<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2023-02-10T11:15:26</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:51681" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.0.7.34-10.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11624" ref_url="https://www.suse.com/security/cve/CVE-2018-11624/" source="CVE"/>
		<reference ref_id="CVE-2018-11625" ref_url="https://www.suse.com/security/cve/CVE-2018-11625/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16641" ref_url="https://www.suse.com/security/cve/CVE-2018-16641/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974/" source="CVE"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977/" source="CVE"/>
		<reference ref_id="CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136/" source="CVE"/>
		<reference ref_id="CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298/" source="CVE"/>
		<reference ref_id="CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299/" source="CVE"/>
		<reference ref_id="CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302/" source="CVE"/>
		<reference ref_id="CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303/" source="CVE"/>
		<reference ref_id="CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304/" source="CVE"/>
		<reference ref_id="CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305/" source="CVE"/>
		<reference ref_id="CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306/" source="CVE"/>
		<reference ref_id="CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307/" source="CVE"/>
		<reference ref_id="CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308/" source="CVE"/>
		<reference ref_id="CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309/" source="CVE"/>
		<reference ref_id="CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711/" source="CVE"/>
		<reference ref_id="CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7396" ref_url="https://www.suse.com/security/cve/CVE-2019-7396/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27756" ref_url="https://www.suse.com/security/cve/CVE-2020-27756/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27758" ref_url="https://www.suse.com/security/cve/CVE-2020-27758/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599/" source="CVE"/>
		<reference ref_id="CVE-2021-20241" ref_url="https://www.suse.com/security/cve/CVE-2021-20241/" source="CVE"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20311" ref_url="https://www.suse.com/security/cve/CVE-2021-20311/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.0.7.34-10.15.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11624/">CVE-2018-11624</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11625/">CVE-2018-11625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16641/">CVE-2018-16641</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7396/">CVE-2019-7396</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27756/">CVE-2020-27756</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27758/">CVE-2020-27758</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20241/">CVE-2021-20241</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20311/">CVE-2021-20311</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629076" comment="ImageMagick-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629077" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629080" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629082" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629083" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51682" version="1" class="patch">
	<metadata>
		<title>Mesa-20.2.4-57.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-20.2.4-57.13 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628228" comment="Mesa-20.2.4-57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628232" comment="Mesa-dri-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684212" comment="Mesa-dri-nouveau-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628235" comment="Mesa-gallium-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628238" comment="Mesa-libEGL1-20.2.4-57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628241" comment="Mesa-libGL1-20.2.4-57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628250" comment="Mesa-libglapi0-20.2.4-57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628252" comment="Mesa-libva-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628258" comment="libgbm1-20.2.4-57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684214" comment="libvdpau_nouveau-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628260" comment="libvdpau_r300-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628261" comment="libvdpau_r600-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628262" comment="libvdpau_radeonsi-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628263" comment="libvulkan_intel-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628264" comment="libvulkan_radeon-20.2.4-57.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628266" comment="libxatracker2-1.0.0-57.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51683" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-78.10.0-8.38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2012-2808" ref_url="https://www.suse.com/security/cve/CVE-2012-2808/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2014-8642" ref_url="https://www.suse.com/security/cve/CVE-2014-8642/" source="CVE"/>
		<reference ref_id="CVE-2014-8643" ref_url="https://www.suse.com/security/cve/CVE-2014-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-0798" ref_url="https://www.suse.com/security/cve/CVE-2015-0798/" source="CVE"/>
		<reference ref_id="CVE-2015-0799" ref_url="https://www.suse.com/security/cve/CVE-2015-0799/" source="CVE"/>
		<reference ref_id="CVE-2015-0800" ref_url="https://www.suse.com/security/cve/CVE-2015-0800/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0802" ref_url="https://www.suse.com/security/cve/CVE-2015-0802/" source="CVE"/>
		<reference ref_id="CVE-2015-0803" ref_url="https://www.suse.com/security/cve/CVE-2015-0803/" source="CVE"/>
		<reference ref_id="CVE-2015-0804" ref_url="https://www.suse.com/security/cve/CVE-2015-0804/" source="CVE"/>
		<reference ref_id="CVE-2015-0805" ref_url="https://www.suse.com/security/cve/CVE-2015-0805/" source="CVE"/>
		<reference ref_id="CVE-2015-0806" ref_url="https://www.suse.com/security/cve/CVE-2015-0806/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0808" ref_url="https://www.suse.com/security/cve/CVE-2015-0808/" source="CVE"/>
		<reference ref_id="CVE-2015-0810" ref_url="https://www.suse.com/security/cve/CVE-2015-0810/" source="CVE"/>
		<reference ref_id="CVE-2015-0811" ref_url="https://www.suse.com/security/cve/CVE-2015-0811/" source="CVE"/>
		<reference ref_id="CVE-2015-0812" ref_url="https://www.suse.com/security/cve/CVE-2015-0812/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0819" ref_url="https://www.suse.com/security/cve/CVE-2015-0819/" source="CVE"/>
		<reference ref_id="CVE-2015-0820" ref_url="https://www.suse.com/security/cve/CVE-2015-0820/" source="CVE"/>
		<reference ref_id="CVE-2015-0821" ref_url="https://www.suse.com/security/cve/CVE-2015-0821/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0823" ref_url="https://www.suse.com/security/cve/CVE-2015-0823/" source="CVE"/>
		<reference ref_id="CVE-2015-0824" ref_url="https://www.suse.com/security/cve/CVE-2015-0824/" source="CVE"/>
		<reference ref_id="CVE-2015-0825" ref_url="https://www.suse.com/security/cve/CVE-2015-0825/" source="CVE"/>
		<reference ref_id="CVE-2015-0826" ref_url="https://www.suse.com/security/cve/CVE-2015-0826/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0828" ref_url="https://www.suse.com/security/cve/CVE-2015-0828/" source="CVE"/>
		<reference ref_id="CVE-2015-0829" ref_url="https://www.suse.com/security/cve/CVE-2015-0829/" source="CVE"/>
		<reference ref_id="CVE-2015-0830" ref_url="https://www.suse.com/security/cve/CVE-2015-0830/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0832" ref_url="https://www.suse.com/security/cve/CVE-2015-0832/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0834" ref_url="https://www.suse.com/security/cve/CVE-2015-0834/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2706" ref_url="https://www.suse.com/security/cve/CVE-2015-2706/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2711" ref_url="https://www.suse.com/security/cve/CVE-2015-2711/" source="CVE"/>
		<reference ref_id="CVE-2015-2712" ref_url="https://www.suse.com/security/cve/CVE-2015-2712/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2715" ref_url="https://www.suse.com/security/cve/CVE-2015-2715/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2717" ref_url="https://www.suse.com/security/cve/CVE-2015-2717/" source="CVE"/>
		<reference ref_id="CVE-2015-2718" ref_url="https://www.suse.com/security/cve/CVE-2015-2718/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2742" ref_url="https://www.suse.com/security/cve/CVE-2015-2742/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4476" ref_url="https://www.suse.com/security/cve/CVE-2015-4476/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4483" ref_url="https://www.suse.com/security/cve/CVE-2015-4483/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4490" ref_url="https://www.suse.com/security/cve/CVE-2015-4490/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4502" ref_url="https://www.suse.com/security/cve/CVE-2015-4502/" source="CVE"/>
		<reference ref_id="CVE-2015-4503" ref_url="https://www.suse.com/security/cve/CVE-2015-4503/" source="CVE"/>
		<reference ref_id="CVE-2015-4504" ref_url="https://www.suse.com/security/cve/CVE-2015-4504/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4507" ref_url="https://www.suse.com/security/cve/CVE-2015-4507/" source="CVE"/>
		<reference ref_id="CVE-2015-4508" ref_url="https://www.suse.com/security/cve/CVE-2015-4508/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4512" ref_url="https://www.suse.com/security/cve/CVE-2015-4512/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4515" ref_url="https://www.suse.com/security/cve/CVE-2015-4515/" source="CVE"/>
		<reference ref_id="CVE-2015-4516" ref_url="https://www.suse.com/security/cve/CVE-2015-4516/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4518" ref_url="https://www.suse.com/security/cve/CVE-2015-4518/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7184" ref_url="https://www.suse.com/security/cve/CVE-2015-7184/" source="CVE"/>
		<reference ref_id="CVE-2015-7185" ref_url="https://www.suse.com/security/cve/CVE-2015-7185/" source="CVE"/>
		<reference ref_id="CVE-2015-7186" ref_url="https://www.suse.com/security/cve/CVE-2015-7186/" source="CVE"/>
		<reference ref_id="CVE-2015-7187" ref_url="https://www.suse.com/security/cve/CVE-2015-7187/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7190" ref_url="https://www.suse.com/security/cve/CVE-2015-7190/" source="CVE"/>
		<reference ref_id="CVE-2015-7191" ref_url="https://www.suse.com/security/cve/CVE-2015-7191/" source="CVE"/>
		<reference ref_id="CVE-2015-7192" ref_url="https://www.suse.com/security/cve/CVE-2015-7192/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7195" ref_url="https://www.suse.com/security/cve/CVE-2015-7195/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7203" ref_url="https://www.suse.com/security/cve/CVE-2015-7203/" source="CVE"/>
		<reference ref_id="CVE-2015-7204" ref_url="https://www.suse.com/security/cve/CVE-2015-7204/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7208" ref_url="https://www.suse.com/security/cve/CVE-2015-7208/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7211" ref_url="https://www.suse.com/security/cve/CVE-2015-7211/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7215" ref_url="https://www.suse.com/security/cve/CVE-2015-7215/" source="CVE"/>
		<reference ref_id="CVE-2015-7216" ref_url="https://www.suse.com/security/cve/CVE-2015-7216/" source="CVE"/>
		<reference ref_id="CVE-2015-7217" ref_url="https://www.suse.com/security/cve/CVE-2015-7217/" source="CVE"/>
		<reference ref_id="CVE-2015-7218" ref_url="https://www.suse.com/security/cve/CVE-2015-7218/" source="CVE"/>
		<reference ref_id="CVE-2015-7219" ref_url="https://www.suse.com/security/cve/CVE-2015-7219/" source="CVE"/>
		<reference ref_id="CVE-2015-7220" ref_url="https://www.suse.com/security/cve/CVE-2015-7220/" source="CVE"/>
		<reference ref_id="CVE-2015-7221" ref_url="https://www.suse.com/security/cve/CVE-2015-7221/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7223" ref_url="https://www.suse.com/security/cve/CVE-2015-7223/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1933" ref_url="https://www.suse.com/security/cve/CVE-2016-1933/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1937" ref_url="https://www.suse.com/security/cve/CVE-2016-1937/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1939" ref_url="https://www.suse.com/security/cve/CVE-2016-1939/" source="CVE"/>
		<reference ref_id="CVE-2016-1942" ref_url="https://www.suse.com/security/cve/CVE-2016-1942/" source="CVE"/>
		<reference ref_id="CVE-2016-1943" ref_url="https://www.suse.com/security/cve/CVE-2016-1943/" source="CVE"/>
		<reference ref_id="CVE-2016-1944" ref_url="https://www.suse.com/security/cve/CVE-2016-1944/" source="CVE"/>
		<reference ref_id="CVE-2016-1945" ref_url="https://www.suse.com/security/cve/CVE-2016-1945/" source="CVE"/>
		<reference ref_id="CVE-2016-1946" ref_url="https://www.suse.com/security/cve/CVE-2016-1946/" source="CVE"/>
		<reference ref_id="CVE-2016-1947" ref_url="https://www.suse.com/security/cve/CVE-2016-1947/" source="CVE"/>
		<reference ref_id="CVE-2016-1949" ref_url="https://www.suse.com/security/cve/CVE-2016-1949/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1959" ref_url="https://www.suse.com/security/cve/CVE-2016-1959/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1963" ref_url="https://www.suse.com/security/cve/CVE-2016-1963/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1967" ref_url="https://www.suse.com/security/cve/CVE-2016-1967/" source="CVE"/>
		<reference ref_id="CVE-2016-1968" ref_url="https://www.suse.com/security/cve/CVE-2016-1968/" source="CVE"/>
		<reference ref_id="CVE-2016-1970" ref_url="https://www.suse.com/security/cve/CVE-2016-1970/" source="CVE"/>
		<reference ref_id="CVE-2016-1971" ref_url="https://www.suse.com/security/cve/CVE-2016-1971/" source="CVE"/>
		<reference ref_id="CVE-2016-1972" ref_url="https://www.suse.com/security/cve/CVE-2016-1972/" source="CVE"/>
		<reference ref_id="CVE-2016-1973" ref_url="https://www.suse.com/security/cve/CVE-2016-1973/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1975" ref_url="https://www.suse.com/security/cve/CVE-2016-1975/" source="CVE"/>
		<reference ref_id="CVE-2016-1976" ref_url="https://www.suse.com/security/cve/CVE-2016-1976/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2804" ref_url="https://www.suse.com/security/cve/CVE-2016-2804/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2809" ref_url="https://www.suse.com/security/cve/CVE-2016-2809/" source="CVE"/>
		<reference ref_id="CVE-2016-2810" ref_url="https://www.suse.com/security/cve/CVE-2016-2810/" source="CVE"/>
		<reference ref_id="CVE-2016-2811" ref_url="https://www.suse.com/security/cve/CVE-2016-2811/" source="CVE"/>
		<reference ref_id="CVE-2016-2812" ref_url="https://www.suse.com/security/cve/CVE-2016-2812/" source="CVE"/>
		<reference ref_id="CVE-2016-2813" ref_url="https://www.suse.com/security/cve/CVE-2016-2813/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2816" ref_url="https://www.suse.com/security/cve/CVE-2016-2816/" source="CVE"/>
		<reference ref_id="CVE-2016-2817" ref_url="https://www.suse.com/security/cve/CVE-2016-2817/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2820" ref_url="https://www.suse.com/security/cve/CVE-2016-2820/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2825" ref_url="https://www.suse.com/security/cve/CVE-2016-2825/" source="CVE"/>
		<reference ref_id="CVE-2016-2827" ref_url="https://www.suse.com/security/cve/CVE-2016-2827/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2829" ref_url="https://www.suse.com/security/cve/CVE-2016-2829/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2832" ref_url="https://www.suse.com/security/cve/CVE-2016-2832/" source="CVE"/>
		<reference ref_id="CVE-2016-2833" ref_url="https://www.suse.com/security/cve/CVE-2016-2833/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5251" ref_url="https://www.suse.com/security/cve/CVE-2016-5251/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5253" ref_url="https://www.suse.com/security/cve/CVE-2016-5253/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5255" ref_url="https://www.suse.com/security/cve/CVE-2016-5255/" source="CVE"/>
		<reference ref_id="CVE-2016-5256" ref_url="https://www.suse.com/security/cve/CVE-2016-5256/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5260" ref_url="https://www.suse.com/security/cve/CVE-2016-5260/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5266" ref_url="https://www.suse.com/security/cve/CVE-2016-5266/" source="CVE"/>
		<reference ref_id="CVE-2016-5267" ref_url="https://www.suse.com/security/cve/CVE-2016-5267/" source="CVE"/>
		<reference ref_id="CVE-2016-5268" ref_url="https://www.suse.com/security/cve/CVE-2016-5268/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5271" ref_url="https://www.suse.com/security/cve/CVE-2016-5271/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5273" ref_url="https://www.suse.com/security/cve/CVE-2016-5273/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5275" ref_url="https://www.suse.com/security/cve/CVE-2016-5275/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5279" ref_url="https://www.suse.com/security/cve/CVE-2016-5279/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5282" ref_url="https://www.suse.com/security/cve/CVE-2016-5282/" source="CVE"/>
		<reference ref_id="CVE-2016-5283" ref_url="https://www.suse.com/security/cve/CVE-2016-5283/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5287" ref_url="https://www.suse.com/security/cve/CVE-2016-5287/" source="CVE"/>
		<reference ref_id="CVE-2016-5288" ref_url="https://www.suse.com/security/cve/CVE-2016-5288/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-5293" ref_url="https://www.suse.com/security/cve/CVE-2016-5293/" source="CVE"/>
		<reference ref_id="CVE-2016-5294" ref_url="https://www.suse.com/security/cve/CVE-2016-5294/" source="CVE"/>
		<reference ref_id="CVE-2016-5295" ref_url="https://www.suse.com/security/cve/CVE-2016-5295/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-5298" ref_url="https://www.suse.com/security/cve/CVE-2016-5298/" source="CVE"/>
		<reference ref_id="CVE-2016-5299" ref_url="https://www.suse.com/security/cve/CVE-2016-5299/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9061" ref_url="https://www.suse.com/security/cve/CVE-2016-9061/" source="CVE"/>
		<reference ref_id="CVE-2016-9062" ref_url="https://www.suse.com/security/cve/CVE-2016-9062/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9065" ref_url="https://www.suse.com/security/cve/CVE-2016-9065/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9070" ref_url="https://www.suse.com/security/cve/CVE-2016-9070/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9072" ref_url="https://www.suse.com/security/cve/CVE-2016-9072/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2016-9078" ref_url="https://www.suse.com/security/cve/CVE-2016-9078/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9080" ref_url="https://www.suse.com/security/cve/CVE-2016-9080/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9894" ref_url="https://www.suse.com/security/cve/CVE-2016-9894/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9896" ref_url="https://www.suse.com/security/cve/CVE-2016-9896/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9903" ref_url="https://www.suse.com/security/cve/CVE-2016-9903/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5031" ref_url="https://www.suse.com/security/cve/CVE-2017-5031/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5374" ref_url="https://www.suse.com/security/cve/CVE-2017-5374/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5377" ref_url="https://www.suse.com/security/cve/CVE-2017-5377/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5379" ref_url="https://www.suse.com/security/cve/CVE-2017-5379/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5381" ref_url="https://www.suse.com/security/cve/CVE-2017-5381/" source="CVE"/>
		<reference ref_id="CVE-2017-5382" ref_url="https://www.suse.com/security/cve/CVE-2017-5382/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5384" ref_url="https://www.suse.com/security/cve/CVE-2017-5384/" source="CVE"/>
		<reference ref_id="CVE-2017-5385" ref_url="https://www.suse.com/security/cve/CVE-2017-5385/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5387" ref_url="https://www.suse.com/security/cve/CVE-2017-5387/" source="CVE"/>
		<reference ref_id="CVE-2017-5388" ref_url="https://www.suse.com/security/cve/CVE-2017-5388/" source="CVE"/>
		<reference ref_id="CVE-2017-5389" ref_url="https://www.suse.com/security/cve/CVE-2017-5389/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5391" ref_url="https://www.suse.com/security/cve/CVE-2017-5391/" source="CVE"/>
		<reference ref_id="CVE-2017-5392" ref_url="https://www.suse.com/security/cve/CVE-2017-5392/" source="CVE"/>
		<reference ref_id="CVE-2017-5393" ref_url="https://www.suse.com/security/cve/CVE-2017-5393/" source="CVE"/>
		<reference ref_id="CVE-2017-5394" ref_url="https://www.suse.com/security/cve/CVE-2017-5394/" source="CVE"/>
		<reference ref_id="CVE-2017-5395" ref_url="https://www.suse.com/security/cve/CVE-2017-5395/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5415" ref_url="https://www.suse.com/security/cve/CVE-2017-5415/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5417" ref_url="https://www.suse.com/security/cve/CVE-2017-5417/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5420" ref_url="https://www.suse.com/security/cve/CVE-2017-5420/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5427" ref_url="https://www.suse.com/security/cve/CVE-2017-5427/" source="CVE"/>
		<reference ref_id="CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7760" ref_url="https://www.suse.com/security/cve/CVE-2017-7760/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7766" ref_url="https://www.suse.com/security/cve/CVE-2017-7766/" source="CVE"/>
		<reference ref_id="CVE-2017-7767" ref_url="https://www.suse.com/security/cve/CVE-2017-7767/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7843" ref_url="https://www.suse.com/security/cve/CVE-2017-7843/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-78.10.0-8.38.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2808/">CVE-2012-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8642/">CVE-2014-8642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8643/">CVE-2014-8643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0798/">CVE-2015-0798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0799/">CVE-2015-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0800/">CVE-2015-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0802/">CVE-2015-0802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0803/">CVE-2015-0803</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0804/">CVE-2015-0804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0805/">CVE-2015-0805</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0806/">CVE-2015-0806</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0808/">CVE-2015-0808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0810/">CVE-2015-0810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0811/">CVE-2015-0811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0812/">CVE-2015-0812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0819/">CVE-2015-0819</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0820/">CVE-2015-0820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0821/">CVE-2015-0821</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0823/">CVE-2015-0823</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0824/">CVE-2015-0824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0825/">CVE-2015-0825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0826/">CVE-2015-0826</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0828/">CVE-2015-0828</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0829/">CVE-2015-0829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0830/">CVE-2015-0830</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0832/">CVE-2015-0832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0834/">CVE-2015-0834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2706/">CVE-2015-2706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2711/">CVE-2015-2711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2712/">CVE-2015-2712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2715/">CVE-2015-2715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2717/">CVE-2015-2717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2718/">CVE-2015-2718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2742/">CVE-2015-2742</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4476/">CVE-2015-4476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4483/">CVE-2015-4483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4490/">CVE-2015-4490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4502/">CVE-2015-4502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4503/">CVE-2015-4503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4504/">CVE-2015-4504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4507/">CVE-2015-4507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4508/">CVE-2015-4508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4512/">CVE-2015-4512</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4515/">CVE-2015-4515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4516/">CVE-2015-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4518/">CVE-2015-4518</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7184/">CVE-2015-7184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7185/">CVE-2015-7185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7186/">CVE-2015-7186</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7187/">CVE-2015-7187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7190/">CVE-2015-7190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7191/">CVE-2015-7191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7192/">CVE-2015-7192</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7195/">CVE-2015-7195</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7203/">CVE-2015-7203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7204/">CVE-2015-7204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7208/">CVE-2015-7208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7211/">CVE-2015-7211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7215/">CVE-2015-7215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7216/">CVE-2015-7216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7217/">CVE-2015-7217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7218/">CVE-2015-7218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7219/">CVE-2015-7219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7220/">CVE-2015-7220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7221/">CVE-2015-7221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7223/">CVE-2015-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="important" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1933/">CVE-2016-1933</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1937/">CVE-2016-1937</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1939/">CVE-2016-1939</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1942/">CVE-2016-1942</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1943/">CVE-2016-1943</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1944/">CVE-2016-1944</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1945/">CVE-2016-1945</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1946/">CVE-2016-1946</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1947/">CVE-2016-1947</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1949/">CVE-2016-1949</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1959/">CVE-2016-1959</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1963/">CVE-2016-1963</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1967/">CVE-2016-1967</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1968/">CVE-2016-1968</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1970/">CVE-2016-1970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1971/">CVE-2016-1971</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1972/">CVE-2016-1972</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1973/">CVE-2016-1973</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-1975/">CVE-2016-1975</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-1976/">CVE-2016-1976</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2804/">CVE-2016-2804</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2809/">CVE-2016-2809</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2810/">CVE-2016-2810</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2811/">CVE-2016-2811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2812/">CVE-2016-2812</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2813/">CVE-2016-2813</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2816/">CVE-2016-2816</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-2817/">CVE-2016-2817</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-2820/">CVE-2016-2820</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2825/">CVE-2016-2825</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2827/">CVE-2016-2827</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2829/">CVE-2016-2829</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2832/">CVE-2016-2832</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-2833/">CVE-2016-2833</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5251/">CVE-2016-5251</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5253/">CVE-2016-5253</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5255/">CVE-2016-5255</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5256/">CVE-2016-5256</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5260/">CVE-2016-5260</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5266/">CVE-2016-5266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5267/">CVE-2016-5267</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5268/">CVE-2016-5268</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5271/">CVE-2016-5271</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5273/">CVE-2016-5273</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5275/">CVE-2016-5275</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5279/">CVE-2016-5279</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5282/">CVE-2016-5282</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5283/">CVE-2016-5283</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5287/">CVE-2016-5287</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5288/">CVE-2016-5288</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5293/">CVE-2016-5293</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5294/">CVE-2016-5294</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5295/">CVE-2016-5295</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5298/">CVE-2016-5298</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5299/">CVE-2016-5299</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9061/">CVE-2016-9061</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9062/">CVE-2016-9062</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9065/">CVE-2016-9065</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9070/">CVE-2016-9070</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9072/">CVE-2016-9072</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9078/">CVE-2016-9078</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9080/">CVE-2016-9080</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9894/">CVE-2016-9894</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9896/">CVE-2016-9896</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9903/">CVE-2016-9903</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5031/">CVE-2017-5031</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5374/">CVE-2017-5374</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5377/">CVE-2017-5377</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5379/">CVE-2017-5379</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5381/">CVE-2017-5381</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5382/">CVE-2017-5382</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5384/">CVE-2017-5384</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5385/">CVE-2017-5385</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5387/">CVE-2017-5387</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5388/">CVE-2017-5388</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5389/">CVE-2017-5389</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5391/">CVE-2017-5391</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5392/">CVE-2017-5392</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5393/">CVE-2017-5393</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5394/">CVE-2017-5394</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5395/">CVE-2017-5395</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5415/">CVE-2017-5415</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5417/">CVE-2017-5417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5420/">CVE-2017-5420</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5427/">CVE-2017-5427</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7760/">CVE-2017-7760</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7766/">CVE-2017-7766</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7767/">CVE-2017-7767</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7843/">CVE-2017-7843</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<cve impact="important" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629084" comment="MozillaFirefox-78.10.0-8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629086" comment="MozillaFirefox-translations-common-78.10.0-8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629087" comment="MozillaFirefox-translations-other-78.10.0-8.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51684" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-78.10.0-8.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7829" ref_url="https://www.suse.com/security/cve/CVE-2017-7829/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7845" ref_url="https://www.suse.com/security/cve/CVE-2017-7845/" source="CVE"/>
		<reference ref_id="CVE-2017-7846" ref_url="https://www.suse.com/security/cve/CVE-2017-7846/" source="CVE"/>
		<reference ref_id="CVE-2017-7847" ref_url="https://www.suse.com/security/cve/CVE-2017-7847/" source="CVE"/>
		<reference ref_id="CVE-2017-7848" ref_url="https://www.suse.com/security/cve/CVE-2017-7848/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12361" ref_url="https://www.suse.com/security/cve/CVE-2018-12361/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12367" ref_url="https://www.suse.com/security/cve/CVE-2018-12367/" source="CVE"/>
		<reference ref_id="CVE-2018-12371" ref_url="https://www.suse.com/security/cve/CVE-2018-12371/" source="CVE"/>
		<reference ref_id="CVE-2018-12372" ref_url="https://www.suse.com/security/cve/CVE-2018-12372/" source="CVE"/>
		<reference ref_id="CVE-2018-12373" ref_url="https://www.suse.com/security/cve/CVE-2018-12373/" source="CVE"/>
		<reference ref_id="CVE-2018-12374" ref_url="https://www.suse.com/security/cve/CVE-2018-12374/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12391" ref_url="https://www.suse.com/security/cve/CVE-2018-12391/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18509" ref_url="https://www.suse.com/security/cve/CVE-2018-18509/" source="CVE"/>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5161" ref_url="https://www.suse.com/security/cve/CVE-2018-5161/" source="CVE"/>
		<reference ref_id="CVE-2018-5162" ref_url="https://www.suse.com/security/cve/CVE-2018-5162/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5170" ref_url="https://www.suse.com/security/cve/CVE-2018-5170/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5184" ref_url="https://www.suse.com/security/cve/CVE-2018-5184/" source="CVE"/>
		<reference ref_id="CVE-2018-5185" ref_url="https://www.suse.com/security/cve/CVE-2018-5185/" source="CVE"/>
		<reference ref_id="CVE-2018-5187" ref_url="https://www.suse.com/security/cve/CVE-2018-5187/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11703" ref_url="https://www.suse.com/security/cve/CVE-2019-11703/" source="CVE"/>
		<reference ref_id="CVE-2019-11704" ref_url="https://www.suse.com/security/cve/CVE-2019-11704/" source="CVE"/>
		<reference ref_id="CVE-2019-11705" ref_url="https://www.suse.com/security/cve/CVE-2019-11705/" source="CVE"/>
		<reference ref_id="CVE-2019-11706" ref_url="https://www.suse.com/security/cve/CVE-2019-11706/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11739" ref_url="https://www.suse.com/security/cve/CVE-2019-11739/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11755" ref_url="https://www.suse.com/security/cve/CVE-2019-11755/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12397" ref_url="https://www.suse.com/security/cve/CVE-2020-12397/" source="CVE"/>
		<reference ref_id="CVE-2020-12398" ref_url="https://www.suse.com/security/cve/CVE-2020-12398/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="CVE-2020-26970" ref_url="https://www.suse.com/security/cve/CVE-2020-26970/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6792" ref_url="https://www.suse.com/security/cve/CVE-2020-6792/" source="CVE"/>
		<reference ref_id="CVE-2020-6793" ref_url="https://www.suse.com/security/cve/CVE-2020-6793/" source="CVE"/>
		<reference ref_id="CVE-2020-6794" ref_url="https://www.suse.com/security/cve/CVE-2020-6794/" source="CVE"/>
		<reference ref_id="CVE-2020-6795" ref_url="https://www.suse.com/security/cve/CVE-2020-6795/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-23991" ref_url="https://www.suse.com/security/cve/CVE-2021-23991/" source="CVE"/>
		<reference ref_id="CVE-2021-23993" ref_url="https://www.suse.com/security/cve/CVE-2021-23993/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29948" ref_url="https://www.suse.com/security/cve/CVE-2021-29948/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-78.10.0-8.23.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7829/">CVE-2017-7829</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7845/">CVE-2017-7845</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7846/">CVE-2017-7846</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7847/">CVE-2017-7847</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7848/">CVE-2017-7848</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12361/">CVE-2018-12361</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12367/">CVE-2018-12367</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12371/">CVE-2018-12371</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12372/">CVE-2018-12372</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12373/">CVE-2018-12373</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12374/">CVE-2018-12374</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12391/">CVE-2018-12391</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18509/">CVE-2018-18509</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5161/">CVE-2018-5161</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5162/">CVE-2018-5162</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5170/">CVE-2018-5170</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5184/">CVE-2018-5184</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5185/">CVE-2018-5185</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5187/">CVE-2018-5187</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11703/">CVE-2019-11703</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11704/">CVE-2019-11704</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11705/">CVE-2019-11705</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11706/">CVE-2019-11706</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<cve impact="important" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11739/">CVE-2019-11739</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11755/">CVE-2019-11755</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12397/">CVE-2020-12397</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12398/">CVE-2020-12398</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26970/">CVE-2020-26970</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6792/">CVE-2020-6792</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6793/">CVE-2020-6793</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6794/">CVE-2020-6794</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6795/">CVE-2020-6795</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23991/">CVE-2021-23991</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23993/">CVE-2021-23993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29948/">CVE-2021-29948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694708" comment="MozillaThunderbird-78.10.0-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694709" comment="MozillaThunderbird-translations-common-78.10.0-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694710" comment="MozillaThunderbird-translations-other-78.10.0-bp153.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51685" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.22.10-3.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<reference ref_id="CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.22.10-3.7.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629088" comment="NetworkManager-1.22.10-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684219" comment="NetworkManager-lang-1.22.10-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628810" comment="libnm0-1.22.10-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628811" comment="typelib-1_0-NM-1_0-1.22.10-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51686" version="1" class="patch">
	<metadata>
		<title>NetworkManager-applet-1.8.24-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-6590" ref_url="https://www.suse.com/security/cve/CVE-2017-6590/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-applet-1.8.24-5.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6590/">CVE-2017-6590</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489177" comment="NetworkManager-applet-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489178" comment="NetworkManager-applet-lang-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489179" comment="NetworkManager-connection-editor-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487559" comment="libnma0-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487560" comment="nma-data-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487561" comment="typelib-1_0-NMA-1_0-1.8.24-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51687" version="1" class="patch">
	<metadata>
		<title>NetworkManager-vpnc-1.2.6-lp153.1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10900" ref_url="https://www.suse.com/security/cve/CVE-2018-10900/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-vpnc-1.2.6-lp153.1.31 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10900/">CVE-2018-10900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694711" comment="NetworkManager-vpnc-1.2.6-lp153.1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694712" comment="NetworkManager-vpnc-gnome-1.2.6-lp153.1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694713" comment="NetworkManager-vpnc-lang-1.2.6-lp153.1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51688" version="1" class="patch">
	<metadata>
		<title>PackageKit-1.1.13-4.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<reference ref_id="CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-1.1.13-4.20.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629089" comment="PackageKit-1.1.13-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629090" comment="PackageKit-backend-zypp-1.1.13-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684220" comment="PackageKit-gstreamer-plugin-1.1.13-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684221" comment="PackageKit-gtk3-module-1.1.13-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629092" comment="PackageKit-lang-1.1.13-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629093" comment="libpackagekit-glib2-18-1.1.13-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629095" comment="typelib-1_0-PackageKitGlib-1_0-1.1.13-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51689" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.55-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.55-3.14 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487192" comment="accountsservice-0.6.55-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487194" comment="accountsservice-lang-0.6.55-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487195" comment="libaccountsservice0-0.6.55-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487196" comment="typelib-1_0-AccountsService-1_0-0.6.55-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51690" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.43-3.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583/" source="CVE"/>
		<reference ref_id="CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109/" source="CVE"/>
		<reference ref_id="CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228/" source="CVE"/>
		<reference ref_id="CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736/" source="CVE"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979/" source="CVE"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081/" source="CVE"/>
		<reference ref_id="CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082/" source="CVE"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2020-11984" ref_url="https://www.suse.com/security/cve/CVE-2020-11984/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.43-3.17.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11984/">CVE-2020-11984</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628269" comment="apache2-2.4.43-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629758" comment="apache2-doc-2.4.43-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694714" comment="apache2-example-pages-2.4.43-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628270" comment="apache2-prefork-2.4.43-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628271" comment="apache2-utils-2.4.43-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51691" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php7-7.4.6-3.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3622" ref_url="https://www.suse.com/security/cve/CVE-2014-3622/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-9426" ref_url="https://www.suse.com/security/cve/CVE-2014-9426/" source="CVE"/>
		<reference ref_id="CVE-2014-9427" ref_url="https://www.suse.com/security/cve/CVE-2014-9427/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1351" ref_url="https://www.suse.com/security/cve/CVE-2015-1351/" source="CVE"/>
		<reference ref_id="CVE-2015-1352" ref_url="https://www.suse.com/security/cve/CVE-2015-1352/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416/" source="CVE"/>
		<reference ref_id="CVE-2017-9120" ref_url="https://www.suse.com/security/cve/CVE-2017-9120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-1000888" ref_url="https://www.suse.com/security/cve/CVE-2018-1000888/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="CVE-2018-19935" ref_url="https://www.suse.com/security/cve/CVE-2018-19935/" source="CVE"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="CVE-2020-7062" ref_url="https://www.suse.com/security/cve/CVE-2020-7062/" source="CVE"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<reference ref_id="CVE-2020-7069" ref_url="https://www.suse.com/security/cve/CVE-2020-7069/" source="CVE"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php7-7.4.6-3.17.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-3622/">CVE-2014-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9426/">CVE-2014-9426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9427/">CVE-2014-9427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1351/">CVE-2015-1351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1352/">CVE-2015-1352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9120/">CVE-2017-9120</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000888/">CVE-2018-1000888</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19935/">CVE-2018-19935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7062/">CVE-2020-7062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7069/">CVE-2020-7069</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630004" comment="apache2-mod_php7-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630005" comment="php7-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630009" comment="php7-ctype-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630013" comment="php7-dom-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630023" comment="php7-iconv-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630025" comment="php7-json-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630028" comment="php7-mysql-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630033" comment="php7-pdo-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630034" comment="php7-pgsql-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630043" comment="php7-sqlite-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630048" comment="php7-tokenizer-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630049" comment="php7-xmlreader-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630051" comment="php7-xmlwriter-7.4.6-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51692" version="1" class="patch">
	<metadata>
		<title>apparmor-abstractions-2.13.6-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the apparmor-abstractions-2.13.6-1.31 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628272" comment="apparmor-abstractions-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628273" comment="apparmor-docs-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628274" comment="apparmor-parser-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628275" comment="apparmor-parser-lang-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628276" comment="apparmor-profiles-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628277" comment="apparmor-utils-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628278" comment="apparmor-utils-lang-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628281" comment="perl-apparmor-2.13.6-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628282" comment="python3-apparmor-2.13.6-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51693" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.9.2-2.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.9.2-2.27 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488880" comment="argyllcms-1.9.2-2.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51694" version="1" class="patch">
	<metadata>
		<title>ark-20.04.2-bp153.2.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-16116" ref_url="https://www.suse.com/security/cve/CVE-2020-16116/" source="CVE"/>
		<reference ref_id="CVE-2020-24654" ref_url="https://www.suse.com/security/cve/CVE-2020-24654/" source="CVE"/>
		<description>
These are all security issues fixed in the ark-20.04.2-bp153.2.25 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-16116/">CVE-2020-16116</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24654/">CVE-2020-24654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694715" comment="ark-20.04.2-bp153.2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694716" comment="ark-lang-20.04.2-bp153.2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694717" comment="libkerfuffle20-20.04.2-bp153.2.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51695" version="1" class="patch">
	<metadata>
		<title>augeas-1.10.1-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.10.1-1.11 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480071" comment="augeas-1.10.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480073" comment="augeas-lenses-1.10.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480074" comment="libaugeas0-1.10.1-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51696" version="1" class="patch">
	<metadata>
		<title>autofs-5.1.3-7.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.1.3-7.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694718" comment="autofs-5.1.3-7.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51697" version="1" class="patch">
	<metadata>
		<title>autoyast2-4.3.77-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-18905" ref_url="https://www.suse.com/security/cve/CVE-2019-18905/" source="CVE"/>
		<description>
These are all security issues fixed in the autoyast2-4.3.77-1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18905/">CVE-2019-18905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628289" comment="autoyast2-4.3.77-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628290" comment="autoyast2-installation-4.3.77-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51698" version="1" class="patch">
	<metadata>
		<title>avahi-0.7-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.7-3.9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694719" comment="avahi-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694720" comment="avahi-lang-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694721" comment="libavahi-client3-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694722" comment="libavahi-client3-32bit-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694723" comment="libavahi-common3-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694724" comment="libavahi-common3-32bit-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694725" comment="libavahi-core7-0.7-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51699" version="1" class="patch">
	<metadata>
		<title>bash-4.4-17.83 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.4-17.83 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628304" comment="bash-4.4-17.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628306" comment="bash-doc-4.4-17.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628307" comment="bash-lang-4.4-17.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628308" comment="libreadline7-7.0-17.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628311" comment="readline-doc-7.0-17.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51700" version="1" class="patch">
	<metadata>
		<title>bind-9.16.6-20.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3214" ref_url="https://www.suse.com/security/cve/CVE-2014-3214/" source="CVE"/>
		<reference ref_id="CVE-2014-3859" ref_url="https://www.suse.com/security/cve/CVE-2014-3859/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2014-8680" ref_url="https://www.suse.com/security/cve/CVE-2014-8680/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-5986" ref_url="https://www.suse.com/security/cve/CVE-2015-5986/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8461" ref_url="https://www.suse.com/security/cve/CVE-2015-8461/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2015-8705" ref_url="https://www.suse.com/security/cve/CVE-2015-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2088" ref_url="https://www.suse.com/security/cve/CVE-2016-2088/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="CVE-2016-9778" ref_url="https://www.suse.com/security/cve/CVE-2016-9778/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="CVE-2017-3140" ref_url="https://www.suse.com/security/cve/CVE-2017-3140/" source="CVE"/>
		<reference ref_id="CVE-2017-3141" ref_url="https://www.suse.com/security/cve/CVE-2017-3141/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="CVE-2018-5736" ref_url="https://www.suse.com/security/cve/CVE-2018-5736/" source="CVE"/>
		<reference ref_id="CVE-2018-5737" ref_url="https://www.suse.com/security/cve/CVE-2018-5737/" source="CVE"/>
		<reference ref_id="CVE-2018-5738" ref_url="https://www.suse.com/security/cve/CVE-2018-5738/" source="CVE"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5744" ref_url="https://www.suse.com/security/cve/CVE-2018-5744/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="CVE-2019-6467" ref_url="https://www.suse.com/security/cve/CVE-2019-6467/" source="CVE"/>
		<reference ref_id="CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471/" source="CVE"/>
		<reference ref_id="CVE-2019-6475" ref_url="https://www.suse.com/security/cve/CVE-2019-6475/" source="CVE"/>
		<reference ref_id="CVE-2019-6476" ref_url="https://www.suse.com/security/cve/CVE-2019-6476/" source="CVE"/>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618/" source="CVE"/>
		<reference ref_id="CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619/" source="CVE"/>
		<reference ref_id="CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620/" source="CVE"/>
		<reference ref_id="CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621/" source="CVE"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.16.6-20.39 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3214/">CVE-2014-3214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3859/">CVE-2014-3859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8680/">CVE-2014-8680</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5986/">CVE-2015-5986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8461/">CVE-2015-8461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8705/">CVE-2015-8705</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2088/">CVE-2016-2088</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9778/">CVE-2016-9778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3140/">CVE-2017-3140</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3141/">CVE-2017-3141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5736/">CVE-2018-5736</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5737/">CVE-2018-5737</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5738/">CVE-2018-5738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5744/">CVE-2018-5744</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6467/">CVE-2019-6467</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6475/">CVE-2019-6475</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6476/">CVE-2019-6476</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629761" comment="bind-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629762" comment="bind-chrootenv-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628313" comment="bind-utils-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628314" comment="libbind9-1600-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628315" comment="libdns1605-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628317" comment="libirs1601-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628318" comment="libisc1606-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628319" comment="libisccc1600-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628320" comment="libisccfg1600-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628321" comment="libns1604-9.16.6-20.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628322" comment="python3-bind-9.16.6-20.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51701" version="1" class="patch">
	<metadata>
		<title>binutils-2.35.1-7.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.35.1-7.18.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628323" comment="binutils-2.35.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628325" comment="libctf-nobfd0-2.35.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628326" comment="libctf0-2.35.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51702" version="1" class="patch">
	<metadata>
		<title>blktrace-1.1.0+git.20170126-3.3.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10689" ref_url="https://www.suse.com/security/cve/CVE-2018-10689/" source="CVE"/>
		<description>
These are all security issues fixed in the blktrace-1.1.0+git.20170126-3.3.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10689/">CVE-2018-10689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487734" comment="blktrace-1.1.0+git.20170126-3.3.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51703" version="1" class="patch">
	<metadata>
		<title>bluez-5.55-1.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.55-1.57 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628327" comment="bluez-5.55-1.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628328" comment="libbluetooth3-5.55-1.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51704" version="1" class="patch">
	<metadata>
		<title>btrfsmaintenance-0.4.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-14722" ref_url="https://www.suse.com/security/cve/CVE-2018-14722/" source="CVE"/>
		<description>
These are all security issues fixed in the btrfsmaintenance-0.4.2-1.11 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14722/">CVE-2018-14722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481038" comment="btrfsmaintenance-0.4.2-1.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51705" version="1" class="patch">
	<metadata>
		<title>bubblewrap-0.4.1-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-12439" ref_url="https://www.suse.com/security/cve/CVE-2019-12439/" source="CVE"/>
		<reference ref_id="CVE-2020-5291" ref_url="https://www.suse.com/security/cve/CVE-2020-5291/" source="CVE"/>
		<description>
These are all security issues fixed in the bubblewrap-0.4.1-1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12439/">CVE-2019-12439</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5291/">CVE-2020-5291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481773" comment="bubblewrap-0.4.1-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51706" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-5.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-5.11.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694726" comment="bzip2-1.0.6-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694727" comment="libbz2-1-1.0.6-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694728" comment="libbz2-1-32bit-1.0.6-5.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51707" version="1" class="patch">
	<metadata>
		<title>chromium-90.0.4430.212-bp153.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574/" source="CVE"/>
		<reference ref_id="CVE-2014-7899" ref_url="https://www.suse.com/security/cve/CVE-2014-7899/" source="CVE"/>
		<reference ref_id="CVE-2014-7900" ref_url="https://www.suse.com/security/cve/CVE-2014-7900/" source="CVE"/>
		<reference ref_id="CVE-2014-7901" ref_url="https://www.suse.com/security/cve/CVE-2014-7901/" source="CVE"/>
		<reference ref_id="CVE-2014-7902" ref_url="https://www.suse.com/security/cve/CVE-2014-7902/" source="CVE"/>
		<reference ref_id="CVE-2014-7903" ref_url="https://www.suse.com/security/cve/CVE-2014-7903/" source="CVE"/>
		<reference ref_id="CVE-2014-7904" ref_url="https://www.suse.com/security/cve/CVE-2014-7904/" source="CVE"/>
		<reference ref_id="CVE-2014-7905" ref_url="https://www.suse.com/security/cve/CVE-2014-7905/" source="CVE"/>
		<reference ref_id="CVE-2014-7906" ref_url="https://www.suse.com/security/cve/CVE-2014-7906/" source="CVE"/>
		<reference ref_id="CVE-2014-7907" ref_url="https://www.suse.com/security/cve/CVE-2014-7907/" source="CVE"/>
		<reference ref_id="CVE-2014-7908" ref_url="https://www.suse.com/security/cve/CVE-2014-7908/" source="CVE"/>
		<reference ref_id="CVE-2014-7909" ref_url="https://www.suse.com/security/cve/CVE-2014-7909/" source="CVE"/>
		<reference ref_id="CVE-2014-7910" ref_url="https://www.suse.com/security/cve/CVE-2014-7910/" source="CVE"/>
		<reference ref_id="CVE-2014-7923" ref_url="https://www.suse.com/security/cve/CVE-2014-7923/" source="CVE"/>
		<reference ref_id="CVE-2014-7924" ref_url="https://www.suse.com/security/cve/CVE-2014-7924/" source="CVE"/>
		<reference ref_id="CVE-2014-7925" ref_url="https://www.suse.com/security/cve/CVE-2014-7925/" source="CVE"/>
		<reference ref_id="CVE-2014-7926" ref_url="https://www.suse.com/security/cve/CVE-2014-7926/" source="CVE"/>
		<reference ref_id="CVE-2014-7927" ref_url="https://www.suse.com/security/cve/CVE-2014-7927/" source="CVE"/>
		<reference ref_id="CVE-2014-7928" ref_url="https://www.suse.com/security/cve/CVE-2014-7928/" source="CVE"/>
		<reference ref_id="CVE-2014-7929" ref_url="https://www.suse.com/security/cve/CVE-2014-7929/" source="CVE"/>
		<reference ref_id="CVE-2014-7930" ref_url="https://www.suse.com/security/cve/CVE-2014-7930/" source="CVE"/>
		<reference ref_id="CVE-2014-7932" ref_url="https://www.suse.com/security/cve/CVE-2014-7932/" source="CVE"/>
		<reference ref_id="CVE-2014-7933" ref_url="https://www.suse.com/security/cve/CVE-2014-7933/" source="CVE"/>
		<reference ref_id="CVE-2014-7934" ref_url="https://www.suse.com/security/cve/CVE-2014-7934/" source="CVE"/>
		<reference ref_id="CVE-2014-7935" ref_url="https://www.suse.com/security/cve/CVE-2014-7935/" source="CVE"/>
		<reference ref_id="CVE-2014-7936" ref_url="https://www.suse.com/security/cve/CVE-2014-7936/" source="CVE"/>
		<reference ref_id="CVE-2014-7937" ref_url="https://www.suse.com/security/cve/CVE-2014-7937/" source="CVE"/>
		<reference ref_id="CVE-2014-7938" ref_url="https://www.suse.com/security/cve/CVE-2014-7938/" source="CVE"/>
		<reference ref_id="CVE-2014-7939" ref_url="https://www.suse.com/security/cve/CVE-2014-7939/" source="CVE"/>
		<reference ref_id="CVE-2014-7940" ref_url="https://www.suse.com/security/cve/CVE-2014-7940/" source="CVE"/>
		<reference ref_id="CVE-2014-7941" ref_url="https://www.suse.com/security/cve/CVE-2014-7941/" source="CVE"/>
		<reference ref_id="CVE-2014-7942" ref_url="https://www.suse.com/security/cve/CVE-2014-7942/" source="CVE"/>
		<reference ref_id="CVE-2014-7943" ref_url="https://www.suse.com/security/cve/CVE-2014-7943/" source="CVE"/>
		<reference ref_id="CVE-2014-7944" ref_url="https://www.suse.com/security/cve/CVE-2014-7944/" source="CVE"/>
		<reference ref_id="CVE-2014-7945" ref_url="https://www.suse.com/security/cve/CVE-2014-7945/" source="CVE"/>
		<reference ref_id="CVE-2014-7946" ref_url="https://www.suse.com/security/cve/CVE-2014-7946/" source="CVE"/>
		<reference ref_id="CVE-2014-7947" ref_url="https://www.suse.com/security/cve/CVE-2014-7947/" source="CVE"/>
		<reference ref_id="CVE-2014-7948" ref_url="https://www.suse.com/security/cve/CVE-2014-7948/" source="CVE"/>
		<reference ref_id="CVE-2015-1205" ref_url="https://www.suse.com/security/cve/CVE-2015-1205/" source="CVE"/>
		<reference ref_id="CVE-2015-1209" ref_url="https://www.suse.com/security/cve/CVE-2015-1209/" source="CVE"/>
		<reference ref_id="CVE-2015-1210" ref_url="https://www.suse.com/security/cve/CVE-2015-1210/" source="CVE"/>
		<reference ref_id="CVE-2015-1211" ref_url="https://www.suse.com/security/cve/CVE-2015-1211/" source="CVE"/>
		<reference ref_id="CVE-2015-1212" ref_url="https://www.suse.com/security/cve/CVE-2015-1212/" source="CVE"/>
		<reference ref_id="CVE-2015-1213" ref_url="https://www.suse.com/security/cve/CVE-2015-1213/" source="CVE"/>
		<reference ref_id="CVE-2015-1214" ref_url="https://www.suse.com/security/cve/CVE-2015-1214/" source="CVE"/>
		<reference ref_id="CVE-2015-1215" ref_url="https://www.suse.com/security/cve/CVE-2015-1215/" source="CVE"/>
		<reference ref_id="CVE-2015-1216" ref_url="https://www.suse.com/security/cve/CVE-2015-1216/" source="CVE"/>
		<reference ref_id="CVE-2015-1217" ref_url="https://www.suse.com/security/cve/CVE-2015-1217/" source="CVE"/>
		<reference ref_id="CVE-2015-1218" ref_url="https://www.suse.com/security/cve/CVE-2015-1218/" source="CVE"/>
		<reference ref_id="CVE-2015-1219" ref_url="https://www.suse.com/security/cve/CVE-2015-1219/" source="CVE"/>
		<reference ref_id="CVE-2015-1220" ref_url="https://www.suse.com/security/cve/CVE-2015-1220/" source="CVE"/>
		<reference ref_id="CVE-2015-1221" ref_url="https://www.suse.com/security/cve/CVE-2015-1221/" source="CVE"/>
		<reference ref_id="CVE-2015-1222" ref_url="https://www.suse.com/security/cve/CVE-2015-1222/" source="CVE"/>
		<reference ref_id="CVE-2015-1223" ref_url="https://www.suse.com/security/cve/CVE-2015-1223/" source="CVE"/>
		<reference ref_id="CVE-2015-1224" ref_url="https://www.suse.com/security/cve/CVE-2015-1224/" source="CVE"/>
		<reference ref_id="CVE-2015-1225" ref_url="https://www.suse.com/security/cve/CVE-2015-1225/" source="CVE"/>
		<reference ref_id="CVE-2015-1226" ref_url="https://www.suse.com/security/cve/CVE-2015-1226/" source="CVE"/>
		<reference ref_id="CVE-2015-1227" ref_url="https://www.suse.com/security/cve/CVE-2015-1227/" source="CVE"/>
		<reference ref_id="CVE-2015-1228" ref_url="https://www.suse.com/security/cve/CVE-2015-1228/" source="CVE"/>
		<reference ref_id="CVE-2015-1229" ref_url="https://www.suse.com/security/cve/CVE-2015-1229/" source="CVE"/>
		<reference ref_id="CVE-2015-1230" ref_url="https://www.suse.com/security/cve/CVE-2015-1230/" source="CVE"/>
		<reference ref_id="CVE-2015-1231" ref_url="https://www.suse.com/security/cve/CVE-2015-1231/" source="CVE"/>
		<reference ref_id="CVE-2015-1233" ref_url="https://www.suse.com/security/cve/CVE-2015-1233/" source="CVE"/>
		<reference ref_id="CVE-2015-1234" ref_url="https://www.suse.com/security/cve/CVE-2015-1234/" source="CVE"/>
		<reference ref_id="CVE-2015-1235" ref_url="https://www.suse.com/security/cve/CVE-2015-1235/" source="CVE"/>
		<reference ref_id="CVE-2015-1236" ref_url="https://www.suse.com/security/cve/CVE-2015-1236/" source="CVE"/>
		<reference ref_id="CVE-2015-1237" ref_url="https://www.suse.com/security/cve/CVE-2015-1237/" source="CVE"/>
		<reference ref_id="CVE-2015-1238" ref_url="https://www.suse.com/security/cve/CVE-2015-1238/" source="CVE"/>
		<reference ref_id="CVE-2015-1240" ref_url="https://www.suse.com/security/cve/CVE-2015-1240/" source="CVE"/>
		<reference ref_id="CVE-2015-1241" ref_url="https://www.suse.com/security/cve/CVE-2015-1241/" source="CVE"/>
		<reference ref_id="CVE-2015-1242" ref_url="https://www.suse.com/security/cve/CVE-2015-1242/" source="CVE"/>
		<reference ref_id="CVE-2015-1243" ref_url="https://www.suse.com/security/cve/CVE-2015-1243/" source="CVE"/>
		<reference ref_id="CVE-2015-1244" ref_url="https://www.suse.com/security/cve/CVE-2015-1244/" source="CVE"/>
		<reference ref_id="CVE-2015-1245" ref_url="https://www.suse.com/security/cve/CVE-2015-1245/" source="CVE"/>
		<reference ref_id="CVE-2015-1246" ref_url="https://www.suse.com/security/cve/CVE-2015-1246/" source="CVE"/>
		<reference ref_id="CVE-2015-1247" ref_url="https://www.suse.com/security/cve/CVE-2015-1247/" source="CVE"/>
		<reference ref_id="CVE-2015-1248" ref_url="https://www.suse.com/security/cve/CVE-2015-1248/" source="CVE"/>
		<reference ref_id="CVE-2015-1249" ref_url="https://www.suse.com/security/cve/CVE-2015-1249/" source="CVE"/>
		<reference ref_id="CVE-2015-1250" ref_url="https://www.suse.com/security/cve/CVE-2015-1250/" source="CVE"/>
		<reference ref_id="CVE-2015-1251" ref_url="https://www.suse.com/security/cve/CVE-2015-1251/" source="CVE"/>
		<reference ref_id="CVE-2015-1252" ref_url="https://www.suse.com/security/cve/CVE-2015-1252/" source="CVE"/>
		<reference ref_id="CVE-2015-1253" ref_url="https://www.suse.com/security/cve/CVE-2015-1253/" source="CVE"/>
		<reference ref_id="CVE-2015-1254" ref_url="https://www.suse.com/security/cve/CVE-2015-1254/" source="CVE"/>
		<reference ref_id="CVE-2015-1255" ref_url="https://www.suse.com/security/cve/CVE-2015-1255/" source="CVE"/>
		<reference ref_id="CVE-2015-1256" ref_url="https://www.suse.com/security/cve/CVE-2015-1256/" source="CVE"/>
		<reference ref_id="CVE-2015-1257" ref_url="https://www.suse.com/security/cve/CVE-2015-1257/" source="CVE"/>
		<reference ref_id="CVE-2015-1258" ref_url="https://www.suse.com/security/cve/CVE-2015-1258/" source="CVE"/>
		<reference ref_id="CVE-2015-1259" ref_url="https://www.suse.com/security/cve/CVE-2015-1259/" source="CVE"/>
		<reference ref_id="CVE-2015-1260" ref_url="https://www.suse.com/security/cve/CVE-2015-1260/" source="CVE"/>
		<reference ref_id="CVE-2015-1261" ref_url="https://www.suse.com/security/cve/CVE-2015-1261/" source="CVE"/>
		<reference ref_id="CVE-2015-1262" ref_url="https://www.suse.com/security/cve/CVE-2015-1262/" source="CVE"/>
		<reference ref_id="CVE-2015-1263" ref_url="https://www.suse.com/security/cve/CVE-2015-1263/" source="CVE"/>
		<reference ref_id="CVE-2015-1264" ref_url="https://www.suse.com/security/cve/CVE-2015-1264/" source="CVE"/>
		<reference ref_id="CVE-2015-1265" ref_url="https://www.suse.com/security/cve/CVE-2015-1265/" source="CVE"/>
		<reference ref_id="CVE-2015-1266" ref_url="https://www.suse.com/security/cve/CVE-2015-1266/" source="CVE"/>
		<reference ref_id="CVE-2015-1267" ref_url="https://www.suse.com/security/cve/CVE-2015-1267/" source="CVE"/>
		<reference ref_id="CVE-2015-1268" ref_url="https://www.suse.com/security/cve/CVE-2015-1268/" source="CVE"/>
		<reference ref_id="CVE-2015-1269" ref_url="https://www.suse.com/security/cve/CVE-2015-1269/" source="CVE"/>
		<reference ref_id="CVE-2015-1270" ref_url="https://www.suse.com/security/cve/CVE-2015-1270/" source="CVE"/>
		<reference ref_id="CVE-2015-1271" ref_url="https://www.suse.com/security/cve/CVE-2015-1271/" source="CVE"/>
		<reference ref_id="CVE-2015-1272" ref_url="https://www.suse.com/security/cve/CVE-2015-1272/" source="CVE"/>
		<reference ref_id="CVE-2015-1273" ref_url="https://www.suse.com/security/cve/CVE-2015-1273/" source="CVE"/>
		<reference ref_id="CVE-2015-1274" ref_url="https://www.suse.com/security/cve/CVE-2015-1274/" source="CVE"/>
		<reference ref_id="CVE-2015-1275" ref_url="https://www.suse.com/security/cve/CVE-2015-1275/" source="CVE"/>
		<reference ref_id="CVE-2015-1276" ref_url="https://www.suse.com/security/cve/CVE-2015-1276/" source="CVE"/>
		<reference ref_id="CVE-2015-1277" ref_url="https://www.suse.com/security/cve/CVE-2015-1277/" source="CVE"/>
		<reference ref_id="CVE-2015-1278" ref_url="https://www.suse.com/security/cve/CVE-2015-1278/" source="CVE"/>
		<reference ref_id="CVE-2015-1279" ref_url="https://www.suse.com/security/cve/CVE-2015-1279/" source="CVE"/>
		<reference ref_id="CVE-2015-1280" ref_url="https://www.suse.com/security/cve/CVE-2015-1280/" source="CVE"/>
		<reference ref_id="CVE-2015-1281" ref_url="https://www.suse.com/security/cve/CVE-2015-1281/" source="CVE"/>
		<reference ref_id="CVE-2015-1282" ref_url="https://www.suse.com/security/cve/CVE-2015-1282/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2015-1284" ref_url="https://www.suse.com/security/cve/CVE-2015-1284/" source="CVE"/>
		<reference ref_id="CVE-2015-1285" ref_url="https://www.suse.com/security/cve/CVE-2015-1285/" source="CVE"/>
		<reference ref_id="CVE-2015-1286" ref_url="https://www.suse.com/security/cve/CVE-2015-1286/" source="CVE"/>
		<reference ref_id="CVE-2015-1287" ref_url="https://www.suse.com/security/cve/CVE-2015-1287/" source="CVE"/>
		<reference ref_id="CVE-2015-1288" ref_url="https://www.suse.com/security/cve/CVE-2015-1288/" source="CVE"/>
		<reference ref_id="CVE-2015-1289" ref_url="https://www.suse.com/security/cve/CVE-2015-1289/" source="CVE"/>
		<reference ref_id="CVE-2015-1291" ref_url="https://www.suse.com/security/cve/CVE-2015-1291/" source="CVE"/>
		<reference ref_id="CVE-2015-1292" ref_url="https://www.suse.com/security/cve/CVE-2015-1292/" source="CVE"/>
		<reference ref_id="CVE-2015-1293" ref_url="https://www.suse.com/security/cve/CVE-2015-1293/" source="CVE"/>
		<reference ref_id="CVE-2015-1294" ref_url="https://www.suse.com/security/cve/CVE-2015-1294/" source="CVE"/>
		<reference ref_id="CVE-2015-1295" ref_url="https://www.suse.com/security/cve/CVE-2015-1295/" source="CVE"/>
		<reference ref_id="CVE-2015-1296" ref_url="https://www.suse.com/security/cve/CVE-2015-1296/" source="CVE"/>
		<reference ref_id="CVE-2015-1297" ref_url="https://www.suse.com/security/cve/CVE-2015-1297/" source="CVE"/>
		<reference ref_id="CVE-2015-1298" ref_url="https://www.suse.com/security/cve/CVE-2015-1298/" source="CVE"/>
		<reference ref_id="CVE-2015-1299" ref_url="https://www.suse.com/security/cve/CVE-2015-1299/" source="CVE"/>
		<reference ref_id="CVE-2015-1300" ref_url="https://www.suse.com/security/cve/CVE-2015-1300/" source="CVE"/>
		<reference ref_id="CVE-2015-1301" ref_url="https://www.suse.com/security/cve/CVE-2015-1301/" source="CVE"/>
		<reference ref_id="CVE-2015-1302" ref_url="https://www.suse.com/security/cve/CVE-2015-1302/" source="CVE"/>
		<reference ref_id="CVE-2015-1303" ref_url="https://www.suse.com/security/cve/CVE-2015-1303/" source="CVE"/>
		<reference ref_id="CVE-2015-1304" ref_url="https://www.suse.com/security/cve/CVE-2015-1304/" source="CVE"/>
		<reference ref_id="CVE-2015-6755" ref_url="https://www.suse.com/security/cve/CVE-2015-6755/" source="CVE"/>
		<reference ref_id="CVE-2015-6756" ref_url="https://www.suse.com/security/cve/CVE-2015-6756/" source="CVE"/>
		<reference ref_id="CVE-2015-6757" ref_url="https://www.suse.com/security/cve/CVE-2015-6757/" source="CVE"/>
		<reference ref_id="CVE-2015-6758" ref_url="https://www.suse.com/security/cve/CVE-2015-6758/" source="CVE"/>
		<reference ref_id="CVE-2015-6759" ref_url="https://www.suse.com/security/cve/CVE-2015-6759/" source="CVE"/>
		<reference ref_id="CVE-2015-6760" ref_url="https://www.suse.com/security/cve/CVE-2015-6760/" source="CVE"/>
		<reference ref_id="CVE-2015-6761" ref_url="https://www.suse.com/security/cve/CVE-2015-6761/" source="CVE"/>
		<reference ref_id="CVE-2015-6762" ref_url="https://www.suse.com/security/cve/CVE-2015-6762/" source="CVE"/>
		<reference ref_id="CVE-2015-6763" ref_url="https://www.suse.com/security/cve/CVE-2015-6763/" source="CVE"/>
		<reference ref_id="CVE-2015-6764" ref_url="https://www.suse.com/security/cve/CVE-2015-6764/" source="CVE"/>
		<reference ref_id="CVE-2015-6765" ref_url="https://www.suse.com/security/cve/CVE-2015-6765/" source="CVE"/>
		<reference ref_id="CVE-2015-6766" ref_url="https://www.suse.com/security/cve/CVE-2015-6766/" source="CVE"/>
		<reference ref_id="CVE-2015-6767" ref_url="https://www.suse.com/security/cve/CVE-2015-6767/" source="CVE"/>
		<reference ref_id="CVE-2015-6768" ref_url="https://www.suse.com/security/cve/CVE-2015-6768/" source="CVE"/>
		<reference ref_id="CVE-2015-6769" ref_url="https://www.suse.com/security/cve/CVE-2015-6769/" source="CVE"/>
		<reference ref_id="CVE-2015-6770" ref_url="https://www.suse.com/security/cve/CVE-2015-6770/" source="CVE"/>
		<reference ref_id="CVE-2015-6771" ref_url="https://www.suse.com/security/cve/CVE-2015-6771/" source="CVE"/>
		<reference ref_id="CVE-2015-6772" ref_url="https://www.suse.com/security/cve/CVE-2015-6772/" source="CVE"/>
		<reference ref_id="CVE-2015-6773" ref_url="https://www.suse.com/security/cve/CVE-2015-6773/" source="CVE"/>
		<reference ref_id="CVE-2015-6774" ref_url="https://www.suse.com/security/cve/CVE-2015-6774/" source="CVE"/>
		<reference ref_id="CVE-2015-6775" ref_url="https://www.suse.com/security/cve/CVE-2015-6775/" source="CVE"/>
		<reference ref_id="CVE-2015-6776" ref_url="https://www.suse.com/security/cve/CVE-2015-6776/" source="CVE"/>
		<reference ref_id="CVE-2015-6777" ref_url="https://www.suse.com/security/cve/CVE-2015-6777/" source="CVE"/>
		<reference ref_id="CVE-2015-6778" ref_url="https://www.suse.com/security/cve/CVE-2015-6778/" source="CVE"/>
		<reference ref_id="CVE-2015-6779" ref_url="https://www.suse.com/security/cve/CVE-2015-6779/" source="CVE"/>
		<reference ref_id="CVE-2015-6780" ref_url="https://www.suse.com/security/cve/CVE-2015-6780/" source="CVE"/>
		<reference ref_id="CVE-2015-6781" ref_url="https://www.suse.com/security/cve/CVE-2015-6781/" source="CVE"/>
		<reference ref_id="CVE-2015-6782" ref_url="https://www.suse.com/security/cve/CVE-2015-6782/" source="CVE"/>
		<reference ref_id="CVE-2015-6783" ref_url="https://www.suse.com/security/cve/CVE-2015-6783/" source="CVE"/>
		<reference ref_id="CVE-2015-6784" ref_url="https://www.suse.com/security/cve/CVE-2015-6784/" source="CVE"/>
		<reference ref_id="CVE-2015-6785" ref_url="https://www.suse.com/security/cve/CVE-2015-6785/" source="CVE"/>
		<reference ref_id="CVE-2015-6786" ref_url="https://www.suse.com/security/cve/CVE-2015-6786/" source="CVE"/>
		<reference ref_id="CVE-2015-6787" ref_url="https://www.suse.com/security/cve/CVE-2015-6787/" source="CVE"/>
		<reference ref_id="CVE-2015-6788" ref_url="https://www.suse.com/security/cve/CVE-2015-6788/" source="CVE"/>
		<reference ref_id="CVE-2015-6789" ref_url="https://www.suse.com/security/cve/CVE-2015-6789/" source="CVE"/>
		<reference ref_id="CVE-2015-6790" ref_url="https://www.suse.com/security/cve/CVE-2015-6790/" source="CVE"/>
		<reference ref_id="CVE-2015-6791" ref_url="https://www.suse.com/security/cve/CVE-2015-6791/" source="CVE"/>
		<reference ref_id="CVE-2015-6792" ref_url="https://www.suse.com/security/cve/CVE-2015-6792/" source="CVE"/>
		<reference ref_id="CVE-2015-7834" ref_url="https://www.suse.com/security/cve/CVE-2015-7834/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-1612" ref_url="https://www.suse.com/security/cve/CVE-2016-1612/" source="CVE"/>
		<reference ref_id="CVE-2016-1613" ref_url="https://www.suse.com/security/cve/CVE-2016-1613/" source="CVE"/>
		<reference ref_id="CVE-2016-1614" ref_url="https://www.suse.com/security/cve/CVE-2016-1614/" source="CVE"/>
		<reference ref_id="CVE-2016-1615" ref_url="https://www.suse.com/security/cve/CVE-2016-1615/" source="CVE"/>
		<reference ref_id="CVE-2016-1616" ref_url="https://www.suse.com/security/cve/CVE-2016-1616/" source="CVE"/>
		<reference ref_id="CVE-2016-1617" ref_url="https://www.suse.com/security/cve/CVE-2016-1617/" source="CVE"/>
		<reference ref_id="CVE-2016-1618" ref_url="https://www.suse.com/security/cve/CVE-2016-1618/" source="CVE"/>
		<reference ref_id="CVE-2016-1619" ref_url="https://www.suse.com/security/cve/CVE-2016-1619/" source="CVE"/>
		<reference ref_id="CVE-2016-1620" ref_url="https://www.suse.com/security/cve/CVE-2016-1620/" source="CVE"/>
		<reference ref_id="CVE-2016-1622" ref_url="https://www.suse.com/security/cve/CVE-2016-1622/" source="CVE"/>
		<reference ref_id="CVE-2016-1623" ref_url="https://www.suse.com/security/cve/CVE-2016-1623/" source="CVE"/>
		<reference ref_id="CVE-2016-1624" ref_url="https://www.suse.com/security/cve/CVE-2016-1624/" source="CVE"/>
		<reference ref_id="CVE-2016-1625" ref_url="https://www.suse.com/security/cve/CVE-2016-1625/" source="CVE"/>
		<reference ref_id="CVE-2016-1626" ref_url="https://www.suse.com/security/cve/CVE-2016-1626/" source="CVE"/>
		<reference ref_id="CVE-2016-1627" ref_url="https://www.suse.com/security/cve/CVE-2016-1627/" source="CVE"/>
		<reference ref_id="CVE-2016-1629" ref_url="https://www.suse.com/security/cve/CVE-2016-1629/" source="CVE"/>
		<reference ref_id="CVE-2016-1630" ref_url="https://www.suse.com/security/cve/CVE-2016-1630/" source="CVE"/>
		<reference ref_id="CVE-2016-1631" ref_url="https://www.suse.com/security/cve/CVE-2016-1631/" source="CVE"/>
		<reference ref_id="CVE-2016-1632" ref_url="https://www.suse.com/security/cve/CVE-2016-1632/" source="CVE"/>
		<reference ref_id="CVE-2016-1633" ref_url="https://www.suse.com/security/cve/CVE-2016-1633/" source="CVE"/>
		<reference ref_id="CVE-2016-1634" ref_url="https://www.suse.com/security/cve/CVE-2016-1634/" source="CVE"/>
		<reference ref_id="CVE-2016-1635" ref_url="https://www.suse.com/security/cve/CVE-2016-1635/" source="CVE"/>
		<reference ref_id="CVE-2016-1636" ref_url="https://www.suse.com/security/cve/CVE-2016-1636/" source="CVE"/>
		<reference ref_id="CVE-2016-1637" ref_url="https://www.suse.com/security/cve/CVE-2016-1637/" source="CVE"/>
		<reference ref_id="CVE-2016-1638" ref_url="https://www.suse.com/security/cve/CVE-2016-1638/" source="CVE"/>
		<reference ref_id="CVE-2016-1639" ref_url="https://www.suse.com/security/cve/CVE-2016-1639/" source="CVE"/>
		<reference ref_id="CVE-2016-1640" ref_url="https://www.suse.com/security/cve/CVE-2016-1640/" source="CVE"/>
		<reference ref_id="CVE-2016-1641" ref_url="https://www.suse.com/security/cve/CVE-2016-1641/" source="CVE"/>
		<reference ref_id="CVE-2016-1642" ref_url="https://www.suse.com/security/cve/CVE-2016-1642/" source="CVE"/>
		<reference ref_id="CVE-2016-1643" ref_url="https://www.suse.com/security/cve/CVE-2016-1643/" source="CVE"/>
		<reference ref_id="CVE-2016-1644" ref_url="https://www.suse.com/security/cve/CVE-2016-1644/" source="CVE"/>
		<reference ref_id="CVE-2016-1645" ref_url="https://www.suse.com/security/cve/CVE-2016-1645/" source="CVE"/>
		<reference ref_id="CVE-2016-1646" ref_url="https://www.suse.com/security/cve/CVE-2016-1646/" source="CVE"/>
		<reference ref_id="CVE-2016-1647" ref_url="https://www.suse.com/security/cve/CVE-2016-1647/" source="CVE"/>
		<reference ref_id="CVE-2016-1648" ref_url="https://www.suse.com/security/cve/CVE-2016-1648/" source="CVE"/>
		<reference ref_id="CVE-2016-1649" ref_url="https://www.suse.com/security/cve/CVE-2016-1649/" source="CVE"/>
		<reference ref_id="CVE-2016-1650" ref_url="https://www.suse.com/security/cve/CVE-2016-1650/" source="CVE"/>
		<reference ref_id="CVE-2016-1651" ref_url="https://www.suse.com/security/cve/CVE-2016-1651/" source="CVE"/>
		<reference ref_id="CVE-2016-1652" ref_url="https://www.suse.com/security/cve/CVE-2016-1652/" source="CVE"/>
		<reference ref_id="CVE-2016-1653" ref_url="https://www.suse.com/security/cve/CVE-2016-1653/" source="CVE"/>
		<reference ref_id="CVE-2016-1654" ref_url="https://www.suse.com/security/cve/CVE-2016-1654/" source="CVE"/>
		<reference ref_id="CVE-2016-1655" ref_url="https://www.suse.com/security/cve/CVE-2016-1655/" source="CVE"/>
		<reference ref_id="CVE-2016-1656" ref_url="https://www.suse.com/security/cve/CVE-2016-1656/" source="CVE"/>
		<reference ref_id="CVE-2016-1657" ref_url="https://www.suse.com/security/cve/CVE-2016-1657/" source="CVE"/>
		<reference ref_id="CVE-2016-1658" ref_url="https://www.suse.com/security/cve/CVE-2016-1658/" source="CVE"/>
		<reference ref_id="CVE-2016-1659" ref_url="https://www.suse.com/security/cve/CVE-2016-1659/" source="CVE"/>
		<reference ref_id="CVE-2016-1660" ref_url="https://www.suse.com/security/cve/CVE-2016-1660/" source="CVE"/>
		<reference ref_id="CVE-2016-1661" ref_url="https://www.suse.com/security/cve/CVE-2016-1661/" source="CVE"/>
		<reference ref_id="CVE-2016-1662" ref_url="https://www.suse.com/security/cve/CVE-2016-1662/" source="CVE"/>
		<reference ref_id="CVE-2016-1663" ref_url="https://www.suse.com/security/cve/CVE-2016-1663/" source="CVE"/>
		<reference ref_id="CVE-2016-1664" ref_url="https://www.suse.com/security/cve/CVE-2016-1664/" source="CVE"/>
		<reference ref_id="CVE-2016-1665" ref_url="https://www.suse.com/security/cve/CVE-2016-1665/" source="CVE"/>
		<reference ref_id="CVE-2016-1666" ref_url="https://www.suse.com/security/cve/CVE-2016-1666/" source="CVE"/>
		<reference ref_id="CVE-2016-1667" ref_url="https://www.suse.com/security/cve/CVE-2016-1667/" source="CVE"/>
		<reference ref_id="CVE-2016-1668" ref_url="https://www.suse.com/security/cve/CVE-2016-1668/" source="CVE"/>
		<reference ref_id="CVE-2016-1669" ref_url="https://www.suse.com/security/cve/CVE-2016-1669/" source="CVE"/>
		<reference ref_id="CVE-2016-1670" ref_url="https://www.suse.com/security/cve/CVE-2016-1670/" source="CVE"/>
		<reference ref_id="CVE-2016-1672" ref_url="https://www.suse.com/security/cve/CVE-2016-1672/" source="CVE"/>
		<reference ref_id="CVE-2016-1673" ref_url="https://www.suse.com/security/cve/CVE-2016-1673/" source="CVE"/>
		<reference ref_id="CVE-2016-1674" ref_url="https://www.suse.com/security/cve/CVE-2016-1674/" source="CVE"/>
		<reference ref_id="CVE-2016-1675" ref_url="https://www.suse.com/security/cve/CVE-2016-1675/" source="CVE"/>
		<reference ref_id="CVE-2016-1676" ref_url="https://www.suse.com/security/cve/CVE-2016-1676/" source="CVE"/>
		<reference ref_id="CVE-2016-1677" ref_url="https://www.suse.com/security/cve/CVE-2016-1677/" source="CVE"/>
		<reference ref_id="CVE-2016-1678" ref_url="https://www.suse.com/security/cve/CVE-2016-1678/" source="CVE"/>
		<reference ref_id="CVE-2016-1679" ref_url="https://www.suse.com/security/cve/CVE-2016-1679/" source="CVE"/>
		<reference ref_id="CVE-2016-1680" ref_url="https://www.suse.com/security/cve/CVE-2016-1680/" source="CVE"/>
		<reference ref_id="CVE-2016-1681" ref_url="https://www.suse.com/security/cve/CVE-2016-1681/" source="CVE"/>
		<reference ref_id="CVE-2016-1682" ref_url="https://www.suse.com/security/cve/CVE-2016-1682/" source="CVE"/>
		<reference ref_id="CVE-2016-1683" ref_url="https://www.suse.com/security/cve/CVE-2016-1683/" source="CVE"/>
		<reference ref_id="CVE-2016-1684" ref_url="https://www.suse.com/security/cve/CVE-2016-1684/" source="CVE"/>
		<reference ref_id="CVE-2016-1685" ref_url="https://www.suse.com/security/cve/CVE-2016-1685/" source="CVE"/>
		<reference ref_id="CVE-2016-1686" ref_url="https://www.suse.com/security/cve/CVE-2016-1686/" source="CVE"/>
		<reference ref_id="CVE-2016-1687" ref_url="https://www.suse.com/security/cve/CVE-2016-1687/" source="CVE"/>
		<reference ref_id="CVE-2016-1688" ref_url="https://www.suse.com/security/cve/CVE-2016-1688/" source="CVE"/>
		<reference ref_id="CVE-2016-1689" ref_url="https://www.suse.com/security/cve/CVE-2016-1689/" source="CVE"/>
		<reference ref_id="CVE-2016-1690" ref_url="https://www.suse.com/security/cve/CVE-2016-1690/" source="CVE"/>
		<reference ref_id="CVE-2016-1691" ref_url="https://www.suse.com/security/cve/CVE-2016-1691/" source="CVE"/>
		<reference ref_id="CVE-2016-1692" ref_url="https://www.suse.com/security/cve/CVE-2016-1692/" source="CVE"/>
		<reference ref_id="CVE-2016-1693" ref_url="https://www.suse.com/security/cve/CVE-2016-1693/" source="CVE"/>
		<reference ref_id="CVE-2016-1694" ref_url="https://www.suse.com/security/cve/CVE-2016-1694/" source="CVE"/>
		<reference ref_id="CVE-2016-1695" ref_url="https://www.suse.com/security/cve/CVE-2016-1695/" source="CVE"/>
		<reference ref_id="CVE-2016-1696" ref_url="https://www.suse.com/security/cve/CVE-2016-1696/" source="CVE"/>
		<reference ref_id="CVE-2016-1697" ref_url="https://www.suse.com/security/cve/CVE-2016-1697/" source="CVE"/>
		<reference ref_id="CVE-2016-1698" ref_url="https://www.suse.com/security/cve/CVE-2016-1698/" source="CVE"/>
		<reference ref_id="CVE-2016-1699" ref_url="https://www.suse.com/security/cve/CVE-2016-1699/" source="CVE"/>
		<reference ref_id="CVE-2016-1700" ref_url="https://www.suse.com/security/cve/CVE-2016-1700/" source="CVE"/>
		<reference ref_id="CVE-2016-1701" ref_url="https://www.suse.com/security/cve/CVE-2016-1701/" source="CVE"/>
		<reference ref_id="CVE-2016-1702" ref_url="https://www.suse.com/security/cve/CVE-2016-1702/" source="CVE"/>
		<reference ref_id="CVE-2016-1703" ref_url="https://www.suse.com/security/cve/CVE-2016-1703/" source="CVE"/>
		<reference ref_id="CVE-2016-1704" ref_url="https://www.suse.com/security/cve/CVE-2016-1704/" source="CVE"/>
		<reference ref_id="CVE-2016-1705" ref_url="https://www.suse.com/security/cve/CVE-2016-1705/" source="CVE"/>
		<reference ref_id="CVE-2016-1706" ref_url="https://www.suse.com/security/cve/CVE-2016-1706/" source="CVE"/>
		<reference ref_id="CVE-2016-1707" ref_url="https://www.suse.com/security/cve/CVE-2016-1707/" source="CVE"/>
		<reference ref_id="CVE-2016-1708" ref_url="https://www.suse.com/security/cve/CVE-2016-1708/" source="CVE"/>
		<reference ref_id="CVE-2016-1709" ref_url="https://www.suse.com/security/cve/CVE-2016-1709/" source="CVE"/>
		<reference ref_id="CVE-2016-1710" ref_url="https://www.suse.com/security/cve/CVE-2016-1710/" source="CVE"/>
		<reference ref_id="CVE-2016-1711" ref_url="https://www.suse.com/security/cve/CVE-2016-1711/" source="CVE"/>
		<reference ref_id="CVE-2016-3679" ref_url="https://www.suse.com/security/cve/CVE-2016-3679/" source="CVE"/>
		<reference ref_id="CVE-2016-5127" ref_url="https://www.suse.com/security/cve/CVE-2016-5127/" source="CVE"/>
		<reference ref_id="CVE-2016-5128" ref_url="https://www.suse.com/security/cve/CVE-2016-5128/" source="CVE"/>
		<reference ref_id="CVE-2016-5129" ref_url="https://www.suse.com/security/cve/CVE-2016-5129/" source="CVE"/>
		<reference ref_id="CVE-2016-5130" ref_url="https://www.suse.com/security/cve/CVE-2016-5130/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2016-5132" ref_url="https://www.suse.com/security/cve/CVE-2016-5132/" source="CVE"/>
		<reference ref_id="CVE-2016-5133" ref_url="https://www.suse.com/security/cve/CVE-2016-5133/" source="CVE"/>
		<reference ref_id="CVE-2016-5134" ref_url="https://www.suse.com/security/cve/CVE-2016-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-5135" ref_url="https://www.suse.com/security/cve/CVE-2016-5135/" source="CVE"/>
		<reference ref_id="CVE-2016-5136" ref_url="https://www.suse.com/security/cve/CVE-2016-5136/" source="CVE"/>
		<reference ref_id="CVE-2016-5137" ref_url="https://www.suse.com/security/cve/CVE-2016-5137/" source="CVE"/>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5140" ref_url="https://www.suse.com/security/cve/CVE-2016-5140/" source="CVE"/>
		<reference ref_id="CVE-2016-5141" ref_url="https://www.suse.com/security/cve/CVE-2016-5141/" source="CVE"/>
		<reference ref_id="CVE-2016-5142" ref_url="https://www.suse.com/security/cve/CVE-2016-5142/" source="CVE"/>
		<reference ref_id="CVE-2016-5143" ref_url="https://www.suse.com/security/cve/CVE-2016-5143/" source="CVE"/>
		<reference ref_id="CVE-2016-5144" ref_url="https://www.suse.com/security/cve/CVE-2016-5144/" source="CVE"/>
		<reference ref_id="CVE-2016-5145" ref_url="https://www.suse.com/security/cve/CVE-2016-5145/" source="CVE"/>
		<reference ref_id="CVE-2016-5146" ref_url="https://www.suse.com/security/cve/CVE-2016-5146/" source="CVE"/>
		<reference ref_id="CVE-2016-5147" ref_url="https://www.suse.com/security/cve/CVE-2016-5147/" source="CVE"/>
		<reference ref_id="CVE-2016-5148" ref_url="https://www.suse.com/security/cve/CVE-2016-5148/" source="CVE"/>
		<reference ref_id="CVE-2016-5149" ref_url="https://www.suse.com/security/cve/CVE-2016-5149/" source="CVE"/>
		<reference ref_id="CVE-2016-5150" ref_url="https://www.suse.com/security/cve/CVE-2016-5150/" source="CVE"/>
		<reference ref_id="CVE-2016-5151" ref_url="https://www.suse.com/security/cve/CVE-2016-5151/" source="CVE"/>
		<reference ref_id="CVE-2016-5152" ref_url="https://www.suse.com/security/cve/CVE-2016-5152/" source="CVE"/>
		<reference ref_id="CVE-2016-5153" ref_url="https://www.suse.com/security/cve/CVE-2016-5153/" source="CVE"/>
		<reference ref_id="CVE-2016-5154" ref_url="https://www.suse.com/security/cve/CVE-2016-5154/" source="CVE"/>
		<reference ref_id="CVE-2016-5155" ref_url="https://www.suse.com/security/cve/CVE-2016-5155/" source="CVE"/>
		<reference ref_id="CVE-2016-5156" ref_url="https://www.suse.com/security/cve/CVE-2016-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-5157" ref_url="https://www.suse.com/security/cve/CVE-2016-5157/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159/" source="CVE"/>
		<reference ref_id="CVE-2016-5160" ref_url="https://www.suse.com/security/cve/CVE-2016-5160/" source="CVE"/>
		<reference ref_id="CVE-2016-5161" ref_url="https://www.suse.com/security/cve/CVE-2016-5161/" source="CVE"/>
		<reference ref_id="CVE-2016-5162" ref_url="https://www.suse.com/security/cve/CVE-2016-5162/" source="CVE"/>
		<reference ref_id="CVE-2016-5163" ref_url="https://www.suse.com/security/cve/CVE-2016-5163/" source="CVE"/>
		<reference ref_id="CVE-2016-5164" ref_url="https://www.suse.com/security/cve/CVE-2016-5164/" source="CVE"/>
		<reference ref_id="CVE-2016-5165" ref_url="https://www.suse.com/security/cve/CVE-2016-5165/" source="CVE"/>
		<reference ref_id="CVE-2016-5166" ref_url="https://www.suse.com/security/cve/CVE-2016-5166/" source="CVE"/>
		<reference ref_id="CVE-2016-5170" ref_url="https://www.suse.com/security/cve/CVE-2016-5170/" source="CVE"/>
		<reference ref_id="CVE-2016-5171" ref_url="https://www.suse.com/security/cve/CVE-2016-5171/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5173" ref_url="https://www.suse.com/security/cve/CVE-2016-5173/" source="CVE"/>
		<reference ref_id="CVE-2016-5174" ref_url="https://www.suse.com/security/cve/CVE-2016-5174/" source="CVE"/>
		<reference ref_id="CVE-2016-5175" ref_url="https://www.suse.com/security/cve/CVE-2016-5175/" source="CVE"/>
		<reference ref_id="CVE-2016-5177" ref_url="https://www.suse.com/security/cve/CVE-2016-5177/" source="CVE"/>
		<reference ref_id="CVE-2016-5178" ref_url="https://www.suse.com/security/cve/CVE-2016-5178/" source="CVE"/>
		<reference ref_id="CVE-2016-5181" ref_url="https://www.suse.com/security/cve/CVE-2016-5181/" source="CVE"/>
		<reference ref_id="CVE-2016-5182" ref_url="https://www.suse.com/security/cve/CVE-2016-5182/" source="CVE"/>
		<reference ref_id="CVE-2016-5183" ref_url="https://www.suse.com/security/cve/CVE-2016-5183/" source="CVE"/>
		<reference ref_id="CVE-2016-5184" ref_url="https://www.suse.com/security/cve/CVE-2016-5184/" source="CVE"/>
		<reference ref_id="CVE-2016-5185" ref_url="https://www.suse.com/security/cve/CVE-2016-5185/" source="CVE"/>
		<reference ref_id="CVE-2016-5186" ref_url="https://www.suse.com/security/cve/CVE-2016-5186/" source="CVE"/>
		<reference ref_id="CVE-2016-5187" ref_url="https://www.suse.com/security/cve/CVE-2016-5187/" source="CVE"/>
		<reference ref_id="CVE-2016-5188" ref_url="https://www.suse.com/security/cve/CVE-2016-5188/" source="CVE"/>
		<reference ref_id="CVE-2016-5189" ref_url="https://www.suse.com/security/cve/CVE-2016-5189/" source="CVE"/>
		<reference ref_id="CVE-2016-5190" ref_url="https://www.suse.com/security/cve/CVE-2016-5190/" source="CVE"/>
		<reference ref_id="CVE-2016-5191" ref_url="https://www.suse.com/security/cve/CVE-2016-5191/" source="CVE"/>
		<reference ref_id="CVE-2016-5192" ref_url="https://www.suse.com/security/cve/CVE-2016-5192/" source="CVE"/>
		<reference ref_id="CVE-2016-5193" ref_url="https://www.suse.com/security/cve/CVE-2016-5193/" source="CVE"/>
		<reference ref_id="CVE-2016-5198" ref_url="https://www.suse.com/security/cve/CVE-2016-5198/" source="CVE"/>
		<reference ref_id="CVE-2016-5199" ref_url="https://www.suse.com/security/cve/CVE-2016-5199/" source="CVE"/>
		<reference ref_id="CVE-2016-5200" ref_url="https://www.suse.com/security/cve/CVE-2016-5200/" source="CVE"/>
		<reference ref_id="CVE-2016-5201" ref_url="https://www.suse.com/security/cve/CVE-2016-5201/" source="CVE"/>
		<reference ref_id="CVE-2016-5202" ref_url="https://www.suse.com/security/cve/CVE-2016-5202/" source="CVE"/>
		<reference ref_id="CVE-2016-5203" ref_url="https://www.suse.com/security/cve/CVE-2016-5203/" source="CVE"/>
		<reference ref_id="CVE-2016-5204" ref_url="https://www.suse.com/security/cve/CVE-2016-5204/" source="CVE"/>
		<reference ref_id="CVE-2016-5205" ref_url="https://www.suse.com/security/cve/CVE-2016-5205/" source="CVE"/>
		<reference ref_id="CVE-2016-5206" ref_url="https://www.suse.com/security/cve/CVE-2016-5206/" source="CVE"/>
		<reference ref_id="CVE-2016-5207" ref_url="https://www.suse.com/security/cve/CVE-2016-5207/" source="CVE"/>
		<reference ref_id="CVE-2016-5208" ref_url="https://www.suse.com/security/cve/CVE-2016-5208/" source="CVE"/>
		<reference ref_id="CVE-2016-5209" ref_url="https://www.suse.com/security/cve/CVE-2016-5209/" source="CVE"/>
		<reference ref_id="CVE-2016-5210" ref_url="https://www.suse.com/security/cve/CVE-2016-5210/" source="CVE"/>
		<reference ref_id="CVE-2016-5211" ref_url="https://www.suse.com/security/cve/CVE-2016-5211/" source="CVE"/>
		<reference ref_id="CVE-2016-5212" ref_url="https://www.suse.com/security/cve/CVE-2016-5212/" source="CVE"/>
		<reference ref_id="CVE-2016-5213" ref_url="https://www.suse.com/security/cve/CVE-2016-5213/" source="CVE"/>
		<reference ref_id="CVE-2016-5214" ref_url="https://www.suse.com/security/cve/CVE-2016-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-5215" ref_url="https://www.suse.com/security/cve/CVE-2016-5215/" source="CVE"/>
		<reference ref_id="CVE-2016-5216" ref_url="https://www.suse.com/security/cve/CVE-2016-5216/" source="CVE"/>
		<reference ref_id="CVE-2016-5217" ref_url="https://www.suse.com/security/cve/CVE-2016-5217/" source="CVE"/>
		<reference ref_id="CVE-2016-5218" ref_url="https://www.suse.com/security/cve/CVE-2016-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-5219" ref_url="https://www.suse.com/security/cve/CVE-2016-5219/" source="CVE"/>
		<reference ref_id="CVE-2016-5220" ref_url="https://www.suse.com/security/cve/CVE-2016-5220/" source="CVE"/>
		<reference ref_id="CVE-2016-5221" ref_url="https://www.suse.com/security/cve/CVE-2016-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-5222" ref_url="https://www.suse.com/security/cve/CVE-2016-5222/" source="CVE"/>
		<reference ref_id="CVE-2016-5223" ref_url="https://www.suse.com/security/cve/CVE-2016-5223/" source="CVE"/>
		<reference ref_id="CVE-2016-5224" ref_url="https://www.suse.com/security/cve/CVE-2016-5224/" source="CVE"/>
		<reference ref_id="CVE-2016-5225" ref_url="https://www.suse.com/security/cve/CVE-2016-5225/" source="CVE"/>
		<reference ref_id="CVE-2016-5226" ref_url="https://www.suse.com/security/cve/CVE-2016-5226/" source="CVE"/>
		<reference ref_id="CVE-2016-9650" ref_url="https://www.suse.com/security/cve/CVE-2016-9650/" source="CVE"/>
		<reference ref_id="CVE-2016-9651" ref_url="https://www.suse.com/security/cve/CVE-2016-9651/" source="CVE"/>
		<reference ref_id="CVE-2016-9652" ref_url="https://www.suse.com/security/cve/CVE-2016-9652/" source="CVE"/>
		<reference ref_id="CVE-2017-11215" ref_url="https://www.suse.com/security/cve/CVE-2017-11215/" source="CVE"/>
		<reference ref_id="CVE-2017-11225" ref_url="https://www.suse.com/security/cve/CVE-2017-11225/" source="CVE"/>
		<reference ref_id="CVE-2017-15386" ref_url="https://www.suse.com/security/cve/CVE-2017-15386/" source="CVE"/>
		<reference ref_id="CVE-2017-15387" ref_url="https://www.suse.com/security/cve/CVE-2017-15387/" source="CVE"/>
		<reference ref_id="CVE-2017-15388" ref_url="https://www.suse.com/security/cve/CVE-2017-15388/" source="CVE"/>
		<reference ref_id="CVE-2017-15389" ref_url="https://www.suse.com/security/cve/CVE-2017-15389/" source="CVE"/>
		<reference ref_id="CVE-2017-15390" ref_url="https://www.suse.com/security/cve/CVE-2017-15390/" source="CVE"/>
		<reference ref_id="CVE-2017-15391" ref_url="https://www.suse.com/security/cve/CVE-2017-15391/" source="CVE"/>
		<reference ref_id="CVE-2017-15392" ref_url="https://www.suse.com/security/cve/CVE-2017-15392/" source="CVE"/>
		<reference ref_id="CVE-2017-15393" ref_url="https://www.suse.com/security/cve/CVE-2017-15393/" source="CVE"/>
		<reference ref_id="CVE-2017-15394" ref_url="https://www.suse.com/security/cve/CVE-2017-15394/" source="CVE"/>
		<reference ref_id="CVE-2017-15395" ref_url="https://www.suse.com/security/cve/CVE-2017-15395/" source="CVE"/>
		<reference ref_id="CVE-2017-15396" ref_url="https://www.suse.com/security/cve/CVE-2017-15396/" source="CVE"/>
		<reference ref_id="CVE-2017-15398" ref_url="https://www.suse.com/security/cve/CVE-2017-15398/" source="CVE"/>
		<reference ref_id="CVE-2017-15399" ref_url="https://www.suse.com/security/cve/CVE-2017-15399/" source="CVE"/>
		<reference ref_id="CVE-2017-15407" ref_url="https://www.suse.com/security/cve/CVE-2017-15407/" source="CVE"/>
		<reference ref_id="CVE-2017-15408" ref_url="https://www.suse.com/security/cve/CVE-2017-15408/" source="CVE"/>
		<reference ref_id="CVE-2017-15409" ref_url="https://www.suse.com/security/cve/CVE-2017-15409/" source="CVE"/>
		<reference ref_id="CVE-2017-15410" ref_url="https://www.suse.com/security/cve/CVE-2017-15410/" source="CVE"/>
		<reference ref_id="CVE-2017-15411" ref_url="https://www.suse.com/security/cve/CVE-2017-15411/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-15413" ref_url="https://www.suse.com/security/cve/CVE-2017-15413/" source="CVE"/>
		<reference ref_id="CVE-2017-15415" ref_url="https://www.suse.com/security/cve/CVE-2017-15415/" source="CVE"/>
		<reference ref_id="CVE-2017-15416" ref_url="https://www.suse.com/security/cve/CVE-2017-15416/" source="CVE"/>
		<reference ref_id="CVE-2017-15417" ref_url="https://www.suse.com/security/cve/CVE-2017-15417/" source="CVE"/>
		<reference ref_id="CVE-2017-15418" ref_url="https://www.suse.com/security/cve/CVE-2017-15418/" source="CVE"/>
		<reference ref_id="CVE-2017-15419" ref_url="https://www.suse.com/security/cve/CVE-2017-15419/" source="CVE"/>
		<reference ref_id="CVE-2017-15420" ref_url="https://www.suse.com/security/cve/CVE-2017-15420/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-15423" ref_url="https://www.suse.com/security/cve/CVE-2017-15423/" source="CVE"/>
		<reference ref_id="CVE-2017-15424" ref_url="https://www.suse.com/security/cve/CVE-2017-15424/" source="CVE"/>
		<reference ref_id="CVE-2017-15425" ref_url="https://www.suse.com/security/cve/CVE-2017-15425/" source="CVE"/>
		<reference ref_id="CVE-2017-15426" ref_url="https://www.suse.com/security/cve/CVE-2017-15426/" source="CVE"/>
		<reference ref_id="CVE-2017-15427" ref_url="https://www.suse.com/security/cve/CVE-2017-15427/" source="CVE"/>
		<reference ref_id="CVE-2017-15429" ref_url="https://www.suse.com/security/cve/CVE-2017-15429/" source="CVE"/>
		<reference ref_id="CVE-2017-15430" ref_url="https://www.suse.com/security/cve/CVE-2017-15430/" source="CVE"/>
		<reference ref_id="CVE-2017-5006" ref_url="https://www.suse.com/security/cve/CVE-2017-5006/" source="CVE"/>
		<reference ref_id="CVE-2017-5007" ref_url="https://www.suse.com/security/cve/CVE-2017-5007/" source="CVE"/>
		<reference ref_id="CVE-2017-5008" ref_url="https://www.suse.com/security/cve/CVE-2017-5008/" source="CVE"/>
		<reference ref_id="CVE-2017-5009" ref_url="https://www.suse.com/security/cve/CVE-2017-5009/" source="CVE"/>
		<reference ref_id="CVE-2017-5010" ref_url="https://www.suse.com/security/cve/CVE-2017-5010/" source="CVE"/>
		<reference ref_id="CVE-2017-5011" ref_url="https://www.suse.com/security/cve/CVE-2017-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-5012" ref_url="https://www.suse.com/security/cve/CVE-2017-5012/" source="CVE"/>
		<reference ref_id="CVE-2017-5013" ref_url="https://www.suse.com/security/cve/CVE-2017-5013/" source="CVE"/>
		<reference ref_id="CVE-2017-5014" ref_url="https://www.suse.com/security/cve/CVE-2017-5014/" source="CVE"/>
		<reference ref_id="CVE-2017-5015" ref_url="https://www.suse.com/security/cve/CVE-2017-5015/" source="CVE"/>
		<reference ref_id="CVE-2017-5016" ref_url="https://www.suse.com/security/cve/CVE-2017-5016/" source="CVE"/>
		<reference ref_id="CVE-2017-5017" ref_url="https://www.suse.com/security/cve/CVE-2017-5017/" source="CVE"/>
		<reference ref_id="CVE-2017-5018" ref_url="https://www.suse.com/security/cve/CVE-2017-5018/" source="CVE"/>
		<reference ref_id="CVE-2017-5019" ref_url="https://www.suse.com/security/cve/CVE-2017-5019/" source="CVE"/>
		<reference ref_id="CVE-2017-5020" ref_url="https://www.suse.com/security/cve/CVE-2017-5020/" source="CVE"/>
		<reference ref_id="CVE-2017-5021" ref_url="https://www.suse.com/security/cve/CVE-2017-5021/" source="CVE"/>
		<reference ref_id="CVE-2017-5022" ref_url="https://www.suse.com/security/cve/CVE-2017-5022/" source="CVE"/>
		<reference ref_id="CVE-2017-5023" ref_url="https://www.suse.com/security/cve/CVE-2017-5023/" source="CVE"/>
		<reference ref_id="CVE-2017-5024" ref_url="https://www.suse.com/security/cve/CVE-2017-5024/" source="CVE"/>
		<reference ref_id="CVE-2017-5025" ref_url="https://www.suse.com/security/cve/CVE-2017-5025/" source="CVE"/>
		<reference ref_id="CVE-2017-5026" ref_url="https://www.suse.com/security/cve/CVE-2017-5026/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2017-5030" ref_url="https://www.suse.com/security/cve/CVE-2017-5030/" source="CVE"/>
		<reference ref_id="CVE-2017-5031" ref_url="https://www.suse.com/security/cve/CVE-2017-5031/" source="CVE"/>
		<reference ref_id="CVE-2017-5032" ref_url="https://www.suse.com/security/cve/CVE-2017-5032/" source="CVE"/>
		<reference ref_id="CVE-2017-5033" ref_url="https://www.suse.com/security/cve/CVE-2017-5033/" source="CVE"/>
		<reference ref_id="CVE-2017-5034" ref_url="https://www.suse.com/security/cve/CVE-2017-5034/" source="CVE"/>
		<reference ref_id="CVE-2017-5035" ref_url="https://www.suse.com/security/cve/CVE-2017-5035/" source="CVE"/>
		<reference ref_id="CVE-2017-5036" ref_url="https://www.suse.com/security/cve/CVE-2017-5036/" source="CVE"/>
		<reference ref_id="CVE-2017-5037" ref_url="https://www.suse.com/security/cve/CVE-2017-5037/" source="CVE"/>
		<reference ref_id="CVE-2017-5038" ref_url="https://www.suse.com/security/cve/CVE-2017-5038/" source="CVE"/>
		<reference ref_id="CVE-2017-5039" ref_url="https://www.suse.com/security/cve/CVE-2017-5039/" source="CVE"/>
		<reference ref_id="CVE-2017-5040" ref_url="https://www.suse.com/security/cve/CVE-2017-5040/" source="CVE"/>
		<reference ref_id="CVE-2017-5041" ref_url="https://www.suse.com/security/cve/CVE-2017-5041/" source="CVE"/>
		<reference ref_id="CVE-2017-5042" ref_url="https://www.suse.com/security/cve/CVE-2017-5042/" source="CVE"/>
		<reference ref_id="CVE-2017-5043" ref_url="https://www.suse.com/security/cve/CVE-2017-5043/" source="CVE"/>
		<reference ref_id="CVE-2017-5044" ref_url="https://www.suse.com/security/cve/CVE-2017-5044/" source="CVE"/>
		<reference ref_id="CVE-2017-5045" ref_url="https://www.suse.com/security/cve/CVE-2017-5045/" source="CVE"/>
		<reference ref_id="CVE-2017-5046" ref_url="https://www.suse.com/security/cve/CVE-2017-5046/" source="CVE"/>
		<reference ref_id="CVE-2017-5052" ref_url="https://www.suse.com/security/cve/CVE-2017-5052/" source="CVE"/>
		<reference ref_id="CVE-2017-5053" ref_url="https://www.suse.com/security/cve/CVE-2017-5053/" source="CVE"/>
		<reference ref_id="CVE-2017-5054" ref_url="https://www.suse.com/security/cve/CVE-2017-5054/" source="CVE"/>
		<reference ref_id="CVE-2017-5055" ref_url="https://www.suse.com/security/cve/CVE-2017-5055/" source="CVE"/>
		<reference ref_id="CVE-2017-5056" ref_url="https://www.suse.com/security/cve/CVE-2017-5056/" source="CVE"/>
		<reference ref_id="CVE-2017-5057" ref_url="https://www.suse.com/security/cve/CVE-2017-5057/" source="CVE"/>
		<reference ref_id="CVE-2017-5058" ref_url="https://www.suse.com/security/cve/CVE-2017-5058/" source="CVE"/>
		<reference ref_id="CVE-2017-5059" ref_url="https://www.suse.com/security/cve/CVE-2017-5059/" source="CVE"/>
		<reference ref_id="CVE-2017-5060" ref_url="https://www.suse.com/security/cve/CVE-2017-5060/" source="CVE"/>
		<reference ref_id="CVE-2017-5061" ref_url="https://www.suse.com/security/cve/CVE-2017-5061/" source="CVE"/>
		<reference ref_id="CVE-2017-5062" ref_url="https://www.suse.com/security/cve/CVE-2017-5062/" source="CVE"/>
		<reference ref_id="CVE-2017-5063" ref_url="https://www.suse.com/security/cve/CVE-2017-5063/" source="CVE"/>
		<reference ref_id="CVE-2017-5064" ref_url="https://www.suse.com/security/cve/CVE-2017-5064/" source="CVE"/>
		<reference ref_id="CVE-2017-5065" ref_url="https://www.suse.com/security/cve/CVE-2017-5065/" source="CVE"/>
		<reference ref_id="CVE-2017-5066" ref_url="https://www.suse.com/security/cve/CVE-2017-5066/" source="CVE"/>
		<reference ref_id="CVE-2017-5067" ref_url="https://www.suse.com/security/cve/CVE-2017-5067/" source="CVE"/>
		<reference ref_id="CVE-2017-5068" ref_url="https://www.suse.com/security/cve/CVE-2017-5068/" source="CVE"/>
		<reference ref_id="CVE-2017-5069" ref_url="https://www.suse.com/security/cve/CVE-2017-5069/" source="CVE"/>
		<reference ref_id="CVE-2017-5070" ref_url="https://www.suse.com/security/cve/CVE-2017-5070/" source="CVE"/>
		<reference ref_id="CVE-2017-5071" ref_url="https://www.suse.com/security/cve/CVE-2017-5071/" source="CVE"/>
		<reference ref_id="CVE-2017-5072" ref_url="https://www.suse.com/security/cve/CVE-2017-5072/" source="CVE"/>
		<reference ref_id="CVE-2017-5073" ref_url="https://www.suse.com/security/cve/CVE-2017-5073/" source="CVE"/>
		<reference ref_id="CVE-2017-5074" ref_url="https://www.suse.com/security/cve/CVE-2017-5074/" source="CVE"/>
		<reference ref_id="CVE-2017-5075" ref_url="https://www.suse.com/security/cve/CVE-2017-5075/" source="CVE"/>
		<reference ref_id="CVE-2017-5076" ref_url="https://www.suse.com/security/cve/CVE-2017-5076/" source="CVE"/>
		<reference ref_id="CVE-2017-5077" ref_url="https://www.suse.com/security/cve/CVE-2017-5077/" source="CVE"/>
		<reference ref_id="CVE-2017-5078" ref_url="https://www.suse.com/security/cve/CVE-2017-5078/" source="CVE"/>
		<reference ref_id="CVE-2017-5079" ref_url="https://www.suse.com/security/cve/CVE-2017-5079/" source="CVE"/>
		<reference ref_id="CVE-2017-5080" ref_url="https://www.suse.com/security/cve/CVE-2017-5080/" source="CVE"/>
		<reference ref_id="CVE-2017-5081" ref_url="https://www.suse.com/security/cve/CVE-2017-5081/" source="CVE"/>
		<reference ref_id="CVE-2017-5082" ref_url="https://www.suse.com/security/cve/CVE-2017-5082/" source="CVE"/>
		<reference ref_id="CVE-2017-5083" ref_url="https://www.suse.com/security/cve/CVE-2017-5083/" source="CVE"/>
		<reference ref_id="CVE-2017-5085" ref_url="https://www.suse.com/security/cve/CVE-2017-5085/" source="CVE"/>
		<reference ref_id="CVE-2017-5086" ref_url="https://www.suse.com/security/cve/CVE-2017-5086/" source="CVE"/>
		<reference ref_id="CVE-2017-5087" ref_url="https://www.suse.com/security/cve/CVE-2017-5087/" source="CVE"/>
		<reference ref_id="CVE-2017-5088" ref_url="https://www.suse.com/security/cve/CVE-2017-5088/" source="CVE"/>
		<reference ref_id="CVE-2017-5089" ref_url="https://www.suse.com/security/cve/CVE-2017-5089/" source="CVE"/>
		<reference ref_id="CVE-2017-5091" ref_url="https://www.suse.com/security/cve/CVE-2017-5091/" source="CVE"/>
		<reference ref_id="CVE-2017-5092" ref_url="https://www.suse.com/security/cve/CVE-2017-5092/" source="CVE"/>
		<reference ref_id="CVE-2017-5093" ref_url="https://www.suse.com/security/cve/CVE-2017-5093/" source="CVE"/>
		<reference ref_id="CVE-2017-5094" ref_url="https://www.suse.com/security/cve/CVE-2017-5094/" source="CVE"/>
		<reference ref_id="CVE-2017-5095" ref_url="https://www.suse.com/security/cve/CVE-2017-5095/" source="CVE"/>
		<reference ref_id="CVE-2017-5096" ref_url="https://www.suse.com/security/cve/CVE-2017-5096/" source="CVE"/>
		<reference ref_id="CVE-2017-5097" ref_url="https://www.suse.com/security/cve/CVE-2017-5097/" source="CVE"/>
		<reference ref_id="CVE-2017-5098" ref_url="https://www.suse.com/security/cve/CVE-2017-5098/" source="CVE"/>
		<reference ref_id="CVE-2017-5099" ref_url="https://www.suse.com/security/cve/CVE-2017-5099/" source="CVE"/>
		<reference ref_id="CVE-2017-5100" ref_url="https://www.suse.com/security/cve/CVE-2017-5100/" source="CVE"/>
		<reference ref_id="CVE-2017-5101" ref_url="https://www.suse.com/security/cve/CVE-2017-5101/" source="CVE"/>
		<reference ref_id="CVE-2017-5102" ref_url="https://www.suse.com/security/cve/CVE-2017-5102/" source="CVE"/>
		<reference ref_id="CVE-2017-5103" ref_url="https://www.suse.com/security/cve/CVE-2017-5103/" source="CVE"/>
		<reference ref_id="CVE-2017-5104" ref_url="https://www.suse.com/security/cve/CVE-2017-5104/" source="CVE"/>
		<reference ref_id="CVE-2017-5105" ref_url="https://www.suse.com/security/cve/CVE-2017-5105/" source="CVE"/>
		<reference ref_id="CVE-2017-5106" ref_url="https://www.suse.com/security/cve/CVE-2017-5106/" source="CVE"/>
		<reference ref_id="CVE-2017-5107" ref_url="https://www.suse.com/security/cve/CVE-2017-5107/" source="CVE"/>
		<reference ref_id="CVE-2017-5108" ref_url="https://www.suse.com/security/cve/CVE-2017-5108/" source="CVE"/>
		<reference ref_id="CVE-2017-5109" ref_url="https://www.suse.com/security/cve/CVE-2017-5109/" source="CVE"/>
		<reference ref_id="CVE-2017-5110" ref_url="https://www.suse.com/security/cve/CVE-2017-5110/" source="CVE"/>
		<reference ref_id="CVE-2017-5111" ref_url="https://www.suse.com/security/cve/CVE-2017-5111/" source="CVE"/>
		<reference ref_id="CVE-2017-5112" ref_url="https://www.suse.com/security/cve/CVE-2017-5112/" source="CVE"/>
		<reference ref_id="CVE-2017-5113" ref_url="https://www.suse.com/security/cve/CVE-2017-5113/" source="CVE"/>
		<reference ref_id="CVE-2017-5114" ref_url="https://www.suse.com/security/cve/CVE-2017-5114/" source="CVE"/>
		<reference ref_id="CVE-2017-5115" ref_url="https://www.suse.com/security/cve/CVE-2017-5115/" source="CVE"/>
		<reference ref_id="CVE-2017-5116" ref_url="https://www.suse.com/security/cve/CVE-2017-5116/" source="CVE"/>
		<reference ref_id="CVE-2017-5117" ref_url="https://www.suse.com/security/cve/CVE-2017-5117/" source="CVE"/>
		<reference ref_id="CVE-2017-5118" ref_url="https://www.suse.com/security/cve/CVE-2017-5118/" source="CVE"/>
		<reference ref_id="CVE-2017-5119" ref_url="https://www.suse.com/security/cve/CVE-2017-5119/" source="CVE"/>
		<reference ref_id="CVE-2017-5120" ref_url="https://www.suse.com/security/cve/CVE-2017-5120/" source="CVE"/>
		<reference ref_id="CVE-2017-5121" ref_url="https://www.suse.com/security/cve/CVE-2017-5121/" source="CVE"/>
		<reference ref_id="CVE-2017-5122" ref_url="https://www.suse.com/security/cve/CVE-2017-5122/" source="CVE"/>
		<reference ref_id="CVE-2017-5124" ref_url="https://www.suse.com/security/cve/CVE-2017-5124/" source="CVE"/>
		<reference ref_id="CVE-2017-5125" ref_url="https://www.suse.com/security/cve/CVE-2017-5125/" source="CVE"/>
		<reference ref_id="CVE-2017-5126" ref_url="https://www.suse.com/security/cve/CVE-2017-5126/" source="CVE"/>
		<reference ref_id="CVE-2017-5127" ref_url="https://www.suse.com/security/cve/CVE-2017-5127/" source="CVE"/>
		<reference ref_id="CVE-2017-5128" ref_url="https://www.suse.com/security/cve/CVE-2017-5128/" source="CVE"/>
		<reference ref_id="CVE-2017-5129" ref_url="https://www.suse.com/security/cve/CVE-2017-5129/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="CVE-2017-5131" ref_url="https://www.suse.com/security/cve/CVE-2017-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-5132" ref_url="https://www.suse.com/security/cve/CVE-2017-5132/" source="CVE"/>
		<reference ref_id="CVE-2017-5133" ref_url="https://www.suse.com/security/cve/CVE-2017-5133/" source="CVE"/>
		<reference ref_id="CVE-2017-7000" ref_url="https://www.suse.com/security/cve/CVE-2017-7000/" source="CVE"/>
		<reference ref_id="CVE-2018-16065" ref_url="https://www.suse.com/security/cve/CVE-2018-16065/" source="CVE"/>
		<reference ref_id="CVE-2018-16066" ref_url="https://www.suse.com/security/cve/CVE-2018-16066/" source="CVE"/>
		<reference ref_id="CVE-2018-16067" ref_url="https://www.suse.com/security/cve/CVE-2018-16067/" source="CVE"/>
		<reference ref_id="CVE-2018-16068" ref_url="https://www.suse.com/security/cve/CVE-2018-16068/" source="CVE"/>
		<reference ref_id="CVE-2018-16069" ref_url="https://www.suse.com/security/cve/CVE-2018-16069/" source="CVE"/>
		<reference ref_id="CVE-2018-16070" ref_url="https://www.suse.com/security/cve/CVE-2018-16070/" source="CVE"/>
		<reference ref_id="CVE-2018-16071" ref_url="https://www.suse.com/security/cve/CVE-2018-16071/" source="CVE"/>
		<reference ref_id="CVE-2018-16073" ref_url="https://www.suse.com/security/cve/CVE-2018-16073/" source="CVE"/>
		<reference ref_id="CVE-2018-16074" ref_url="https://www.suse.com/security/cve/CVE-2018-16074/" source="CVE"/>
		<reference ref_id="CVE-2018-16075" ref_url="https://www.suse.com/security/cve/CVE-2018-16075/" source="CVE"/>
		<reference ref_id="CVE-2018-16076" ref_url="https://www.suse.com/security/cve/CVE-2018-16076/" source="CVE"/>
		<reference ref_id="CVE-2018-16077" ref_url="https://www.suse.com/security/cve/CVE-2018-16077/" source="CVE"/>
		<reference ref_id="CVE-2018-16078" ref_url="https://www.suse.com/security/cve/CVE-2018-16078/" source="CVE"/>
		<reference ref_id="CVE-2018-16079" ref_url="https://www.suse.com/security/cve/CVE-2018-16079/" source="CVE"/>
		<reference ref_id="CVE-2018-16080" ref_url="https://www.suse.com/security/cve/CVE-2018-16080/" source="CVE"/>
		<reference ref_id="CVE-2018-16081" ref_url="https://www.suse.com/security/cve/CVE-2018-16081/" source="CVE"/>
		<reference ref_id="CVE-2018-16082" ref_url="https://www.suse.com/security/cve/CVE-2018-16082/" source="CVE"/>
		<reference ref_id="CVE-2018-16083" ref_url="https://www.suse.com/security/cve/CVE-2018-16083/" source="CVE"/>
		<reference ref_id="CVE-2018-16084" ref_url="https://www.suse.com/security/cve/CVE-2018-16084/" source="CVE"/>
		<reference ref_id="CVE-2018-16085" ref_url="https://www.suse.com/security/cve/CVE-2018-16085/" source="CVE"/>
		<reference ref_id="CVE-2018-16086" ref_url="https://www.suse.com/security/cve/CVE-2018-16086/" source="CVE"/>
		<reference ref_id="CVE-2018-16087" ref_url="https://www.suse.com/security/cve/CVE-2018-16087/" source="CVE"/>
		<reference ref_id="CVE-2018-16088" ref_url="https://www.suse.com/security/cve/CVE-2018-16088/" source="CVE"/>
		<reference ref_id="CVE-2018-17462" ref_url="https://www.suse.com/security/cve/CVE-2018-17462/" source="CVE"/>
		<reference ref_id="CVE-2018-17463" ref_url="https://www.suse.com/security/cve/CVE-2018-17463/" source="CVE"/>
		<reference ref_id="CVE-2018-17464" ref_url="https://www.suse.com/security/cve/CVE-2018-17464/" source="CVE"/>
		<reference ref_id="CVE-2018-17465" ref_url="https://www.suse.com/security/cve/CVE-2018-17465/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-17467" ref_url="https://www.suse.com/security/cve/CVE-2018-17467/" source="CVE"/>
		<reference ref_id="CVE-2018-17468" ref_url="https://www.suse.com/security/cve/CVE-2018-17468/" source="CVE"/>
		<reference ref_id="CVE-2018-17469" ref_url="https://www.suse.com/security/cve/CVE-2018-17469/" source="CVE"/>
		<reference ref_id="CVE-2018-17470" ref_url="https://www.suse.com/security/cve/CVE-2018-17470/" source="CVE"/>
		<reference ref_id="CVE-2018-17471" ref_url="https://www.suse.com/security/cve/CVE-2018-17471/" source="CVE"/>
		<reference ref_id="CVE-2018-17472" ref_url="https://www.suse.com/security/cve/CVE-2018-17472/" source="CVE"/>
		<reference ref_id="CVE-2018-17473" ref_url="https://www.suse.com/security/cve/CVE-2018-17473/" source="CVE"/>
		<reference ref_id="CVE-2018-17474" ref_url="https://www.suse.com/security/cve/CVE-2018-17474/" source="CVE"/>
		<reference ref_id="CVE-2018-17475" ref_url="https://www.suse.com/security/cve/CVE-2018-17475/" source="CVE"/>
		<reference ref_id="CVE-2018-17476" ref_url="https://www.suse.com/security/cve/CVE-2018-17476/" source="CVE"/>
		<reference ref_id="CVE-2018-17477" ref_url="https://www.suse.com/security/cve/CVE-2018-17477/" source="CVE"/>
		<reference ref_id="CVE-2018-17478" ref_url="https://www.suse.com/security/cve/CVE-2018-17478/" source="CVE"/>
		<reference ref_id="CVE-2018-17479" ref_url="https://www.suse.com/security/cve/CVE-2018-17479/" source="CVE"/>
		<reference ref_id="CVE-2018-17480" ref_url="https://www.suse.com/security/cve/CVE-2018-17480/" source="CVE"/>
		<reference ref_id="CVE-2018-17481" ref_url="https://www.suse.com/security/cve/CVE-2018-17481/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18336" ref_url="https://www.suse.com/security/cve/CVE-2018-18336/" source="CVE"/>
		<reference ref_id="CVE-2018-18337" ref_url="https://www.suse.com/security/cve/CVE-2018-18337/" source="CVE"/>
		<reference ref_id="CVE-2018-18338" ref_url="https://www.suse.com/security/cve/CVE-2018-18338/" source="CVE"/>
		<reference ref_id="CVE-2018-18339" ref_url="https://www.suse.com/security/cve/CVE-2018-18339/" source="CVE"/>
		<reference ref_id="CVE-2018-18340" ref_url="https://www.suse.com/security/cve/CVE-2018-18340/" source="CVE"/>
		<reference ref_id="CVE-2018-18341" ref_url="https://www.suse.com/security/cve/CVE-2018-18341/" source="CVE"/>
		<reference ref_id="CVE-2018-18342" ref_url="https://www.suse.com/security/cve/CVE-2018-18342/" source="CVE"/>
		<reference ref_id="CVE-2018-18343" ref_url="https://www.suse.com/security/cve/CVE-2018-18343/" source="CVE"/>
		<reference ref_id="CVE-2018-18344" ref_url="https://www.suse.com/security/cve/CVE-2018-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-18345" ref_url="https://www.suse.com/security/cve/CVE-2018-18345/" source="CVE"/>
		<reference ref_id="CVE-2018-18346" ref_url="https://www.suse.com/security/cve/CVE-2018-18346/" source="CVE"/>
		<reference ref_id="CVE-2018-18347" ref_url="https://www.suse.com/security/cve/CVE-2018-18347/" source="CVE"/>
		<reference ref_id="CVE-2018-18348" ref_url="https://www.suse.com/security/cve/CVE-2018-18348/" source="CVE"/>
		<reference ref_id="CVE-2018-18349" ref_url="https://www.suse.com/security/cve/CVE-2018-18349/" source="CVE"/>
		<reference ref_id="CVE-2018-18350" ref_url="https://www.suse.com/security/cve/CVE-2018-18350/" source="CVE"/>
		<reference ref_id="CVE-2018-18351" ref_url="https://www.suse.com/security/cve/CVE-2018-18351/" source="CVE"/>
		<reference ref_id="CVE-2018-18352" ref_url="https://www.suse.com/security/cve/CVE-2018-18352/" source="CVE"/>
		<reference ref_id="CVE-2018-18353" ref_url="https://www.suse.com/security/cve/CVE-2018-18353/" source="CVE"/>
		<reference ref_id="CVE-2018-18354" ref_url="https://www.suse.com/security/cve/CVE-2018-18354/" source="CVE"/>
		<reference ref_id="CVE-2018-18355" ref_url="https://www.suse.com/security/cve/CVE-2018-18355/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18357" ref_url="https://www.suse.com/security/cve/CVE-2018-18357/" source="CVE"/>
		<reference ref_id="CVE-2018-18358" ref_url="https://www.suse.com/security/cve/CVE-2018-18358/" source="CVE"/>
		<reference ref_id="CVE-2018-18359" ref_url="https://www.suse.com/security/cve/CVE-2018-18359/" source="CVE"/>
		<reference ref_id="CVE-2018-20073" ref_url="https://www.suse.com/security/cve/CVE-2018-20073/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-6031" ref_url="https://www.suse.com/security/cve/CVE-2018-6031/" source="CVE"/>
		<reference ref_id="CVE-2018-6032" ref_url="https://www.suse.com/security/cve/CVE-2018-6032/" source="CVE"/>
		<reference ref_id="CVE-2018-6033" ref_url="https://www.suse.com/security/cve/CVE-2018-6033/" source="CVE"/>
		<reference ref_id="CVE-2018-6034" ref_url="https://www.suse.com/security/cve/CVE-2018-6034/" source="CVE"/>
		<reference ref_id="CVE-2018-6035" ref_url="https://www.suse.com/security/cve/CVE-2018-6035/" source="CVE"/>
		<reference ref_id="CVE-2018-6036" ref_url="https://www.suse.com/security/cve/CVE-2018-6036/" source="CVE"/>
		<reference ref_id="CVE-2018-6037" ref_url="https://www.suse.com/security/cve/CVE-2018-6037/" source="CVE"/>
		<reference ref_id="CVE-2018-6038" ref_url="https://www.suse.com/security/cve/CVE-2018-6038/" source="CVE"/>
		<reference ref_id="CVE-2018-6039" ref_url="https://www.suse.com/security/cve/CVE-2018-6039/" source="CVE"/>
		<reference ref_id="CVE-2018-6040" ref_url="https://www.suse.com/security/cve/CVE-2018-6040/" source="CVE"/>
		<reference ref_id="CVE-2018-6041" ref_url="https://www.suse.com/security/cve/CVE-2018-6041/" source="CVE"/>
		<reference ref_id="CVE-2018-6042" ref_url="https://www.suse.com/security/cve/CVE-2018-6042/" source="CVE"/>
		<reference ref_id="CVE-2018-6043" ref_url="https://www.suse.com/security/cve/CVE-2018-6043/" source="CVE"/>
		<reference ref_id="CVE-2018-6044" ref_url="https://www.suse.com/security/cve/CVE-2018-6044/" source="CVE"/>
		<reference ref_id="CVE-2018-6045" ref_url="https://www.suse.com/security/cve/CVE-2018-6045/" source="CVE"/>
		<reference ref_id="CVE-2018-6046" ref_url="https://www.suse.com/security/cve/CVE-2018-6046/" source="CVE"/>
		<reference ref_id="CVE-2018-6047" ref_url="https://www.suse.com/security/cve/CVE-2018-6047/" source="CVE"/>
		<reference ref_id="CVE-2018-6048" ref_url="https://www.suse.com/security/cve/CVE-2018-6048/" source="CVE"/>
		<reference ref_id="CVE-2018-6049" ref_url="https://www.suse.com/security/cve/CVE-2018-6049/" source="CVE"/>
		<reference ref_id="CVE-2018-6050" ref_url="https://www.suse.com/security/cve/CVE-2018-6050/" source="CVE"/>
		<reference ref_id="CVE-2018-6051" ref_url="https://www.suse.com/security/cve/CVE-2018-6051/" source="CVE"/>
		<reference ref_id="CVE-2018-6052" ref_url="https://www.suse.com/security/cve/CVE-2018-6052/" source="CVE"/>
		<reference ref_id="CVE-2018-6053" ref_url="https://www.suse.com/security/cve/CVE-2018-6053/" source="CVE"/>
		<reference ref_id="CVE-2018-6054" ref_url="https://www.suse.com/security/cve/CVE-2018-6054/" source="CVE"/>
		<reference ref_id="CVE-2018-6056" ref_url="https://www.suse.com/security/cve/CVE-2018-6056/" source="CVE"/>
		<reference ref_id="CVE-2018-6057" ref_url="https://www.suse.com/security/cve/CVE-2018-6057/" source="CVE"/>
		<reference ref_id="CVE-2018-6060" ref_url="https://www.suse.com/security/cve/CVE-2018-6060/" source="CVE"/>
		<reference ref_id="CVE-2018-6061" ref_url="https://www.suse.com/security/cve/CVE-2018-6061/" source="CVE"/>
		<reference ref_id="CVE-2018-6062" ref_url="https://www.suse.com/security/cve/CVE-2018-6062/" source="CVE"/>
		<reference ref_id="CVE-2018-6063" ref_url="https://www.suse.com/security/cve/CVE-2018-6063/" source="CVE"/>
		<reference ref_id="CVE-2018-6064" ref_url="https://www.suse.com/security/cve/CVE-2018-6064/" source="CVE"/>
		<reference ref_id="CVE-2018-6065" ref_url="https://www.suse.com/security/cve/CVE-2018-6065/" source="CVE"/>
		<reference ref_id="CVE-2018-6066" ref_url="https://www.suse.com/security/cve/CVE-2018-6066/" source="CVE"/>
		<reference ref_id="CVE-2018-6067" ref_url="https://www.suse.com/security/cve/CVE-2018-6067/" source="CVE"/>
		<reference ref_id="CVE-2018-6068" ref_url="https://www.suse.com/security/cve/CVE-2018-6068/" source="CVE"/>
		<reference ref_id="CVE-2018-6069" ref_url="https://www.suse.com/security/cve/CVE-2018-6069/" source="CVE"/>
		<reference ref_id="CVE-2018-6070" ref_url="https://www.suse.com/security/cve/CVE-2018-6070/" source="CVE"/>
		<reference ref_id="CVE-2018-6071" ref_url="https://www.suse.com/security/cve/CVE-2018-6071/" source="CVE"/>
		<reference ref_id="CVE-2018-6072" ref_url="https://www.suse.com/security/cve/CVE-2018-6072/" source="CVE"/>
		<reference ref_id="CVE-2018-6073" ref_url="https://www.suse.com/security/cve/CVE-2018-6073/" source="CVE"/>
		<reference ref_id="CVE-2018-6074" ref_url="https://www.suse.com/security/cve/CVE-2018-6074/" source="CVE"/>
		<reference ref_id="CVE-2018-6075" ref_url="https://www.suse.com/security/cve/CVE-2018-6075/" source="CVE"/>
		<reference ref_id="CVE-2018-6076" ref_url="https://www.suse.com/security/cve/CVE-2018-6076/" source="CVE"/>
		<reference ref_id="CVE-2018-6077" ref_url="https://www.suse.com/security/cve/CVE-2018-6077/" source="CVE"/>
		<reference ref_id="CVE-2018-6078" ref_url="https://www.suse.com/security/cve/CVE-2018-6078/" source="CVE"/>
		<reference ref_id="CVE-2018-6079" ref_url="https://www.suse.com/security/cve/CVE-2018-6079/" source="CVE"/>
		<reference ref_id="CVE-2018-6080" ref_url="https://www.suse.com/security/cve/CVE-2018-6080/" source="CVE"/>
		<reference ref_id="CVE-2018-6081" ref_url="https://www.suse.com/security/cve/CVE-2018-6081/" source="CVE"/>
		<reference ref_id="CVE-2018-6082" ref_url="https://www.suse.com/security/cve/CVE-2018-6082/" source="CVE"/>
		<reference ref_id="CVE-2018-6083" ref_url="https://www.suse.com/security/cve/CVE-2018-6083/" source="CVE"/>
		<reference ref_id="CVE-2018-6085" ref_url="https://www.suse.com/security/cve/CVE-2018-6085/" source="CVE"/>
		<reference ref_id="CVE-2018-6086" ref_url="https://www.suse.com/security/cve/CVE-2018-6086/" source="CVE"/>
		<reference ref_id="CVE-2018-6087" ref_url="https://www.suse.com/security/cve/CVE-2018-6087/" source="CVE"/>
		<reference ref_id="CVE-2018-6088" ref_url="https://www.suse.com/security/cve/CVE-2018-6088/" source="CVE"/>
		<reference ref_id="CVE-2018-6089" ref_url="https://www.suse.com/security/cve/CVE-2018-6089/" source="CVE"/>
		<reference ref_id="CVE-2018-6090" ref_url="https://www.suse.com/security/cve/CVE-2018-6090/" source="CVE"/>
		<reference ref_id="CVE-2018-6091" ref_url="https://www.suse.com/security/cve/CVE-2018-6091/" source="CVE"/>
		<reference ref_id="CVE-2018-6092" ref_url="https://www.suse.com/security/cve/CVE-2018-6092/" source="CVE"/>
		<reference ref_id="CVE-2018-6093" ref_url="https://www.suse.com/security/cve/CVE-2018-6093/" source="CVE"/>
		<reference ref_id="CVE-2018-6094" ref_url="https://www.suse.com/security/cve/CVE-2018-6094/" source="CVE"/>
		<reference ref_id="CVE-2018-6095" ref_url="https://www.suse.com/security/cve/CVE-2018-6095/" source="CVE"/>
		<reference ref_id="CVE-2018-6096" ref_url="https://www.suse.com/security/cve/CVE-2018-6096/" source="CVE"/>
		<reference ref_id="CVE-2018-6097" ref_url="https://www.suse.com/security/cve/CVE-2018-6097/" source="CVE"/>
		<reference ref_id="CVE-2018-6098" ref_url="https://www.suse.com/security/cve/CVE-2018-6098/" source="CVE"/>
		<reference ref_id="CVE-2018-6099" ref_url="https://www.suse.com/security/cve/CVE-2018-6099/" source="CVE"/>
		<reference ref_id="CVE-2018-6100" ref_url="https://www.suse.com/security/cve/CVE-2018-6100/" source="CVE"/>
		<reference ref_id="CVE-2018-6101" ref_url="https://www.suse.com/security/cve/CVE-2018-6101/" source="CVE"/>
		<reference ref_id="CVE-2018-6102" ref_url="https://www.suse.com/security/cve/CVE-2018-6102/" source="CVE"/>
		<reference ref_id="CVE-2018-6103" ref_url="https://www.suse.com/security/cve/CVE-2018-6103/" source="CVE"/>
		<reference ref_id="CVE-2018-6104" ref_url="https://www.suse.com/security/cve/CVE-2018-6104/" source="CVE"/>
		<reference ref_id="CVE-2018-6105" ref_url="https://www.suse.com/security/cve/CVE-2018-6105/" source="CVE"/>
		<reference ref_id="CVE-2018-6106" ref_url="https://www.suse.com/security/cve/CVE-2018-6106/" source="CVE"/>
		<reference ref_id="CVE-2018-6107" ref_url="https://www.suse.com/security/cve/CVE-2018-6107/" source="CVE"/>
		<reference ref_id="CVE-2018-6108" ref_url="https://www.suse.com/security/cve/CVE-2018-6108/" source="CVE"/>
		<reference ref_id="CVE-2018-6109" ref_url="https://www.suse.com/security/cve/CVE-2018-6109/" source="CVE"/>
		<reference ref_id="CVE-2018-6110" ref_url="https://www.suse.com/security/cve/CVE-2018-6110/" source="CVE"/>
		<reference ref_id="CVE-2018-6111" ref_url="https://www.suse.com/security/cve/CVE-2018-6111/" source="CVE"/>
		<reference ref_id="CVE-2018-6112" ref_url="https://www.suse.com/security/cve/CVE-2018-6112/" source="CVE"/>
		<reference ref_id="CVE-2018-6113" ref_url="https://www.suse.com/security/cve/CVE-2018-6113/" source="CVE"/>
		<reference ref_id="CVE-2018-6114" ref_url="https://www.suse.com/security/cve/CVE-2018-6114/" source="CVE"/>
		<reference ref_id="CVE-2018-6115" ref_url="https://www.suse.com/security/cve/CVE-2018-6115/" source="CVE"/>
		<reference ref_id="CVE-2018-6116" ref_url="https://www.suse.com/security/cve/CVE-2018-6116/" source="CVE"/>
		<reference ref_id="CVE-2018-6117" ref_url="https://www.suse.com/security/cve/CVE-2018-6117/" source="CVE"/>
		<reference ref_id="CVE-2018-6118" ref_url="https://www.suse.com/security/cve/CVE-2018-6118/" source="CVE"/>
		<reference ref_id="CVE-2018-6120" ref_url="https://www.suse.com/security/cve/CVE-2018-6120/" source="CVE"/>
		<reference ref_id="CVE-2018-6121" ref_url="https://www.suse.com/security/cve/CVE-2018-6121/" source="CVE"/>
		<reference ref_id="CVE-2018-6122" ref_url="https://www.suse.com/security/cve/CVE-2018-6122/" source="CVE"/>
		<reference ref_id="CVE-2018-6123" ref_url="https://www.suse.com/security/cve/CVE-2018-6123/" source="CVE"/>
		<reference ref_id="CVE-2018-6124" ref_url="https://www.suse.com/security/cve/CVE-2018-6124/" source="CVE"/>
		<reference ref_id="CVE-2018-6125" ref_url="https://www.suse.com/security/cve/CVE-2018-6125/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2018-6127" ref_url="https://www.suse.com/security/cve/CVE-2018-6127/" source="CVE"/>
		<reference ref_id="CVE-2018-6128" ref_url="https://www.suse.com/security/cve/CVE-2018-6128/" source="CVE"/>
		<reference ref_id="CVE-2018-6129" ref_url="https://www.suse.com/security/cve/CVE-2018-6129/" source="CVE"/>
		<reference ref_id="CVE-2018-6130" ref_url="https://www.suse.com/security/cve/CVE-2018-6130/" source="CVE"/>
		<reference ref_id="CVE-2018-6131" ref_url="https://www.suse.com/security/cve/CVE-2018-6131/" source="CVE"/>
		<reference ref_id="CVE-2018-6132" ref_url="https://www.suse.com/security/cve/CVE-2018-6132/" source="CVE"/>
		<reference ref_id="CVE-2018-6133" ref_url="https://www.suse.com/security/cve/CVE-2018-6133/" source="CVE"/>
		<reference ref_id="CVE-2018-6134" ref_url="https://www.suse.com/security/cve/CVE-2018-6134/" source="CVE"/>
		<reference ref_id="CVE-2018-6135" ref_url="https://www.suse.com/security/cve/CVE-2018-6135/" source="CVE"/>
		<reference ref_id="CVE-2018-6136" ref_url="https://www.suse.com/security/cve/CVE-2018-6136/" source="CVE"/>
		<reference ref_id="CVE-2018-6137" ref_url="https://www.suse.com/security/cve/CVE-2018-6137/" source="CVE"/>
		<reference ref_id="CVE-2018-6138" ref_url="https://www.suse.com/security/cve/CVE-2018-6138/" source="CVE"/>
		<reference ref_id="CVE-2018-6139" ref_url="https://www.suse.com/security/cve/CVE-2018-6139/" source="CVE"/>
		<reference ref_id="CVE-2018-6140" ref_url="https://www.suse.com/security/cve/CVE-2018-6140/" source="CVE"/>
		<reference ref_id="CVE-2018-6141" ref_url="https://www.suse.com/security/cve/CVE-2018-6141/" source="CVE"/>
		<reference ref_id="CVE-2018-6142" ref_url="https://www.suse.com/security/cve/CVE-2018-6142/" source="CVE"/>
		<reference ref_id="CVE-2018-6143" ref_url="https://www.suse.com/security/cve/CVE-2018-6143/" source="CVE"/>
		<reference ref_id="CVE-2018-6144" ref_url="https://www.suse.com/security/cve/CVE-2018-6144/" source="CVE"/>
		<reference ref_id="CVE-2018-6145" ref_url="https://www.suse.com/security/cve/CVE-2018-6145/" source="CVE"/>
		<reference ref_id="CVE-2018-6147" ref_url="https://www.suse.com/security/cve/CVE-2018-6147/" source="CVE"/>
		<reference ref_id="CVE-2018-6148" ref_url="https://www.suse.com/security/cve/CVE-2018-6148/" source="CVE"/>
		<reference ref_id="CVE-2018-6149" ref_url="https://www.suse.com/security/cve/CVE-2018-6149/" source="CVE"/>
		<reference ref_id="CVE-2018-6153" ref_url="https://www.suse.com/security/cve/CVE-2018-6153/" source="CVE"/>
		<reference ref_id="CVE-2018-6154" ref_url="https://www.suse.com/security/cve/CVE-2018-6154/" source="CVE"/>
		<reference ref_id="CVE-2018-6155" ref_url="https://www.suse.com/security/cve/CVE-2018-6155/" source="CVE"/>
		<reference ref_id="CVE-2018-6156" ref_url="https://www.suse.com/security/cve/CVE-2018-6156/" source="CVE"/>
		<reference ref_id="CVE-2018-6157" ref_url="https://www.suse.com/security/cve/CVE-2018-6157/" source="CVE"/>
		<reference ref_id="CVE-2018-6158" ref_url="https://www.suse.com/security/cve/CVE-2018-6158/" source="CVE"/>
		<reference ref_id="CVE-2018-6159" ref_url="https://www.suse.com/security/cve/CVE-2018-6159/" source="CVE"/>
		<reference ref_id="CVE-2018-6160" ref_url="https://www.suse.com/security/cve/CVE-2018-6160/" source="CVE"/>
		<reference ref_id="CVE-2018-6161" ref_url="https://www.suse.com/security/cve/CVE-2018-6161/" source="CVE"/>
		<reference ref_id="CVE-2018-6162" ref_url="https://www.suse.com/security/cve/CVE-2018-6162/" source="CVE"/>
		<reference ref_id="CVE-2018-6163" ref_url="https://www.suse.com/security/cve/CVE-2018-6163/" source="CVE"/>
		<reference ref_id="CVE-2018-6164" ref_url="https://www.suse.com/security/cve/CVE-2018-6164/" source="CVE"/>
		<reference ref_id="CVE-2018-6165" ref_url="https://www.suse.com/security/cve/CVE-2018-6165/" source="CVE"/>
		<reference ref_id="CVE-2018-6166" ref_url="https://www.suse.com/security/cve/CVE-2018-6166/" source="CVE"/>
		<reference ref_id="CVE-2018-6167" ref_url="https://www.suse.com/security/cve/CVE-2018-6167/" source="CVE"/>
		<reference ref_id="CVE-2018-6168" ref_url="https://www.suse.com/security/cve/CVE-2018-6168/" source="CVE"/>
		<reference ref_id="CVE-2018-6169" ref_url="https://www.suse.com/security/cve/CVE-2018-6169/" source="CVE"/>
		<reference ref_id="CVE-2018-6170" ref_url="https://www.suse.com/security/cve/CVE-2018-6170/" source="CVE"/>
		<reference ref_id="CVE-2018-6171" ref_url="https://www.suse.com/security/cve/CVE-2018-6171/" source="CVE"/>
		<reference ref_id="CVE-2018-6172" ref_url="https://www.suse.com/security/cve/CVE-2018-6172/" source="CVE"/>
		<reference ref_id="CVE-2018-6173" ref_url="https://www.suse.com/security/cve/CVE-2018-6173/" source="CVE"/>
		<reference ref_id="CVE-2018-6174" ref_url="https://www.suse.com/security/cve/CVE-2018-6174/" source="CVE"/>
		<reference ref_id="CVE-2018-6175" ref_url="https://www.suse.com/security/cve/CVE-2018-6175/" source="CVE"/>
		<reference ref_id="CVE-2018-6176" ref_url="https://www.suse.com/security/cve/CVE-2018-6176/" source="CVE"/>
		<reference ref_id="CVE-2018-6177" ref_url="https://www.suse.com/security/cve/CVE-2018-6177/" source="CVE"/>
		<reference ref_id="CVE-2018-6178" ref_url="https://www.suse.com/security/cve/CVE-2018-6178/" source="CVE"/>
		<reference ref_id="CVE-2018-6179" ref_url="https://www.suse.com/security/cve/CVE-2018-6179/" source="CVE"/>
		<reference ref_id="CVE-2018-6406" ref_url="https://www.suse.com/security/cve/CVE-2018-6406/" source="CVE"/>
		<reference ref_id="CVE-2019-13659" ref_url="https://www.suse.com/security/cve/CVE-2019-13659/" source="CVE"/>
		<reference ref_id="CVE-2019-13660" ref_url="https://www.suse.com/security/cve/CVE-2019-13660/" source="CVE"/>
		<reference ref_id="CVE-2019-13661" ref_url="https://www.suse.com/security/cve/CVE-2019-13661/" source="CVE"/>
		<reference ref_id="CVE-2019-13662" ref_url="https://www.suse.com/security/cve/CVE-2019-13662/" source="CVE"/>
		<reference ref_id="CVE-2019-13663" ref_url="https://www.suse.com/security/cve/CVE-2019-13663/" source="CVE"/>
		<reference ref_id="CVE-2019-13664" ref_url="https://www.suse.com/security/cve/CVE-2019-13664/" source="CVE"/>
		<reference ref_id="CVE-2019-13665" ref_url="https://www.suse.com/security/cve/CVE-2019-13665/" source="CVE"/>
		<reference ref_id="CVE-2019-13666" ref_url="https://www.suse.com/security/cve/CVE-2019-13666/" source="CVE"/>
		<reference ref_id="CVE-2019-13667" ref_url="https://www.suse.com/security/cve/CVE-2019-13667/" source="CVE"/>
		<reference ref_id="CVE-2019-13668" ref_url="https://www.suse.com/security/cve/CVE-2019-13668/" source="CVE"/>
		<reference ref_id="CVE-2019-13669" ref_url="https://www.suse.com/security/cve/CVE-2019-13669/" source="CVE"/>
		<reference ref_id="CVE-2019-13670" ref_url="https://www.suse.com/security/cve/CVE-2019-13670/" source="CVE"/>
		<reference ref_id="CVE-2019-13671" ref_url="https://www.suse.com/security/cve/CVE-2019-13671/" source="CVE"/>
		<reference ref_id="CVE-2019-13673" ref_url="https://www.suse.com/security/cve/CVE-2019-13673/" source="CVE"/>
		<reference ref_id="CVE-2019-13674" ref_url="https://www.suse.com/security/cve/CVE-2019-13674/" source="CVE"/>
		<reference ref_id="CVE-2019-13675" ref_url="https://www.suse.com/security/cve/CVE-2019-13675/" source="CVE"/>
		<reference ref_id="CVE-2019-13676" ref_url="https://www.suse.com/security/cve/CVE-2019-13676/" source="CVE"/>
		<reference ref_id="CVE-2019-13677" ref_url="https://www.suse.com/security/cve/CVE-2019-13677/" source="CVE"/>
		<reference ref_id="CVE-2019-13678" ref_url="https://www.suse.com/security/cve/CVE-2019-13678/" source="CVE"/>
		<reference ref_id="CVE-2019-13679" ref_url="https://www.suse.com/security/cve/CVE-2019-13679/" source="CVE"/>
		<reference ref_id="CVE-2019-13680" ref_url="https://www.suse.com/security/cve/CVE-2019-13680/" source="CVE"/>
		<reference ref_id="CVE-2019-13681" ref_url="https://www.suse.com/security/cve/CVE-2019-13681/" source="CVE"/>
		<reference ref_id="CVE-2019-13682" ref_url="https://www.suse.com/security/cve/CVE-2019-13682/" source="CVE"/>
		<reference ref_id="CVE-2019-13683" ref_url="https://www.suse.com/security/cve/CVE-2019-13683/" source="CVE"/>
		<reference ref_id="CVE-2019-13685" ref_url="https://www.suse.com/security/cve/CVE-2019-13685/" source="CVE"/>
		<reference ref_id="CVE-2019-13686" ref_url="https://www.suse.com/security/cve/CVE-2019-13686/" source="CVE"/>
		<reference ref_id="CVE-2019-13687" ref_url="https://www.suse.com/security/cve/CVE-2019-13687/" source="CVE"/>
		<reference ref_id="CVE-2019-13688" ref_url="https://www.suse.com/security/cve/CVE-2019-13688/" source="CVE"/>
		<reference ref_id="CVE-2019-13693" ref_url="https://www.suse.com/security/cve/CVE-2019-13693/" source="CVE"/>
		<reference ref_id="CVE-2019-13694" ref_url="https://www.suse.com/security/cve/CVE-2019-13694/" source="CVE"/>
		<reference ref_id="CVE-2019-13695" ref_url="https://www.suse.com/security/cve/CVE-2019-13695/" source="CVE"/>
		<reference ref_id="CVE-2019-13696" ref_url="https://www.suse.com/security/cve/CVE-2019-13696/" source="CVE"/>
		<reference ref_id="CVE-2019-13697" ref_url="https://www.suse.com/security/cve/CVE-2019-13697/" source="CVE"/>
		<reference ref_id="CVE-2019-13699" ref_url="https://www.suse.com/security/cve/CVE-2019-13699/" source="CVE"/>
		<reference ref_id="CVE-2019-13700" ref_url="https://www.suse.com/security/cve/CVE-2019-13700/" source="CVE"/>
		<reference ref_id="CVE-2019-13701" ref_url="https://www.suse.com/security/cve/CVE-2019-13701/" source="CVE"/>
		<reference ref_id="CVE-2019-13702" ref_url="https://www.suse.com/security/cve/CVE-2019-13702/" source="CVE"/>
		<reference ref_id="CVE-2019-13703" ref_url="https://www.suse.com/security/cve/CVE-2019-13703/" source="CVE"/>
		<reference ref_id="CVE-2019-13704" ref_url="https://www.suse.com/security/cve/CVE-2019-13704/" source="CVE"/>
		<reference ref_id="CVE-2019-13705" ref_url="https://www.suse.com/security/cve/CVE-2019-13705/" source="CVE"/>
		<reference ref_id="CVE-2019-13706" ref_url="https://www.suse.com/security/cve/CVE-2019-13706/" source="CVE"/>
		<reference ref_id="CVE-2019-13707" ref_url="https://www.suse.com/security/cve/CVE-2019-13707/" source="CVE"/>
		<reference ref_id="CVE-2019-13708" ref_url="https://www.suse.com/security/cve/CVE-2019-13708/" source="CVE"/>
		<reference ref_id="CVE-2019-13709" ref_url="https://www.suse.com/security/cve/CVE-2019-13709/" source="CVE"/>
		<reference ref_id="CVE-2019-13710" ref_url="https://www.suse.com/security/cve/CVE-2019-13710/" source="CVE"/>
		<reference ref_id="CVE-2019-13711" ref_url="https://www.suse.com/security/cve/CVE-2019-13711/" source="CVE"/>
		<reference ref_id="CVE-2019-13713" ref_url="https://www.suse.com/security/cve/CVE-2019-13713/" source="CVE"/>
		<reference ref_id="CVE-2019-13714" ref_url="https://www.suse.com/security/cve/CVE-2019-13714/" source="CVE"/>
		<reference ref_id="CVE-2019-13715" ref_url="https://www.suse.com/security/cve/CVE-2019-13715/" source="CVE"/>
		<reference ref_id="CVE-2019-13716" ref_url="https://www.suse.com/security/cve/CVE-2019-13716/" source="CVE"/>
		<reference ref_id="CVE-2019-13717" ref_url="https://www.suse.com/security/cve/CVE-2019-13717/" source="CVE"/>
		<reference ref_id="CVE-2019-13718" ref_url="https://www.suse.com/security/cve/CVE-2019-13718/" source="CVE"/>
		<reference ref_id="CVE-2019-13719" ref_url="https://www.suse.com/security/cve/CVE-2019-13719/" source="CVE"/>
		<reference ref_id="CVE-2019-13720" ref_url="https://www.suse.com/security/cve/CVE-2019-13720/" source="CVE"/>
		<reference ref_id="CVE-2019-13721" ref_url="https://www.suse.com/security/cve/CVE-2019-13721/" source="CVE"/>
		<reference ref_id="CVE-2019-13723" ref_url="https://www.suse.com/security/cve/CVE-2019-13723/" source="CVE"/>
		<reference ref_id="CVE-2019-13724" ref_url="https://www.suse.com/security/cve/CVE-2019-13724/" source="CVE"/>
		<reference ref_id="CVE-2019-13725" ref_url="https://www.suse.com/security/cve/CVE-2019-13725/" source="CVE"/>
		<reference ref_id="CVE-2019-13726" ref_url="https://www.suse.com/security/cve/CVE-2019-13726/" source="CVE"/>
		<reference ref_id="CVE-2019-13727" ref_url="https://www.suse.com/security/cve/CVE-2019-13727/" source="CVE"/>
		<reference ref_id="CVE-2019-13728" ref_url="https://www.suse.com/security/cve/CVE-2019-13728/" source="CVE"/>
		<reference ref_id="CVE-2019-13729" ref_url="https://www.suse.com/security/cve/CVE-2019-13729/" source="CVE"/>
		<reference ref_id="CVE-2019-13730" ref_url="https://www.suse.com/security/cve/CVE-2019-13730/" source="CVE"/>
		<reference ref_id="CVE-2019-13732" ref_url="https://www.suse.com/security/cve/CVE-2019-13732/" source="CVE"/>
		<reference ref_id="CVE-2019-13734" ref_url="https://www.suse.com/security/cve/CVE-2019-13734/" source="CVE"/>
		<reference ref_id="CVE-2019-13735" ref_url="https://www.suse.com/security/cve/CVE-2019-13735/" source="CVE"/>
		<reference ref_id="CVE-2019-13736" ref_url="https://www.suse.com/security/cve/CVE-2019-13736/" source="CVE"/>
		<reference ref_id="CVE-2019-13737" ref_url="https://www.suse.com/security/cve/CVE-2019-13737/" source="CVE"/>
		<reference ref_id="CVE-2019-13738" ref_url="https://www.suse.com/security/cve/CVE-2019-13738/" source="CVE"/>
		<reference ref_id="CVE-2019-13739" ref_url="https://www.suse.com/security/cve/CVE-2019-13739/" source="CVE"/>
		<reference ref_id="CVE-2019-13740" ref_url="https://www.suse.com/security/cve/CVE-2019-13740/" source="CVE"/>
		<reference ref_id="CVE-2019-13741" ref_url="https://www.suse.com/security/cve/CVE-2019-13741/" source="CVE"/>
		<reference ref_id="CVE-2019-13742" ref_url="https://www.suse.com/security/cve/CVE-2019-13742/" source="CVE"/>
		<reference ref_id="CVE-2019-13743" ref_url="https://www.suse.com/security/cve/CVE-2019-13743/" source="CVE"/>
		<reference ref_id="CVE-2019-13744" ref_url="https://www.suse.com/security/cve/CVE-2019-13744/" source="CVE"/>
		<reference ref_id="CVE-2019-13745" ref_url="https://www.suse.com/security/cve/CVE-2019-13745/" source="CVE"/>
		<reference ref_id="CVE-2019-13746" ref_url="https://www.suse.com/security/cve/CVE-2019-13746/" source="CVE"/>
		<reference ref_id="CVE-2019-13747" ref_url="https://www.suse.com/security/cve/CVE-2019-13747/" source="CVE"/>
		<reference ref_id="CVE-2019-13748" ref_url="https://www.suse.com/security/cve/CVE-2019-13748/" source="CVE"/>
		<reference ref_id="CVE-2019-13749" ref_url="https://www.suse.com/security/cve/CVE-2019-13749/" source="CVE"/>
		<reference ref_id="CVE-2019-13750" ref_url="https://www.suse.com/security/cve/CVE-2019-13750/" source="CVE"/>
		<reference ref_id="CVE-2019-13751" ref_url="https://www.suse.com/security/cve/CVE-2019-13751/" source="CVE"/>
		<reference ref_id="CVE-2019-13752" ref_url="https://www.suse.com/security/cve/CVE-2019-13752/" source="CVE"/>
		<reference ref_id="CVE-2019-13753" ref_url="https://www.suse.com/security/cve/CVE-2019-13753/" source="CVE"/>
		<reference ref_id="CVE-2019-13754" ref_url="https://www.suse.com/security/cve/CVE-2019-13754/" source="CVE"/>
		<reference ref_id="CVE-2019-13755" ref_url="https://www.suse.com/security/cve/CVE-2019-13755/" source="CVE"/>
		<reference ref_id="CVE-2019-13756" ref_url="https://www.suse.com/security/cve/CVE-2019-13756/" source="CVE"/>
		<reference ref_id="CVE-2019-13757" ref_url="https://www.suse.com/security/cve/CVE-2019-13757/" source="CVE"/>
		<reference ref_id="CVE-2019-13758" ref_url="https://www.suse.com/security/cve/CVE-2019-13758/" source="CVE"/>
		<reference ref_id="CVE-2019-13759" ref_url="https://www.suse.com/security/cve/CVE-2019-13759/" source="CVE"/>
		<reference ref_id="CVE-2019-13761" ref_url="https://www.suse.com/security/cve/CVE-2019-13761/" source="CVE"/>
		<reference ref_id="CVE-2019-13762" ref_url="https://www.suse.com/security/cve/CVE-2019-13762/" source="CVE"/>
		<reference ref_id="CVE-2019-13763" ref_url="https://www.suse.com/security/cve/CVE-2019-13763/" source="CVE"/>
		<reference ref_id="CVE-2019-13764" ref_url="https://www.suse.com/security/cve/CVE-2019-13764/" source="CVE"/>
		<reference ref_id="CVE-2019-13767" ref_url="https://www.suse.com/security/cve/CVE-2019-13767/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5754" ref_url="https://www.suse.com/security/cve/CVE-2019-5754/" source="CVE"/>
		<reference ref_id="CVE-2019-5755" ref_url="https://www.suse.com/security/cve/CVE-2019-5755/" source="CVE"/>
		<reference ref_id="CVE-2019-5756" ref_url="https://www.suse.com/security/cve/CVE-2019-5756/" source="CVE"/>
		<reference ref_id="CVE-2019-5757" ref_url="https://www.suse.com/security/cve/CVE-2019-5757/" source="CVE"/>
		<reference ref_id="CVE-2019-5758" ref_url="https://www.suse.com/security/cve/CVE-2019-5758/" source="CVE"/>
		<reference ref_id="CVE-2019-5759" ref_url="https://www.suse.com/security/cve/CVE-2019-5759/" source="CVE"/>
		<reference ref_id="CVE-2019-5760" ref_url="https://www.suse.com/security/cve/CVE-2019-5760/" source="CVE"/>
		<reference ref_id="CVE-2019-5761" ref_url="https://www.suse.com/security/cve/CVE-2019-5761/" source="CVE"/>
		<reference ref_id="CVE-2019-5762" ref_url="https://www.suse.com/security/cve/CVE-2019-5762/" source="CVE"/>
		<reference ref_id="CVE-2019-5763" ref_url="https://www.suse.com/security/cve/CVE-2019-5763/" source="CVE"/>
		<reference ref_id="CVE-2019-5764" ref_url="https://www.suse.com/security/cve/CVE-2019-5764/" source="CVE"/>
		<reference ref_id="CVE-2019-5765" ref_url="https://www.suse.com/security/cve/CVE-2019-5765/" source="CVE"/>
		<reference ref_id="CVE-2019-5766" ref_url="https://www.suse.com/security/cve/CVE-2019-5766/" source="CVE"/>
		<reference ref_id="CVE-2019-5767" ref_url="https://www.suse.com/security/cve/CVE-2019-5767/" source="CVE"/>
		<reference ref_id="CVE-2019-5768" ref_url="https://www.suse.com/security/cve/CVE-2019-5768/" source="CVE"/>
		<reference ref_id="CVE-2019-5769" ref_url="https://www.suse.com/security/cve/CVE-2019-5769/" source="CVE"/>
		<reference ref_id="CVE-2019-5770" ref_url="https://www.suse.com/security/cve/CVE-2019-5770/" source="CVE"/>
		<reference ref_id="CVE-2019-5771" ref_url="https://www.suse.com/security/cve/CVE-2019-5771/" source="CVE"/>
		<reference ref_id="CVE-2019-5772" ref_url="https://www.suse.com/security/cve/CVE-2019-5772/" source="CVE"/>
		<reference ref_id="CVE-2019-5773" ref_url="https://www.suse.com/security/cve/CVE-2019-5773/" source="CVE"/>
		<reference ref_id="CVE-2019-5774" ref_url="https://www.suse.com/security/cve/CVE-2019-5774/" source="CVE"/>
		<reference ref_id="CVE-2019-5775" ref_url="https://www.suse.com/security/cve/CVE-2019-5775/" source="CVE"/>
		<reference ref_id="CVE-2019-5776" ref_url="https://www.suse.com/security/cve/CVE-2019-5776/" source="CVE"/>
		<reference ref_id="CVE-2019-5777" ref_url="https://www.suse.com/security/cve/CVE-2019-5777/" source="CVE"/>
		<reference ref_id="CVE-2019-5778" ref_url="https://www.suse.com/security/cve/CVE-2019-5778/" source="CVE"/>
		<reference ref_id="CVE-2019-5779" ref_url="https://www.suse.com/security/cve/CVE-2019-5779/" source="CVE"/>
		<reference ref_id="CVE-2019-5780" ref_url="https://www.suse.com/security/cve/CVE-2019-5780/" source="CVE"/>
		<reference ref_id="CVE-2019-5781" ref_url="https://www.suse.com/security/cve/CVE-2019-5781/" source="CVE"/>
		<reference ref_id="CVE-2019-5782" ref_url="https://www.suse.com/security/cve/CVE-2019-5782/" source="CVE"/>
		<reference ref_id="CVE-2019-5784" ref_url="https://www.suse.com/security/cve/CVE-2019-5784/" source="CVE"/>
		<reference ref_id="CVE-2019-5786" ref_url="https://www.suse.com/security/cve/CVE-2019-5786/" source="CVE"/>
		<reference ref_id="CVE-2019-5787" ref_url="https://www.suse.com/security/cve/CVE-2019-5787/" source="CVE"/>
		<reference ref_id="CVE-2019-5788" ref_url="https://www.suse.com/security/cve/CVE-2019-5788/" source="CVE"/>
		<reference ref_id="CVE-2019-5789" ref_url="https://www.suse.com/security/cve/CVE-2019-5789/" source="CVE"/>
		<reference ref_id="CVE-2019-5790" ref_url="https://www.suse.com/security/cve/CVE-2019-5790/" source="CVE"/>
		<reference ref_id="CVE-2019-5791" ref_url="https://www.suse.com/security/cve/CVE-2019-5791/" source="CVE"/>
		<reference ref_id="CVE-2019-5792" ref_url="https://www.suse.com/security/cve/CVE-2019-5792/" source="CVE"/>
		<reference ref_id="CVE-2019-5793" ref_url="https://www.suse.com/security/cve/CVE-2019-5793/" source="CVE"/>
		<reference ref_id="CVE-2019-5794" ref_url="https://www.suse.com/security/cve/CVE-2019-5794/" source="CVE"/>
		<reference ref_id="CVE-2019-5795" ref_url="https://www.suse.com/security/cve/CVE-2019-5795/" source="CVE"/>
		<reference ref_id="CVE-2019-5796" ref_url="https://www.suse.com/security/cve/CVE-2019-5796/" source="CVE"/>
		<reference ref_id="CVE-2019-5797" ref_url="https://www.suse.com/security/cve/CVE-2019-5797/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-5799" ref_url="https://www.suse.com/security/cve/CVE-2019-5799/" source="CVE"/>
		<reference ref_id="CVE-2019-5800" ref_url="https://www.suse.com/security/cve/CVE-2019-5800/" source="CVE"/>
		<reference ref_id="CVE-2019-5801" ref_url="https://www.suse.com/security/cve/CVE-2019-5801/" source="CVE"/>
		<reference ref_id="CVE-2019-5802" ref_url="https://www.suse.com/security/cve/CVE-2019-5802/" source="CVE"/>
		<reference ref_id="CVE-2019-5803" ref_url="https://www.suse.com/security/cve/CVE-2019-5803/" source="CVE"/>
		<reference ref_id="CVE-2019-5804" ref_url="https://www.suse.com/security/cve/CVE-2019-5804/" source="CVE"/>
		<reference ref_id="CVE-2019-5805" ref_url="https://www.suse.com/security/cve/CVE-2019-5805/" source="CVE"/>
		<reference ref_id="CVE-2019-5806" ref_url="https://www.suse.com/security/cve/CVE-2019-5806/" source="CVE"/>
		<reference ref_id="CVE-2019-5807" ref_url="https://www.suse.com/security/cve/CVE-2019-5807/" source="CVE"/>
		<reference ref_id="CVE-2019-5808" ref_url="https://www.suse.com/security/cve/CVE-2019-5808/" source="CVE"/>
		<reference ref_id="CVE-2019-5809" ref_url="https://www.suse.com/security/cve/CVE-2019-5809/" source="CVE"/>
		<reference ref_id="CVE-2019-5810" ref_url="https://www.suse.com/security/cve/CVE-2019-5810/" source="CVE"/>
		<reference ref_id="CVE-2019-5811" ref_url="https://www.suse.com/security/cve/CVE-2019-5811/" source="CVE"/>
		<reference ref_id="CVE-2019-5812" ref_url="https://www.suse.com/security/cve/CVE-2019-5812/" source="CVE"/>
		<reference ref_id="CVE-2019-5813" ref_url="https://www.suse.com/security/cve/CVE-2019-5813/" source="CVE"/>
		<reference ref_id="CVE-2019-5814" ref_url="https://www.suse.com/security/cve/CVE-2019-5814/" source="CVE"/>
		<reference ref_id="CVE-2019-5815" ref_url="https://www.suse.com/security/cve/CVE-2019-5815/" source="CVE"/>
		<reference ref_id="CVE-2019-5816" ref_url="https://www.suse.com/security/cve/CVE-2019-5816/" source="CVE"/>
		<reference ref_id="CVE-2019-5817" ref_url="https://www.suse.com/security/cve/CVE-2019-5817/" source="CVE"/>
		<reference ref_id="CVE-2019-5818" ref_url="https://www.suse.com/security/cve/CVE-2019-5818/" source="CVE"/>
		<reference ref_id="CVE-2019-5819" ref_url="https://www.suse.com/security/cve/CVE-2019-5819/" source="CVE"/>
		<reference ref_id="CVE-2019-5820" ref_url="https://www.suse.com/security/cve/CVE-2019-5820/" source="CVE"/>
		<reference ref_id="CVE-2019-5821" ref_url="https://www.suse.com/security/cve/CVE-2019-5821/" source="CVE"/>
		<reference ref_id="CVE-2019-5822" ref_url="https://www.suse.com/security/cve/CVE-2019-5822/" source="CVE"/>
		<reference ref_id="CVE-2019-5823" ref_url="https://www.suse.com/security/cve/CVE-2019-5823/" source="CVE"/>
		<reference ref_id="CVE-2019-5824" ref_url="https://www.suse.com/security/cve/CVE-2019-5824/" source="CVE"/>
		<reference ref_id="CVE-2019-5827" ref_url="https://www.suse.com/security/cve/CVE-2019-5827/" source="CVE"/>
		<reference ref_id="CVE-2019-5828" ref_url="https://www.suse.com/security/cve/CVE-2019-5828/" source="CVE"/>
		<reference ref_id="CVE-2019-5829" ref_url="https://www.suse.com/security/cve/CVE-2019-5829/" source="CVE"/>
		<reference ref_id="CVE-2019-5830" ref_url="https://www.suse.com/security/cve/CVE-2019-5830/" source="CVE"/>
		<reference ref_id="CVE-2019-5831" ref_url="https://www.suse.com/security/cve/CVE-2019-5831/" source="CVE"/>
		<reference ref_id="CVE-2019-5832" ref_url="https://www.suse.com/security/cve/CVE-2019-5832/" source="CVE"/>
		<reference ref_id="CVE-2019-5833" ref_url="https://www.suse.com/security/cve/CVE-2019-5833/" source="CVE"/>
		<reference ref_id="CVE-2019-5834" ref_url="https://www.suse.com/security/cve/CVE-2019-5834/" source="CVE"/>
		<reference ref_id="CVE-2019-5835" ref_url="https://www.suse.com/security/cve/CVE-2019-5835/" source="CVE"/>
		<reference ref_id="CVE-2019-5836" ref_url="https://www.suse.com/security/cve/CVE-2019-5836/" source="CVE"/>
		<reference ref_id="CVE-2019-5837" ref_url="https://www.suse.com/security/cve/CVE-2019-5837/" source="CVE"/>
		<reference ref_id="CVE-2019-5838" ref_url="https://www.suse.com/security/cve/CVE-2019-5838/" source="CVE"/>
		<reference ref_id="CVE-2019-5839" ref_url="https://www.suse.com/security/cve/CVE-2019-5839/" source="CVE"/>
		<reference ref_id="CVE-2019-5840" ref_url="https://www.suse.com/security/cve/CVE-2019-5840/" source="CVE"/>
		<reference ref_id="CVE-2019-5842" ref_url="https://www.suse.com/security/cve/CVE-2019-5842/" source="CVE"/>
		<reference ref_id="CVE-2019-5844" ref_url="https://www.suse.com/security/cve/CVE-2019-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-5845" ref_url="https://www.suse.com/security/cve/CVE-2019-5845/" source="CVE"/>
		<reference ref_id="CVE-2019-5846" ref_url="https://www.suse.com/security/cve/CVE-2019-5846/" source="CVE"/>
		<reference ref_id="CVE-2019-5847" ref_url="https://www.suse.com/security/cve/CVE-2019-5847/" source="CVE"/>
		<reference ref_id="CVE-2019-5848" ref_url="https://www.suse.com/security/cve/CVE-2019-5848/" source="CVE"/>
		<reference ref_id="CVE-2019-5850" ref_url="https://www.suse.com/security/cve/CVE-2019-5850/" source="CVE"/>
		<reference ref_id="CVE-2019-5851" ref_url="https://www.suse.com/security/cve/CVE-2019-5851/" source="CVE"/>
		<reference ref_id="CVE-2019-5852" ref_url="https://www.suse.com/security/cve/CVE-2019-5852/" source="CVE"/>
		<reference ref_id="CVE-2019-5853" ref_url="https://www.suse.com/security/cve/CVE-2019-5853/" source="CVE"/>
		<reference ref_id="CVE-2019-5854" ref_url="https://www.suse.com/security/cve/CVE-2019-5854/" source="CVE"/>
		<reference ref_id="CVE-2019-5855" ref_url="https://www.suse.com/security/cve/CVE-2019-5855/" source="CVE"/>
		<reference ref_id="CVE-2019-5856" ref_url="https://www.suse.com/security/cve/CVE-2019-5856/" source="CVE"/>
		<reference ref_id="CVE-2019-5857" ref_url="https://www.suse.com/security/cve/CVE-2019-5857/" source="CVE"/>
		<reference ref_id="CVE-2019-5858" ref_url="https://www.suse.com/security/cve/CVE-2019-5858/" source="CVE"/>
		<reference ref_id="CVE-2019-5859" ref_url="https://www.suse.com/security/cve/CVE-2019-5859/" source="CVE"/>
		<reference ref_id="CVE-2019-5860" ref_url="https://www.suse.com/security/cve/CVE-2019-5860/" source="CVE"/>
		<reference ref_id="CVE-2019-5861" ref_url="https://www.suse.com/security/cve/CVE-2019-5861/" source="CVE"/>
		<reference ref_id="CVE-2019-5862" ref_url="https://www.suse.com/security/cve/CVE-2019-5862/" source="CVE"/>
		<reference ref_id="CVE-2019-5863" ref_url="https://www.suse.com/security/cve/CVE-2019-5863/" source="CVE"/>
		<reference ref_id="CVE-2019-5864" ref_url="https://www.suse.com/security/cve/CVE-2019-5864/" source="CVE"/>
		<reference ref_id="CVE-2019-5865" ref_url="https://www.suse.com/security/cve/CVE-2019-5865/" source="CVE"/>
		<reference ref_id="CVE-2019-5867" ref_url="https://www.suse.com/security/cve/CVE-2019-5867/" source="CVE"/>
		<reference ref_id="CVE-2019-5868" ref_url="https://www.suse.com/security/cve/CVE-2019-5868/" source="CVE"/>
		<reference ref_id="CVE-2019-5869" ref_url="https://www.suse.com/security/cve/CVE-2019-5869/" source="CVE"/>
		<reference ref_id="CVE-2019-5870" ref_url="https://www.suse.com/security/cve/CVE-2019-5870/" source="CVE"/>
		<reference ref_id="CVE-2019-5871" ref_url="https://www.suse.com/security/cve/CVE-2019-5871/" source="CVE"/>
		<reference ref_id="CVE-2019-5872" ref_url="https://www.suse.com/security/cve/CVE-2019-5872/" source="CVE"/>
		<reference ref_id="CVE-2019-5874" ref_url="https://www.suse.com/security/cve/CVE-2019-5874/" source="CVE"/>
		<reference ref_id="CVE-2019-5875" ref_url="https://www.suse.com/security/cve/CVE-2019-5875/" source="CVE"/>
		<reference ref_id="CVE-2019-5876" ref_url="https://www.suse.com/security/cve/CVE-2019-5876/" source="CVE"/>
		<reference ref_id="CVE-2019-5877" ref_url="https://www.suse.com/security/cve/CVE-2019-5877/" source="CVE"/>
		<reference ref_id="CVE-2019-5878" ref_url="https://www.suse.com/security/cve/CVE-2019-5878/" source="CVE"/>
		<reference ref_id="CVE-2019-5879" ref_url="https://www.suse.com/security/cve/CVE-2019-5879/" source="CVE"/>
		<reference ref_id="CVE-2019-5880" ref_url="https://www.suse.com/security/cve/CVE-2019-5880/" source="CVE"/>
		<reference ref_id="CVE-2019-5881" ref_url="https://www.suse.com/security/cve/CVE-2019-5881/" source="CVE"/>
		<reference ref_id="CVE-2019-8075" ref_url="https://www.suse.com/security/cve/CVE-2019-8075/" source="CVE"/>
		<reference ref_id="CVE-2020-0561" ref_url="https://www.suse.com/security/cve/CVE-2020-0561/" source="CVE"/>
		<reference ref_id="CVE-2020-15959" ref_url="https://www.suse.com/security/cve/CVE-2020-15959/" source="CVE"/>
		<reference ref_id="CVE-2020-15960" ref_url="https://www.suse.com/security/cve/CVE-2020-15960/" source="CVE"/>
		<reference ref_id="CVE-2020-15961" ref_url="https://www.suse.com/security/cve/CVE-2020-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-15962" ref_url="https://www.suse.com/security/cve/CVE-2020-15962/" source="CVE"/>
		<reference ref_id="CVE-2020-15963" ref_url="https://www.suse.com/security/cve/CVE-2020-15963/" source="CVE"/>
		<reference ref_id="CVE-2020-15964" ref_url="https://www.suse.com/security/cve/CVE-2020-15964/" source="CVE"/>
		<reference ref_id="CVE-2020-15965" ref_url="https://www.suse.com/security/cve/CVE-2020-15965/" source="CVE"/>
		<reference ref_id="CVE-2020-15966" ref_url="https://www.suse.com/security/cve/CVE-2020-15966/" source="CVE"/>
		<reference ref_id="CVE-2020-15967" ref_url="https://www.suse.com/security/cve/CVE-2020-15967/" source="CVE"/>
		<reference ref_id="CVE-2020-15968" ref_url="https://www.suse.com/security/cve/CVE-2020-15968/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="CVE-2020-15970" ref_url="https://www.suse.com/security/cve/CVE-2020-15970/" source="CVE"/>
		<reference ref_id="CVE-2020-15971" ref_url="https://www.suse.com/security/cve/CVE-2020-15971/" source="CVE"/>
		<reference ref_id="CVE-2020-15972" ref_url="https://www.suse.com/security/cve/CVE-2020-15972/" source="CVE"/>
		<reference ref_id="CVE-2020-15973" ref_url="https://www.suse.com/security/cve/CVE-2020-15973/" source="CVE"/>
		<reference ref_id="CVE-2020-15974" ref_url="https://www.suse.com/security/cve/CVE-2020-15974/" source="CVE"/>
		<reference ref_id="CVE-2020-15975" ref_url="https://www.suse.com/security/cve/CVE-2020-15975/" source="CVE"/>
		<reference ref_id="CVE-2020-15976" ref_url="https://www.suse.com/security/cve/CVE-2020-15976/" source="CVE"/>
		<reference ref_id="CVE-2020-15977" ref_url="https://www.suse.com/security/cve/CVE-2020-15977/" source="CVE"/>
		<reference ref_id="CVE-2020-15978" ref_url="https://www.suse.com/security/cve/CVE-2020-15978/" source="CVE"/>
		<reference ref_id="CVE-2020-15979" ref_url="https://www.suse.com/security/cve/CVE-2020-15979/" source="CVE"/>
		<reference ref_id="CVE-2020-15980" ref_url="https://www.suse.com/security/cve/CVE-2020-15980/" source="CVE"/>
		<reference ref_id="CVE-2020-15981" ref_url="https://www.suse.com/security/cve/CVE-2020-15981/" source="CVE"/>
		<reference ref_id="CVE-2020-15982" ref_url="https://www.suse.com/security/cve/CVE-2020-15982/" source="CVE"/>
		<reference ref_id="CVE-2020-15983" ref_url="https://www.suse.com/security/cve/CVE-2020-15983/" source="CVE"/>
		<reference ref_id="CVE-2020-15984" ref_url="https://www.suse.com/security/cve/CVE-2020-15984/" source="CVE"/>
		<reference ref_id="CVE-2020-15985" ref_url="https://www.suse.com/security/cve/CVE-2020-15985/" source="CVE"/>
		<reference ref_id="CVE-2020-15986" ref_url="https://www.suse.com/security/cve/CVE-2020-15986/" source="CVE"/>
		<reference ref_id="CVE-2020-15987" ref_url="https://www.suse.com/security/cve/CVE-2020-15987/" source="CVE"/>
		<reference ref_id="CVE-2020-15988" ref_url="https://www.suse.com/security/cve/CVE-2020-15988/" source="CVE"/>
		<reference ref_id="CVE-2020-15989" ref_url="https://www.suse.com/security/cve/CVE-2020-15989/" source="CVE"/>
		<reference ref_id="CVE-2020-15990" ref_url="https://www.suse.com/security/cve/CVE-2020-15990/" source="CVE"/>
		<reference ref_id="CVE-2020-15991" ref_url="https://www.suse.com/security/cve/CVE-2020-15991/" source="CVE"/>
		<reference ref_id="CVE-2020-15992" ref_url="https://www.suse.com/security/cve/CVE-2020-15992/" source="CVE"/>
		<reference ref_id="CVE-2020-15995" ref_url="https://www.suse.com/security/cve/CVE-2020-15995/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16000" ref_url="https://www.suse.com/security/cve/CVE-2020-16000/" source="CVE"/>
		<reference ref_id="CVE-2020-16001" ref_url="https://www.suse.com/security/cve/CVE-2020-16001/" source="CVE"/>
		<reference ref_id="CVE-2020-16002" ref_url="https://www.suse.com/security/cve/CVE-2020-16002/" source="CVE"/>
		<reference ref_id="CVE-2020-16003" ref_url="https://www.suse.com/security/cve/CVE-2020-16003/" source="CVE"/>
		<reference ref_id="CVE-2020-16004" ref_url="https://www.suse.com/security/cve/CVE-2020-16004/" source="CVE"/>
		<reference ref_id="CVE-2020-16005" ref_url="https://www.suse.com/security/cve/CVE-2020-16005/" source="CVE"/>
		<reference ref_id="CVE-2020-16006" ref_url="https://www.suse.com/security/cve/CVE-2020-16006/" source="CVE"/>
		<reference ref_id="CVE-2020-16007" ref_url="https://www.suse.com/security/cve/CVE-2020-16007/" source="CVE"/>
		<reference ref_id="CVE-2020-16008" ref_url="https://www.suse.com/security/cve/CVE-2020-16008/" source="CVE"/>
		<reference ref_id="CVE-2020-16009" ref_url="https://www.suse.com/security/cve/CVE-2020-16009/" source="CVE"/>
		<reference ref_id="CVE-2020-16011" ref_url="https://www.suse.com/security/cve/CVE-2020-16011/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-16013" ref_url="https://www.suse.com/security/cve/CVE-2020-16013/" source="CVE"/>
		<reference ref_id="CVE-2020-16014" ref_url="https://www.suse.com/security/cve/CVE-2020-16014/" source="CVE"/>
		<reference ref_id="CVE-2020-16015" ref_url="https://www.suse.com/security/cve/CVE-2020-16015/" source="CVE"/>
		<reference ref_id="CVE-2020-16016" ref_url="https://www.suse.com/security/cve/CVE-2020-16016/" source="CVE"/>
		<reference ref_id="CVE-2020-16017" ref_url="https://www.suse.com/security/cve/CVE-2020-16017/" source="CVE"/>
		<reference ref_id="CVE-2020-16018" ref_url="https://www.suse.com/security/cve/CVE-2020-16018/" source="CVE"/>
		<reference ref_id="CVE-2020-16019" ref_url="https://www.suse.com/security/cve/CVE-2020-16019/" source="CVE"/>
		<reference ref_id="CVE-2020-16020" ref_url="https://www.suse.com/security/cve/CVE-2020-16020/" source="CVE"/>
		<reference ref_id="CVE-2020-16021" ref_url="https://www.suse.com/security/cve/CVE-2020-16021/" source="CVE"/>
		<reference ref_id="CVE-2020-16022" ref_url="https://www.suse.com/security/cve/CVE-2020-16022/" source="CVE"/>
		<reference ref_id="CVE-2020-16023" ref_url="https://www.suse.com/security/cve/CVE-2020-16023/" source="CVE"/>
		<reference ref_id="CVE-2020-16024" ref_url="https://www.suse.com/security/cve/CVE-2020-16024/" source="CVE"/>
		<reference ref_id="CVE-2020-16025" ref_url="https://www.suse.com/security/cve/CVE-2020-16025/" source="CVE"/>
		<reference ref_id="CVE-2020-16026" ref_url="https://www.suse.com/security/cve/CVE-2020-16026/" source="CVE"/>
		<reference ref_id="CVE-2020-16027" ref_url="https://www.suse.com/security/cve/CVE-2020-16027/" source="CVE"/>
		<reference ref_id="CVE-2020-16028" ref_url="https://www.suse.com/security/cve/CVE-2020-16028/" source="CVE"/>
		<reference ref_id="CVE-2020-16029" ref_url="https://www.suse.com/security/cve/CVE-2020-16029/" source="CVE"/>
		<reference ref_id="CVE-2020-16030" ref_url="https://www.suse.com/security/cve/CVE-2020-16030/" source="CVE"/>
		<reference ref_id="CVE-2020-16031" ref_url="https://www.suse.com/security/cve/CVE-2020-16031/" source="CVE"/>
		<reference ref_id="CVE-2020-16032" ref_url="https://www.suse.com/security/cve/CVE-2020-16032/" source="CVE"/>
		<reference ref_id="CVE-2020-16033" ref_url="https://www.suse.com/security/cve/CVE-2020-16033/" source="CVE"/>
		<reference ref_id="CVE-2020-16034" ref_url="https://www.suse.com/security/cve/CVE-2020-16034/" source="CVE"/>
		<reference ref_id="CVE-2020-16035" ref_url="https://www.suse.com/security/cve/CVE-2020-16035/" source="CVE"/>
		<reference ref_id="CVE-2020-16036" ref_url="https://www.suse.com/security/cve/CVE-2020-16036/" source="CVE"/>
		<reference ref_id="CVE-2020-16037" ref_url="https://www.suse.com/security/cve/CVE-2020-16037/" source="CVE"/>
		<reference ref_id="CVE-2020-16038" ref_url="https://www.suse.com/security/cve/CVE-2020-16038/" source="CVE"/>
		<reference ref_id="CVE-2020-16039" ref_url="https://www.suse.com/security/cve/CVE-2020-16039/" source="CVE"/>
		<reference ref_id="CVE-2020-16040" ref_url="https://www.suse.com/security/cve/CVE-2020-16040/" source="CVE"/>
		<reference ref_id="CVE-2020-16041" ref_url="https://www.suse.com/security/cve/CVE-2020-16041/" source="CVE"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-16043" ref_url="https://www.suse.com/security/cve/CVE-2020-16043/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2020-27844" ref_url="https://www.suse.com/security/cve/CVE-2020-27844/" source="CVE"/>
		<reference ref_id="CVE-2020-6377" ref_url="https://www.suse.com/security/cve/CVE-2020-6377/" source="CVE"/>
		<reference ref_id="CVE-2020-6378" ref_url="https://www.suse.com/security/cve/CVE-2020-6378/" source="CVE"/>
		<reference ref_id="CVE-2020-6379" ref_url="https://www.suse.com/security/cve/CVE-2020-6379/" source="CVE"/>
		<reference ref_id="CVE-2020-6380" ref_url="https://www.suse.com/security/cve/CVE-2020-6380/" source="CVE"/>
		<reference ref_id="CVE-2020-6381" ref_url="https://www.suse.com/security/cve/CVE-2020-6381/" source="CVE"/>
		<reference ref_id="CVE-2020-6382" ref_url="https://www.suse.com/security/cve/CVE-2020-6382/" source="CVE"/>
		<reference ref_id="CVE-2020-6385" ref_url="https://www.suse.com/security/cve/CVE-2020-6385/" source="CVE"/>
		<reference ref_id="CVE-2020-6387" ref_url="https://www.suse.com/security/cve/CVE-2020-6387/" source="CVE"/>
		<reference ref_id="CVE-2020-6388" ref_url="https://www.suse.com/security/cve/CVE-2020-6388/" source="CVE"/>
		<reference ref_id="CVE-2020-6389" ref_url="https://www.suse.com/security/cve/CVE-2020-6389/" source="CVE"/>
		<reference ref_id="CVE-2020-6390" ref_url="https://www.suse.com/security/cve/CVE-2020-6390/" source="CVE"/>
		<reference ref_id="CVE-2020-6391" ref_url="https://www.suse.com/security/cve/CVE-2020-6391/" source="CVE"/>
		<reference ref_id="CVE-2020-6392" ref_url="https://www.suse.com/security/cve/CVE-2020-6392/" source="CVE"/>
		<reference ref_id="CVE-2020-6393" ref_url="https://www.suse.com/security/cve/CVE-2020-6393/" source="CVE"/>
		<reference ref_id="CVE-2020-6394" ref_url="https://www.suse.com/security/cve/CVE-2020-6394/" source="CVE"/>
		<reference ref_id="CVE-2020-6395" ref_url="https://www.suse.com/security/cve/CVE-2020-6395/" source="CVE"/>
		<reference ref_id="CVE-2020-6396" ref_url="https://www.suse.com/security/cve/CVE-2020-6396/" source="CVE"/>
		<reference ref_id="CVE-2020-6397" ref_url="https://www.suse.com/security/cve/CVE-2020-6397/" source="CVE"/>
		<reference ref_id="CVE-2020-6398" ref_url="https://www.suse.com/security/cve/CVE-2020-6398/" source="CVE"/>
		<reference ref_id="CVE-2020-6399" ref_url="https://www.suse.com/security/cve/CVE-2020-6399/" source="CVE"/>
		<reference ref_id="CVE-2020-6400" ref_url="https://www.suse.com/security/cve/CVE-2020-6400/" source="CVE"/>
		<reference ref_id="CVE-2020-6401" ref_url="https://www.suse.com/security/cve/CVE-2020-6401/" source="CVE"/>
		<reference ref_id="CVE-2020-6402" ref_url="https://www.suse.com/security/cve/CVE-2020-6402/" source="CVE"/>
		<reference ref_id="CVE-2020-6403" ref_url="https://www.suse.com/security/cve/CVE-2020-6403/" source="CVE"/>
		<reference ref_id="CVE-2020-6404" ref_url="https://www.suse.com/security/cve/CVE-2020-6404/" source="CVE"/>
		<reference ref_id="CVE-2020-6405" ref_url="https://www.suse.com/security/cve/CVE-2020-6405/" source="CVE"/>
		<reference ref_id="CVE-2020-6406" ref_url="https://www.suse.com/security/cve/CVE-2020-6406/" source="CVE"/>
		<reference ref_id="CVE-2020-6407" ref_url="https://www.suse.com/security/cve/CVE-2020-6407/" source="CVE"/>
		<reference ref_id="CVE-2020-6408" ref_url="https://www.suse.com/security/cve/CVE-2020-6408/" source="CVE"/>
		<reference ref_id="CVE-2020-6409" ref_url="https://www.suse.com/security/cve/CVE-2020-6409/" source="CVE"/>
		<reference ref_id="CVE-2020-6410" ref_url="https://www.suse.com/security/cve/CVE-2020-6410/" source="CVE"/>
		<reference ref_id="CVE-2020-6411" ref_url="https://www.suse.com/security/cve/CVE-2020-6411/" source="CVE"/>
		<reference ref_id="CVE-2020-6412" ref_url="https://www.suse.com/security/cve/CVE-2020-6412/" source="CVE"/>
		<reference ref_id="CVE-2020-6413" ref_url="https://www.suse.com/security/cve/CVE-2020-6413/" source="CVE"/>
		<reference ref_id="CVE-2020-6414" ref_url="https://www.suse.com/security/cve/CVE-2020-6414/" source="CVE"/>
		<reference ref_id="CVE-2020-6415" ref_url="https://www.suse.com/security/cve/CVE-2020-6415/" source="CVE"/>
		<reference ref_id="CVE-2020-6416" ref_url="https://www.suse.com/security/cve/CVE-2020-6416/" source="CVE"/>
		<reference ref_id="CVE-2020-6417" ref_url="https://www.suse.com/security/cve/CVE-2020-6417/" source="CVE"/>
		<reference ref_id="CVE-2020-6418" ref_url="https://www.suse.com/security/cve/CVE-2020-6418/" source="CVE"/>
		<reference ref_id="CVE-2020-6420" ref_url="https://www.suse.com/security/cve/CVE-2020-6420/" source="CVE"/>
		<reference ref_id="CVE-2020-6422" ref_url="https://www.suse.com/security/cve/CVE-2020-6422/" source="CVE"/>
		<reference ref_id="CVE-2020-6423" ref_url="https://www.suse.com/security/cve/CVE-2020-6423/" source="CVE"/>
		<reference ref_id="CVE-2020-6424" ref_url="https://www.suse.com/security/cve/CVE-2020-6424/" source="CVE"/>
		<reference ref_id="CVE-2020-6425" ref_url="https://www.suse.com/security/cve/CVE-2020-6425/" source="CVE"/>
		<reference ref_id="CVE-2020-6426" ref_url="https://www.suse.com/security/cve/CVE-2020-6426/" source="CVE"/>
		<reference ref_id="CVE-2020-6427" ref_url="https://www.suse.com/security/cve/CVE-2020-6427/" source="CVE"/>
		<reference ref_id="CVE-2020-6428" ref_url="https://www.suse.com/security/cve/CVE-2020-6428/" source="CVE"/>
		<reference ref_id="CVE-2020-6429" ref_url="https://www.suse.com/security/cve/CVE-2020-6429/" source="CVE"/>
		<reference ref_id="CVE-2020-6430" ref_url="https://www.suse.com/security/cve/CVE-2020-6430/" source="CVE"/>
		<reference ref_id="CVE-2020-6431" ref_url="https://www.suse.com/security/cve/CVE-2020-6431/" source="CVE"/>
		<reference ref_id="CVE-2020-6432" ref_url="https://www.suse.com/security/cve/CVE-2020-6432/" source="CVE"/>
		<reference ref_id="CVE-2020-6433" ref_url="https://www.suse.com/security/cve/CVE-2020-6433/" source="CVE"/>
		<reference ref_id="CVE-2020-6434" ref_url="https://www.suse.com/security/cve/CVE-2020-6434/" source="CVE"/>
		<reference ref_id="CVE-2020-6435" ref_url="https://www.suse.com/security/cve/CVE-2020-6435/" source="CVE"/>
		<reference ref_id="CVE-2020-6436" ref_url="https://www.suse.com/security/cve/CVE-2020-6436/" source="CVE"/>
		<reference ref_id="CVE-2020-6437" ref_url="https://www.suse.com/security/cve/CVE-2020-6437/" source="CVE"/>
		<reference ref_id="CVE-2020-6438" ref_url="https://www.suse.com/security/cve/CVE-2020-6438/" source="CVE"/>
		<reference ref_id="CVE-2020-6439" ref_url="https://www.suse.com/security/cve/CVE-2020-6439/" source="CVE"/>
		<reference ref_id="CVE-2020-6440" ref_url="https://www.suse.com/security/cve/CVE-2020-6440/" source="CVE"/>
		<reference ref_id="CVE-2020-6441" ref_url="https://www.suse.com/security/cve/CVE-2020-6441/" source="CVE"/>
		<reference ref_id="CVE-2020-6442" ref_url="https://www.suse.com/security/cve/CVE-2020-6442/" source="CVE"/>
		<reference ref_id="CVE-2020-6443" ref_url="https://www.suse.com/security/cve/CVE-2020-6443/" source="CVE"/>
		<reference ref_id="CVE-2020-6444" ref_url="https://www.suse.com/security/cve/CVE-2020-6444/" source="CVE"/>
		<reference ref_id="CVE-2020-6445" ref_url="https://www.suse.com/security/cve/CVE-2020-6445/" source="CVE"/>
		<reference ref_id="CVE-2020-6446" ref_url="https://www.suse.com/security/cve/CVE-2020-6446/" source="CVE"/>
		<reference ref_id="CVE-2020-6447" ref_url="https://www.suse.com/security/cve/CVE-2020-6447/" source="CVE"/>
		<reference ref_id="CVE-2020-6448" ref_url="https://www.suse.com/security/cve/CVE-2020-6448/" source="CVE"/>
		<reference ref_id="CVE-2020-6449" ref_url="https://www.suse.com/security/cve/CVE-2020-6449/" source="CVE"/>
		<reference ref_id="CVE-2020-6450" ref_url="https://www.suse.com/security/cve/CVE-2020-6450/" source="CVE"/>
		<reference ref_id="CVE-2020-6451" ref_url="https://www.suse.com/security/cve/CVE-2020-6451/" source="CVE"/>
		<reference ref_id="CVE-2020-6452" ref_url="https://www.suse.com/security/cve/CVE-2020-6452/" source="CVE"/>
		<reference ref_id="CVE-2020-6454" ref_url="https://www.suse.com/security/cve/CVE-2020-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-6455" ref_url="https://www.suse.com/security/cve/CVE-2020-6455/" source="CVE"/>
		<reference ref_id="CVE-2020-6456" ref_url="https://www.suse.com/security/cve/CVE-2020-6456/" source="CVE"/>
		<reference ref_id="CVE-2020-6457" ref_url="https://www.suse.com/security/cve/CVE-2020-6457/" source="CVE"/>
		<reference ref_id="CVE-2020-6458" ref_url="https://www.suse.com/security/cve/CVE-2020-6458/" source="CVE"/>
		<reference ref_id="CVE-2020-6459" ref_url="https://www.suse.com/security/cve/CVE-2020-6459/" source="CVE"/>
		<reference ref_id="CVE-2020-6460" ref_url="https://www.suse.com/security/cve/CVE-2020-6460/" source="CVE"/>
		<reference ref_id="CVE-2020-6462" ref_url="https://www.suse.com/security/cve/CVE-2020-6462/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6464" ref_url="https://www.suse.com/security/cve/CVE-2020-6464/" source="CVE"/>
		<reference ref_id="CVE-2020-6465" ref_url="https://www.suse.com/security/cve/CVE-2020-6465/" source="CVE"/>
		<reference ref_id="CVE-2020-6466" ref_url="https://www.suse.com/security/cve/CVE-2020-6466/" source="CVE"/>
		<reference ref_id="CVE-2020-6467" ref_url="https://www.suse.com/security/cve/CVE-2020-6467/" source="CVE"/>
		<reference ref_id="CVE-2020-6468" ref_url="https://www.suse.com/security/cve/CVE-2020-6468/" source="CVE"/>
		<reference ref_id="CVE-2020-6469" ref_url="https://www.suse.com/security/cve/CVE-2020-6469/" source="CVE"/>
		<reference ref_id="CVE-2020-6470" ref_url="https://www.suse.com/security/cve/CVE-2020-6470/" source="CVE"/>
		<reference ref_id="CVE-2020-6471" ref_url="https://www.suse.com/security/cve/CVE-2020-6471/" source="CVE"/>
		<reference ref_id="CVE-2020-6472" ref_url="https://www.suse.com/security/cve/CVE-2020-6472/" source="CVE"/>
		<reference ref_id="CVE-2020-6473" ref_url="https://www.suse.com/security/cve/CVE-2020-6473/" source="CVE"/>
		<reference ref_id="CVE-2020-6474" ref_url="https://www.suse.com/security/cve/CVE-2020-6474/" source="CVE"/>
		<reference ref_id="CVE-2020-6475" ref_url="https://www.suse.com/security/cve/CVE-2020-6475/" source="CVE"/>
		<reference ref_id="CVE-2020-6476" ref_url="https://www.suse.com/security/cve/CVE-2020-6476/" source="CVE"/>
		<reference ref_id="CVE-2020-6477" ref_url="https://www.suse.com/security/cve/CVE-2020-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-6478" ref_url="https://www.suse.com/security/cve/CVE-2020-6478/" source="CVE"/>
		<reference ref_id="CVE-2020-6479" ref_url="https://www.suse.com/security/cve/CVE-2020-6479/" source="CVE"/>
		<reference ref_id="CVE-2020-6480" ref_url="https://www.suse.com/security/cve/CVE-2020-6480/" source="CVE"/>
		<reference ref_id="CVE-2020-6481" ref_url="https://www.suse.com/security/cve/CVE-2020-6481/" source="CVE"/>
		<reference ref_id="CVE-2020-6482" ref_url="https://www.suse.com/security/cve/CVE-2020-6482/" source="CVE"/>
		<reference ref_id="CVE-2020-6483" ref_url="https://www.suse.com/security/cve/CVE-2020-6483/" source="CVE"/>
		<reference ref_id="CVE-2020-6484" ref_url="https://www.suse.com/security/cve/CVE-2020-6484/" source="CVE"/>
		<reference ref_id="CVE-2020-6485" ref_url="https://www.suse.com/security/cve/CVE-2020-6485/" source="CVE"/>
		<reference ref_id="CVE-2020-6486" ref_url="https://www.suse.com/security/cve/CVE-2020-6486/" source="CVE"/>
		<reference ref_id="CVE-2020-6487" ref_url="https://www.suse.com/security/cve/CVE-2020-6487/" source="CVE"/>
		<reference ref_id="CVE-2020-6488" ref_url="https://www.suse.com/security/cve/CVE-2020-6488/" source="CVE"/>
		<reference ref_id="CVE-2020-6489" ref_url="https://www.suse.com/security/cve/CVE-2020-6489/" source="CVE"/>
		<reference ref_id="CVE-2020-6490" ref_url="https://www.suse.com/security/cve/CVE-2020-6490/" source="CVE"/>
		<reference ref_id="CVE-2020-6491" ref_url="https://www.suse.com/security/cve/CVE-2020-6491/" source="CVE"/>
		<reference ref_id="CVE-2020-6493" ref_url="https://www.suse.com/security/cve/CVE-2020-6493/" source="CVE"/>
		<reference ref_id="CVE-2020-6494" ref_url="https://www.suse.com/security/cve/CVE-2020-6494/" source="CVE"/>
		<reference ref_id="CVE-2020-6495" ref_url="https://www.suse.com/security/cve/CVE-2020-6495/" source="CVE"/>
		<reference ref_id="CVE-2020-6496" ref_url="https://www.suse.com/security/cve/CVE-2020-6496/" source="CVE"/>
		<reference ref_id="CVE-2020-6505" ref_url="https://www.suse.com/security/cve/CVE-2020-6505/" source="CVE"/>
		<reference ref_id="CVE-2020-6506" ref_url="https://www.suse.com/security/cve/CVE-2020-6506/" source="CVE"/>
		<reference ref_id="CVE-2020-6507" ref_url="https://www.suse.com/security/cve/CVE-2020-6507/" source="CVE"/>
		<reference ref_id="CVE-2020-6509" ref_url="https://www.suse.com/security/cve/CVE-2020-6509/" source="CVE"/>
		<reference ref_id="CVE-2020-6510" ref_url="https://www.suse.com/security/cve/CVE-2020-6510/" source="CVE"/>
		<reference ref_id="CVE-2020-6511" ref_url="https://www.suse.com/security/cve/CVE-2020-6511/" source="CVE"/>
		<reference ref_id="CVE-2020-6512" ref_url="https://www.suse.com/security/cve/CVE-2020-6512/" source="CVE"/>
		<reference ref_id="CVE-2020-6513" ref_url="https://www.suse.com/security/cve/CVE-2020-6513/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="CVE-2020-6515" ref_url="https://www.suse.com/security/cve/CVE-2020-6515/" source="CVE"/>
		<reference ref_id="CVE-2020-6516" ref_url="https://www.suse.com/security/cve/CVE-2020-6516/" source="CVE"/>
		<reference ref_id="CVE-2020-6517" ref_url="https://www.suse.com/security/cve/CVE-2020-6517/" source="CVE"/>
		<reference ref_id="CVE-2020-6518" ref_url="https://www.suse.com/security/cve/CVE-2020-6518/" source="CVE"/>
		<reference ref_id="CVE-2020-6519" ref_url="https://www.suse.com/security/cve/CVE-2020-6519/" source="CVE"/>
		<reference ref_id="CVE-2020-6520" ref_url="https://www.suse.com/security/cve/CVE-2020-6520/" source="CVE"/>
		<reference ref_id="CVE-2020-6521" ref_url="https://www.suse.com/security/cve/CVE-2020-6521/" source="CVE"/>
		<reference ref_id="CVE-2020-6522" ref_url="https://www.suse.com/security/cve/CVE-2020-6522/" source="CVE"/>
		<reference ref_id="CVE-2020-6523" ref_url="https://www.suse.com/security/cve/CVE-2020-6523/" source="CVE"/>
		<reference ref_id="CVE-2020-6524" ref_url="https://www.suse.com/security/cve/CVE-2020-6524/" source="CVE"/>
		<reference ref_id="CVE-2020-6525" ref_url="https://www.suse.com/security/cve/CVE-2020-6525/" source="CVE"/>
		<reference ref_id="CVE-2020-6526" ref_url="https://www.suse.com/security/cve/CVE-2020-6526/" source="CVE"/>
		<reference ref_id="CVE-2020-6527" ref_url="https://www.suse.com/security/cve/CVE-2020-6527/" source="CVE"/>
		<reference ref_id="CVE-2020-6528" ref_url="https://www.suse.com/security/cve/CVE-2020-6528/" source="CVE"/>
		<reference ref_id="CVE-2020-6529" ref_url="https://www.suse.com/security/cve/CVE-2020-6529/" source="CVE"/>
		<reference ref_id="CVE-2020-6530" ref_url="https://www.suse.com/security/cve/CVE-2020-6530/" source="CVE"/>
		<reference ref_id="CVE-2020-6531" ref_url="https://www.suse.com/security/cve/CVE-2020-6531/" source="CVE"/>
		<reference ref_id="CVE-2020-6532" ref_url="https://www.suse.com/security/cve/CVE-2020-6532/" source="CVE"/>
		<reference ref_id="CVE-2020-6533" ref_url="https://www.suse.com/security/cve/CVE-2020-6533/" source="CVE"/>
		<reference ref_id="CVE-2020-6534" ref_url="https://www.suse.com/security/cve/CVE-2020-6534/" source="CVE"/>
		<reference ref_id="CVE-2020-6535" ref_url="https://www.suse.com/security/cve/CVE-2020-6535/" source="CVE"/>
		<reference ref_id="CVE-2020-6536" ref_url="https://www.suse.com/security/cve/CVE-2020-6536/" source="CVE"/>
		<reference ref_id="CVE-2020-6537" ref_url="https://www.suse.com/security/cve/CVE-2020-6537/" source="CVE"/>
		<reference ref_id="CVE-2020-6538" ref_url="https://www.suse.com/security/cve/CVE-2020-6538/" source="CVE"/>
		<reference ref_id="CVE-2020-6539" ref_url="https://www.suse.com/security/cve/CVE-2020-6539/" source="CVE"/>
		<reference ref_id="CVE-2020-6540" ref_url="https://www.suse.com/security/cve/CVE-2020-6540/" source="CVE"/>
		<reference ref_id="CVE-2020-6541" ref_url="https://www.suse.com/security/cve/CVE-2020-6541/" source="CVE"/>
		<reference ref_id="CVE-2020-6542" ref_url="https://www.suse.com/security/cve/CVE-2020-6542/" source="CVE"/>
		<reference ref_id="CVE-2020-6543" ref_url="https://www.suse.com/security/cve/CVE-2020-6543/" source="CVE"/>
		<reference ref_id="CVE-2020-6544" ref_url="https://www.suse.com/security/cve/CVE-2020-6544/" source="CVE"/>
		<reference ref_id="CVE-2020-6545" ref_url="https://www.suse.com/security/cve/CVE-2020-6545/" source="CVE"/>
		<reference ref_id="CVE-2020-6546" ref_url="https://www.suse.com/security/cve/CVE-2020-6546/" source="CVE"/>
		<reference ref_id="CVE-2020-6547" ref_url="https://www.suse.com/security/cve/CVE-2020-6547/" source="CVE"/>
		<reference ref_id="CVE-2020-6548" ref_url="https://www.suse.com/security/cve/CVE-2020-6548/" source="CVE"/>
		<reference ref_id="CVE-2020-6549" ref_url="https://www.suse.com/security/cve/CVE-2020-6549/" source="CVE"/>
		<reference ref_id="CVE-2020-6550" ref_url="https://www.suse.com/security/cve/CVE-2020-6550/" source="CVE"/>
		<reference ref_id="CVE-2020-6551" ref_url="https://www.suse.com/security/cve/CVE-2020-6551/" source="CVE"/>
		<reference ref_id="CVE-2020-6552" ref_url="https://www.suse.com/security/cve/CVE-2020-6552/" source="CVE"/>
		<reference ref_id="CVE-2020-6553" ref_url="https://www.suse.com/security/cve/CVE-2020-6553/" source="CVE"/>
		<reference ref_id="CVE-2020-6554" ref_url="https://www.suse.com/security/cve/CVE-2020-6554/" source="CVE"/>
		<reference ref_id="CVE-2020-6555" ref_url="https://www.suse.com/security/cve/CVE-2020-6555/" source="CVE"/>
		<reference ref_id="CVE-2020-6556" ref_url="https://www.suse.com/security/cve/CVE-2020-6556/" source="CVE"/>
		<reference ref_id="CVE-2020-6557" ref_url="https://www.suse.com/security/cve/CVE-2020-6557/" source="CVE"/>
		<reference ref_id="CVE-2020-6558" ref_url="https://www.suse.com/security/cve/CVE-2020-6558/" source="CVE"/>
		<reference ref_id="CVE-2020-6559" ref_url="https://www.suse.com/security/cve/CVE-2020-6559/" source="CVE"/>
		<reference ref_id="CVE-2020-6560" ref_url="https://www.suse.com/security/cve/CVE-2020-6560/" source="CVE"/>
		<reference ref_id="CVE-2020-6561" ref_url="https://www.suse.com/security/cve/CVE-2020-6561/" source="CVE"/>
		<reference ref_id="CVE-2020-6562" ref_url="https://www.suse.com/security/cve/CVE-2020-6562/" source="CVE"/>
		<reference ref_id="CVE-2020-6563" ref_url="https://www.suse.com/security/cve/CVE-2020-6563/" source="CVE"/>
		<reference ref_id="CVE-2020-6564" ref_url="https://www.suse.com/security/cve/CVE-2020-6564/" source="CVE"/>
		<reference ref_id="CVE-2020-6565" ref_url="https://www.suse.com/security/cve/CVE-2020-6565/" source="CVE"/>
		<reference ref_id="CVE-2020-6566" ref_url="https://www.suse.com/security/cve/CVE-2020-6566/" source="CVE"/>
		<reference ref_id="CVE-2020-6567" ref_url="https://www.suse.com/security/cve/CVE-2020-6567/" source="CVE"/>
		<reference ref_id="CVE-2020-6568" ref_url="https://www.suse.com/security/cve/CVE-2020-6568/" source="CVE"/>
		<reference ref_id="CVE-2020-6569" ref_url="https://www.suse.com/security/cve/CVE-2020-6569/" source="CVE"/>
		<reference ref_id="CVE-2020-6570" ref_url="https://www.suse.com/security/cve/CVE-2020-6570/" source="CVE"/>
		<reference ref_id="CVE-2020-6571" ref_url="https://www.suse.com/security/cve/CVE-2020-6571/" source="CVE"/>
		<reference ref_id="CVE-2020-6573" ref_url="https://www.suse.com/security/cve/CVE-2020-6573/" source="CVE"/>
		<reference ref_id="CVE-2020-6574" ref_url="https://www.suse.com/security/cve/CVE-2020-6574/" source="CVE"/>
		<reference ref_id="CVE-2020-6575" ref_url="https://www.suse.com/security/cve/CVE-2020-6575/" source="CVE"/>
		<reference ref_id="CVE-2020-6576" ref_url="https://www.suse.com/security/cve/CVE-2020-6576/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="CVE-2021-21106" ref_url="https://www.suse.com/security/cve/CVE-2021-21106/" source="CVE"/>
		<reference ref_id="CVE-2021-21107" ref_url="https://www.suse.com/security/cve/CVE-2021-21107/" source="CVE"/>
		<reference ref_id="CVE-2021-21108" ref_url="https://www.suse.com/security/cve/CVE-2021-21108/" source="CVE"/>
		<reference ref_id="CVE-2021-21109" ref_url="https://www.suse.com/security/cve/CVE-2021-21109/" source="CVE"/>
		<reference ref_id="CVE-2021-21110" ref_url="https://www.suse.com/security/cve/CVE-2021-21110/" source="CVE"/>
		<reference ref_id="CVE-2021-21111" ref_url="https://www.suse.com/security/cve/CVE-2021-21111/" source="CVE"/>
		<reference ref_id="CVE-2021-21112" ref_url="https://www.suse.com/security/cve/CVE-2021-21112/" source="CVE"/>
		<reference ref_id="CVE-2021-21113" ref_url="https://www.suse.com/security/cve/CVE-2021-21113/" source="CVE"/>
		<reference ref_id="CVE-2021-21114" ref_url="https://www.suse.com/security/cve/CVE-2021-21114/" source="CVE"/>
		<reference ref_id="CVE-2021-21115" ref_url="https://www.suse.com/security/cve/CVE-2021-21115/" source="CVE"/>
		<reference ref_id="CVE-2021-21116" ref_url="https://www.suse.com/security/cve/CVE-2021-21116/" source="CVE"/>
		<reference ref_id="CVE-2021-21117" ref_url="https://www.suse.com/security/cve/CVE-2021-21117/" source="CVE"/>
		<reference ref_id="CVE-2021-21118" ref_url="https://www.suse.com/security/cve/CVE-2021-21118/" source="CVE"/>
		<reference ref_id="CVE-2021-21119" ref_url="https://www.suse.com/security/cve/CVE-2021-21119/" source="CVE"/>
		<reference ref_id="CVE-2021-21120" ref_url="https://www.suse.com/security/cve/CVE-2021-21120/" source="CVE"/>
		<reference ref_id="CVE-2021-21121" ref_url="https://www.suse.com/security/cve/CVE-2021-21121/" source="CVE"/>
		<reference ref_id="CVE-2021-21122" ref_url="https://www.suse.com/security/cve/CVE-2021-21122/" source="CVE"/>
		<reference ref_id="CVE-2021-21123" ref_url="https://www.suse.com/security/cve/CVE-2021-21123/" source="CVE"/>
		<reference ref_id="CVE-2021-21124" ref_url="https://www.suse.com/security/cve/CVE-2021-21124/" source="CVE"/>
		<reference ref_id="CVE-2021-21125" ref_url="https://www.suse.com/security/cve/CVE-2021-21125/" source="CVE"/>
		<reference ref_id="CVE-2021-21126" ref_url="https://www.suse.com/security/cve/CVE-2021-21126/" source="CVE"/>
		<reference ref_id="CVE-2021-21127" ref_url="https://www.suse.com/security/cve/CVE-2021-21127/" source="CVE"/>
		<reference ref_id="CVE-2021-21128" ref_url="https://www.suse.com/security/cve/CVE-2021-21128/" source="CVE"/>
		<reference ref_id="CVE-2021-21129" ref_url="https://www.suse.com/security/cve/CVE-2021-21129/" source="CVE"/>
		<reference ref_id="CVE-2021-21130" ref_url="https://www.suse.com/security/cve/CVE-2021-21130/" source="CVE"/>
		<reference ref_id="CVE-2021-21131" ref_url="https://www.suse.com/security/cve/CVE-2021-21131/" source="CVE"/>
		<reference ref_id="CVE-2021-21132" ref_url="https://www.suse.com/security/cve/CVE-2021-21132/" source="CVE"/>
		<reference ref_id="CVE-2021-21133" ref_url="https://www.suse.com/security/cve/CVE-2021-21133/" source="CVE"/>
		<reference ref_id="CVE-2021-21134" ref_url="https://www.suse.com/security/cve/CVE-2021-21134/" source="CVE"/>
		<reference ref_id="CVE-2021-21135" ref_url="https://www.suse.com/security/cve/CVE-2021-21135/" source="CVE"/>
		<reference ref_id="CVE-2021-21136" ref_url="https://www.suse.com/security/cve/CVE-2021-21136/" source="CVE"/>
		<reference ref_id="CVE-2021-21137" ref_url="https://www.suse.com/security/cve/CVE-2021-21137/" source="CVE"/>
		<reference ref_id="CVE-2021-21138" ref_url="https://www.suse.com/security/cve/CVE-2021-21138/" source="CVE"/>
		<reference ref_id="CVE-2021-21139" ref_url="https://www.suse.com/security/cve/CVE-2021-21139/" source="CVE"/>
		<reference ref_id="CVE-2021-21140" ref_url="https://www.suse.com/security/cve/CVE-2021-21140/" source="CVE"/>
		<reference ref_id="CVE-2021-21141" ref_url="https://www.suse.com/security/cve/CVE-2021-21141/" source="CVE"/>
		<reference ref_id="CVE-2021-21142" ref_url="https://www.suse.com/security/cve/CVE-2021-21142/" source="CVE"/>
		<reference ref_id="CVE-2021-21143" ref_url="https://www.suse.com/security/cve/CVE-2021-21143/" source="CVE"/>
		<reference ref_id="CVE-2021-21144" ref_url="https://www.suse.com/security/cve/CVE-2021-21144/" source="CVE"/>
		<reference ref_id="CVE-2021-21145" ref_url="https://www.suse.com/security/cve/CVE-2021-21145/" source="CVE"/>
		<reference ref_id="CVE-2021-21146" ref_url="https://www.suse.com/security/cve/CVE-2021-21146/" source="CVE"/>
		<reference ref_id="CVE-2021-21147" ref_url="https://www.suse.com/security/cve/CVE-2021-21147/" source="CVE"/>
		<reference ref_id="CVE-2021-21148" ref_url="https://www.suse.com/security/cve/CVE-2021-21148/" source="CVE"/>
		<reference ref_id="CVE-2021-21149" ref_url="https://www.suse.com/security/cve/CVE-2021-21149/" source="CVE"/>
		<reference ref_id="CVE-2021-21150" ref_url="https://www.suse.com/security/cve/CVE-2021-21150/" source="CVE"/>
		<reference ref_id="CVE-2021-21151" ref_url="https://www.suse.com/security/cve/CVE-2021-21151/" source="CVE"/>
		<reference ref_id="CVE-2021-21152" ref_url="https://www.suse.com/security/cve/CVE-2021-21152/" source="CVE"/>
		<reference ref_id="CVE-2021-21153" ref_url="https://www.suse.com/security/cve/CVE-2021-21153/" source="CVE"/>
		<reference ref_id="CVE-2021-21154" ref_url="https://www.suse.com/security/cve/CVE-2021-21154/" source="CVE"/>
		<reference ref_id="CVE-2021-21155" ref_url="https://www.suse.com/security/cve/CVE-2021-21155/" source="CVE"/>
		<reference ref_id="CVE-2021-21156" ref_url="https://www.suse.com/security/cve/CVE-2021-21156/" source="CVE"/>
		<reference ref_id="CVE-2021-21157" ref_url="https://www.suse.com/security/cve/CVE-2021-21157/" source="CVE"/>
		<reference ref_id="CVE-2021-21159" ref_url="https://www.suse.com/security/cve/CVE-2021-21159/" source="CVE"/>
		<reference ref_id="CVE-2021-21160" ref_url="https://www.suse.com/security/cve/CVE-2021-21160/" source="CVE"/>
		<reference ref_id="CVE-2021-21161" ref_url="https://www.suse.com/security/cve/CVE-2021-21161/" source="CVE"/>
		<reference ref_id="CVE-2021-21162" ref_url="https://www.suse.com/security/cve/CVE-2021-21162/" source="CVE"/>
		<reference ref_id="CVE-2021-21163" ref_url="https://www.suse.com/security/cve/CVE-2021-21163/" source="CVE"/>
		<reference ref_id="CVE-2021-21164" ref_url="https://www.suse.com/security/cve/CVE-2021-21164/" source="CVE"/>
		<reference ref_id="CVE-2021-21165" ref_url="https://www.suse.com/security/cve/CVE-2021-21165/" source="CVE"/>
		<reference ref_id="CVE-2021-21166" ref_url="https://www.suse.com/security/cve/CVE-2021-21166/" source="CVE"/>
		<reference ref_id="CVE-2021-21167" ref_url="https://www.suse.com/security/cve/CVE-2021-21167/" source="CVE"/>
		<reference ref_id="CVE-2021-21168" ref_url="https://www.suse.com/security/cve/CVE-2021-21168/" source="CVE"/>
		<reference ref_id="CVE-2021-21169" ref_url="https://www.suse.com/security/cve/CVE-2021-21169/" source="CVE"/>
		<reference ref_id="CVE-2021-21170" ref_url="https://www.suse.com/security/cve/CVE-2021-21170/" source="CVE"/>
		<reference ref_id="CVE-2021-21171" ref_url="https://www.suse.com/security/cve/CVE-2021-21171/" source="CVE"/>
		<reference ref_id="CVE-2021-21172" ref_url="https://www.suse.com/security/cve/CVE-2021-21172/" source="CVE"/>
		<reference ref_id="CVE-2021-21173" ref_url="https://www.suse.com/security/cve/CVE-2021-21173/" source="CVE"/>
		<reference ref_id="CVE-2021-21174" ref_url="https://www.suse.com/security/cve/CVE-2021-21174/" source="CVE"/>
		<reference ref_id="CVE-2021-21175" ref_url="https://www.suse.com/security/cve/CVE-2021-21175/" source="CVE"/>
		<reference ref_id="CVE-2021-21176" ref_url="https://www.suse.com/security/cve/CVE-2021-21176/" source="CVE"/>
		<reference ref_id="CVE-2021-21177" ref_url="https://www.suse.com/security/cve/CVE-2021-21177/" source="CVE"/>
		<reference ref_id="CVE-2021-21178" ref_url="https://www.suse.com/security/cve/CVE-2021-21178/" source="CVE"/>
		<reference ref_id="CVE-2021-21179" ref_url="https://www.suse.com/security/cve/CVE-2021-21179/" source="CVE"/>
		<reference ref_id="CVE-2021-21180" ref_url="https://www.suse.com/security/cve/CVE-2021-21180/" source="CVE"/>
		<reference ref_id="CVE-2021-21181" ref_url="https://www.suse.com/security/cve/CVE-2021-21181/" source="CVE"/>
		<reference ref_id="CVE-2021-21182" ref_url="https://www.suse.com/security/cve/CVE-2021-21182/" source="CVE"/>
		<reference ref_id="CVE-2021-21183" ref_url="https://www.suse.com/security/cve/CVE-2021-21183/" source="CVE"/>
		<reference ref_id="CVE-2021-21184" ref_url="https://www.suse.com/security/cve/CVE-2021-21184/" source="CVE"/>
		<reference ref_id="CVE-2021-21185" ref_url="https://www.suse.com/security/cve/CVE-2021-21185/" source="CVE"/>
		<reference ref_id="CVE-2021-21186" ref_url="https://www.suse.com/security/cve/CVE-2021-21186/" source="CVE"/>
		<reference ref_id="CVE-2021-21187" ref_url="https://www.suse.com/security/cve/CVE-2021-21187/" source="CVE"/>
		<reference ref_id="CVE-2021-21188" ref_url="https://www.suse.com/security/cve/CVE-2021-21188/" source="CVE"/>
		<reference ref_id="CVE-2021-21189" ref_url="https://www.suse.com/security/cve/CVE-2021-21189/" source="CVE"/>
		<reference ref_id="CVE-2021-21190" ref_url="https://www.suse.com/security/cve/CVE-2021-21190/" source="CVE"/>
		<reference ref_id="CVE-2021-21191" ref_url="https://www.suse.com/security/cve/CVE-2021-21191/" source="CVE"/>
		<reference ref_id="CVE-2021-21192" ref_url="https://www.suse.com/security/cve/CVE-2021-21192/" source="CVE"/>
		<reference ref_id="CVE-2021-21193" ref_url="https://www.suse.com/security/cve/CVE-2021-21193/" source="CVE"/>
		<reference ref_id="CVE-2021-21194" ref_url="https://www.suse.com/security/cve/CVE-2021-21194/" source="CVE"/>
		<reference ref_id="CVE-2021-21195" ref_url="https://www.suse.com/security/cve/CVE-2021-21195/" source="CVE"/>
		<reference ref_id="CVE-2021-21196" ref_url="https://www.suse.com/security/cve/CVE-2021-21196/" source="CVE"/>
		<reference ref_id="CVE-2021-21197" ref_url="https://www.suse.com/security/cve/CVE-2021-21197/" source="CVE"/>
		<reference ref_id="CVE-2021-21198" ref_url="https://www.suse.com/security/cve/CVE-2021-21198/" source="CVE"/>
		<reference ref_id="CVE-2021-21199" ref_url="https://www.suse.com/security/cve/CVE-2021-21199/" source="CVE"/>
		<reference ref_id="CVE-2021-21201" ref_url="https://www.suse.com/security/cve/CVE-2021-21201/" source="CVE"/>
		<reference ref_id="CVE-2021-21202" ref_url="https://www.suse.com/security/cve/CVE-2021-21202/" source="CVE"/>
		<reference ref_id="CVE-2021-21203" ref_url="https://www.suse.com/security/cve/CVE-2021-21203/" source="CVE"/>
		<reference ref_id="CVE-2021-21204" ref_url="https://www.suse.com/security/cve/CVE-2021-21204/" source="CVE"/>
		<reference ref_id="CVE-2021-21205" ref_url="https://www.suse.com/security/cve/CVE-2021-21205/" source="CVE"/>
		<reference ref_id="CVE-2021-21206" ref_url="https://www.suse.com/security/cve/CVE-2021-21206/" source="CVE"/>
		<reference ref_id="CVE-2021-21207" ref_url="https://www.suse.com/security/cve/CVE-2021-21207/" source="CVE"/>
		<reference ref_id="CVE-2021-21208" ref_url="https://www.suse.com/security/cve/CVE-2021-21208/" source="CVE"/>
		<reference ref_id="CVE-2021-21209" ref_url="https://www.suse.com/security/cve/CVE-2021-21209/" source="CVE"/>
		<reference ref_id="CVE-2021-21210" ref_url="https://www.suse.com/security/cve/CVE-2021-21210/" source="CVE"/>
		<reference ref_id="CVE-2021-21211" ref_url="https://www.suse.com/security/cve/CVE-2021-21211/" source="CVE"/>
		<reference ref_id="CVE-2021-21212" ref_url="https://www.suse.com/security/cve/CVE-2021-21212/" source="CVE"/>
		<reference ref_id="CVE-2021-21213" ref_url="https://www.suse.com/security/cve/CVE-2021-21213/" source="CVE"/>
		<reference ref_id="CVE-2021-21214" ref_url="https://www.suse.com/security/cve/CVE-2021-21214/" source="CVE"/>
		<reference ref_id="CVE-2021-21215" ref_url="https://www.suse.com/security/cve/CVE-2021-21215/" source="CVE"/>
		<reference ref_id="CVE-2021-21216" ref_url="https://www.suse.com/security/cve/CVE-2021-21216/" source="CVE"/>
		<reference ref_id="CVE-2021-21217" ref_url="https://www.suse.com/security/cve/CVE-2021-21217/" source="CVE"/>
		<reference ref_id="CVE-2021-21218" ref_url="https://www.suse.com/security/cve/CVE-2021-21218/" source="CVE"/>
		<reference ref_id="CVE-2021-21219" ref_url="https://www.suse.com/security/cve/CVE-2021-21219/" source="CVE"/>
		<reference ref_id="CVE-2021-21220" ref_url="https://www.suse.com/security/cve/CVE-2021-21220/" source="CVE"/>
		<reference ref_id="CVE-2021-21221" ref_url="https://www.suse.com/security/cve/CVE-2021-21221/" source="CVE"/>
		<reference ref_id="CVE-2021-21222" ref_url="https://www.suse.com/security/cve/CVE-2021-21222/" source="CVE"/>
		<reference ref_id="CVE-2021-21223" ref_url="https://www.suse.com/security/cve/CVE-2021-21223/" source="CVE"/>
		<reference ref_id="CVE-2021-21224" ref_url="https://www.suse.com/security/cve/CVE-2021-21224/" source="CVE"/>
		<reference ref_id="CVE-2021-21225" ref_url="https://www.suse.com/security/cve/CVE-2021-21225/" source="CVE"/>
		<reference ref_id="CVE-2021-21226" ref_url="https://www.suse.com/security/cve/CVE-2021-21226/" source="CVE"/>
		<reference ref_id="CVE-2021-21227" ref_url="https://www.suse.com/security/cve/CVE-2021-21227/" source="CVE"/>
		<reference ref_id="CVE-2021-21228" ref_url="https://www.suse.com/security/cve/CVE-2021-21228/" source="CVE"/>
		<reference ref_id="CVE-2021-21229" ref_url="https://www.suse.com/security/cve/CVE-2021-21229/" source="CVE"/>
		<reference ref_id="CVE-2021-21230" ref_url="https://www.suse.com/security/cve/CVE-2021-21230/" source="CVE"/>
		<reference ref_id="CVE-2021-21231" ref_url="https://www.suse.com/security/cve/CVE-2021-21231/" source="CVE"/>
		<reference ref_id="CVE-2021-21232" ref_url="https://www.suse.com/security/cve/CVE-2021-21232/" source="CVE"/>
		<reference ref_id="CVE-2021-21233" ref_url="https://www.suse.com/security/cve/CVE-2021-21233/" source="CVE"/>
		<reference ref_id="CVE-2021-30506" ref_url="https://www.suse.com/security/cve/CVE-2021-30506/" source="CVE"/>
		<reference ref_id="CVE-2021-30507" ref_url="https://www.suse.com/security/cve/CVE-2021-30507/" source="CVE"/>
		<reference ref_id="CVE-2021-30508" ref_url="https://www.suse.com/security/cve/CVE-2021-30508/" source="CVE"/>
		<reference ref_id="CVE-2021-30509" ref_url="https://www.suse.com/security/cve/CVE-2021-30509/" source="CVE"/>
		<reference ref_id="CVE-2021-30510" ref_url="https://www.suse.com/security/cve/CVE-2021-30510/" source="CVE"/>
		<reference ref_id="CVE-2021-30511" ref_url="https://www.suse.com/security/cve/CVE-2021-30511/" source="CVE"/>
		<reference ref_id="CVE-2021-30512" ref_url="https://www.suse.com/security/cve/CVE-2021-30512/" source="CVE"/>
		<reference ref_id="CVE-2021-30513" ref_url="https://www.suse.com/security/cve/CVE-2021-30513/" source="CVE"/>
		<reference ref_id="CVE-2021-30514" ref_url="https://www.suse.com/security/cve/CVE-2021-30514/" source="CVE"/>
		<reference ref_id="CVE-2021-30515" ref_url="https://www.suse.com/security/cve/CVE-2021-30515/" source="CVE"/>
		<reference ref_id="CVE-2021-30516" ref_url="https://www.suse.com/security/cve/CVE-2021-30516/" source="CVE"/>
		<reference ref_id="CVE-2021-30517" ref_url="https://www.suse.com/security/cve/CVE-2021-30517/" source="CVE"/>
		<reference ref_id="CVE-2021-30518" ref_url="https://www.suse.com/security/cve/CVE-2021-30518/" source="CVE"/>
		<reference ref_id="CVE-2021-30519" ref_url="https://www.suse.com/security/cve/CVE-2021-30519/" source="CVE"/>
		<reference ref_id="CVE-2021-30520" ref_url="https://www.suse.com/security/cve/CVE-2021-30520/" source="CVE"/>
		<description>
These are all security issues fixed in the chromium-90.0.4430.212-bp153.1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7899/">CVE-2014-7899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7900/">CVE-2014-7900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7901/">CVE-2014-7901</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7902/">CVE-2014-7902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7903/">CVE-2014-7903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7904/">CVE-2014-7904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7905/">CVE-2014-7905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7906/">CVE-2014-7906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7907/">CVE-2014-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7908/">CVE-2014-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7909/">CVE-2014-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7910/">CVE-2014-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7923/">CVE-2014-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7924/">CVE-2014-7924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7925/">CVE-2014-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7926/">CVE-2014-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7927/">CVE-2014-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7928/">CVE-2014-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7929/">CVE-2014-7929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7930/">CVE-2014-7930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7932/">CVE-2014-7932</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7933/">CVE-2014-7933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7934/">CVE-2014-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7935/">CVE-2014-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7936/">CVE-2014-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7937/">CVE-2014-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7938/">CVE-2014-7938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7939/">CVE-2014-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7940/">CVE-2014-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7941/">CVE-2014-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7942/">CVE-2014-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7943/">CVE-2014-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7944/">CVE-2014-7944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7945/">CVE-2014-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7946/">CVE-2014-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7947/">CVE-2014-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7948/">CVE-2014-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1205/">CVE-2015-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1209/">CVE-2015-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1210/">CVE-2015-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1211/">CVE-2015-1211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1212/">CVE-2015-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1213/">CVE-2015-1213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1214/">CVE-2015-1214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1215/">CVE-2015-1215</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1216/">CVE-2015-1216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1217/">CVE-2015-1217</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1218/">CVE-2015-1218</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1219/">CVE-2015-1219</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1220/">CVE-2015-1220</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1221/">CVE-2015-1221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1222/">CVE-2015-1222</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1223/">CVE-2015-1223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1224/">CVE-2015-1224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1225/">CVE-2015-1225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1226/">CVE-2015-1226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1227/">CVE-2015-1227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1228/">CVE-2015-1228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1229/">CVE-2015-1229</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1230/">CVE-2015-1230</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1231/">CVE-2015-1231</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1233/">CVE-2015-1233</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1234/">CVE-2015-1234</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1235/">CVE-2015-1235</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1236/">CVE-2015-1236</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1237/">CVE-2015-1237</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1238/">CVE-2015-1238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1240/">CVE-2015-1240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1241/">CVE-2015-1241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1242/">CVE-2015-1242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1243/">CVE-2015-1243</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1244/">CVE-2015-1244</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1245/">CVE-2015-1245</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1246/">CVE-2015-1246</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1247/">CVE-2015-1247</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1248/">CVE-2015-1248</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1249/">CVE-2015-1249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1250/">CVE-2015-1250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1251/">CVE-2015-1251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1252/">CVE-2015-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1253/">CVE-2015-1253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1254/">CVE-2015-1254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1255/">CVE-2015-1255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1256/">CVE-2015-1256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1257/">CVE-2015-1257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1258/">CVE-2015-1258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1259/">CVE-2015-1259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1260/">CVE-2015-1260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1261/">CVE-2015-1261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1262/">CVE-2015-1262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1263/">CVE-2015-1263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1264/">CVE-2015-1264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1265/">CVE-2015-1265</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1266/">CVE-2015-1266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1267/">CVE-2015-1267</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1268/">CVE-2015-1268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1269/">CVE-2015-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1270/">CVE-2015-1270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1271/">CVE-2015-1271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1272/">CVE-2015-1272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1273/">CVE-2015-1273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1274/">CVE-2015-1274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1275/">CVE-2015-1275</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1276/">CVE-2015-1276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1277/">CVE-2015-1277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1278/">CVE-2015-1278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1279/">CVE-2015-1279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1280/">CVE-2015-1280</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1281/">CVE-2015-1281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1282/">CVE-2015-1282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1284/">CVE-2015-1284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1285/">CVE-2015-1285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1286/">CVE-2015-1286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1287/">CVE-2015-1287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1288/">CVE-2015-1288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1289/">CVE-2015-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1291/">CVE-2015-1291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1292/">CVE-2015-1292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1293/">CVE-2015-1293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1294/">CVE-2015-1294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1295/">CVE-2015-1295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1296/">CVE-2015-1296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1297/">CVE-2015-1297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1298/">CVE-2015-1298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1299/">CVE-2015-1299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1300/">CVE-2015-1300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1301/">CVE-2015-1301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1302/">CVE-2015-1302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1303/">CVE-2015-1303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1304/">CVE-2015-1304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6755/">CVE-2015-6755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6756/">CVE-2015-6756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6757/">CVE-2015-6757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6758/">CVE-2015-6758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6759/">CVE-2015-6759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6760/">CVE-2015-6760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6761/">CVE-2015-6761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6762/">CVE-2015-6762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6763/">CVE-2015-6763</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-6764/">CVE-2015-6764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-6765/">CVE-2015-6765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6766/">CVE-2015-6766</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6767/">CVE-2015-6767</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6768/">CVE-2015-6768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6769/">CVE-2015-6769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6770/">CVE-2015-6770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6771/">CVE-2015-6771</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6772/">CVE-2015-6772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6773/">CVE-2015-6773</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6774/">CVE-2015-6774</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6775/">CVE-2015-6775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6776/">CVE-2015-6776</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6777/">CVE-2015-6777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6778/">CVE-2015-6778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6779/">CVE-2015-6779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6780/">CVE-2015-6780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6781/">CVE-2015-6781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6782/">CVE-2015-6782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6783/">CVE-2015-6783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6784/">CVE-2015-6784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6785/">CVE-2015-6785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6786/">CVE-2015-6786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6787/">CVE-2015-6787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6788/">CVE-2015-6788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6789/">CVE-2015-6789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6790/">CVE-2015-6790</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6791/">CVE-2015-6791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6792/">CVE-2015-6792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7834/">CVE-2015-7834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-1612/">CVE-2016-1612</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-1613/">CVE-2016-1613</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1614/">CVE-2016-1614</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1615/">CVE-2016-1615</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1616/">CVE-2016-1616</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1617/">CVE-2016-1617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1618/">CVE-2016-1618</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-1619/">CVE-2016-1619</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1620/">CVE-2016-1620</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1622/">CVE-2016-1622</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1623/">CVE-2016-1623</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1624/">CVE-2016-1624</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1625/">CVE-2016-1625</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1626/">CVE-2016-1626</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1627/">CVE-2016-1627</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1629/">CVE-2016-1629</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1630/">CVE-2016-1630</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1631/">CVE-2016-1631</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1632/">CVE-2016-1632</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1633/">CVE-2016-1633</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1634/">CVE-2016-1634</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1635/">CVE-2016-1635</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1636/">CVE-2016-1636</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1637/">CVE-2016-1637</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-1638/">CVE-2016-1638</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1639/">CVE-2016-1639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1640/">CVE-2016-1640</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1641/">CVE-2016-1641</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1642/">CVE-2016-1642</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1643/">CVE-2016-1643</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1644/">CVE-2016-1644</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1645/">CVE-2016-1645</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1646/">CVE-2016-1646</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1647/">CVE-2016-1647</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1648/">CVE-2016-1648</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1649/">CVE-2016-1649</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1650/">CVE-2016-1650</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1651/">CVE-2016-1651</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1652/">CVE-2016-1652</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1653/">CVE-2016-1653</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1654/">CVE-2016-1654</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1655/">CVE-2016-1655</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1656/">CVE-2016-1656</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1657/">CVE-2016-1657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1658/">CVE-2016-1658</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1659/">CVE-2016-1659</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1660/">CVE-2016-1660</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1661/">CVE-2016-1661</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1662/">CVE-2016-1662</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1663/">CVE-2016-1663</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1664/">CVE-2016-1664</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1665/">CVE-2016-1665</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1666/">CVE-2016-1666</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1667/">CVE-2016-1667</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1668/">CVE-2016-1668</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1669/">CVE-2016-1669</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1670/">CVE-2016-1670</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1672/">CVE-2016-1672</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1673/">CVE-2016-1673</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1674/">CVE-2016-1674</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1675/">CVE-2016-1675</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1676/">CVE-2016-1676</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1677/">CVE-2016-1677</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1678/">CVE-2016-1678</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1679/">CVE-2016-1679</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1680/">CVE-2016-1680</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1681/">CVE-2016-1681</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1682/">CVE-2016-1682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1683/">CVE-2016-1683</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1684/">CVE-2016-1684</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1685/">CVE-2016-1685</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1686/">CVE-2016-1686</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1687/">CVE-2016-1687</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1688/">CVE-2016-1688</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1689/">CVE-2016-1689</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1690/">CVE-2016-1690</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1691/">CVE-2016-1691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1692/">CVE-2016-1692</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1693/">CVE-2016-1693</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1694/">CVE-2016-1694</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1695/">CVE-2016-1695</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1696/">CVE-2016-1696</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1697/">CVE-2016-1697</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1698/">CVE-2016-1698</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1699/">CVE-2016-1699</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1700/">CVE-2016-1700</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1701/">CVE-2016-1701</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1702/">CVE-2016-1702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1703/">CVE-2016-1703</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1704/">CVE-2016-1704</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1705/">CVE-2016-1705</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1706/">CVE-2016-1706</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-1707/">CVE-2016-1707</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1708/">CVE-2016-1708</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1709/">CVE-2016-1709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1710/">CVE-2016-1710</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1711/">CVE-2016-1711</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3679/">CVE-2016-3679</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5127/">CVE-2016-5127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5128/">CVE-2016-5128</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5129/">CVE-2016-5129</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5130/">CVE-2016-5130</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5132/">CVE-2016-5132</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5133/">CVE-2016-5133</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5134/">CVE-2016-5134</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5135/">CVE-2016-5135</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5136/">CVE-2016-5136</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5137/">CVE-2016-5137</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5140/">CVE-2016-5140</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5141/">CVE-2016-5141</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5142/">CVE-2016-5142</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5143/">CVE-2016-5143</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5144/">CVE-2016-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5145/">CVE-2016-5145</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5146/">CVE-2016-5146</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5147/">CVE-2016-5147</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5148/">CVE-2016-5148</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5149/">CVE-2016-5149</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5150/">CVE-2016-5150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5151/">CVE-2016-5151</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5152/">CVE-2016-5152</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5153/">CVE-2016-5153</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5154/">CVE-2016-5154</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5155/">CVE-2016-5155</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5156/">CVE-2016-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5157/">CVE-2016-5157</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5160/">CVE-2016-5160</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5161/">CVE-2016-5161</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5162/">CVE-2016-5162</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5163/">CVE-2016-5163</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5164/">CVE-2016-5164</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5165/">CVE-2016-5165</cve>
	<cve impact="important" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5166/">CVE-2016-5166</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5170/">CVE-2016-5170</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5171/">CVE-2016-5171</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5173/">CVE-2016-5173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5174/">CVE-2016-5174</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5175/">CVE-2016-5175</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5177/">CVE-2016-5177</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5178/">CVE-2016-5178</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5181/">CVE-2016-5181</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5182/">CVE-2016-5182</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5183/">CVE-2016-5183</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5184/">CVE-2016-5184</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5185/">CVE-2016-5185</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5186/">CVE-2016-5186</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5187/">CVE-2016-5187</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5188/">CVE-2016-5188</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5189/">CVE-2016-5189</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5190/">CVE-2016-5190</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5191/">CVE-2016-5191</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5192/">CVE-2016-5192</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5193/">CVE-2016-5193</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5198/">CVE-2016-5198</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5199/">CVE-2016-5199</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5200/">CVE-2016-5200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5201/">CVE-2016-5201</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5202/">CVE-2016-5202</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5203/">CVE-2016-5203</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5204/">CVE-2016-5204</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5205/">CVE-2016-5205</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5206/">CVE-2016-5206</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5207/">CVE-2016-5207</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5208/">CVE-2016-5208</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5209/">CVE-2016-5209</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5210/">CVE-2016-5210</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5211/">CVE-2016-5211</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5212/">CVE-2016-5212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5213/">CVE-2016-5213</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5214/">CVE-2016-5214</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5215/">CVE-2016-5215</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5216/">CVE-2016-5216</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5217/">CVE-2016-5217</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5218/">CVE-2016-5218</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5219/">CVE-2016-5219</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5220/">CVE-2016-5220</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5221/">CVE-2016-5221</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5222/">CVE-2016-5222</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5223/">CVE-2016-5223</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5224/">CVE-2016-5224</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5225/">CVE-2016-5225</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5226/">CVE-2016-5226</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9650/">CVE-2016-9650</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9651/">CVE-2016-9651</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9652/">CVE-2016-9652</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11215/">CVE-2017-11215</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11225/">CVE-2017-11225</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15386/">CVE-2017-15386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15387/">CVE-2017-15387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15388/">CVE-2017-15388</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15389/">CVE-2017-15389</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15390/">CVE-2017-15390</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15391/">CVE-2017-15391</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15392/">CVE-2017-15392</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15393/">CVE-2017-15393</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15394/">CVE-2017-15394</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15395/">CVE-2017-15395</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15396/">CVE-2017-15396</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15398/">CVE-2017-15398</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15399/">CVE-2017-15399</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15407/">CVE-2017-15407</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15408/">CVE-2017-15408</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15409/">CVE-2017-15409</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15410/">CVE-2017-15410</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15411/">CVE-2017-15411</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15413/">CVE-2017-15413</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15415/">CVE-2017-15415</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15416/">CVE-2017-15416</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15417/">CVE-2017-15417</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15418/">CVE-2017-15418</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15419/">CVE-2017-15419</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15420/">CVE-2017-15420</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15423/">CVE-2017-15423</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15424/">CVE-2017-15424</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15425/">CVE-2017-15425</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-15426/">CVE-2017-15426</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15427/">CVE-2017-15427</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15429/">CVE-2017-15429</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15430/">CVE-2017-15430</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5006/">CVE-2017-5006</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5007/">CVE-2017-5007</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5008/">CVE-2017-5008</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5009/">CVE-2017-5009</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5010/">CVE-2017-5010</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5011/">CVE-2017-5011</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5012/">CVE-2017-5012</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5013/">CVE-2017-5013</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5014/">CVE-2017-5014</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5015/">CVE-2017-5015</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5016/">CVE-2017-5016</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5017/">CVE-2017-5017</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5018/">CVE-2017-5018</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5019/">CVE-2017-5019</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5020/">CVE-2017-5020</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5021/">CVE-2017-5021</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5022/">CVE-2017-5022</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5023/">CVE-2017-5023</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5024/">CVE-2017-5024</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5025/">CVE-2017-5025</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5026/">CVE-2017-5026</cve>
	<cve impact="low" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5030/">CVE-2017-5030</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5031/">CVE-2017-5031</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5032/">CVE-2017-5032</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5033/">CVE-2017-5033</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5034/">CVE-2017-5034</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5035/">CVE-2017-5035</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5036/">CVE-2017-5036</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5037/">CVE-2017-5037</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5038/">CVE-2017-5038</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5039/">CVE-2017-5039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5040/">CVE-2017-5040</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5041/">CVE-2017-5041</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5042/">CVE-2017-5042</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5043/">CVE-2017-5043</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5044/">CVE-2017-5044</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5045/">CVE-2017-5045</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5046/">CVE-2017-5046</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5052/">CVE-2017-5052</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5053/">CVE-2017-5053</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5054/">CVE-2017-5054</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5055/">CVE-2017-5055</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5056/">CVE-2017-5056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5057/">CVE-2017-5057</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5058/">CVE-2017-5058</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5059/">CVE-2017-5059</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5060/">CVE-2017-5060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5061/">CVE-2017-5061</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5062/">CVE-2017-5062</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5063/">CVE-2017-5063</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5064/">CVE-2017-5064</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5065/">CVE-2017-5065</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5066/">CVE-2017-5066</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5067/">CVE-2017-5067</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5068/">CVE-2017-5068</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5069/">CVE-2017-5069</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5070/">CVE-2017-5070</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5071/">CVE-2017-5071</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5072/">CVE-2017-5072</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5073/">CVE-2017-5073</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5074/">CVE-2017-5074</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5075/">CVE-2017-5075</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5076/">CVE-2017-5076</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5077/">CVE-2017-5077</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5078/">CVE-2017-5078</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5079/">CVE-2017-5079</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5080/">CVE-2017-5080</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5081/">CVE-2017-5081</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5082/">CVE-2017-5082</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5083/">CVE-2017-5083</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5085/">CVE-2017-5085</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5086/">CVE-2017-5086</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5087/">CVE-2017-5087</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5088/">CVE-2017-5088</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5089/">CVE-2017-5089</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5091/">CVE-2017-5091</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5092/">CVE-2017-5092</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5093/">CVE-2017-5093</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5094/">CVE-2017-5094</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5095/">CVE-2017-5095</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5096/">CVE-2017-5096</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5097/">CVE-2017-5097</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5098/">CVE-2017-5098</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5099/">CVE-2017-5099</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5100/">CVE-2017-5100</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5101/">CVE-2017-5101</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5102/">CVE-2017-5102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5103/">CVE-2017-5103</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5104/">CVE-2017-5104</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5105/">CVE-2017-5105</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5106/">CVE-2017-5106</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5107/">CVE-2017-5107</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5108/">CVE-2017-5108</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5109/">CVE-2017-5109</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5110/">CVE-2017-5110</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5111/">CVE-2017-5111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5112/">CVE-2017-5112</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5113/">CVE-2017-5113</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5114/">CVE-2017-5114</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5115/">CVE-2017-5115</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5116/">CVE-2017-5116</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5117/">CVE-2017-5117</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5118/">CVE-2017-5118</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5119/">CVE-2017-5119</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5120/">CVE-2017-5120</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5121/">CVE-2017-5121</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5122/">CVE-2017-5122</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5124/">CVE-2017-5124</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5125/">CVE-2017-5125</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5126/">CVE-2017-5126</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5127/">CVE-2017-5127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5128/">CVE-2017-5128</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5129/">CVE-2017-5129</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5131/">CVE-2017-5131</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5132/">CVE-2017-5132</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5133/">CVE-2017-5133</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7000/">CVE-2017-7000</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16065/">CVE-2018-16065</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16066/">CVE-2018-16066</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16067/">CVE-2018-16067</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16068/">CVE-2018-16068</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16069/">CVE-2018-16069</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16070/">CVE-2018-16070</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16071/">CVE-2018-16071</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16073/">CVE-2018-16073</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16074/">CVE-2018-16074</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16075/">CVE-2018-16075</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16076/">CVE-2018-16076</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16077/">CVE-2018-16077</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16078/">CVE-2018-16078</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16079/">CVE-2018-16079</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16080/">CVE-2018-16080</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16081/">CVE-2018-16081</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16082/">CVE-2018-16082</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16083/">CVE-2018-16083</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16084/">CVE-2018-16084</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16085/">CVE-2018-16085</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16086/">CVE-2018-16086</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16087/">CVE-2018-16087</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16088/">CVE-2018-16088</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17462/">CVE-2018-17462</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17463/">CVE-2018-17463</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17464/">CVE-2018-17464</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17465/">CVE-2018-17465</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17467/">CVE-2018-17467</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17468/">CVE-2018-17468</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17469/">CVE-2018-17469</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17470/">CVE-2018-17470</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17471/">CVE-2018-17471</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17472/">CVE-2018-17472</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17473/">CVE-2018-17473</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17474/">CVE-2018-17474</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17475/">CVE-2018-17475</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17476/">CVE-2018-17476</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17477/">CVE-2018-17477</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17478/">CVE-2018-17478</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17479/">CVE-2018-17479</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17480/">CVE-2018-17480</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17481/">CVE-2018-17481</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18336/">CVE-2018-18336</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18337/">CVE-2018-18337</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18338/">CVE-2018-18338</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18339/">CVE-2018-18339</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18340/">CVE-2018-18340</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18341/">CVE-2018-18341</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18342/">CVE-2018-18342</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18343/">CVE-2018-18343</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18344/">CVE-2018-18344</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18345/">CVE-2018-18345</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18346/">CVE-2018-18346</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18347/">CVE-2018-18347</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18348/">CVE-2018-18348</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18349/">CVE-2018-18349</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18350/">CVE-2018-18350</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18351/">CVE-2018-18351</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18352/">CVE-2018-18352</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18353/">CVE-2018-18353</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18354/">CVE-2018-18354</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18355/">CVE-2018-18355</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18357/">CVE-2018-18357</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18358/">CVE-2018-18358</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18359/">CVE-2018-18359</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20073/">CVE-2018-20073</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6031/">CVE-2018-6031</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6032/">CVE-2018-6032</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6033/">CVE-2018-6033</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6034/">CVE-2018-6034</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6035/">CVE-2018-6035</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6036/">CVE-2018-6036</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6037/">CVE-2018-6037</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6038/">CVE-2018-6038</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6039/">CVE-2018-6039</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6040/">CVE-2018-6040</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6041/">CVE-2018-6041</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6042/">CVE-2018-6042</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6043/">CVE-2018-6043</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6044/">CVE-2018-6044</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6045/">CVE-2018-6045</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6046/">CVE-2018-6046</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6047/">CVE-2018-6047</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6048/">CVE-2018-6048</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6049/">CVE-2018-6049</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6050/">CVE-2018-6050</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6051/">CVE-2018-6051</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6052/">CVE-2018-6052</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6053/">CVE-2018-6053</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6054/">CVE-2018-6054</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6056/">CVE-2018-6056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6057/">CVE-2018-6057</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6060/">CVE-2018-6060</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6061/">CVE-2018-6061</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6062/">CVE-2018-6062</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6063/">CVE-2018-6063</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6064/">CVE-2018-6064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6065/">CVE-2018-6065</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6066/">CVE-2018-6066</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6067/">CVE-2018-6067</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6068/">CVE-2018-6068</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6069/">CVE-2018-6069</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6070/">CVE-2018-6070</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6071/">CVE-2018-6071</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6072/">CVE-2018-6072</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6073/">CVE-2018-6073</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6074/">CVE-2018-6074</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6075/">CVE-2018-6075</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6076/">CVE-2018-6076</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6077/">CVE-2018-6077</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6078/">CVE-2018-6078</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6079/">CVE-2018-6079</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6080/">CVE-2018-6080</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6081/">CVE-2018-6081</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6082/">CVE-2018-6082</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6083/">CVE-2018-6083</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6085/">CVE-2018-6085</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6086/">CVE-2018-6086</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6087/">CVE-2018-6087</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6088/">CVE-2018-6088</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6089/">CVE-2018-6089</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6090/">CVE-2018-6090</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6091/">CVE-2018-6091</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6092/">CVE-2018-6092</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6093/">CVE-2018-6093</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6094/">CVE-2018-6094</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6095/">CVE-2018-6095</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6096/">CVE-2018-6096</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6097/">CVE-2018-6097</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6098/">CVE-2018-6098</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6099/">CVE-2018-6099</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6100/">CVE-2018-6100</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6101/">CVE-2018-6101</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6102/">CVE-2018-6102</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6103/">CVE-2018-6103</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6104/">CVE-2018-6104</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6105/">CVE-2018-6105</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6106/">CVE-2018-6106</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6107/">CVE-2018-6107</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6108/">CVE-2018-6108</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6109/">CVE-2018-6109</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6110/">CVE-2018-6110</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6111/">CVE-2018-6111</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6112/">CVE-2018-6112</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6113/">CVE-2018-6113</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6114/">CVE-2018-6114</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6115/">CVE-2018-6115</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6116/">CVE-2018-6116</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6117/">CVE-2018-6117</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6118/">CVE-2018-6118</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6120/">CVE-2018-6120</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6121/">CVE-2018-6121</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6122/">CVE-2018-6122</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6123/">CVE-2018-6123</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6124/">CVE-2018-6124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6125/">CVE-2018-6125</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6127/">CVE-2018-6127</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6128/">CVE-2018-6128</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6129/">CVE-2018-6129</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6130/">CVE-2018-6130</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6131/">CVE-2018-6131</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6132/">CVE-2018-6132</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6133/">CVE-2018-6133</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6134/">CVE-2018-6134</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6135/">CVE-2018-6135</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6136/">CVE-2018-6136</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6137/">CVE-2018-6137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6138/">CVE-2018-6138</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6139/">CVE-2018-6139</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6140/">CVE-2018-6140</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6141/">CVE-2018-6141</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6142/">CVE-2018-6142</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6143/">CVE-2018-6143</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6144/">CVE-2018-6144</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6145/">CVE-2018-6145</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6147/">CVE-2018-6147</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6148/">CVE-2018-6148</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6149/">CVE-2018-6149</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6153/">CVE-2018-6153</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6154/">CVE-2018-6154</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6155/">CVE-2018-6155</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6156/">CVE-2018-6156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6157/">CVE-2018-6157</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6158/">CVE-2018-6158</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6159/">CVE-2018-6159</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6160/">CVE-2018-6160</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6161/">CVE-2018-6161</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6162/">CVE-2018-6162</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6163/">CVE-2018-6163</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6164/">CVE-2018-6164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6165/">CVE-2018-6165</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6166/">CVE-2018-6166</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6167/">CVE-2018-6167</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6168/">CVE-2018-6168</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6169/">CVE-2018-6169</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6170/">CVE-2018-6170</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6171/">CVE-2018-6171</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6172/">CVE-2018-6172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6173/">CVE-2018-6173</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6174/">CVE-2018-6174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6175/">CVE-2018-6175</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6176/">CVE-2018-6176</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6177/">CVE-2018-6177</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6178/">CVE-2018-6178</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6179/">CVE-2018-6179</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6406/">CVE-2018-6406</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13659/">CVE-2019-13659</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13660/">CVE-2019-13660</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13661/">CVE-2019-13661</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13662/">CVE-2019-13662</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13663/">CVE-2019-13663</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13664/">CVE-2019-13664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13665/">CVE-2019-13665</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13666/">CVE-2019-13666</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13667/">CVE-2019-13667</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13668/">CVE-2019-13668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13669/">CVE-2019-13669</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13670/">CVE-2019-13670</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13671/">CVE-2019-13671</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13673/">CVE-2019-13673</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13674/">CVE-2019-13674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13675/">CVE-2019-13675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13676/">CVE-2019-13676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13677/">CVE-2019-13677</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13678/">CVE-2019-13678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13679/">CVE-2019-13679</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13680/">CVE-2019-13680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13681/">CVE-2019-13681</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13682/">CVE-2019-13682</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13683/">CVE-2019-13683</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13685/">CVE-2019-13685</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13686/">CVE-2019-13686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13687/">CVE-2019-13687</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13688/">CVE-2019-13688</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13693/">CVE-2019-13693</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13694/">CVE-2019-13694</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13695/">CVE-2019-13695</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13696/">CVE-2019-13696</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13697/">CVE-2019-13697</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13699/">CVE-2019-13699</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13700/">CVE-2019-13700</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13701/">CVE-2019-13701</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13702/">CVE-2019-13702</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13703/">CVE-2019-13703</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13704/">CVE-2019-13704</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13705/">CVE-2019-13705</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13706/">CVE-2019-13706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13707/">CVE-2019-13707</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13708/">CVE-2019-13708</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13709/">CVE-2019-13709</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13710/">CVE-2019-13710</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13711/">CVE-2019-13711</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13713/">CVE-2019-13713</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13714/">CVE-2019-13714</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13715/">CVE-2019-13715</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13716/">CVE-2019-13716</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13717/">CVE-2019-13717</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13718/">CVE-2019-13718</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13719/">CVE-2019-13719</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13720/">CVE-2019-13720</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13721/">CVE-2019-13721</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13723/">CVE-2019-13723</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13724/">CVE-2019-13724</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13725/">CVE-2019-13725</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13726/">CVE-2019-13726</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13727/">CVE-2019-13727</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13728/">CVE-2019-13728</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13729/">CVE-2019-13729</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13730/">CVE-2019-13730</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13732/">CVE-2019-13732</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13734/">CVE-2019-13734</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13735/">CVE-2019-13735</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13736/">CVE-2019-13736</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13737/">CVE-2019-13737</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13738/">CVE-2019-13738</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13739/">CVE-2019-13739</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13740/">CVE-2019-13740</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13741/">CVE-2019-13741</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13742/">CVE-2019-13742</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13743/">CVE-2019-13743</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13744/">CVE-2019-13744</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13745/">CVE-2019-13745</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13746/">CVE-2019-13746</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13747/">CVE-2019-13747</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13748/">CVE-2019-13748</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13749/">CVE-2019-13749</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13750/">CVE-2019-13750</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13751/">CVE-2019-13751</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13752/">CVE-2019-13752</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13753/">CVE-2019-13753</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13754/">CVE-2019-13754</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13755/">CVE-2019-13755</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13756/">CVE-2019-13756</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13757/">CVE-2019-13757</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13758/">CVE-2019-13758</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13759/">CVE-2019-13759</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13761/">CVE-2019-13761</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13762/">CVE-2019-13762</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13763/">CVE-2019-13763</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13764/">CVE-2019-13764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13767/">CVE-2019-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5754/">CVE-2019-5754</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5755/">CVE-2019-5755</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5756/">CVE-2019-5756</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5757/">CVE-2019-5757</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5758/">CVE-2019-5758</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5759/">CVE-2019-5759</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5760/">CVE-2019-5760</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5761/">CVE-2019-5761</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5762/">CVE-2019-5762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5763/">CVE-2019-5763</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5764/">CVE-2019-5764</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5765/">CVE-2019-5765</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5766/">CVE-2019-5766</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5767/">CVE-2019-5767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5768/">CVE-2019-5768</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5769/">CVE-2019-5769</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5770/">CVE-2019-5770</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5771/">CVE-2019-5771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5772/">CVE-2019-5772</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5773/">CVE-2019-5773</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5774/">CVE-2019-5774</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5775/">CVE-2019-5775</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5776/">CVE-2019-5776</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5777/">CVE-2019-5777</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5778/">CVE-2019-5778</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5779/">CVE-2019-5779</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5780/">CVE-2019-5780</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5781/">CVE-2019-5781</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5782/">CVE-2019-5782</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5784/">CVE-2019-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5786/">CVE-2019-5786</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5787/">CVE-2019-5787</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5788/">CVE-2019-5788</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5789/">CVE-2019-5789</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5790/">CVE-2019-5790</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5791/">CVE-2019-5791</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5792/">CVE-2019-5792</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5793/">CVE-2019-5793</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5794/">CVE-2019-5794</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5795/">CVE-2019-5795</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5796/">CVE-2019-5796</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5797/">CVE-2019-5797</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5799/">CVE-2019-5799</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5800/">CVE-2019-5800</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5801/">CVE-2019-5801</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5802/">CVE-2019-5802</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5803/">CVE-2019-5803</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5804/">CVE-2019-5804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5805/">CVE-2019-5805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5806/">CVE-2019-5806</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5807/">CVE-2019-5807</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5808/">CVE-2019-5808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5809/">CVE-2019-5809</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5810/">CVE-2019-5810</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5811/">CVE-2019-5811</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5812/">CVE-2019-5812</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5813/">CVE-2019-5813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5814/">CVE-2019-5814</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5815/">CVE-2019-5815</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5816/">CVE-2019-5816</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5817/">CVE-2019-5817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5818/">CVE-2019-5818</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5819/">CVE-2019-5819</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5820/">CVE-2019-5820</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5821/">CVE-2019-5821</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5822/">CVE-2019-5822</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5823/">CVE-2019-5823</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5824/">CVE-2019-5824</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5827/">CVE-2019-5827</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5828/">CVE-2019-5828</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5829/">CVE-2019-5829</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5830/">CVE-2019-5830</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5831/">CVE-2019-5831</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5832/">CVE-2019-5832</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5833/">CVE-2019-5833</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5834/">CVE-2019-5834</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5835/">CVE-2019-5835</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5836/">CVE-2019-5836</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5837/">CVE-2019-5837</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5838/">CVE-2019-5838</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5839/">CVE-2019-5839</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5840/">CVE-2019-5840</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5842/">CVE-2019-5842</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5844/">CVE-2019-5844</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5845/">CVE-2019-5845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5846/">CVE-2019-5846</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5847/">CVE-2019-5847</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5848/">CVE-2019-5848</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5850/">CVE-2019-5850</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5851/">CVE-2019-5851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5852/">CVE-2019-5852</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5853/">CVE-2019-5853</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5854/">CVE-2019-5854</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5855/">CVE-2019-5855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5856/">CVE-2019-5856</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5857/">CVE-2019-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5858/">CVE-2019-5858</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5859/">CVE-2019-5859</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5860/">CVE-2019-5860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5861/">CVE-2019-5861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5862/">CVE-2019-5862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5863/">CVE-2019-5863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5864/">CVE-2019-5864</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-5865/">CVE-2019-5865</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5867/">CVE-2019-5867</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5868/">CVE-2019-5868</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5869/">CVE-2019-5869</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5870/">CVE-2019-5870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5871/">CVE-2019-5871</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5872/">CVE-2019-5872</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5874/">CVE-2019-5874</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5875/">CVE-2019-5875</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5876/">CVE-2019-5876</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5877/">CVE-2019-5877</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5878/">CVE-2019-5878</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5879/">CVE-2019-5879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5880/">CVE-2019-5880</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5881/">CVE-2019-5881</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8075/">CVE-2019-8075</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0561/">CVE-2020-0561</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15959/">CVE-2020-15959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15960/">CVE-2020-15960</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15961/">CVE-2020-15961</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15962/">CVE-2020-15962</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15963/">CVE-2020-15963</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15964/">CVE-2020-15964</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15965/">CVE-2020-15965</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15966/">CVE-2020-15966</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15967/">CVE-2020-15967</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15968/">CVE-2020-15968</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15970/">CVE-2020-15970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15971/">CVE-2020-15971</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15972/">CVE-2020-15972</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15973/">CVE-2020-15973</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15974/">CVE-2020-15974</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15975/">CVE-2020-15975</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15976/">CVE-2020-15976</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15977/">CVE-2020-15977</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15978/">CVE-2020-15978</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15979/">CVE-2020-15979</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15980/">CVE-2020-15980</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15981/">CVE-2020-15981</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15982/">CVE-2020-15982</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15983/">CVE-2020-15983</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15984/">CVE-2020-15984</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15985/">CVE-2020-15985</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15986/">CVE-2020-15986</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15987/">CVE-2020-15987</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15988/">CVE-2020-15988</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15989/">CVE-2020-15989</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15990/">CVE-2020-15990</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15991/">CVE-2020-15991</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15992/">CVE-2020-15992</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15995/">CVE-2020-15995</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16000/">CVE-2020-16000</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16001/">CVE-2020-16001</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16002/">CVE-2020-16002</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16003/">CVE-2020-16003</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16004/">CVE-2020-16004</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16005/">CVE-2020-16005</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16006/">CVE-2020-16006</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16007/">CVE-2020-16007</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16008/">CVE-2020-16008</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16009/">CVE-2020-16009</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16011/">CVE-2020-16011</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16013/">CVE-2020-16013</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16014/">CVE-2020-16014</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16015/">CVE-2020-16015</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16016/">CVE-2020-16016</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16017/">CVE-2020-16017</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16018/">CVE-2020-16018</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16019/">CVE-2020-16019</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16020/">CVE-2020-16020</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16021/">CVE-2020-16021</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16022/">CVE-2020-16022</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16023/">CVE-2020-16023</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16024/">CVE-2020-16024</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16025/">CVE-2020-16025</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16026/">CVE-2020-16026</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16027/">CVE-2020-16027</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16028/">CVE-2020-16028</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16029/">CVE-2020-16029</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-16030/">CVE-2020-16030</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-16031/">CVE-2020-16031</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-16032/">CVE-2020-16032</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-16033/">CVE-2020-16033</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-16034/">CVE-2020-16034</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16035/">CVE-2020-16035</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-16036/">CVE-2020-16036</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16037/">CVE-2020-16037</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16038/">CVE-2020-16038</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16039/">CVE-2020-16039</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16040/">CVE-2020-16040</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16041/">CVE-2020-16041</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16043/">CVE-2020-16043</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27844/">CVE-2020-27844</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6377/">CVE-2020-6377</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6378/">CVE-2020-6378</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6379/">CVE-2020-6379</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6380/">CVE-2020-6380</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6381/">CVE-2020-6381</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6382/">CVE-2020-6382</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6385/">CVE-2020-6385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6387/">CVE-2020-6387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6388/">CVE-2020-6388</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6389/">CVE-2020-6389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6390/">CVE-2020-6390</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6391/">CVE-2020-6391</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6392/">CVE-2020-6392</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6393/">CVE-2020-6393</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6394/">CVE-2020-6394</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6395/">CVE-2020-6395</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6396/">CVE-2020-6396</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6397/">CVE-2020-6397</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6398/">CVE-2020-6398</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6399/">CVE-2020-6399</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6400/">CVE-2020-6400</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6401/">CVE-2020-6401</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6402/">CVE-2020-6402</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6403/">CVE-2020-6403</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6404/">CVE-2020-6404</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6405/">CVE-2020-6405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6406/">CVE-2020-6406</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6407/">CVE-2020-6407</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6408/">CVE-2020-6408</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6409/">CVE-2020-6409</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6410/">CVE-2020-6410</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6411/">CVE-2020-6411</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6412/">CVE-2020-6412</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6413/">CVE-2020-6413</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6414/">CVE-2020-6414</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6415/">CVE-2020-6415</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6416/">CVE-2020-6416</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6417/">CVE-2020-6417</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6418/">CVE-2020-6418</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6420/">CVE-2020-6420</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6422/">CVE-2020-6422</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6423/">CVE-2020-6423</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6424/">CVE-2020-6424</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6425/">CVE-2020-6425</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6426/">CVE-2020-6426</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6427/">CVE-2020-6427</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6428/">CVE-2020-6428</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6429/">CVE-2020-6429</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6430/">CVE-2020-6430</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6431/">CVE-2020-6431</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6432/">CVE-2020-6432</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6433/">CVE-2020-6433</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6434/">CVE-2020-6434</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6435/">CVE-2020-6435</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6436/">CVE-2020-6436</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6437/">CVE-2020-6437</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6438/">CVE-2020-6438</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6439/">CVE-2020-6439</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6440/">CVE-2020-6440</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6441/">CVE-2020-6441</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6442/">CVE-2020-6442</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6443/">CVE-2020-6443</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6444/">CVE-2020-6444</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6445/">CVE-2020-6445</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6446/">CVE-2020-6446</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6447/">CVE-2020-6447</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6448/">CVE-2020-6448</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6449/">CVE-2020-6449</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6450/">CVE-2020-6450</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6451/">CVE-2020-6451</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6452/">CVE-2020-6452</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6454/">CVE-2020-6454</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6455/">CVE-2020-6455</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6456/">CVE-2020-6456</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6457/">CVE-2020-6457</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6458/">CVE-2020-6458</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6459/">CVE-2020-6459</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6460/">CVE-2020-6460</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6462/">CVE-2020-6462</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6464/">CVE-2020-6464</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6465/">CVE-2020-6465</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6466/">CVE-2020-6466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6467/">CVE-2020-6467</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6468/">CVE-2020-6468</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6469/">CVE-2020-6469</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6470/">CVE-2020-6470</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6471/">CVE-2020-6471</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6472/">CVE-2020-6472</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6473/">CVE-2020-6473</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6474/">CVE-2020-6474</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6475/">CVE-2020-6475</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6476/">CVE-2020-6476</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6477/">CVE-2020-6477</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6478/">CVE-2020-6478</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6479/">CVE-2020-6479</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6480/">CVE-2020-6480</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6481/">CVE-2020-6481</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6482/">CVE-2020-6482</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6483/">CVE-2020-6483</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6484/">CVE-2020-6484</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6485/">CVE-2020-6485</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6486/">CVE-2020-6486</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6487/">CVE-2020-6487</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6488/">CVE-2020-6488</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6489/">CVE-2020-6489</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6490/">CVE-2020-6490</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6491/">CVE-2020-6491</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6493/">CVE-2020-6493</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6494/">CVE-2020-6494</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6495/">CVE-2020-6495</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6496/">CVE-2020-6496</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6505/">CVE-2020-6505</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6506/">CVE-2020-6506</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6507/">CVE-2020-6507</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6509/">CVE-2020-6509</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6510/">CVE-2020-6510</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6511/">CVE-2020-6511</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6512/">CVE-2020-6512</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6513/">CVE-2020-6513</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6515/">CVE-2020-6515</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6516/">CVE-2020-6516</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6517/">CVE-2020-6517</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6518/">CVE-2020-6518</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6519/">CVE-2020-6519</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6520/">CVE-2020-6520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6521/">CVE-2020-6521</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6522/">CVE-2020-6522</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6523/">CVE-2020-6523</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6524/">CVE-2020-6524</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6525/">CVE-2020-6525</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6526/">CVE-2020-6526</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6527/">CVE-2020-6527</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6528/">CVE-2020-6528</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6529/">CVE-2020-6529</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6530/">CVE-2020-6530</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6531/">CVE-2020-6531</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6532/">CVE-2020-6532</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6533/">CVE-2020-6533</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6534/">CVE-2020-6534</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6535/">CVE-2020-6535</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6536/">CVE-2020-6536</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6537/">CVE-2020-6537</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6538/">CVE-2020-6538</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6539/">CVE-2020-6539</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6540/">CVE-2020-6540</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6541/">CVE-2020-6541</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6542/">CVE-2020-6542</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6543/">CVE-2020-6543</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6544/">CVE-2020-6544</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6545/">CVE-2020-6545</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6546/">CVE-2020-6546</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6547/">CVE-2020-6547</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6548/">CVE-2020-6548</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6549/">CVE-2020-6549</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6550/">CVE-2020-6550</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6551/">CVE-2020-6551</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6552/">CVE-2020-6552</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6553/">CVE-2020-6553</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6554/">CVE-2020-6554</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6555/">CVE-2020-6555</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6556/">CVE-2020-6556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6557/">CVE-2020-6557</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6558/">CVE-2020-6558</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6559/">CVE-2020-6559</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6560/">CVE-2020-6560</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6561/">CVE-2020-6561</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6562/">CVE-2020-6562</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6563/">CVE-2020-6563</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6564/">CVE-2020-6564</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6565/">CVE-2020-6565</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6566/">CVE-2020-6566</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6567/">CVE-2020-6567</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-6568/">CVE-2020-6568</cve>
	<cve impact="critical" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6569/">CVE-2020-6569</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6570/">CVE-2020-6570</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6571/">CVE-2020-6571</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6573/">CVE-2020-6573</cve>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6574/">CVE-2020-6574</cve>
	<cve impact="critical" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6575/">CVE-2020-6575</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6576/">CVE-2020-6576</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21106/">CVE-2021-21106</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21107/">CVE-2021-21107</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21108/">CVE-2021-21108</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21109/">CVE-2021-21109</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21110/">CVE-2021-21110</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21111/">CVE-2021-21111</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21112/">CVE-2021-21112</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21113/">CVE-2021-21113</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21114/">CVE-2021-21114</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21115/">CVE-2021-21115</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21116/">CVE-2021-21116</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21117/">CVE-2021-21117</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21118/">CVE-2021-21118</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21119/">CVE-2021-21119</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21120/">CVE-2021-21120</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21121/">CVE-2021-21121</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21122/">CVE-2021-21122</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21123/">CVE-2021-21123</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21124/">CVE-2021-21124</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21125/">CVE-2021-21125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21126/">CVE-2021-21126</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21127/">CVE-2021-21127</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21128/">CVE-2021-21128</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21129/">CVE-2021-21129</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21130/">CVE-2021-21130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21131/">CVE-2021-21131</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21132/">CVE-2021-21132</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21133/">CVE-2021-21133</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21134/">CVE-2021-21134</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21135/">CVE-2021-21135</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21136/">CVE-2021-21136</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21137/">CVE-2021-21137</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21138/">CVE-2021-21138</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21139/">CVE-2021-21139</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21140/">CVE-2021-21140</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21141/">CVE-2021-21141</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21142/">CVE-2021-21142</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21143/">CVE-2021-21143</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21144/">CVE-2021-21144</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21145/">CVE-2021-21145</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21146/">CVE-2021-21146</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21147/">CVE-2021-21147</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21148/">CVE-2021-21148</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21149/">CVE-2021-21149</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21150/">CVE-2021-21150</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21151/">CVE-2021-21151</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21152/">CVE-2021-21152</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21153/">CVE-2021-21153</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21154/">CVE-2021-21154</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21155/">CVE-2021-21155</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21156/">CVE-2021-21156</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21157/">CVE-2021-21157</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21159/">CVE-2021-21159</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21160/">CVE-2021-21160</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21161/">CVE-2021-21161</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21162/">CVE-2021-21162</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21163/">CVE-2021-21163</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21164/">CVE-2021-21164</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21165/">CVE-2021-21165</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21166/">CVE-2021-21166</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21167/">CVE-2021-21167</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21168/">CVE-2021-21168</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21169/">CVE-2021-21169</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21170/">CVE-2021-21170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21171/">CVE-2021-21171</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21172/">CVE-2021-21172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21173/">CVE-2021-21173</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21174/">CVE-2021-21174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21175/">CVE-2021-21175</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21176/">CVE-2021-21176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21177/">CVE-2021-21177</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21178/">CVE-2021-21178</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21179/">CVE-2021-21179</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21180/">CVE-2021-21180</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21181/">CVE-2021-21181</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21182/">CVE-2021-21182</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21183/">CVE-2021-21183</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21184/">CVE-2021-21184</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21185/">CVE-2021-21185</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21186/">CVE-2021-21186</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21187/">CVE-2021-21187</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21188/">CVE-2021-21188</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21189/">CVE-2021-21189</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21190/">CVE-2021-21190</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21191/">CVE-2021-21191</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21192/">CVE-2021-21192</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21193/">CVE-2021-21193</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21194/">CVE-2021-21194</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21195/">CVE-2021-21195</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21196/">CVE-2021-21196</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21197/">CVE-2021-21197</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21198/">CVE-2021-21198</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21199/">CVE-2021-21199</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21201/">CVE-2021-21201</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21202/">CVE-2021-21202</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21203/">CVE-2021-21203</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21204/">CVE-2021-21204</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21205/">CVE-2021-21205</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21206/">CVE-2021-21206</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21207/">CVE-2021-21207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21208/">CVE-2021-21208</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21209/">CVE-2021-21209</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21210/">CVE-2021-21210</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21211/">CVE-2021-21211</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21212/">CVE-2021-21212</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21213/">CVE-2021-21213</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21214/">CVE-2021-21214</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21215/">CVE-2021-21215</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21216/">CVE-2021-21216</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21217/">CVE-2021-21217</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21218/">CVE-2021-21218</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21219/">CVE-2021-21219</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21220/">CVE-2021-21220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21221/">CVE-2021-21221</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21222/">CVE-2021-21222</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21223/">CVE-2021-21223</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21224/">CVE-2021-21224</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21225/">CVE-2021-21225</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21226/">CVE-2021-21226</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21227/">CVE-2021-21227</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21228/">CVE-2021-21228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21229/">CVE-2021-21229</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21230/">CVE-2021-21230</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21231/">CVE-2021-21231</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21232/">CVE-2021-21232</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21233/">CVE-2021-21233</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30506/">CVE-2021-30506</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30507/">CVE-2021-30507</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30508/">CVE-2021-30508</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30509/">CVE-2021-30509</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30510/">CVE-2021-30510</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30511/">CVE-2021-30511</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30512/">CVE-2021-30512</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30513/">CVE-2021-30513</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30514/">CVE-2021-30514</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30515/">CVE-2021-30515</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30516/">CVE-2021-30516</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30517/">CVE-2021-30517</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30518/">CVE-2021-30518</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30519/">CVE-2021-30519</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30520/">CVE-2021-30520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694729" comment="chromium-90.0.4430.212-bp153.1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51708" version="1" class="patch">
	<metadata>
		<title>chrony-3.2-9.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-3.2-9.21.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694730" comment="chrony-3.2-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694731" comment="chrony-pool-openSUSE-3.2-9.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51709" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.9-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342/" source="CVE"/>
		<reference ref_id="CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.9-5.12.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628352" comment="cifs-utils-6.9-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51710" version="1" class="patch">
	<metadata>
		<title>colord-gtk-lang-0.1.26-1.48 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-gtk-lang-0.1.26-1.48 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488885" comment="colord-gtk-lang-0.1.26-1.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482646" comment="libcolord-gtk1-0.1.26-1.48 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51711" version="1" class="patch">
	<metadata>
		<title>coreutils-8.32-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.32-1.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628358" comment="coreutils-8.32-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694732" comment="coreutils-doc-8.32-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628359" comment="coreutils-lang-8.32-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51712" version="1" class="patch">
	<metadata>
		<title>cpio-2.12-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.12-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481843" comment="cpio-2.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481844" comment="cpio-lang-2.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481845" comment="cpio-mt-2.12-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51713" version="1" class="patch">
	<metadata>
		<title>cpp7-7.5.0+r278197-4.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp7-7.5.0+r278197-4.25.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628360" comment="cpp7-7.5.0+r278197-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628366" comment="libgfortran4-7.5.0+r278197-4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51714" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.7-11.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.7-11.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628370" comment="cracklib-2.9.7-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628373" comment="libcrack2-2.9.7-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628374" comment="libcrack2-32bit-2.9.7-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51715" version="1" class="patch">
	<metadata>
		<title>cron-4.2-6.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-6.12.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481890" comment="cron-4.2-6.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481891" comment="cronie-1.5.1-6.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51716" version="1" class="patch">
	<metadata>
		<title>cryptsetup-2.3.4-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-14382" ref_url="https://www.suse.com/security/cve/CVE-2020-14382/" source="CVE"/>
		<description>
These are all security issues fixed in the cryptsetup-2.3.4-1.34 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14382/">CVE-2020-14382</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628375" comment="cryptsetup-2.3.4-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628376" comment="cryptsetup-lang-2.3.4-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628378" comment="libcryptsetup12-2.3.4-1.34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51717" version="1" class="patch">
	<metadata>
		<title>cups-2.2.7-3.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842/" source="CVE"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.2.7-3.26.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628382" comment="cups-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628383" comment="cups-client-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628384" comment="cups-config-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628386" comment="libcups2-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628387" comment="libcups2-32bit-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628388" comment="libcupscgi1-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628389" comment="libcupsimage2-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628390" comment="libcupsmime1-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628391" comment="libcupsppdc1-2.2.7-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51718" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.25.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.25.0-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685444" comment="cups-filters-1.25.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51719" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.6-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.6-1.36 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482654" comment="cups-pk-helper-0.2.6-1.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482655" comment="cups-pk-helper-lang-0.2.6-1.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51720" version="1" class="patch">
	<metadata>
		<title>curl-7.66.0-4.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236/" source="CVE"/>
		<reference ref_id="CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594/" source="CVE"/>
		<reference ref_id="CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629/" source="CVE"/>
		<reference ref_id="CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468/" source="CVE"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818/" source="CVE"/>
		<reference ref_id="CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502/" source="CVE"/>
		<reference ref_id="CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300/" source="CVE"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="CVE-2019-5435" ref_url="https://www.suse.com/security/cve/CVE-2019-5435/" source="CVE"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481/" source="CVE"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="CVE-2020-8169" ref_url="https://www.suse.com/security/cve/CVE-2020-8169/" source="CVE"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286/" source="CVE"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.66.0-4.14.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5435/">CVE-2019-5435</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8169/">CVE-2020-8169</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628392" comment="curl-7.66.0-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628394" comment="libcurl4-7.66.0-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628395" comment="libcurl4-32bit-7.66.0-4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51721" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.27-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="CVE-2020-8032" ref_url="https://www.suse.com/security/cve/CVE-2020-8032/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.27-2.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8032/">CVE-2020-8032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628396" comment="cyrus-sasl-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628397" comment="cyrus-sasl-32bit-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628398" comment="cyrus-sasl-crammd5-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628399" comment="cyrus-sasl-crammd5-32bit-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628401" comment="cyrus-sasl-digestmd5-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628402" comment="cyrus-sasl-digestmd5-32bit-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628403" comment="cyrus-sasl-gssapi-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628404" comment="cyrus-sasl-gssapi-32bit-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628406" comment="cyrus-sasl-plain-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628407" comment="cyrus-sasl-plain-32bit-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628408" comment="libsasl2-3-2.1.27-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628409" comment="libsasl2-3-32bit-2.1.27-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51722" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.12.2-8.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.12.2-8.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481908" comment="dbus-1-1.12.2-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481910" comment="dbus-1-x11-1.12.2-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481911" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481912" comment="libdbus-1-3-32bit-1.12.2-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51723" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.108-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.108-1.29 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480190" comment="dbus-1-glib-0.108-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480191" comment="dbus-1-glib-32bit-0.108-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480193" comment="dbus-1-glib-tool-0.108-1.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51724" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.5-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.5-6.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628411" comment="dhcp-4.3.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628412" comment="dhcp-client-4.3.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51725" version="1" class="patch">
	<metadata>
		<title>dirmngr-2.2.27-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1000858" ref_url="https://www.suse.com/security/cve/CVE-2018-1000858/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234/" source="CVE"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<reference ref_id="CVE-2019-14855" ref_url="https://www.suse.com/security/cve/CVE-2019-14855/" source="CVE"/>
		<reference ref_id="CVE-2020-25125" ref_url="https://www.suse.com/security/cve/CVE-2020-25125/" source="CVE"/>
		<description>
These are all security issues fixed in the dirmngr-2.2.27-1.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000858/">CVE-2018-1000858</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14855/">CVE-2019-14855</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25125/">CVE-2020-25125</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628414" comment="dirmngr-2.2.27-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628415" comment="gpg2-2.2.27-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628416" comment="gpg2-lang-2.2.27-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51726" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.78-7.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.78-7.8.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694733" comment="dnsmasq-2.78-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51727" version="1" class="patch">
	<metadata>
		<title>dracut-049.1+suse.188.gbf445638-3.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-049.1+suse.188.gbf445638-3.30.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694734" comment="dracut-049.1+suse.188.gbf445638-3.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51728" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.43.8-4.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094/" source="CVE"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.43.8-4.26.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628421" comment="e2fsprogs-1.43.8-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628425" comment="libcom_err2-1.43.8-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628426" comment="libcom_err2-32bit-1.43.8-4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628429" comment="libext2fs2-1.43.8-4.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51729" version="1" class="patch">
	<metadata>
		<title>elfutils-0.168-4.5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.168-4.5.3 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481929" comment="elfutils-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481930" comment="elfutils-lang-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481932" comment="libasm1-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481934" comment="libdw1-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481935" comment="libdw1-32bit-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481937" comment="libebl-plugins-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481938" comment="libebl-plugins-32bit-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481940" comment="libelf1-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481941" comment="libelf1-32bit-0.168-4.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51730" version="1" class="patch">
	<metadata>
		<title>emacs-25.3-3.6.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="CVE-2014-9483" ref_url="https://www.suse.com/security/cve/CVE-2014-9483/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-25.3-3.6.51 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9483/">CVE-2014-9483</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628430" comment="emacs-25.3-3.6.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628432" comment="emacs-info-25.3-3.6.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628433" comment="emacs-nox-25.3-3.6.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628434" comment="etags-25.3-3.6.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51731" version="1" class="patch">
	<metadata>
		<title>eog-3.34.2-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.34.2-1.46 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487201" comment="eog-3.34.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487203" comment="eog-lang-3.34.2-1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51732" version="1" class="patch">
	<metadata>
		<title>evince-3.34.2-1.115 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.34.2-1.115 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487204" comment="evince-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487206" comment="evince-lang-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487209" comment="evince-plugin-pdfdocument-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487213" comment="libevdocument3-4-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487214" comment="libevview3-3-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487215" comment="nautilus-evince-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487216" comment="typelib-1_0-EvinceDocument-3_0-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487217" comment="typelib-1_0-EvinceView-3_0-3.34.2-1.115 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51733" version="1" class="patch">
	<metadata>
		<title>evolution-3.34.4-1.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-3.34.4-1.49 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489187" comment="evolution-3.34.4-1.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489189" comment="evolution-lang-3.34.4-1.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51734" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-3.34.4-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-14928" ref_url="https://www.suse.com/security/cve/CVE-2020-14928/" source="CVE"/>
		<reference ref_id="CVE-2020-16117" ref_url="https://www.suse.com/security/cve/CVE-2020-16117/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-3.34.4-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14928/">CVE-2020-14928</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16117/">CVE-2020-16117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630123" comment="evolution-data-server-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630125" comment="evolution-data-server-lang-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630126" comment="libcamel-1_2-62-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630127" comment="libebackend-1_2-10-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630128" comment="libebook-1_2-20-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630129" comment="libebook-contacts-1_2-3-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630130" comment="libecal-2_0-1-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630131" comment="libedata-book-1_2-26-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630132" comment="libedata-cal-2_0-1-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630133" comment="libedataserver-1_2-24-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630134" comment="libedataserverui-1_2-2-3.34.4-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51735" version="1" class="patch">
	<metadata>
		<title>expat-2.2.5-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.2.5-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481942" comment="expat-2.2.5-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481944" comment="libexpat1-2.2.5-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481945" comment="libexpat1-32bit-2.2.5-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51736" version="1" class="patch">
	<metadata>
		<title>file-5.32-7.11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249/" source="CVE"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.32-7.11.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628435" comment="file-5.32-7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628437" comment="file-magic-5.32-7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628438" comment="libmagic1-5.32-7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628439" comment="libmagic1-32bit-5.32-7.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51737" version="1" class="patch">
	<metadata>
		<title>file-roller-3.32.5-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-11736" ref_url="https://www.suse.com/security/cve/CVE-2020-11736/" source="CVE"/>
		<description>
These are all security issues fixed in the file-roller-3.32.5-1.8 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11736/">CVE-2020-11736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487218" comment="file-roller-3.32.5-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487219" comment="file-roller-lang-3.32.5-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51738" version="1" class="patch">
	<metadata>
		<title>firewall-macros-0.9.3-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410/" source="CVE"/>
		<description>
These are all security issues fixed in the firewall-macros-0.9.3-1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628440" comment="firewall-macros-0.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628441" comment="firewalld-0.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628442" comment="firewalld-lang-0.9.3-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628443" comment="python3-firewall-0.9.3-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51739" version="1" class="patch">
	<metadata>
		<title>flatpak-1.10.2-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-8659" ref_url="https://www.suse.com/security/cve/CVE-2016-8659/" source="CVE"/>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-10063" ref_url="https://www.suse.com/security/cve/CVE-2019-10063/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.10.2-4.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8659/">CVE-2016-8659</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10063/">CVE-2019-10063</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629101" comment="flatpak-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629104" comment="libflatpak0-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629105" comment="system-user-flatpak-1.10.2-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51740" version="1" class="patch">
	<metadata>
		<title>freerdp-2.1.2-15.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<reference ref_id="CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834/" source="CVE"/>
		<reference ref_id="CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835/" source="CVE"/>
		<reference ref_id="CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836/" source="CVE"/>
		<reference ref_id="CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837/" source="CVE"/>
		<reference ref_id="CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838/" source="CVE"/>
		<reference ref_id="CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839/" source="CVE"/>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<reference ref_id="CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852/" source="CVE"/>
		<reference ref_id="CVE-2018-8784" ref_url="https://www.suse.com/security/cve/CVE-2018-8784/" source="CVE"/>
		<reference ref_id="CVE-2018-8785" ref_url="https://www.suse.com/security/cve/CVE-2018-8785/" source="CVE"/>
		<reference ref_id="CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786/" source="CVE"/>
		<reference ref_id="CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788/" source="CVE"/>
		<reference ref_id="CVE-2018-8789" ref_url="https://www.suse.com/security/cve/CVE-2018-8789/" source="CVE"/>
		<reference ref_id="CVE-2019-17177" ref_url="https://www.suse.com/security/cve/CVE-2019-17177/" source="CVE"/>
		<reference ref_id="CVE-2019-17178" ref_url="https://www.suse.com/security/cve/CVE-2019-17178/" source="CVE"/>
		<reference ref_id="CVE-2020-11017" ref_url="https://www.suse.com/security/cve/CVE-2020-11017/" source="CVE"/>
		<reference ref_id="CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018/" source="CVE"/>
		<reference ref_id="CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019/" source="CVE"/>
		<reference ref_id="CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038/" source="CVE"/>
		<reference ref_id="CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039/" source="CVE"/>
		<reference ref_id="CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040/" source="CVE"/>
		<reference ref_id="CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041/" source="CVE"/>
		<reference ref_id="CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043/" source="CVE"/>
		<reference ref_id="CVE-2020-11095" ref_url="https://www.suse.com/security/cve/CVE-2020-11095/" source="CVE"/>
		<reference ref_id="CVE-2020-11096" ref_url="https://www.suse.com/security/cve/CVE-2020-11096/" source="CVE"/>
		<reference ref_id="CVE-2020-11097" ref_url="https://www.suse.com/security/cve/CVE-2020-11097/" source="CVE"/>
		<reference ref_id="CVE-2020-11098" ref_url="https://www.suse.com/security/cve/CVE-2020-11098/" source="CVE"/>
		<reference ref_id="CVE-2020-11099" ref_url="https://www.suse.com/security/cve/CVE-2020-11099/" source="CVE"/>
		<reference ref_id="CVE-2020-11521" ref_url="https://www.suse.com/security/cve/CVE-2020-11521/" source="CVE"/>
		<reference ref_id="CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522/" source="CVE"/>
		<reference ref_id="CVE-2020-11523" ref_url="https://www.suse.com/security/cve/CVE-2020-11523/" source="CVE"/>
		<reference ref_id="CVE-2020-11524" ref_url="https://www.suse.com/security/cve/CVE-2020-11524/" source="CVE"/>
		<reference ref_id="CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525/" source="CVE"/>
		<reference ref_id="CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526/" source="CVE"/>
		<reference ref_id="CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396/" source="CVE"/>
		<reference ref_id="CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397/" source="CVE"/>
		<reference ref_id="CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398/" source="CVE"/>
		<reference ref_id="CVE-2020-15103" ref_url="https://www.suse.com/security/cve/CVE-2020-15103/" source="CVE"/>
		<reference ref_id="CVE-2020-4030" ref_url="https://www.suse.com/security/cve/CVE-2020-4030/" source="CVE"/>
		<reference ref_id="CVE-2020-4031" ref_url="https://www.suse.com/security/cve/CVE-2020-4031/" source="CVE"/>
		<reference ref_id="CVE-2020-4032" ref_url="https://www.suse.com/security/cve/CVE-2020-4032/" source="CVE"/>
		<reference ref_id="CVE-2020-4033" ref_url="https://www.suse.com/security/cve/CVE-2020-4033/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.1.2-15.10.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8784/">CVE-2018-8784</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8785/">CVE-2018-8785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8789/">CVE-2018-8789</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17177/">CVE-2019-17177</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17178/">CVE-2019-17178</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11017/">CVE-2020-11017</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039</cve>
	<cve impact="important" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040</cve>
	<cve impact="important" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041</cve>
	<cve impact="important" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11095/">CVE-2020-11095</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11096/">CVE-2020-11096</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11097/">CVE-2020-11097</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11098/">CVE-2020-11098</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11099/">CVE-2020-11099</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11521/">CVE-2020-11521</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11523/">CVE-2020-11523</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11524/">CVE-2020-11524</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15103/">CVE-2020-15103</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4030/">CVE-2020-4030</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4031/">CVE-2020-4031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-4032/">CVE-2020-4032</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4033/">CVE-2020-4033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694735" comment="freerdp-2.1.2-bp153.1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694736" comment="libfreerdp2-2.1.2-bp153.1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694737" comment="libwinpr2-2.1.2-bp153.1.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51741" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.7-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.7-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481128" comment="fuse-2.9.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481131" comment="libfuse2-2.9.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51742" version="1" class="patch">
	<metadata>
		<title>fwupd-1.5.8-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<description>
These are all security issues fixed in the fwupd-1.5.8-1.13 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629109" comment="fwupd-1.5.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629111" comment="fwupd-lang-1.5.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629114" comment="libfwupd2-1.5.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629115" comment="libfwupdplugin1-1.5.8-1.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629117" comment="libjcat1-0.1.3-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629118" comment="typelib-1_0-Fwupd-2_0-1.5.8-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51743" version="1" class="patch">
	<metadata>
		<title>gcab-1.1-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-0552" ref_url="https://www.suse.com/security/cve/CVE-2015-0552/" source="CVE"/>
		<reference ref_id="CVE-2018-5345" ref_url="https://www.suse.com/security/cve/CVE-2018-5345/" source="CVE"/>
		<description>
These are all security issues fixed in the gcab-1.1-1.15 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0552/">CVE-2015-0552</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5345/">CVE-2018-5345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482681" comment="gcab-1.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482683" comment="gcab-lang-1.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482684" comment="libgcab-1_0-0-1.1-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51744" version="1" class="patch">
	<metadata>
		<title>gdb-10.1-8.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
These are all security issues fixed in the gdb-10.1-8.24.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629348" comment="gdb-10.1-8.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51745" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.40.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.40.0-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628451" comment="gdk-pixbuf-lang-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628452" comment="gdk-pixbuf-query-loaders-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628453" comment="gdk-pixbuf-thumbnailer-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628454" comment="libgdk_pixbuf-2_0-0-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628455" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51746" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.46.5-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="CVE-2021-25900" ref_url="https://www.suse.com/security/cve/CVE-2021-25900/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.46.5-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25900/">CVE-2021-25900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628457" comment="gdk-pixbuf-loader-rsvg-2.46.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628458" comment="librsvg-2-2-2.46.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694738" comment="librsvg-lang-2.46.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694739" comment="rsvg-thumbnailer-2.46.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629215" comment="typelib-1_0-Rsvg-2_0-2.46.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51747" version="1" class="patch">
	<metadata>
		<title>gdm-3.34.1-8.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-7496" ref_url="https://www.suse.com/security/cve/CVE-2015-7496/" source="CVE"/>
		<reference ref_id="CVE-2017-12164" ref_url="https://www.suse.com/security/cve/CVE-2017-12164/" source="CVE"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<reference ref_id="CVE-2019-3825" ref_url="https://www.suse.com/security/cve/CVE-2019-3825/" source="CVE"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.34.1-8.18.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7496/">CVE-2015-7496</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12164/">CVE-2017-12164</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3825/">CVE-2019-3825</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694740" comment="gdm-3.34.1-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694741" comment="gdm-lang-3.34.1-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694742" comment="gdmflexiserver-3.34.1-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694743" comment="libgdm1-3.34.1-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694744" comment="typelib-1_0-Gdm-1_0-3.34.1-8.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51748" version="1" class="patch">
	<metadata>
		<title>gegl-0_4-0.4.16-1.99 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433/" source="CVE"/>
		<reference ref_id="CVE-2018-10114" ref_url="https://www.suse.com/security/cve/CVE-2018-10114/" source="CVE"/>
		<description>
These are all security issues fixed in the gegl-0_4-0.4.16-1.99 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10114/">CVE-2018-10114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489199" comment="gegl-0_4-0.4.16-1.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489200" comment="gegl-0_4-lang-0.4.16-1.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489202" comment="libgegl-0_4-0-0.4.16-1.99 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51749" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.52-3.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-10217" ref_url="https://www.suse.com/security/cve/CVE-2016-10217/" source="CVE"/>
		<reference ref_id="CVE-2016-10218" ref_url="https://www.suse.com/security/cve/CVE-2016-10218/" source="CVE"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2016-7976" ref_url="https://www.suse.com/security/cve/CVE-2016-7976/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.52-3.32.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10217/">CVE-2016-10217</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10218/">CVE-2016-10218</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7976/">CVE-2016-7976</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628459" comment="ghostscript-9.52-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628461" comment="ghostscript-x11-9.52-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51750" version="1" class="patch">
	<metadata>
		<title>gimp-2.10.12-7.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2007-3126" ref_url="https://www.suse.com/security/cve/CVE-2007-3126/" source="CVE"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.10.12-7.25 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-3126/">CVE-2007-3126</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630151" comment="gimp-2.10.12-7.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630153" comment="gimp-lang-2.10.12-7.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630154" comment="gimp-plugin-aa-2.10.12-7.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684230" comment="gimp-plugins-python-2.10.12-3.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630155" comment="libgimp-2_0-0-2.10.12-7.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630156" comment="libgimpui-2_0-0-2.10.12-7.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51751" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.62.6-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="CVE-2020-6750" ref_url="https://www.suse.com/security/cve/CVE-2020-6750/" source="CVE"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.62.6-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6750/">CVE-2020-6750</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628466" comment="glib2-lang-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628467" comment="glib2-tools-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628468" comment="libgio-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628469" comment="libgio-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628470" comment="libglib-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628471" comment="libglib-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628472" comment="libgmodule-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628473" comment="libgmodule-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628474" comment="libgobject-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628475" comment="libgobject-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628476" comment="libgthread-2_0-0-2.62.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51752" version="1" class="patch">
	<metadata>
		<title>glibc-2.31-7.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751/" source="CVE"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-27645" ref_url="https://www.suse.com/security/cve/CVE-2021-27645/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.31-7.30 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27645/">CVE-2021-27645</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628477" comment="glibc-2.31-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628478" comment="glibc-32bit-2.31-7.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628480" comment="glibc-extra-2.31-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628483" comment="glibc-lang-2.31-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628484" comment="glibc-locale-2.31-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628485" comment="glibc-locale-base-2.31-7.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628486" comment="glibc-locale-base-32bit-2.31-7.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628488" comment="nscd-2.31-7.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51753" version="1" class="patch">
	<metadata>
		<title>glibc-locale-32bit-2.26-13.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2009-5064" ref_url="https://www.suse.com/security/cve/CVE-2009-5064/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-locale-32bit-2.26-13.8.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5064/">CVE-2009-5064</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481163" comment="glibc-locale-32bit-2.26-13.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51754" version="1" class="patch">
	<metadata>
		<title>gnome-desktop-lang-3.34.7-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-11460" ref_url="https://www.suse.com/security/cve/CVE-2019-11460/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-desktop-lang-3.34.7-3.3.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11460/">CVE-2019-11460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629134" comment="gnome-desktop-lang-3.34.7-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629135" comment="gnome-version-3.34.7-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629136" comment="libgnome-desktop-3-18-3.34.7-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629138" comment="libgnome-desktop-3_0-common-3.34.7-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629139" comment="typelib-1_0-GnomeDesktop-3_0-3.34.7-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51755" version="1" class="patch">
	<metadata>
		<title>gnome-photos-3.34.1-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-photos-3.34.1-1.62 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489210" comment="gnome-photos-3.34.1-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489211" comment="gnome-photos-lang-3.34.1-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489212" comment="gnome-shell-search-provider-gnome-photos-3.34.1-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487294" comment="gtk2-data-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694745" comment="gtk2-immodule-amharic-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694746" comment="gtk2-immodule-inuktitut-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694747" comment="gtk2-immodule-thai-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694748" comment="gtk2-immodule-tigrigna-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694749" comment="gtk2-immodule-vietnamese-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694750" comment="gtk2-immodule-xim-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482037" comment="gtk2-lang-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482038" comment="gtk2-tools-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482039" comment="libgtk-2_0-0-2.24.32+67-2.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51756" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.34.2+0-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.34.2+0-4.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629140" comment="gnome-settings-daemon-3.34.2+0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629142" comment="gnome-settings-daemon-lang-3.34.2+0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51757" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.34.5-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<reference ref_id="CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.34.5-8.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629143" comment="gnome-shell-3.34.5-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684231" comment="gnome-shell-calendar-3.34.5-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629145" comment="gnome-shell-lang-3.34.5-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51758" version="1" class="patch">
	<metadata>
		<title>gnome-shell-search-provider-nautilus-3.34.3-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-11461" ref_url="https://www.suse.com/security/cve/CVE-2019-11461/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-search-provider-nautilus-3.34.3-4.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11461/">CVE-2019-11461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629146" comment="gnome-shell-search-provider-nautilus-3.34.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629147" comment="libnautilus-extension1-3.34.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629148" comment="nautilus-3.34.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629150" comment="nautilus-lang-3.34.3-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51759" version="1" class="patch">
	<metadata>
		<title>gnuchess-6.2.6-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8972" ref_url="https://www.suse.com/security/cve/CVE-2015-8972/" source="CVE"/>
		<reference ref_id="CVE-2019-15767" ref_url="https://www.suse.com/security/cve/CVE-2019-15767/" source="CVE"/>
		<description>
These are all security issues fixed in the gnuchess-6.2.6-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8972/">CVE-2015-8972</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15767/">CVE-2019-15767</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694751" comment="gnuchess-6.2.6-bp153.1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51760" version="1" class="patch">
	<metadata>
		<title>gnutls-3.6.7-14.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="CVE-2018-16868" ref_url="https://www.suse.com/security/cve/CVE-2018-16868/" source="CVE"/>
		<reference ref_id="CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829/" source="CVE"/>
		<reference ref_id="CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836/" source="CVE"/>
		<reference ref_id="CVE-2020-11501" ref_url="https://www.suse.com/security/cve/CVE-2020-11501/" source="CVE"/>
		<reference ref_id="CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777/" source="CVE"/>
		<reference ref_id="CVE-2020-24659" ref_url="https://www.suse.com/security/cve/CVE-2020-24659/" source="CVE"/>
		<reference ref_id="CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231/" source="CVE"/>
		<reference ref_id="CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.6.7-14.10.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16868/">CVE-2018-16868</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11501/">CVE-2020-11501</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24659/">CVE-2020-24659</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628489" comment="gnutls-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628491" comment="libgnutls30-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628492" comment="libgnutls30-32bit-3.6.7-14.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51761" version="1" class="patch">
	<metadata>
		<title>graphviz-2.40.1-6.6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<description>
These are all security issues fixed in the graphviz-2.40.1-6.6.4 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628497" comment="graphviz-2.40.1-6.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694752" comment="graphviz-gd-2.40.1-6.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630157" comment="graphviz-gnome-2.40.1-6.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628499" comment="graphviz-plugins-core-2.40.1-6.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628500" comment="libgraphviz6-2.40.1-6.6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51762" version="1" class="patch">
	<metadata>
		<title>grep-3.1-4.3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345/" source="CVE"/>
		<description>
These are all security issues fixed in the grep-3.1-4.3.12 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482006" comment="grep-3.1-4.3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482007" comment="grep-lang-3.1-4.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51763" version="1" class="patch">
	<metadata>
		<title>groff-1.22.3-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.3-5.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628501" comment="groff-1.22.3-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628502" comment="groff-full-1.22.3-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628503" comment="gxditview-1.22.3-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51764" version="1" class="patch">
	<metadata>
		<title>grub2-2.04-20.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.04-20.4 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628504" comment="grub2-2.04-20.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628505" comment="grub2-arm64-efi-2.04-20.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628506" comment="grub2-i386-pc-2.04-20.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628507" comment="grub2-powerpc-ieee1275-2.04-20.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628509" comment="grub2-snapper-plugin-2.04-20.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628510" comment="grub2-systemd-sleep-plugin-2.04-20.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628511" comment="grub2-x86_64-efi-2.04-20.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51765" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.16.2-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="CVE-2017-5846" ref_url="https://www.suse.com/security/cve/CVE-2017-5846/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.16.2-1.53 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5846/">CVE-2017-5846</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482016" comment="gstreamer-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482017" comment="gstreamer-lang-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487262" comment="gstreamer-utils-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482018" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482019" comment="typelib-1_0-Gst-1_0-1.16.2-1.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51766" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.16.2-lp153.2.114 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.16.2-lp153.2.114 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694753" comment="gstreamer-plugins-bad-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694754" comment="gstreamer-plugins-bad-lang-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694755" comment="libgstadaptivedemux-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694756" comment="libgstbadaudio-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694757" comment="libgstbasecamerabinsrc-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694758" comment="libgstcodecparsers-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694759" comment="libgstisoff-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694760" comment="libgstmpegts-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694761" comment="libgstphotography-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694762" comment="libgstsctp-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694763" comment="libgsturidownloader-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694764" comment="libgstwayland-1_0-0-1.16.2-lp153.2.114 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694765" comment="libgstwebrtc-1_0-0-1.16.2-lp153.2.114 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51767" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.16.2-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.16.2-2.12 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482020" comment="gstreamer-plugins-base-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482021" comment="gstreamer-plugins-base-lang-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482022" comment="libgstallocators-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482023" comment="libgstapp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482024" comment="libgstaudio-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482025" comment="libgstfft-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482026" comment="libgstgl-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482027" comment="libgstpbutils-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482028" comment="libgstriff-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482029" comment="libgstrtp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482030" comment="libgstrtsp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482031" comment="libgstsdp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482032" comment="libgsttag-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482033" comment="libgstvideo-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487286" comment="typelib-1_0-GstAudio-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487288" comment="typelib-1_0-GstPbutils-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487292" comment="typelib-1_0-GstTag-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487293" comment="typelib-1_0-GstVideo-1_0-1.16.2-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51768" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.16.2-1.85 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.16.2-1.85 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482034" comment="gstreamer-plugins-good-1.16.2-1.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694766" comment="gstreamer-plugins-good-gtk-1.16.2-1.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482035" comment="gstreamer-plugins-good-lang-1.16.2-1.85 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51769" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-ugly-1.16.2-1.75 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-ugly-1.16.2-1.75 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489214" comment="gstreamer-plugins-ugly-1.16.2-1.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489215" comment="gstreamer-plugins-ugly-lang-1.16.2-1.75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51770" version="1" class="patch">
	<metadata>
		<title>gtk-vnc-lang-1.0.0-2.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk-vnc-lang-1.0.0-2.35 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694767" comment="gtk-vnc-lang-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482239" comment="libgtk-vnc-2_0-0-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482240" comment="libgvnc-1_0-0-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488509" comment="typelib-1_0-GVnc-1_0-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488511" comment="typelib-1_0-GtkVnc-2_0-1.0.0-2.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51771" version="1" class="patch">
	<metadata>
		<title>gvfs-1.42.2-4.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-12447" ref_url="https://www.suse.com/security/cve/CVE-2019-12447/" source="CVE"/>
		<reference ref_id="CVE-2019-12448" ref_url="https://www.suse.com/security/cve/CVE-2019-12448/" source="CVE"/>
		<reference ref_id="CVE-2019-12449" ref_url="https://www.suse.com/security/cve/CVE-2019-12449/" source="CVE"/>
		<reference ref_id="CVE-2019-12795" ref_url="https://www.suse.com/security/cve/CVE-2019-12795/" source="CVE"/>
		<reference ref_id="CVE-2019-3827" ref_url="https://www.suse.com/security/cve/CVE-2019-3827/" source="CVE"/>
		<description>
These are all security issues fixed in the gvfs-1.42.2-4.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12447/">CVE-2019-12447</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12448/">CVE-2019-12448</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12449/">CVE-2019-12449</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12795/">CVE-2019-12795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3827/">CVE-2019-3827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487297" comment="gvfs-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487298" comment="gvfs-backend-afc-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487299" comment="gvfs-backend-samba-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487300" comment="gvfs-backends-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487302" comment="gvfs-fuse-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487303" comment="gvfs-lang-1.42.2-4.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51772" version="1" class="patch">
	<metadata>
		<title>hplip-hpijs-3.20.11-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-hpijs-3.20.11-2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628514" comment="hplip-hpijs-3.20.11-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628515" comment="hplip-sane-3.20.11-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51773" version="1" class="patch">
	<metadata>
		<title>ibus-1.5.23-1.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-1.5.23-1.56 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629174" comment="ibus-1.5.23-1.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629176" comment="ibus-dict-emoji-1.5.23-1.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629177" comment="ibus-gtk-1.5.23-1.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629178" comment="ibus-gtk3-1.5.23-1.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629179" comment="ibus-lang-1.5.23-1.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629180" comment="libibus-1_0-5-1.5.23-1.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629181" comment="typelib-1_0-IBus-1_0-1.5.23-1.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51774" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.6.1-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.6.1-1.53 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487314" comment="ibus-chewing-1.6.1-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486644" comment="ibus-pinyin-1.5.0-4.37 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51775" version="1" class="patch">
	<metadata>
		<title>iscsiuio-0.7.8.6-30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987/" source="CVE"/>
		<reference ref_id="CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988/" source="CVE"/>
		<reference ref_id="CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437/" source="CVE"/>
		<reference ref_id="CVE-2020-17438" ref_url="https://www.suse.com/security/cve/CVE-2020-17438/" source="CVE"/>
		<description>
These are all security issues fixed in the iscsiuio-0.7.8.6-30.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-17438/">CVE-2020-17438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628520" comment="iscsiuio-0.7.8.6-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628521" comment="libopeniscsiusr0_2_0-2.1.4-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628522" comment="open-iscsi-2.1.4-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51776" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.11.0-3.56.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2972" ref_url="https://www.suse.com/security/cve/CVE-2018-2972/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3150" ref_url="https://www.suse.com/security/cve/CVE-2018-3150/" source="CVE"/>
		<reference ref_id="CVE-2018-3157" ref_url="https://www.suse.com/security/cve/CVE-2018-3157/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818/" source="CVE"/>
		<reference ref_id="CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821/" source="CVE"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.11.0-3.56.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2972/">CVE-2018-2972</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3150/">CVE-2018-3150</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3157/">CVE-2018-3157</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="important" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="important" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="important" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694768" comment="java-11-openjdk-11.0.11.0-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694769" comment="java-11-openjdk-headless-11.0.11.0-3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51777" version="1" class="patch">
	<metadata>
		<title>jq-1.6-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8863" ref_url="https://www.suse.com/security/cve/CVE-2015-8863/" source="CVE"/>
		<reference ref_id="CVE-2016-4074" ref_url="https://www.suse.com/security/cve/CVE-2016-4074/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.6-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8863/">CVE-2015-8863</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4074/">CVE-2016-4074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482049" comment="jq-1.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482051" comment="libjq1-1.6-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51778" version="1" class="patch">
	<metadata>
		<title>kconf_update5-5.76.0-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-14744" ref_url="https://www.suse.com/security/cve/CVE-2019-14744/" source="CVE"/>
		<description>
These are all security issues fixed in the kconf_update5-5.76.0-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14744/">CVE-2019-14744</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694770" comment="kconf_update5-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694771" comment="libKF5ConfigCore5-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694772" comment="libKF5ConfigCore5-lang-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694773" comment="libKF5ConfigGui5-5.76.0-bp153.1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51779" version="1" class="patch">
	<metadata>
		<title>kcoreaddons-5.76.0-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-7966" ref_url="https://www.suse.com/security/cve/CVE-2016-7966/" source="CVE"/>
		<description>
These are all security issues fixed in the kcoreaddons-5.76.0-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-7966/">CVE-2016-7966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694774" comment="kcoreaddons-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694775" comment="kcoreaddons-lang-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694776" comment="libKF5CoreAddons5-5.76.0-bp153.1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51780" version="1" class="patch">
	<metadata>
		<title>kdump-0.9.0-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.9.0-16.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628528" comment="kdump-0.9.0-16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51781" version="1" class="patch">
	<metadata>
		<title>kernel-64kb-5.3.18-57.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-2521" ref_url="https://www.suse.com/security/cve/CVE-2020-2521/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27194" ref_url="https://www.suse.com/security/cve/CVE-2020-27194/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27675" ref_url="https://www.suse.com/security/cve/CVE-2020-27675/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-64kb-5.3.18-57.3 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-2521/">CVE-2020-2521</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27194/">CVE-2020-27194</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27675/">CVE-2020-27675</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628529" comment="kernel-64kb-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694777" comment="kernel-64kb-extra-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694778" comment="kernel-64kb-optional-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628531" comment="kernel-default-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684232" comment="kernel-default-extra-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694779" comment="kernel-default-optional-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694780" comment="kernel-kvmsmall-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628535" comment="kernel-preempt-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684233" comment="kernel-preempt-extra-5.3.18-57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694781" comment="kernel-preempt-optional-5.3.18-57.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51782" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-all-20210208-2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-all-20210208-2.4 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694782" comment="kernel-firmware-all-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694783" comment="kernel-firmware-amdgpu-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694784" comment="kernel-firmware-ath10k-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694785" comment="kernel-firmware-ath11k-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694786" comment="kernel-firmware-atheros-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694787" comment="kernel-firmware-bluetooth-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694788" comment="kernel-firmware-bnx2-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628538" comment="kernel-firmware-brcm-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694789" comment="kernel-firmware-chelsio-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694790" comment="kernel-firmware-dpaa2-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694791" comment="kernel-firmware-i915-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694792" comment="kernel-firmware-intel-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694793" comment="kernel-firmware-iwlwifi-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694794" comment="kernel-firmware-liquidio-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694795" comment="kernel-firmware-marvell-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694796" comment="kernel-firmware-media-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694797" comment="kernel-firmware-mediatek-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694798" comment="kernel-firmware-mellanox-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694799" comment="kernel-firmware-mwifiex-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694800" comment="kernel-firmware-network-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694801" comment="kernel-firmware-nfp-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694802" comment="kernel-firmware-nvidia-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694803" comment="kernel-firmware-platform-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694804" comment="kernel-firmware-prestera-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694805" comment="kernel-firmware-qlogic-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694806" comment="kernel-firmware-radeon-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694807" comment="kernel-firmware-realtek-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694808" comment="kernel-firmware-serial-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694809" comment="kernel-firmware-sound-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694810" comment="kernel-firmware-ti-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694811" comment="kernel-firmware-ueagle-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694812" comment="kernel-firmware-usb-network-20210208-2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628539" comment="ucode-amd-20210208-2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51783" version="1" class="patch">
	<metadata>
		<title>kinit-5.76.0-bp153.1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-3100" ref_url="https://www.suse.com/security/cve/CVE-2016-3100/" source="CVE"/>
		<description>
These are all security issues fixed in the kinit-5.76.0-bp153.1.15 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3100/">CVE-2016-3100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694813" comment="kinit-5.76.0-bp153.1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694814" comment="kinit-lang-5.76.0-bp153.1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51784" version="1" class="patch">
	<metadata>
		<title>kio-extras5-20.04.2-bp153.2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8600" ref_url="https://www.suse.com/security/cve/CVE-2014-8600/" source="CVE"/>
		<description>
These are all security issues fixed in the kio-extras5-20.04.2-bp153.2.12 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8600/">CVE-2014-8600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694815" comment="kio-extras5-20.04.2-bp153.2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694816" comment="kio-extras5-lang-20.04.2-bp153.2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694817" comment="libkioarchive5-20.04.2-bp153.2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51785" version="1" class="patch">
	<metadata>
		<title>konversation-1.7.5-bp153.1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8483" ref_url="https://www.suse.com/security/cve/CVE-2014-8483/" source="CVE"/>
		<reference ref_id="CVE-2017-15923" ref_url="https://www.suse.com/security/cve/CVE-2017-15923/" source="CVE"/>
		<description>
These are all security issues fixed in the konversation-1.7.5-bp153.1.25 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8483/">CVE-2014-8483</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15923/">CVE-2017-15923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694818" comment="konversation-1.7.5-bp153.1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694819" comment="konversation-lang-1.7.5-bp153.1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51786" version="1" class="patch">
	<metadata>
		<title>krb5-1.16.3-3.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.16.3-3.18.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694820" comment="krb5-1.16.3-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694821" comment="krb5-32bit-1.16.3-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51787" version="1" class="patch">
	<metadata>
		<title>kscreenlocker-5.18.5-bp153.1.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-2312" ref_url="https://www.suse.com/security/cve/CVE-2016-2312/" source="CVE"/>
		<description>
These are all security issues fixed in the kscreenlocker-5.18.5-bp153.1.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2312/">CVE-2016-2312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694822" comment="kscreenlocker-5.18.5-bp153.1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694823" comment="kscreenlocker-lang-5.18.5-bp153.1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694824" comment="libKScreenLocker5-5.18.5-bp153.1.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51788" version="1" class="patch">
	<metadata>
		<title>ktexteditor-5.76.0-bp153.1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10361" ref_url="https://www.suse.com/security/cve/CVE-2018-10361/" source="CVE"/>
		<description>
These are all security issues fixed in the ktexteditor-5.76.0-bp153.1.14 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10361/">CVE-2018-10361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694825" comment="ktexteditor-5.76.0-bp153.1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694826" comment="ktexteditor-lang-5.76.0-bp153.1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51789" version="1" class="patch">
	<metadata>
		<title>less-530-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
These are all security issues fixed in the less-530-1.6 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480353" comment="less-530-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51790" version="1" class="patch">
	<metadata>
		<title>libBasicUsageEnvironment1-2019.06.28-bp153.1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-4013" ref_url="https://www.suse.com/security/cve/CVE-2018-4013/" source="CVE"/>
		<reference ref_id="CVE-2019-6256" ref_url="https://www.suse.com/security/cve/CVE-2019-6256/" source="CVE"/>
		<reference ref_id="CVE-2019-7314" ref_url="https://www.suse.com/security/cve/CVE-2019-7314/" source="CVE"/>
		<reference ref_id="CVE-2019-9215" ref_url="https://www.suse.com/security/cve/CVE-2019-9215/" source="CVE"/>
		<description>
These are all security issues fixed in the libBasicUsageEnvironment1-2019.06.28-bp153.1.20 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4013/">CVE-2018-4013</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6256/">CVE-2019-6256</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7314/">CVE-2019-7314</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9215/">CVE-2019-9215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694827" comment="libBasicUsageEnvironment1-2019.06.28-bp153.1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694828" comment="libUsageEnvironment3-2019.06.28-bp153.1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694829" comment="libgroupsock8-2019.06.28-bp153.1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694830" comment="libliveMedia66-2019.06.28-bp153.1.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51791" version="1" class="patch">
	<metadata>
		<title>libFLAC8-1.3.2-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<reference ref_id="CVE-2017-6888" ref_url="https://www.suse.com/security/cve/CVE-2017-6888/" source="CVE"/>
		<reference ref_id="CVE-2020-0487" ref_url="https://www.suse.com/security/cve/CVE-2020-0487/" source="CVE"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC8-1.3.2-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6888/">CVE-2017-6888</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0487/">CVE-2020-0487</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628446" comment="libFLAC8-1.3.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630148" comment="libFLAC8-32bit-1.3.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51792" version="1" class="patch">
	<metadata>
		<title>libHX28-3.22-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.22-1.26 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480358" comment="libHX28-3.22-1.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51793" version="1" class="patch">
	<metadata>
		<title>libICE6-1.0.9-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
These are all security issues fixed in the libICE6-1.0.9-1.25 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480361" comment="libICE6-1.0.9-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51794" version="1" class="patch">
	<metadata>
		<title>libIlmImf-2_2-23-2.2.1-3.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<reference ref_id="CVE-2017-9116" ref_url="https://www.suse.com/security/cve/CVE-2017-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-18444" ref_url="https://www.suse.com/security/cve/CVE-2018-18444/" source="CVE"/>
		<reference ref_id="CVE-2020-11758" ref_url="https://www.suse.com/security/cve/CVE-2020-11758/" source="CVE"/>
		<reference ref_id="CVE-2020-11760" ref_url="https://www.suse.com/security/cve/CVE-2020-11760/" source="CVE"/>
		<reference ref_id="CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761/" source="CVE"/>
		<reference ref_id="CVE-2020-11762" ref_url="https://www.suse.com/security/cve/CVE-2020-11762/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<reference ref_id="CVE-2020-11765" ref_url="https://www.suse.com/security/cve/CVE-2020-11765/" source="CVE"/>
		<reference ref_id="CVE-2020-15304" ref_url="https://www.suse.com/security/cve/CVE-2020-15304/" source="CVE"/>
		<reference ref_id="CVE-2020-15305" ref_url="https://www.suse.com/security/cve/CVE-2020-15305/" source="CVE"/>
		<reference ref_id="CVE-2020-15306" ref_url="https://www.suse.com/security/cve/CVE-2020-15306/" source="CVE"/>
		<reference ref_id="CVE-2020-16587" ref_url="https://www.suse.com/security/cve/CVE-2020-16587/" source="CVE"/>
		<reference ref_id="CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588/" source="CVE"/>
		<reference ref_id="CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589/" source="CVE"/>
		<reference ref_id="CVE-2021-20296" ref_url="https://www.suse.com/security/cve/CVE-2021-20296/" source="CVE"/>
		<reference ref_id="CVE-2021-23215" ref_url="https://www.suse.com/security/cve/CVE-2021-23215/" source="CVE"/>
		<reference ref_id="CVE-2021-26260" ref_url="https://www.suse.com/security/cve/CVE-2021-26260/" source="CVE"/>
		<reference ref_id="CVE-2021-3474" ref_url="https://www.suse.com/security/cve/CVE-2021-3474/" source="CVE"/>
		<reference ref_id="CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="CVE-2021-3477" ref_url="https://www.suse.com/security/cve/CVE-2021-3477/" source="CVE"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-2_2-23-2.2.1-3.27.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9116/">CVE-2017-9116</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18444/">CVE-2018-18444</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11758/">CVE-2020-11758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11760/">CVE-2020-11760</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11762/">CVE-2020-11762</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11765/">CVE-2020-11765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15304/">CVE-2020-15304</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15305/">CVE-2020-15305</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15306/">CVE-2020-15306</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16587/">CVE-2020-16587</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20296/">CVE-2021-20296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23215/">CVE-2021-23215</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26260/">CVE-2021-26260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3474/">CVE-2021-3474</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3477/">CVE-2021-3477</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694831" comment="libIlmImf-2_2-23-2.2.1-3.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51795" version="1" class="patch">
	<metadata>
		<title>libKF5Auth5-5.76.0-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<reference ref_id="CVE-2019-7443" ref_url="https://www.suse.com/security/cve/CVE-2019-7443/" source="CVE"/>
		<description>
These are all security issues fixed in the libKF5Auth5-5.76.0-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7443/">CVE-2019-7443</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694832" comment="libKF5Auth5-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694833" comment="libKF5Auth5-lang-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694834" comment="libKF5AuthCore5-5.76.0-bp153.1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51796" version="1" class="patch">
	<metadata>
		<title>libKF5Codecs5-5.76.0-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<description>
These are all security issues fixed in the libKF5Codecs5-5.76.0-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694835" comment="libKF5Codecs5-5.76.0-bp153.1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694836" comment="libKF5Codecs5-lang-5.76.0-bp153.1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51797" version="1" class="patch">
	<metadata>
		<title>libQt5Concurrent5-5.12.7-4.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570/" source="CVE"/>
		<reference ref_id="CVE-2020-13962" ref_url="https://www.suse.com/security/cve/CVE-2020-13962/" source="CVE"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Concurrent5-5.12.7-4.12.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13962/">CVE-2020-13962</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628554" comment="libQt5Concurrent5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628557" comment="libQt5Core5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628560" comment="libQt5DBus5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628563" comment="libQt5Gui5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628568" comment="libQt5Network5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628571" comment="libQt5OpenGL5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628577" comment="libQt5PrintSupport5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628580" comment="libQt5Sql5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629186" comment="libQt5Sql5-mysql-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628581" comment="libQt5Sql5-sqlite-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628584" comment="libQt5Test5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628587" comment="libQt5Widgets5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628589" comment="libQt5Xml5-5.12.7-4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629189" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51798" version="1" class="patch">
	<metadata>
		<title>libSDL-1_2-0-1.2.15-3.12.73 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL-1_2-0-1.2.15-3.12.73 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629190" comment="libSDL-1_2-0-1.2.15-3.12.73 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51799" version="1" class="patch">
	<metadata>
		<title>libSDL2-2_0-0-2.0.8-9.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-2888" ref_url="https://www.suse.com/security/cve/CVE-2017-2888/" source="CVE"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-13626" ref_url="https://www.suse.com/security/cve/CVE-2019-13626/" source="CVE"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL2-2_0-0-2.0.8-9.63 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2888/">CVE-2017-2888</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13626/">CVE-2019-13626</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487325" comment="libSDL2-2_0-0-2.0.8-9.63 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51800" version="1" class="patch">
	<metadata>
		<title>libSoundTouch0-1.8.0-3.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<description>
These are all security issues fixed in the libSoundTouch0-1.8.0-3.11.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096</cve>
	<cve impact="low" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097</cve>
	<cve impact="low" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486657" comment="libSoundTouch0-1.8.0-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51801" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.5-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.5-3.15.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628593" comment="libX11-6-1.6.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628595" comment="libX11-data-1.6.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628597" comment="libX11-xcb1-1.6.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51802" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.2.0-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.2.0-1.18 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480408" comment="libXRes1-1.2.0-1.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51803" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.15-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.15-1.18 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480411" comment="libXcursor1-1.1.15-1.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51804" version="1" class="patch">
	<metadata>
		<title>libXdmcp6-1.1.2-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the libXdmcp6-1.1.2-1.23 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480413" comment="libXdmcp6-1.1.2-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51805" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.3-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.3-1.30 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480415" comment="libXext6-1.3.3-1.30 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51806" version="1" class="patch">
	<metadata>
		<title>libXfixes3-5.0.3-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-5.0.3-1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480418" comment="libXfixes3-5.0.3-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51807" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.5.4-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.5.4-1.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480421" comment="libXfont1-1.5.4-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51808" version="1" class="patch">
	<metadata>
		<title>libXfont2-2-2.0.3-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont2-2-2.0.3-1.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480422" comment="libXfont2-2-2.0.3-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51809" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.9-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.9-3.2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482117" comment="libXi6-1.7.9-3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51810" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-1.22 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480427" comment="libXinerama1-1.1.3-1.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51811" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.5.1-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.5.1-2.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480431" comment="libXrandr2-1.5.1-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51812" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.10-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.10-1.30 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480433" comment="libXrender1-0.9.10-1.30 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51813" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.5-2.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.5-2.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480436" comment="libXt6-1.1.5-2.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51814" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.3-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.3-1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480438" comment="libXtst6-1.2.3-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51815" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.11-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.11-1.23 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480441" comment="libXv1-1.0.11-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51816" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.10-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.10-1.23 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480443" comment="libXvMC1-1.0.10-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51817" version="1" class="patch">
	<metadata>
		<title>libXvnc1-1.9.0-19.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc1-1.9.0-19.9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628599" comment="libXvnc1-1.9.0-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628600" comment="tigervnc-1.9.0-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628601" comment="xorg-x11-Xvnc-1.9.0-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628602" comment="xorg-x11-Xvnc-module-1.9.0-19.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51818" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.4-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.4-1.23 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480451" comment="libXxf86vm1-1.1.4-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51819" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.6.1-16.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.6.1-16.43 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628284" comment="libapr-util1-1.6.1-16.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51820" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.4.2-2.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2018-1000879" ref_url="https://www.suse.com/security/cve/CVE-2018-1000879/" source="CVE"/>
		<reference ref_id="CVE-2018-1000880" ref_url="https://www.suse.com/security/cve/CVE-2018-1000880/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<reference ref_id="CVE-2019-19221" ref_url="https://www.suse.com/security/cve/CVE-2019-19221/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.4.2-2.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000879/">CVE-2018-1000879</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000880/">CVE-2018-1000880</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19221/">CVE-2019-19221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482125" comment="libarchive13-3.4.2-2.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51821" version="1" class="patch">
	<metadata>
		<title>libass9-0.14.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<reference ref_id="CVE-2020-26682" ref_url="https://www.suse.com/security/cve/CVE-2020-26682/" source="CVE"/>
		<description>
These are all security issues fixed in the libass9-0.14.0-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26682/">CVE-2020-26682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629194" comment="libass9-0.14.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51822" version="1" class="patch">
	<metadata>
		<title>libaudit1-2.8.5-3.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<description>
These are all security issues fixed in the libaudit1-2.8.5-3.43 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628286" comment="libaudit1-2.8.5-3.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628287" comment="libaudit1-32bit-2.8.5-3.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628288" comment="libauparse0-2.8.5-3.43 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51823" version="1" class="patch">
	<metadata>
		<title>libavcodec57-3.4.2-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8216" ref_url="https://www.suse.com/security/cve/CVE-2015-8216/" source="CVE"/>
		<reference ref_id="CVE-2015-8217" ref_url="https://www.suse.com/security/cve/CVE-2015-8217/" source="CVE"/>
		<reference ref_id="CVE-2015-8218" ref_url="https://www.suse.com/security/cve/CVE-2015-8218/" source="CVE"/>
		<reference ref_id="CVE-2015-8219" ref_url="https://www.suse.com/security/cve/CVE-2015-8219/" source="CVE"/>
		<reference ref_id="CVE-2015-8363" ref_url="https://www.suse.com/security/cve/CVE-2015-8363/" source="CVE"/>
		<reference ref_id="CVE-2015-8364" ref_url="https://www.suse.com/security/cve/CVE-2015-8364/" source="CVE"/>
		<reference ref_id="CVE-2015-8365" ref_url="https://www.suse.com/security/cve/CVE-2015-8365/" source="CVE"/>
		<reference ref_id="CVE-2015-8661" ref_url="https://www.suse.com/security/cve/CVE-2015-8661/" source="CVE"/>
		<reference ref_id="CVE-2015-8662" ref_url="https://www.suse.com/security/cve/CVE-2015-8662/" source="CVE"/>
		<reference ref_id="CVE-2015-8663" ref_url="https://www.suse.com/security/cve/CVE-2015-8663/" source="CVE"/>
		<reference ref_id="CVE-2016-10190" ref_url="https://www.suse.com/security/cve/CVE-2016-10190/" source="CVE"/>
		<reference ref_id="CVE-2016-10191" ref_url="https://www.suse.com/security/cve/CVE-2016-10191/" source="CVE"/>
		<reference ref_id="CVE-2016-10192" ref_url="https://www.suse.com/security/cve/CVE-2016-10192/" source="CVE"/>
		<reference ref_id="CVE-2016-1897" ref_url="https://www.suse.com/security/cve/CVE-2016-1897/" source="CVE"/>
		<reference ref_id="CVE-2016-1898" ref_url="https://www.suse.com/security/cve/CVE-2016-1898/" source="CVE"/>
		<reference ref_id="CVE-2017-11399" ref_url="https://www.suse.com/security/cve/CVE-2017-11399/" source="CVE"/>
		<reference ref_id="CVE-2017-11665" ref_url="https://www.suse.com/security/cve/CVE-2017-11665/" source="CVE"/>
		<reference ref_id="CVE-2017-14054" ref_url="https://www.suse.com/security/cve/CVE-2017-14054/" source="CVE"/>
		<reference ref_id="CVE-2017-14055" ref_url="https://www.suse.com/security/cve/CVE-2017-14055/" source="CVE"/>
		<reference ref_id="CVE-2017-14056" ref_url="https://www.suse.com/security/cve/CVE-2017-14056/" source="CVE"/>
		<reference ref_id="CVE-2017-14057" ref_url="https://www.suse.com/security/cve/CVE-2017-14057/" source="CVE"/>
		<reference ref_id="CVE-2017-14058" ref_url="https://www.suse.com/security/cve/CVE-2017-14058/" source="CVE"/>
		<reference ref_id="CVE-2017-14059" ref_url="https://www.suse.com/security/cve/CVE-2017-14059/" source="CVE"/>
		<reference ref_id="CVE-2017-14169" ref_url="https://www.suse.com/security/cve/CVE-2017-14169/" source="CVE"/>
		<reference ref_id="CVE-2017-14170" ref_url="https://www.suse.com/security/cve/CVE-2017-14170/" source="CVE"/>
		<reference ref_id="CVE-2017-14171" ref_url="https://www.suse.com/security/cve/CVE-2017-14171/" source="CVE"/>
		<reference ref_id="CVE-2017-14222" ref_url="https://www.suse.com/security/cve/CVE-2017-14222/" source="CVE"/>
		<reference ref_id="CVE-2017-14223" ref_url="https://www.suse.com/security/cve/CVE-2017-14223/" source="CVE"/>
		<reference ref_id="CVE-2017-14225" ref_url="https://www.suse.com/security/cve/CVE-2017-14225/" source="CVE"/>
		<reference ref_id="CVE-2017-15186" ref_url="https://www.suse.com/security/cve/CVE-2017-15186/" source="CVE"/>
		<reference ref_id="CVE-2017-15672" ref_url="https://www.suse.com/security/cve/CVE-2017-15672/" source="CVE"/>
		<reference ref_id="CVE-2017-16840" ref_url="https://www.suse.com/security/cve/CVE-2017-16840/" source="CVE"/>
		<reference ref_id="CVE-2017-17081" ref_url="https://www.suse.com/security/cve/CVE-2017-17081/" source="CVE"/>
		<reference ref_id="CVE-2017-17555" ref_url="https://www.suse.com/security/cve/CVE-2017-17555/" source="CVE"/>
		<reference ref_id="CVE-2017-7859" ref_url="https://www.suse.com/security/cve/CVE-2017-7859/" source="CVE"/>
		<reference ref_id="CVE-2017-7862" ref_url="https://www.suse.com/security/cve/CVE-2017-7862/" source="CVE"/>
		<reference ref_id="CVE-2017-7863" ref_url="https://www.suse.com/security/cve/CVE-2017-7863/" source="CVE"/>
		<reference ref_id="CVE-2017-7865" ref_url="https://www.suse.com/security/cve/CVE-2017-7865/" source="CVE"/>
		<reference ref_id="CVE-2017-7866" ref_url="https://www.suse.com/security/cve/CVE-2017-7866/" source="CVE"/>
		<reference ref_id="CVE-2018-12458" ref_url="https://www.suse.com/security/cve/CVE-2018-12458/" source="CVE"/>
		<reference ref_id="CVE-2018-13300" ref_url="https://www.suse.com/security/cve/CVE-2018-13300/" source="CVE"/>
		<reference ref_id="CVE-2018-13301" ref_url="https://www.suse.com/security/cve/CVE-2018-13301/" source="CVE"/>
		<reference ref_id="CVE-2018-13302" ref_url="https://www.suse.com/security/cve/CVE-2018-13302/" source="CVE"/>
		<reference ref_id="CVE-2018-13305" ref_url="https://www.suse.com/security/cve/CVE-2018-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-14394" ref_url="https://www.suse.com/security/cve/CVE-2018-14394/" source="CVE"/>
		<reference ref_id="CVE-2018-14395" ref_url="https://www.suse.com/security/cve/CVE-2018-14395/" source="CVE"/>
		<reference ref_id="CVE-2018-15822" ref_url="https://www.suse.com/security/cve/CVE-2018-15822/" source="CVE"/>
		<reference ref_id="CVE-2018-1999010" ref_url="https://www.suse.com/security/cve/CVE-2018-1999010/" source="CVE"/>
		<reference ref_id="CVE-2018-1999011" ref_url="https://www.suse.com/security/cve/CVE-2018-1999011/" source="CVE"/>
		<reference ref_id="CVE-2018-1999012" ref_url="https://www.suse.com/security/cve/CVE-2018-1999012/" source="CVE"/>
		<reference ref_id="CVE-2018-1999013" ref_url="https://www.suse.com/security/cve/CVE-2018-1999013/" source="CVE"/>
		<reference ref_id="CVE-2018-6392" ref_url="https://www.suse.com/security/cve/CVE-2018-6392/" source="CVE"/>
		<reference ref_id="CVE-2018-6621" ref_url="https://www.suse.com/security/cve/CVE-2018-6621/" source="CVE"/>
		<reference ref_id="CVE-2019-12730" ref_url="https://www.suse.com/security/cve/CVE-2019-12730/" source="CVE"/>
		<reference ref_id="CVE-2019-17542" ref_url="https://www.suse.com/security/cve/CVE-2019-17542/" source="CVE"/>
		<reference ref_id="CVE-2019-9718" ref_url="https://www.suse.com/security/cve/CVE-2019-9718/" source="CVE"/>
		<description>
These are all security issues fixed in the libavcodec57-3.4.2-9.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8216/">CVE-2015-8216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8217/">CVE-2015-8217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8218/">CVE-2015-8218</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8219/">CVE-2015-8219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8363/">CVE-2015-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8364/">CVE-2015-8364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8365/">CVE-2015-8365</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8661/">CVE-2015-8661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8662/">CVE-2015-8662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8663/">CVE-2015-8663</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10190/">CVE-2016-10190</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10191/">CVE-2016-10191</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10192/">CVE-2016-10192</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1897/">CVE-2016-1897</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1898/">CVE-2016-1898</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11399/">CVE-2017-11399</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11665/">CVE-2017-11665</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14054/">CVE-2017-14054</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14055/">CVE-2017-14055</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14056/">CVE-2017-14056</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14057/">CVE-2017-14057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14058/">CVE-2017-14058</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14059/">CVE-2017-14059</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14169/">CVE-2017-14169</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14170/">CVE-2017-14170</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14171/">CVE-2017-14171</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14222/">CVE-2017-14222</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14223/">CVE-2017-14223</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14225/">CVE-2017-14225</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15186/">CVE-2017-15186</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15672/">CVE-2017-15672</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16840/">CVE-2017-16840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17081/">CVE-2017-17081</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17555/">CVE-2017-17555</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7859/">CVE-2017-7859</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7862/">CVE-2017-7862</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7863/">CVE-2017-7863</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7865/">CVE-2017-7865</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7866/">CVE-2017-7866</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12458/">CVE-2018-12458</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13300/">CVE-2018-13300</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13301/">CVE-2018-13301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13302/">CVE-2018-13302</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13305/">CVE-2018-13305</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14394/">CVE-2018-14394</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14395/">CVE-2018-14395</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15822/">CVE-2018-15822</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999010/">CVE-2018-1999010</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999011/">CVE-2018-1999011</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999012/">CVE-2018-1999012</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999013/">CVE-2018-1999013</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6392/">CVE-2018-6392</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6621/">CVE-2018-6621</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12730/">CVE-2019-12730</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17542/">CVE-2019-17542</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9718/">CVE-2019-9718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487328" comment="libavcodec57-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487329" comment="libavformat57-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487331" comment="libavutil55-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487335" comment="libswresample2-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487337" comment="libswscale4-3.4.2-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51824" version="1" class="patch">
	<metadata>
		<title>libavcodec58_134-4.4-bp153.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8216" ref_url="https://www.suse.com/security/cve/CVE-2015-8216/" source="CVE"/>
		<reference ref_id="CVE-2015-8217" ref_url="https://www.suse.com/security/cve/CVE-2015-8217/" source="CVE"/>
		<reference ref_id="CVE-2015-8218" ref_url="https://www.suse.com/security/cve/CVE-2015-8218/" source="CVE"/>
		<reference ref_id="CVE-2015-8219" ref_url="https://www.suse.com/security/cve/CVE-2015-8219/" source="CVE"/>
		<reference ref_id="CVE-2015-8363" ref_url="https://www.suse.com/security/cve/CVE-2015-8363/" source="CVE"/>
		<reference ref_id="CVE-2015-8364" ref_url="https://www.suse.com/security/cve/CVE-2015-8364/" source="CVE"/>
		<reference ref_id="CVE-2015-8365" ref_url="https://www.suse.com/security/cve/CVE-2015-8365/" source="CVE"/>
		<reference ref_id="CVE-2015-8661" ref_url="https://www.suse.com/security/cve/CVE-2015-8661/" source="CVE"/>
		<reference ref_id="CVE-2015-8662" ref_url="https://www.suse.com/security/cve/CVE-2015-8662/" source="CVE"/>
		<reference ref_id="CVE-2015-8663" ref_url="https://www.suse.com/security/cve/CVE-2015-8663/" source="CVE"/>
		<reference ref_id="CVE-2016-10190" ref_url="https://www.suse.com/security/cve/CVE-2016-10190/" source="CVE"/>
		<reference ref_id="CVE-2016-10191" ref_url="https://www.suse.com/security/cve/CVE-2016-10191/" source="CVE"/>
		<reference ref_id="CVE-2016-10192" ref_url="https://www.suse.com/security/cve/CVE-2016-10192/" source="CVE"/>
		<reference ref_id="CVE-2016-1897" ref_url="https://www.suse.com/security/cve/CVE-2016-1897/" source="CVE"/>
		<reference ref_id="CVE-2016-1898" ref_url="https://www.suse.com/security/cve/CVE-2016-1898/" source="CVE"/>
		<reference ref_id="CVE-2017-11399" ref_url="https://www.suse.com/security/cve/CVE-2017-11399/" source="CVE"/>
		<reference ref_id="CVE-2017-11665" ref_url="https://www.suse.com/security/cve/CVE-2017-11665/" source="CVE"/>
		<reference ref_id="CVE-2017-14054" ref_url="https://www.suse.com/security/cve/CVE-2017-14054/" source="CVE"/>
		<reference ref_id="CVE-2017-14055" ref_url="https://www.suse.com/security/cve/CVE-2017-14055/" source="CVE"/>
		<reference ref_id="CVE-2017-14056" ref_url="https://www.suse.com/security/cve/CVE-2017-14056/" source="CVE"/>
		<reference ref_id="CVE-2017-14057" ref_url="https://www.suse.com/security/cve/CVE-2017-14057/" source="CVE"/>
		<reference ref_id="CVE-2017-14058" ref_url="https://www.suse.com/security/cve/CVE-2017-14058/" source="CVE"/>
		<reference ref_id="CVE-2017-14059" ref_url="https://www.suse.com/security/cve/CVE-2017-14059/" source="CVE"/>
		<reference ref_id="CVE-2017-14169" ref_url="https://www.suse.com/security/cve/CVE-2017-14169/" source="CVE"/>
		<reference ref_id="CVE-2017-14170" ref_url="https://www.suse.com/security/cve/CVE-2017-14170/" source="CVE"/>
		<reference ref_id="CVE-2017-14171" ref_url="https://www.suse.com/security/cve/CVE-2017-14171/" source="CVE"/>
		<reference ref_id="CVE-2017-14222" ref_url="https://www.suse.com/security/cve/CVE-2017-14222/" source="CVE"/>
		<reference ref_id="CVE-2017-14223" ref_url="https://www.suse.com/security/cve/CVE-2017-14223/" source="CVE"/>
		<reference ref_id="CVE-2017-14225" ref_url="https://www.suse.com/security/cve/CVE-2017-14225/" source="CVE"/>
		<reference ref_id="CVE-2017-15186" ref_url="https://www.suse.com/security/cve/CVE-2017-15186/" source="CVE"/>
		<reference ref_id="CVE-2017-15672" ref_url="https://www.suse.com/security/cve/CVE-2017-15672/" source="CVE"/>
		<reference ref_id="CVE-2017-16840" ref_url="https://www.suse.com/security/cve/CVE-2017-16840/" source="CVE"/>
		<reference ref_id="CVE-2017-17081" ref_url="https://www.suse.com/security/cve/CVE-2017-17081/" source="CVE"/>
		<reference ref_id="CVE-2017-17555" ref_url="https://www.suse.com/security/cve/CVE-2017-17555/" source="CVE"/>
		<reference ref_id="CVE-2017-7859" ref_url="https://www.suse.com/security/cve/CVE-2017-7859/" source="CVE"/>
		<reference ref_id="CVE-2017-7862" ref_url="https://www.suse.com/security/cve/CVE-2017-7862/" source="CVE"/>
		<reference ref_id="CVE-2017-7863" ref_url="https://www.suse.com/security/cve/CVE-2017-7863/" source="CVE"/>
		<reference ref_id="CVE-2017-7865" ref_url="https://www.suse.com/security/cve/CVE-2017-7865/" source="CVE"/>
		<reference ref_id="CVE-2017-7866" ref_url="https://www.suse.com/security/cve/CVE-2017-7866/" source="CVE"/>
		<reference ref_id="CVE-2018-13300" ref_url="https://www.suse.com/security/cve/CVE-2018-13300/" source="CVE"/>
		<reference ref_id="CVE-2018-13305" ref_url="https://www.suse.com/security/cve/CVE-2018-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-15822" ref_url="https://www.suse.com/security/cve/CVE-2018-15822/" source="CVE"/>
		<reference ref_id="CVE-2018-6392" ref_url="https://www.suse.com/security/cve/CVE-2018-6392/" source="CVE"/>
		<reference ref_id="CVE-2018-6621" ref_url="https://www.suse.com/security/cve/CVE-2018-6621/" source="CVE"/>
		<reference ref_id="CVE-2018-7751" ref_url="https://www.suse.com/security/cve/CVE-2018-7751/" source="CVE"/>
		<reference ref_id="CVE-2019-11338" ref_url="https://www.suse.com/security/cve/CVE-2019-11338/" source="CVE"/>
		<reference ref_id="CVE-2019-11339" ref_url="https://www.suse.com/security/cve/CVE-2019-11339/" source="CVE"/>
		<reference ref_id="CVE-2019-15942" ref_url="https://www.suse.com/security/cve/CVE-2019-15942/" source="CVE"/>
		<reference ref_id="CVE-2020-35964" ref_url="https://www.suse.com/security/cve/CVE-2020-35964/" source="CVE"/>
		<description>
These are all security issues fixed in the libavcodec58_134-4.4-bp153.1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8216/">CVE-2015-8216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8217/">CVE-2015-8217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8218/">CVE-2015-8218</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8219/">CVE-2015-8219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8363/">CVE-2015-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8364/">CVE-2015-8364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8365/">CVE-2015-8365</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8661/">CVE-2015-8661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8662/">CVE-2015-8662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8663/">CVE-2015-8663</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10190/">CVE-2016-10190</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10191/">CVE-2016-10191</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10192/">CVE-2016-10192</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1897/">CVE-2016-1897</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-1898/">CVE-2016-1898</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11399/">CVE-2017-11399</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11665/">CVE-2017-11665</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14054/">CVE-2017-14054</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14055/">CVE-2017-14055</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14056/">CVE-2017-14056</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14057/">CVE-2017-14057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14058/">CVE-2017-14058</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14059/">CVE-2017-14059</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14169/">CVE-2017-14169</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14170/">CVE-2017-14170</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14171/">CVE-2017-14171</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14222/">CVE-2017-14222</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14223/">CVE-2017-14223</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14225/">CVE-2017-14225</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15186/">CVE-2017-15186</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15672/">CVE-2017-15672</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16840/">CVE-2017-16840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17081/">CVE-2017-17081</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17555/">CVE-2017-17555</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7859/">CVE-2017-7859</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7862/">CVE-2017-7862</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7863/">CVE-2017-7863</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7865/">CVE-2017-7865</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7866/">CVE-2017-7866</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13300/">CVE-2018-13300</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13305/">CVE-2018-13305</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15822/">CVE-2018-15822</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6392/">CVE-2018-6392</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6621/">CVE-2018-6621</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7751/">CVE-2018-7751</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11338/">CVE-2019-11338</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11339/">CVE-2019-11339</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15942/">CVE-2019-15942</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35964/">CVE-2020-35964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694837" comment="libavcodec58_134-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694838" comment="libavdevice58_13-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694839" comment="libavfilter7_110-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694840" comment="libavformat58_76-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694841" comment="libavresample4_0-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694842" comment="libavutil56_70-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694843" comment="libpostproc55_9-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694844" comment="libswresample3_9-4.4-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694845" comment="libswscale5_9-4.4-bp153.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51825" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.36.2-2.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.36.2-2.29 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779</cve>
	<cve impact="low" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628636" comment="libblkid1-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628637" comment="libblkid1-32bit-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628639" comment="libfdisk1-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628641" comment="libmount1-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628642" comment="libmount1-32bit-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628644" comment="libsmartcols1-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628647" comment="libuuid1-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628648" comment="libuuid1-32bit-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628649" comment="util-linux-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628650" comment="util-linux-lang-2.36.2-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628651" comment="util-linux-systemd-2.36.2-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51826" version="1" class="patch">
	<metadata>
		<title>libbsd0-0.8.7-3.3.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-20367" ref_url="https://www.suse.com/security/cve/CVE-2019-20367/" source="CVE"/>
		<description>
These are all security issues fixed in the libbsd0-0.8.7-3.3.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20367/">CVE-2019-20367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482145" comment="libbsd0-0.8.7-3.3.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51827" version="1" class="patch">
	<metadata>
		<title>libcaca0-0.99.beta19.git20171003-9.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-20544" ref_url="https://www.suse.com/security/cve/CVE-2018-20544/" source="CVE"/>
		<reference ref_id="CVE-2018-20545" ref_url="https://www.suse.com/security/cve/CVE-2018-20545/" source="CVE"/>
		<reference ref_id="CVE-2018-20546" ref_url="https://www.suse.com/security/cve/CVE-2018-20546/" source="CVE"/>
		<reference ref_id="CVE-2018-20547" ref_url="https://www.suse.com/security/cve/CVE-2018-20547/" source="CVE"/>
		<reference ref_id="CVE-2018-20548" ref_url="https://www.suse.com/security/cve/CVE-2018-20548/" source="CVE"/>
		<reference ref_id="CVE-2018-20549" ref_url="https://www.suse.com/security/cve/CVE-2018-20549/" source="CVE"/>
		<description>
These are all security issues fixed in the libcaca0-0.99.beta19.git20171003-9.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20544/">CVE-2018-20544</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20545/">CVE-2018-20545</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20546/">CVE-2018-20546</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20547/">CVE-2018-20547</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20548/">CVE-2018-20548</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20549/">CVE-2018-20549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482147" comment="libcaca0-0.99.beta19.git20171003-9.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51828" version="1" class="patch">
	<metadata>
		<title>libcacard0-2.5.3-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<description>
These are all security issues fixed in the libcacard0-2.5.3-1.27 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488173" comment="libcacard0-2.5.3-1.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51829" version="1" class="patch">
	<metadata>
		<title>libcairo-gobject2-1.16.0-1.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
These are all security issues fixed in the libcairo-gobject2-1.16.0-1.55 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481781" comment="libcairo-gobject2-1.16.0-1.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481783" comment="libcairo2-1.16.0-1.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51830" version="1" class="patch">
	<metadata>
		<title>libcares2-1.17.0-3.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<description>
These are all security issues fixed in the libcares2-1.17.0-3.11.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628330" comment="libcares2-1.17.0-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51831" version="1" class="patch">
	<metadata>
		<title>libcdio16-0.94-6.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<description>
These are all security issues fixed in the libcdio16-0.94-6.9.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487341" comment="libcdio16-0.94-6.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51832" version="1" class="patch">
	<metadata>
		<title>libcdio19-2.1.0-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-18198" ref_url="https://www.suse.com/security/cve/CVE-2017-18198/" source="CVE"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<description>
These are all security issues fixed in the libcdio19-2.1.0-1.27 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18198/">CVE-2017-18198</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629197" comment="libcdio19-2.1.0-1.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51833" version="1" class="patch">
	<metadata>
		<title>libcfitsio6-3.440-bp153.1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1000166" ref_url="https://www.suse.com/security/cve/CVE-2018-1000166/" source="CVE"/>
		<description>
These are all security issues fixed in the libcfitsio6-3.440-bp153.1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000166/">CVE-2018-1000166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694846" comment="libcfitsio6-3.440-bp153.1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51834" version="1" class="patch">
	<metadata>
		<title>libcroco-0_6-3-0.6.13-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<description>
These are all security issues fixed in the libcroco-0_6-3-0.6.13-1.26 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482151" comment="libcroco-0_6-3-0.6.13-1.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51835" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.13.4+git.187.5ad4708741a-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="CVE-2018-10918" ref_url="https://www.suse.com/security/cve/CVE-2018-10918/" source="CVE"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<reference ref_id="CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2018-14629" ref_url="https://www.suse.com/security/cve/CVE-2018-14629/" source="CVE"/>
		<reference ref_id="CVE-2018-16841" ref_url="https://www.suse.com/security/cve/CVE-2018-16841/" source="CVE"/>
		<reference ref_id="CVE-2018-16851" ref_url="https://www.suse.com/security/cve/CVE-2018-16851/" source="CVE"/>
		<reference ref_id="CVE-2018-16852" ref_url="https://www.suse.com/security/cve/CVE-2018-16852/" source="CVE"/>
		<reference ref_id="CVE-2018-16853" ref_url="https://www.suse.com/security/cve/CVE-2018-16853/" source="CVE"/>
		<reference ref_id="CVE-2018-16857" ref_url="https://www.suse.com/security/cve/CVE-2018-16857/" source="CVE"/>
		<reference ref_id="CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860/" source="CVE"/>
		<reference ref_id="CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197/" source="CVE"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="CVE-2019-12435" ref_url="https://www.suse.com/security/cve/CVE-2019-12435/" source="CVE"/>
		<reference ref_id="CVE-2019-12436" ref_url="https://www.suse.com/security/cve/CVE-2019-12436/" source="CVE"/>
		<reference ref_id="CVE-2019-14833" ref_url="https://www.suse.com/security/cve/CVE-2019-14833/" source="CVE"/>
		<reference ref_id="CVE-2019-14847" ref_url="https://www.suse.com/security/cve/CVE-2019-14847/" source="CVE"/>
		<reference ref_id="CVE-2019-14861" ref_url="https://www.suse.com/security/cve/CVE-2019-14861/" source="CVE"/>
		<reference ref_id="CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870/" source="CVE"/>
		<reference ref_id="CVE-2019-14902" ref_url="https://www.suse.com/security/cve/CVE-2019-14902/" source="CVE"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="CVE-2019-19344" ref_url="https://www.suse.com/security/cve/CVE-2019-19344/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2019-3870" ref_url="https://www.suse.com/security/cve/CVE-2019-3870/" source="CVE"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760/" source="CVE"/>
		<reference ref_id="CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303/" source="CVE"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.13.4+git.187.5ad4708741a-1.34 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10918/">CVE-2018-10918</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14629/">CVE-2018-14629</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16841/">CVE-2018-16841</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16851/">CVE-2018-16851</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16852/">CVE-2018-16852</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16853/">CVE-2018-16853</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16857/">CVE-2018-16857</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12435/">CVE-2019-12435</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12436/">CVE-2019-12436</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14833/">CVE-2019-14833</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14847/">CVE-2019-14847</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14861/">CVE-2019-14861</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14902/">CVE-2019-14902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19344/">CVE-2019-19344</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3870/">CVE-2019-3870</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628655" comment="libdcerpc-binding0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628656" comment="libdcerpc-binding0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628660" comment="libdcerpc0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628661" comment="libdcerpc0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628664" comment="libndr-krb5pac0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628665" comment="libndr-krb5pac0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628667" comment="libndr-nbt0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628668" comment="libndr-nbt0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628670" comment="libndr-standard0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628671" comment="libndr-standard0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628672" comment="libndr1-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628673" comment="libndr1-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628675" comment="libnetapi0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628676" comment="libnetapi0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628678" comment="libsamba-credentials0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628679" comment="libsamba-credentials0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628681" comment="libsamba-errors0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628682" comment="libsamba-errors0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628684" comment="libsamba-hostconfig0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628685" comment="libsamba-hostconfig0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628687" comment="libsamba-passdb0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628688" comment="libsamba-passdb0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628691" comment="libsamba-policy0-python3-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628693" comment="libsamba-util0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628694" comment="libsamba-util0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628696" comment="libsamdb0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628697" comment="libsamdb0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628699" comment="libsmbclient0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628701" comment="libsmbconf0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628702" comment="libsmbconf0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628704" comment="libsmbldap2-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628705" comment="libsmbldap2-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628707" comment="libtevent-util0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628708" comment="libtevent-util0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628710" comment="libwbclient0-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628711" comment="libwbclient0-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628712" comment="samba-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628714" comment="samba-client-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694847" comment="samba-client-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628717" comment="samba-libs-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628718" comment="samba-libs-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628719" comment="samba-libs-python3-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628720" comment="samba-python3-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628721" comment="samba-winbind-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628722" comment="samba-winbind-32bit-4.13.4+git.187.5ad4708741a-1.34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51836" version="1" class="patch">
	<metadata>
		<title>libdjvulibre21-3.5.27-9.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<description>
These are all security issues fixed in the libdjvulibre21-3.5.27-9.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487345" comment="libdjvulibre21-3.5.27-9.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51837" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-1.23 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480524" comment="libdmx1-1.1.3-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51838" version="1" class="patch">
	<metadata>
		<title>libebml5-1.4.2-bp153.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-3405" ref_url="https://www.suse.com/security/cve/CVE-2021-3405/" source="CVE"/>
		<description>
These are all security issues fixed in the libebml5-1.4.2-bp153.1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3405/">CVE-2021-3405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694848" comment="libebml5-1.4.2-bp153.1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51839" version="1" class="patch">
	<metadata>
		<title>libekmfweb1-2.15.1-6.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-25316" ref_url="https://www.suse.com/security/cve/CVE-2021-25316/" source="CVE"/>
		<description>
These are all security issues fixed in the libekmfweb1-2.15.1-6.7 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25316/">CVE-2021-25316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628723" comment="libekmfweb1-2.15.1-6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628726" comment="s390-tools-2.15.1-6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51840" version="1" class="patch">
	<metadata>
		<title>libevent-2_1-8-2.1.8-2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_1-8-2.1.8-2.23 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480525" comment="libevent-2_1-8-2.1.8-2.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51841" version="1" class="patch">
	<metadata>
		<title>libexempi3-2.4.5-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-12648" ref_url="https://www.suse.com/security/cve/CVE-2018-12648/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7729" ref_url="https://www.suse.com/security/cve/CVE-2018-7729/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="CVE-2018-7731" ref_url="https://www.suse.com/security/cve/CVE-2018-7731/" source="CVE"/>
		<description>
These are all security issues fixed in the libexempi3-2.4.5-3.3.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12648/">CVE-2018-12648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7729/">CVE-2018-7729</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7731/">CVE-2018-7731</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487347" comment="libexempi3-2.4.5-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51842" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.22-5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.22-5.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629201" comment="libexif12-0.6.22-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51843" version="1" class="patch">
	<metadata>
		<title>libexiv2-26-0.26-6.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9449" ref_url="https://www.suse.com/security/cve/CVE-2014-9449/" source="CVE"/>
		<reference ref_id="CVE-2017-1000126" ref_url="https://www.suse.com/security/cve/CVE-2017-1000126/" source="CVE"/>
		<reference ref_id="CVE-2017-11337" ref_url="https://www.suse.com/security/cve/CVE-2017-11337/" source="CVE"/>
		<reference ref_id="CVE-2017-11338" ref_url="https://www.suse.com/security/cve/CVE-2017-11338/" source="CVE"/>
		<reference ref_id="CVE-2017-11339" ref_url="https://www.suse.com/security/cve/CVE-2017-11339/" source="CVE"/>
		<reference ref_id="CVE-2017-11340" ref_url="https://www.suse.com/security/cve/CVE-2017-11340/" source="CVE"/>
		<reference ref_id="CVE-2017-11553" ref_url="https://www.suse.com/security/cve/CVE-2017-11553/" source="CVE"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-11592" ref_url="https://www.suse.com/security/cve/CVE-2017-11592/" source="CVE"/>
		<reference ref_id="CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683/" source="CVE"/>
		<reference ref_id="CVE-2017-12955" ref_url="https://www.suse.com/security/cve/CVE-2017-12955/" source="CVE"/>
		<reference ref_id="CVE-2017-12956" ref_url="https://www.suse.com/security/cve/CVE-2017-12956/" source="CVE"/>
		<reference ref_id="CVE-2017-12957" ref_url="https://www.suse.com/security/cve/CVE-2017-12957/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14860" ref_url="https://www.suse.com/security/cve/CVE-2017-14860/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2017-9239" ref_url="https://www.suse.com/security/cve/CVE-2017-9239/" source="CVE"/>
		<reference ref_id="CVE-2018-12264" ref_url="https://www.suse.com/security/cve/CVE-2018-12264/" source="CVE"/>
		<reference ref_id="CVE-2018-12265" ref_url="https://www.suse.com/security/cve/CVE-2018-12265/" source="CVE"/>
		<reference ref_id="CVE-2018-17229" ref_url="https://www.suse.com/security/cve/CVE-2018-17229/" source="CVE"/>
		<reference ref_id="CVE-2018-17230" ref_url="https://www.suse.com/security/cve/CVE-2018-17230/" source="CVE"/>
		<reference ref_id="CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282/" source="CVE"/>
		<reference ref_id="CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108/" source="CVE"/>
		<reference ref_id="CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607/" source="CVE"/>
		<reference ref_id="CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305/" source="CVE"/>
		<reference ref_id="CVE-2019-13114" ref_url="https://www.suse.com/security/cve/CVE-2019-13114/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-26-0.26-6.8.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9449/">CVE-2014-9449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000126/">CVE-2017-1000126</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11337/">CVE-2017-11337</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11338/">CVE-2017-11338</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11339/">CVE-2017-11339</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11340/">CVE-2017-11340</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11553/">CVE-2017-11553</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11592/">CVE-2017-11592</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683</cve>
	<cve impact="low" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12955/">CVE-2017-12955</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12956/">CVE-2017-12956</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12957/">CVE-2017-12957</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14860/">CVE-2017-14860</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9239/">CVE-2017-9239</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12264/">CVE-2018-12264</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12265/">CVE-2018-12265</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17229/">CVE-2018-17229</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17230/">CVE-2018-17230</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13114/">CVE-2019-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487350" comment="libexiv2-26-0.26-6.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51844" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.53.1-3.51.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.53.1-3.51.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628729" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629829" comment="libfreebl3-hmac-3.53.1-3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628731" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629830" comment="libsoftokn3-hmac-3.53.1-3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628733" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628735" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51845" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.10.1-4.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.10.1-4.8.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628448" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628449" comment="libfreetype6-32bit-2.10.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51846" version="1" class="patch">
	<metadata>
		<title>libgadu3-1.12.2-1.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu3-1.12.2-1.44 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694849" comment="libgadu3-1.12.2-bp153.1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51847" version="1" class="patch">
	<metadata>
		<title>libgc1-7.6.4-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.6.4-1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480250" comment="libgc1-7.6.4-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51848" version="1" class="patch">
	<metadata>
		<title>libgcc_s1-10.2.1+git583-1.3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcc_s1-10.2.1+git583-1.3.4 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628610" comment="libgcc_s1-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628611" comment="libgcc_s1-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628616" comment="libgomp1-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628621" comment="libobjc4-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628623" comment="libquadmath0-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628625" comment="libstdc++6-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628626" comment="libstdc++6-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628629" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628630" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51849" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.8.2-8.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-5738" ref_url="https://www.suse.com/security/cve/CVE-2015-5738/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379/" source="CVE"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904/" source="CVE"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.8.2-8.36.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5738/">CVE-2015-5738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482233" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482234" comment="libgcrypt20-32bit-1.8.2-8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51850" version="1" class="patch">
	<metadata>
		<title>libgd3-2.2.5-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
These are all security issues fixed in the libgd3-2.2.5-9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482237" comment="libgd3-2.2.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51851" version="1" class="patch">
	<metadata>
		<title>libgif7-5.1.4-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the libgif7-5.1.4-4.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628463" comment="libgif7-5.1.4-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51852" version="1" class="patch">
	<metadata>
		<title>libgit2-28-0.28.4-1.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2016-10128" ref_url="https://www.suse.com/security/cve/CVE-2016-10128/" source="CVE"/>
		<reference ref_id="CVE-2016-10129" ref_url="https://www.suse.com/security/cve/CVE-2016-10129/" source="CVE"/>
		<reference ref_id="CVE-2016-10130" ref_url="https://www.suse.com/security/cve/CVE-2016-10130/" source="CVE"/>
		<reference ref_id="CVE-2016-8568" ref_url="https://www.suse.com/security/cve/CVE-2016-8568/" source="CVE"/>
		<reference ref_id="CVE-2016-8569" ref_url="https://www.suse.com/security/cve/CVE-2016-8569/" source="CVE"/>
		<reference ref_id="CVE-2017-5338" ref_url="https://www.suse.com/security/cve/CVE-2017-5338/" source="CVE"/>
		<reference ref_id="CVE-2017-5339" ref_url="https://www.suse.com/security/cve/CVE-2017-5339/" source="CVE"/>
		<reference ref_id="CVE-2018-10887" ref_url="https://www.suse.com/security/cve/CVE-2018-10887/" source="CVE"/>
		<reference ref_id="CVE-2018-10888" ref_url="https://www.suse.com/security/cve/CVE-2018-10888/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-8098" ref_url="https://www.suse.com/security/cve/CVE-2018-8098/" source="CVE"/>
		<reference ref_id="CVE-2018-8099" ref_url="https://www.suse.com/security/cve/CVE-2018-8099/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-28-0.28.4-1.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10128/">CVE-2016-10128</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10129/">CVE-2016-10129</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-10130/">CVE-2016-10130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8568/">CVE-2016-8568</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8569/">CVE-2016-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5338/">CVE-2017-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5339/">CVE-2017-5339</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10887/">CVE-2018-10887</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10888/">CVE-2018-10888</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8098/">CVE-2018-8098</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8099/">CVE-2018-8099</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487888" comment="libgit2-28-0.28.4-1.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51853" version="1" class="patch">
	<metadata>
		<title>libgme0-0.6.2-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<description>
These are all security issues fixed in the libgme0-0.6.2-1.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482785" comment="libgme0-0.6.2-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51854" version="1" class="patch">
	<metadata>
		<title>libgnome-autoar-0-0-0.2.3-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-36241" ref_url="https://www.suse.com/security/cve/CVE-2020-36241/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnome-autoar-0-0-0.2.3-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36241/">CVE-2020-36241</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629130" comment="libgnome-autoar-0-0-0.2.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629131" comment="libgnome-autoar-gtk-0-0-0.2.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51855" version="1" class="patch">
	<metadata>
		<title>libgraphite2-3-1.3.11-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<description>
These are all security issues fixed in the libgraphite2-3-1.3.11-2.12 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480302" comment="libgraphite2-3-1.3.11-2.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51856" version="1" class="patch">
	<metadata>
		<title>libgxps2-0.3.0-4.3.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10733" ref_url="https://www.suse.com/security/cve/CVE-2018-10733/" source="CVE"/>
		<description>
These are all security issues fixed in the libgxps2-0.3.0-4.3.29 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10733/">CVE-2018-10733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486678" comment="libgxps2-0.3.0-4.3.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51857" version="1" class="patch">
	<metadata>
		<title>libhdf5-103-1.10.7-bp153.3.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-17505" ref_url="https://www.suse.com/security/cve/CVE-2017-17505/" source="CVE"/>
		<reference ref_id="CVE-2017-17506" ref_url="https://www.suse.com/security/cve/CVE-2017-17506/" source="CVE"/>
		<reference ref_id="CVE-2017-17508" ref_url="https://www.suse.com/security/cve/CVE-2017-17508/" source="CVE"/>
		<reference ref_id="CVE-2017-17509" ref_url="https://www.suse.com/security/cve/CVE-2017-17509/" source="CVE"/>
		<reference ref_id="CVE-2018-11202" ref_url="https://www.suse.com/security/cve/CVE-2018-11202/" source="CVE"/>
		<reference ref_id="CVE-2018-11203" ref_url="https://www.suse.com/security/cve/CVE-2018-11203/" source="CVE"/>
		<reference ref_id="CVE-2018-11204" ref_url="https://www.suse.com/security/cve/CVE-2018-11204/" source="CVE"/>
		<reference ref_id="CVE-2018-11206" ref_url="https://www.suse.com/security/cve/CVE-2018-11206/" source="CVE"/>
		<reference ref_id="CVE-2018-11207" ref_url="https://www.suse.com/security/cve/CVE-2018-11207/" source="CVE"/>
		<reference ref_id="CVE-2018-13869" ref_url="https://www.suse.com/security/cve/CVE-2018-13869/" source="CVE"/>
		<reference ref_id="CVE-2018-13870" ref_url="https://www.suse.com/security/cve/CVE-2018-13870/" source="CVE"/>
		<reference ref_id="CVE-2018-17233" ref_url="https://www.suse.com/security/cve/CVE-2018-17233/" source="CVE"/>
		<reference ref_id="CVE-2018-17434" ref_url="https://www.suse.com/security/cve/CVE-2018-17434/" source="CVE"/>
		<reference ref_id="CVE-2018-17435" ref_url="https://www.suse.com/security/cve/CVE-2018-17435/" source="CVE"/>
		<reference ref_id="CVE-2018-17437" ref_url="https://www.suse.com/security/cve/CVE-2018-17437/" source="CVE"/>
		<reference ref_id="CVE-2018-17438" ref_url="https://www.suse.com/security/cve/CVE-2018-17438/" source="CVE"/>
		<description>
These are all security issues fixed in the libhdf5-103-1.10.7-bp153.3.43 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17505/">CVE-2017-17505</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17506/">CVE-2017-17506</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17508/">CVE-2017-17508</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17509/">CVE-2017-17509</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11202/">CVE-2018-11202</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11203/">CVE-2018-11203</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11204/">CVE-2018-11204</cve>
	<cve impact="low" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11206/">CVE-2018-11206</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11207/">CVE-2018-11207</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13869/">CVE-2018-13869</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13870/">CVE-2018-13870</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17233/">CVE-2018-17233</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17434/">CVE-2018-17434</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17435/">CVE-2018-17435</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17437/">CVE-2018-17437</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17438/">CVE-2018-17438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694850" comment="libhdf5-103-1.10.7-bp153.3.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51858" version="1" class="patch">
	<metadata>
		<title>libhogweed4-3.4.1-4.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<reference ref_id="CVE-2018-16869" ref_url="https://www.suse.com/security/cve/CVE-2018-16869/" source="CVE"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed4-3.4.1-4.15.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16869/">CVE-2018-16869</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628741" comment="libhogweed4-3.4.1-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628742" comment="libhogweed4-32bit-3.4.1-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628744" comment="libnettle6-3.4.1-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628745" comment="libnettle6-32bit-3.4.1-4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51859" version="1" class="patch">
	<metadata>
		<title>libhunspell-1_6-0-1.6.2-3.3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
These are all security issues fixed in the libhunspell-1_6-0-1.6.2-3.3.7 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628519" comment="libhunspell-1_6-0-1.6.2-3.3.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51860" version="1" class="patch">
	<metadata>
		<title>libical-glib3-3.0.6-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
These are all security issues fixed in the libical-glib3-3.0.6-4.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684236" comment="libical-glib3-3.0.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628746" comment="libical3-3.0.6-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51861" version="1" class="patch">
	<metadata>
		<title>libicu60_2-60.2-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu60_2-60.2-3.9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488530" comment="libicu60_2-60.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488532" comment="libicu60_2-ledata-60.2-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51862" version="1" class="patch">
	<metadata>
		<title>libidn11-1.34-3.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn11-1.34-3.2.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482248" comment="libidn11-1.34-3.2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51863" version="1" class="patch">
	<metadata>
		<title>libidn2-0-2.2.0-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2019-12290" ref_url="https://www.suse.com/security/cve/CVE-2019-12290/" source="CVE"/>
		<reference ref_id="CVE-2019-18224" ref_url="https://www.suse.com/security/cve/CVE-2019-18224/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn2-0-2.2.0-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12290/">CVE-2019-12290</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18224/">CVE-2019-18224</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628747" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628748" comment="libidn2-0-32bit-2.2.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694851" comment="libidn2-lang-2.2.0-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51864" version="1" class="patch">
	<metadata>
		<title>libimobiledevice6-1.2.0+git20180427.26373b3-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libimobiledevice6-1.2.0+git20180427.26373b3-1.40 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487355" comment="libimobiledevice6-1.2.0+git20180427.26373b3-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486510" comment="libusbmuxd4-1.0.10-3.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51865" version="1" class="patch">
	<metadata>
		<title>libixml11-1.14.0-bp153.1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-6255" ref_url="https://www.suse.com/security/cve/CVE-2016-6255/" source="CVE"/>
		<reference ref_id="CVE-2016-8863" ref_url="https://www.suse.com/security/cve/CVE-2016-8863/" source="CVE"/>
		<description>
These are all security issues fixed in the libixml11-1.14.0-bp153.1.19 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-6255/">CVE-2016-6255</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8863/">CVE-2016-8863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694852" comment="libixml11-1.14.0-bp153.1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694853" comment="libupnp17-1.14.0-bp153.1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51866" version="1" class="patch">
	<metadata>
		<title>libjansson4-2.9-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401/" source="CVE"/>
		<description>
These are all security issues fixed in the libjansson4-2.9-1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480580" comment="libjansson4-2.9-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481404" comment="libjansson4-32bit-2.9-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51867" version="1" class="patch">
	<metadata>
		<title>libjasper4-2.0.14-3.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper4-2.0.14-3.19.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628772" comment="libjasper4-2.0.14-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51868" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.32.0-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121/" source="CVE"/>
		<reference ref_id="CVE-2017-1000122" ref_url="https://www.suse.com/security/cve/CVE-2017-1000122/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8518" ref_url="https://www.suse.com/security/cve/CVE-2019-8518/" source="CVE"/>
		<reference ref_id="CVE-2019-8523" ref_url="https://www.suse.com/security/cve/CVE-2019-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.32.0-3.15.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000122/">CVE-2017-1000122</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8518/">CVE-2019-8518</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8523/">CVE-2019-8523</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885</cve>
	<cve impact="important" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<cve impact="important" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628773" comment="libjavascriptcoregtk-4_0-18-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628774" comment="libwebkit2gtk-4_0-37-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628775" comment="libwebkit2gtk3-lang-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629277" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629278" comment="typelib-1_0-WebKit2-4_0-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628776" comment="webkit2gtk-4_0-injected-bundles-2.32.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51869" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.1-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.1-1.31 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480587" comment="libjbig2-2.1-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51870" version="1" class="patch">
	<metadata>
		<title>libjpeg8-8.1.2-5.15.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg8-8.1.2-5.15.7 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628779" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51871" version="1" class="patch">
	<metadata>
		<title>libjson-c3-0.13-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c3-0.13-1.19 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480594" comment="libjson-c3-0.13-1.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51872" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.5-2.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.5-2.14 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480597" comment="libksba8-1.3.5-2.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51873" version="1" class="patch">
	<metadata>
		<title>liblcms2-2-2.9-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<description>
These are all security issues fixed in the liblcms2-2-2.9-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481415" comment="liblcms2-2-2.9-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51874" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.46-9.53.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719/" source="CVE"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.46-9.53.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694854" comment="libldap-2_4-2-2.4.46-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694855" comment="libldap-2_4-2-32bit-2.4.46-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694856" comment="libldap-data-2.4.46-9.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694857" comment="openldap2-client-2.4.46-9.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51875" version="1" class="patch">
	<metadata>
		<title>libldb2-2.2.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb2-2.2.1-1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628548" comment="libldb2-2.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628549" comment="libldb2-32bit-2.2.1-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628550" comment="python3-ldb-2.2.1-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51876" version="1" class="patch">
	<metadata>
		<title>liblouis-data-3.11.0-1.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13742" ref_url="https://www.suse.com/security/cve/CVE-2017-13742/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="CVE-2018-11410" ref_url="https://www.suse.com/security/cve/CVE-2018-11410/" source="CVE"/>
		<reference ref_id="CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-3.11.0-1.42 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13742/">CVE-2017-13742</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11410/">CVE-2018-11410</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487548" comment="liblouis-data-3.11.0-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487550" comment="liblouis19-3.11.0-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487551" comment="python3-louis-3.11.0-1.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51877" version="1" class="patch">
	<metadata>
		<title>liblua5_3-5-32bit-5.3.4-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-6706" ref_url="https://www.suse.com/security/cve/CVE-2019-6706/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_3-5-32bit-5.3.4-3.3.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6706/">CVE-2019-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481427" comment="liblua5_3-5-5.3.4-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481428" comment="liblua5_3-5-32bit-5.3.4-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481429" comment="lua53-5.3.4-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51878" version="1" class="patch">
	<metadata>
		<title>liblz4-1-1.9.2-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543/" source="CVE"/>
		<description>
These are all security issues fixed in the liblz4-1-1.9.2-1.40 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628788" comment="liblz4-1-1.9.2-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628789" comment="liblz4-1-32bit-1.9.2-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51879" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.10-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.10-2.22 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480611" comment="liblzo2-2-2.10-2.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51880" version="1" class="patch">
	<metadata>
		<title>libmad0-0.15.1b-3.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-8374" ref_url="https://www.suse.com/security/cve/CVE-2017-8374/" source="CVE"/>
		<description>
These are all security issues fixed in the libmad0-0.15.1b-3.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8374/">CVE-2017-8374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486459" comment="libmad0-0.15.1b-3.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51881" version="1" class="patch">
	<metadata>
		<title>libmariadb3-3.1.12-3.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadb3-3.1.12-3.25.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628792" comment="libmariadb3-3.1.12-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51882" version="1" class="patch">
	<metadata>
		<title>libmarkdown2-2.2.4-1.41 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-11468" ref_url="https://www.suse.com/security/cve/CVE-2018-11468/" source="CVE"/>
		<reference ref_id="CVE-2018-12495" ref_url="https://www.suse.com/security/cve/CVE-2018-12495/" source="CVE"/>
		<description>
These are all security issues fixed in the libmarkdown2-2.2.4-1.41 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11468/">CVE-2018-11468</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12495/">CVE-2018-12495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482299" comment="libmarkdown2-2.2.4-1.41 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51883" version="1" class="patch">
	<metadata>
		<title>libminiupnpc16-2.0.20171102-bp153.1.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3985" ref_url="https://www.suse.com/security/cve/CVE-2014-3985/" source="CVE"/>
		<reference ref_id="CVE-2017-8798" ref_url="https://www.suse.com/security/cve/CVE-2017-8798/" source="CVE"/>
		<description>
These are all security issues fixed in the libminiupnpc16-2.0.20171102-bp153.1.39 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3985/">CVE-2014-3985</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8798/">CVE-2017-8798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694858" comment="libminiupnpc16-2.0.20171102-bp153.1.39 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51884" version="1" class="patch">
	<metadata>
		<title>libminizip1-1.2.11-3.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>
These are all security issues fixed in the libminizip1-1.2.11-3.21.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628794" comment="libminizip1-1.2.11-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628795" comment="libz1-1.2.11-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628796" comment="libz1-32bit-1.2.11-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51885" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.4-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.4-1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486462" comment="libmms0-0.6.4-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51886" version="1" class="patch">
	<metadata>
		<title>libmp3lame0-3.100-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-9410" ref_url="https://www.suse.com/security/cve/CVE-2017-9410/" source="CVE"/>
		<reference ref_id="CVE-2017-9411" ref_url="https://www.suse.com/security/cve/CVE-2017-9411/" source="CVE"/>
		<reference ref_id="CVE-2017-9412" ref_url="https://www.suse.com/security/cve/CVE-2017-9412/" source="CVE"/>
		<description>
These are all security issues fixed in the libmp3lame0-3.100-1.33 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9410/">CVE-2017-9410</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9411/">CVE-2017-9411</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9412/">CVE-2017-9412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482307" comment="libmp3lame0-3.100-1.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51887" version="1" class="patch">
	<metadata>
		<title>libmpfr6-4.0.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr6-4.0.2-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628800" comment="libmpfr6-4.0.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51888" version="1" class="patch">
	<metadata>
		<title>libmpg123-0-1.26.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-10683" ref_url="https://www.suse.com/security/cve/CVE-2017-10683/" source="CVE"/>
		<reference ref_id="CVE-2017-11126" ref_url="https://www.suse.com/security/cve/CVE-2017-11126/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpg123-0-1.26.4-1.15 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10683/">CVE-2017-10683</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11126/">CVE-2017-11126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628802" comment="libmpg123-0-1.26.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694859" comment="mpg123-openal-1.26.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629210" comment="mpg123-pulse-1.26.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51889" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.6-3.8.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.6-3.8.19 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482310" comment="libmspack0-0.6-3.8.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51890" version="1" class="patch">
	<metadata>
		<title>libmwaw-0_3-3-0.3.17-4.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<description>
These are all security issues fixed in the libmwaw-0_3-3-0.3.17-4.9.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630164" comment="libmwaw-0_3-3-0.3.17-4.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51891" version="1" class="patch">
	<metadata>
		<title>libmysqld19-10.2.37-3.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0610" ref_url="https://www.suse.com/security/cve/CVE-2016-0610/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10286" ref_url="https://www.suse.com/security/cve/CVE-2017-10286/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqld19-10.2.37-3.37.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0610/">CVE-2016-0610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10286/">CVE-2017-10286</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694860" comment="libmysqld19-10.2.37-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51892" version="1" class="patch">
	<metadata>
		<title>libncurses6-6.1-5.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
These are all security issues fixed in the libncurses6-6.1-5.6.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482311" comment="libncurses6-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482314" comment="ncurses-utils-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482316" comment="terminfo-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482317" comment="terminfo-base-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482318" comment="terminfo-iterm-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482319" comment="terminfo-screen-6.1-5.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51893" version="1" class="patch">
	<metadata>
		<title>libndp0-1.6-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp0-1.6-1.26 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486474" comment="libndp0-1.6-1.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51894" version="1" class="patch">
	<metadata>
		<title>libnetpbm11-10.80.1-3.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm11-10.80.1-3.11.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628803" comment="libnetpbm11-10.80.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628804" comment="netpbm-10.80.1-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51895" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.20-5.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.20-5.35 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480626" comment="libnewt0_52-0.52.20-5.35 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51896" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.40.0-3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.40.0-3.5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628805" comment="libnghttp2-14-1.40.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628806" comment="libnghttp2-14-32bit-1.40.0-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51897" version="1" class="patch">
	<metadata>
		<title>libntfs-3g87-2016.2.22-3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<description>
These are all security issues fixed in the libntfs-3g87-2016.2.22-3.5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489228" comment="libntfs-3g87-2016.2.22-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489229" comment="ntfs-3g-2016.2.22-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489230" comment="ntfsprogs-2016.2.22-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51898" version="1" class="patch">
	<metadata>
		<title>libopencv3_3-3.3.1-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-18009" ref_url="https://www.suse.com/security/cve/CVE-2017-18009/" source="CVE"/>
		<reference ref_id="CVE-2019-14491" ref_url="https://www.suse.com/security/cve/CVE-2019-14491/" source="CVE"/>
		<reference ref_id="CVE-2019-14492" ref_url="https://www.suse.com/security/cve/CVE-2019-14492/" source="CVE"/>
		<reference ref_id="CVE-2019-15939" ref_url="https://www.suse.com/security/cve/CVE-2019-15939/" source="CVE"/>
		<description>
These are all security issues fixed in the libopencv3_3-3.3.1-6.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18009/">CVE-2017-18009</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14491/">CVE-2019-14491</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14492/">CVE-2019-14492</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15939/">CVE-2019-15939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489231" comment="libopencv3_3-3.3.1-6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51899" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.3.0-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-10504" ref_url="https://www.suse.com/security/cve/CVE-2016-10504/" source="CVE"/>
		<reference ref_id="CVE-2016-10505" ref_url="https://www.suse.com/security/cve/CVE-2016-10505/" source="CVE"/>
		<reference ref_id="CVE-2016-10506" ref_url="https://www.suse.com/security/cve/CVE-2016-10506/" source="CVE"/>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5152" ref_url="https://www.suse.com/security/cve/CVE-2016-5152/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2017-12982" ref_url="https://www.suse.com/security/cve/CVE-2017-12982/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14151" ref_url="https://www.suse.com/security/cve/CVE-2017-14151/" source="CVE"/>
		<reference ref_id="CVE-2017-14152" ref_url="https://www.suse.com/security/cve/CVE-2017-14152/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.3.0-1.25 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10504/">CVE-2016-10504</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10505/">CVE-2016-10505</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10506/">CVE-2016-10506</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5152/">CVE-2016-5152</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12982/">CVE-2017-12982</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14151/">CVE-2017-14151</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14152/">CVE-2017-14152</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480638" comment="libopenjp2-7-2.3.0-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51900" version="1" class="patch">
	<metadata>
		<title>libopenjpeg1-1.5.2-2.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-5030" ref_url="https://www.suse.com/security/cve/CVE-2009-5030/" source="CVE"/>
		<reference ref_id="CVE-2012-3358" ref_url="https://www.suse.com/security/cve/CVE-2012-3358/" source="CVE"/>
		<reference ref_id="CVE-2012-3535" ref_url="https://www.suse.com/security/cve/CVE-2012-3535/" source="CVE"/>
		<reference ref_id="CVE-2013-1447" ref_url="https://www.suse.com/security/cve/CVE-2013-1447/" source="CVE"/>
		<reference ref_id="CVE-2013-4289" ref_url="https://www.suse.com/security/cve/CVE-2013-4289/" source="CVE"/>
		<reference ref_id="CVE-2013-4290" ref_url="https://www.suse.com/security/cve/CVE-2013-4290/" source="CVE"/>
		<reference ref_id="CVE-2013-6045" ref_url="https://www.suse.com/security/cve/CVE-2013-6045/" source="CVE"/>
		<reference ref_id="CVE-2013-6052" ref_url="https://www.suse.com/security/cve/CVE-2013-6052/" source="CVE"/>
		<reference ref_id="CVE-2013-6053" ref_url="https://www.suse.com/security/cve/CVE-2013-6053/" source="CVE"/>
		<reference ref_id="CVE-2013-6054" ref_url="https://www.suse.com/security/cve/CVE-2013-6054/" source="CVE"/>
		<reference ref_id="CVE-2013-6887" ref_url="https://www.suse.com/security/cve/CVE-2013-6887/" source="CVE"/>
		<reference ref_id="CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjpeg1-1.5.2-2.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-5030/">CVE-2009-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3358/">CVE-2012-3358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3535/">CVE-2012-3535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1447/">CVE-2013-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4289/">CVE-2013-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4290/">CVE-2013-4290</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6045/">CVE-2013-6045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6052/">CVE-2013-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6053/">CVE-2013-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6054/">CVE-2013-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6887/">CVE-2013-6887</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486482" comment="libopenjpeg1-1.5.2-2.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51901" version="1" class="patch">
	<metadata>
		<title>libopenmpt0-0.3.19-2.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-11311" ref_url="https://www.suse.com/security/cve/CVE-2017-11311/" source="CVE"/>
		<reference ref_id="CVE-2018-10017" ref_url="https://www.suse.com/security/cve/CVE-2018-10017/" source="CVE"/>
		<reference ref_id="CVE-2018-11710" ref_url="https://www.suse.com/security/cve/CVE-2018-11710/" source="CVE"/>
		<reference ref_id="CVE-2018-20860" ref_url="https://www.suse.com/security/cve/CVE-2018-20860/" source="CVE"/>
		<reference ref_id="CVE-2018-20861" ref_url="https://www.suse.com/security/cve/CVE-2018-20861/" source="CVE"/>
		<reference ref_id="CVE-2019-14382" ref_url="https://www.suse.com/security/cve/CVE-2019-14382/" source="CVE"/>
		<reference ref_id="CVE-2019-14383" ref_url="https://www.suse.com/security/cve/CVE-2019-14383/" source="CVE"/>
		<reference ref_id="CVE-2019-17113" ref_url="https://www.suse.com/security/cve/CVE-2019-17113/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenmpt0-0.3.19-2.10.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11311/">CVE-2017-11311</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10017/">CVE-2018-10017</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11710/">CVE-2018-11710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20860/">CVE-2018-20860</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20861/">CVE-2018-20861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14382/">CVE-2019-14382</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14383/">CVE-2019-14383</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17113/">CVE-2019-17113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487555" comment="libopenmpt0-0.3.19-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51902" version="1" class="patch">
	<metadata>
		<title>libopenssl1_1-1.1.1d-11.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543/" source="CVE"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549/" source="CVE"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl1_1-1.1.1d-11.23.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<cve impact="low" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="low" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694861" comment="libopenssl1_1-1.1.1d-11.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694862" comment="libopenssl1_1-32bit-1.1.1d-11.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694863" comment="openssl-1_1-1.1.1d-11.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51903" version="1" class="patch">
	<metadata>
		<title>libopus0-1.3.1-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus0-1.3.1-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628819" comment="libopus0-1.3.1-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51904" version="1" class="patch">
	<metadata>
		<title>libosinfo-1.7.1-1.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
These are all security issues fixed in the libosinfo-1.7.1-1.52 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482338" comment="libosinfo-1.7.1-1.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482339" comment="libosinfo-1_0-0-1.7.1-1.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482340" comment="libosinfo-lang-1.7.1-1.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488542" comment="typelib-1_0-Libosinfo-1_0-1.7.1-1.52 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51905" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.44.7+11-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.44.7+11-1.25 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482345" comment="libpango-1_0-0-1.44.7+11-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482347" comment="typelib-1_0-Pango-1_0-1.44.7+11-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51906" version="1" class="patch">
	<metadata>
		<title>libpano13-3-2.9.19-bp153.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-20307" ref_url="https://www.suse.com/security/cve/CVE-2021-20307/" source="CVE"/>
		<description>
These are all security issues fixed in the libpano13-3-2.9.19-bp153.2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20307/">CVE-2021-20307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694864" comment="libpano13-3-2.9.19-bp153.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51907" version="1" class="patch">
	<metadata>
		<title>libpcap1-1.9.1-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15161" ref_url="https://www.suse.com/security/cve/CVE-2019-15161/" source="CVE"/>
		<reference ref_id="CVE-2019-15162" ref_url="https://www.suse.com/security/cve/CVE-2019-15162/" source="CVE"/>
		<reference ref_id="CVE-2019-15163" ref_url="https://www.suse.com/security/cve/CVE-2019-15163/" source="CVE"/>
		<reference ref_id="CVE-2019-15164" ref_url="https://www.suse.com/security/cve/CVE-2019-15164/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcap1-1.9.1-1.33 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15161/">CVE-2019-15161</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15162/">CVE-2019-15162</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15163/">CVE-2019-15163</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15164/">CVE-2019-15164</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628825" comment="libpcap1-1.9.1-1.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51908" version="1" class="patch">
	<metadata>
		<title>libpcre1-32bit-8.41-4.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-32bit-8.41-4.20 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480657" comment="libpcre1-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480658" comment="libpcre1-32bit-8.41-4.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51909" version="1" class="patch">
	<metadata>
		<title>libpcre2-16-0-10.31-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-8786" ref_url="https://www.suse.com/security/cve/CVE-2017-8786/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre2-16-0-10.31-1.14 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8786/">CVE-2017-8786</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480665" comment="libpcre2-16-0-10.31-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480667" comment="libpcre2-8-0-10.31-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51910" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.24-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.24-1.14 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481464" comment="libpcsclite1-1.8.24-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481466" comment="pcsc-lite-1.8.24-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51911" version="1" class="patch">
	<metadata>
		<title>libplist3-2.0.0-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<description>
These are all security issues fixed in the libplist3-2.0.0-1.31 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486489" comment="libplist3-2.0.0-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51912" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.34-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="CVE-2016-5735" ref_url="https://www.suse.com/security/cve/CVE-2016-5735/" source="CVE"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.34-3.9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5735/">CVE-2016-5735</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482352" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482353" comment="libpng16-16-32bit-1.6.34-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51913" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.116-1.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.116-1.51 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482356" comment="libpolkit0-0.116-1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482357" comment="polkit-0.116-1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482359" comment="typelib-1_0-Polkit-1_0-0.116-1.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51914" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp0-0.79.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp0-0.79.0-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628826" comment="libpoppler-cpp0-0.79.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628829" comment="libpoppler-glib8-0.79.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630169" comment="libpoppler-qt5-1-0.79.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628830" comment="libpoppler89-0.79.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628831" comment="poppler-tools-0.79.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51915" version="1" class="patch">
	<metadata>
		<title>libpotrace0-1.15-3.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-7437" ref_url="https://www.suse.com/security/cve/CVE-2013-7437/" source="CVE"/>
		<reference ref_id="CVE-2016-8685" ref_url="https://www.suse.com/security/cve/CVE-2016-8685/" source="CVE"/>
		<reference ref_id="CVE-2016-8686" ref_url="https://www.suse.com/security/cve/CVE-2016-8686/" source="CVE"/>
		<reference ref_id="CVE-2017-12067" ref_url="https://www.suse.com/security/cve/CVE-2017-12067/" source="CVE"/>
		<description>
These are all security issues fixed in the libpotrace0-1.15-3.19 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7437/">CVE-2013-7437</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8685/">CVE-2016-8685</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8686/">CVE-2016-8686</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12067/">CVE-2017-12067</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486490" comment="libpotrace0-1.15-3.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51916" version="1" class="patch">
	<metadata>
		<title>libpq5-13.2-5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<description>
These are all security issues fixed in the libpq5-13.2-5.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628833" comment="libpq5-13.2-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51917" version="1" class="patch">
	<metadata>
		<title>libprocps7-3.3.15-7.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
These are all security issues fixed in the libprocps7-3.3.15-7.19.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694865" comment="libprocps7-3.3.15-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694866" comment="procps-3.3.15-7.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51918" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.15-12.41 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.15-12.41 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628839" comment="libproxy1-0.4.15-12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684239" comment="libproxy1-config-gnome3-0.4.15-12.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694867" comment="libproxy1-config-kde-0.4.15-12.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684240" comment="libproxy1-networkmanager-0.4.15-12.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694868" comment="libproxy1-pacrunner-webkit-0.4.15-12.72 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51919" version="1" class="patch">
	<metadata>
		<title>libpskc0-2.6.2-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-7322" ref_url="https://www.suse.com/security/cve/CVE-2013-7322/" source="CVE"/>
		<description>
These are all security issues fixed in the libpskc0-2.6.2-1.15 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7322/">CVE-2013-7322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488933" comment="libpskc0-2.6.2-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51920" version="1" class="patch">
	<metadata>
		<title>libpurple-2.13.0-10.105 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3697" ref_url="https://www.suse.com/security/cve/CVE-2014-3697/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<reference ref_id="CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640/" source="CVE"/>
		<description>
These are all security issues fixed in the libpurple-2.13.0-10.105 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3697/">CVE-2014-3697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489234" comment="libpurple-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489237" comment="libpurple-lang-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630146" comment="libpurple-tcl-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489239" comment="pidgin-2.13.0-10.105 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51921" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.18-7.55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.18-7.55.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628840" comment="libpython2_7-1_0-2.7.18-7.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628841" comment="python-2.7.18-7.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628842" comment="python-base-2.7.18-7.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51922" version="1" class="patch">
	<metadata>
		<title>libpython3_6m1_0-3.6.13-3.81.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_6m1_0-3.6.13-3.81.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694869" comment="libpython3_6m1_0-3.6.13-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694870" comment="python3-3.6.13-3.81.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694871" comment="python3-base-3.6.13-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694872" comment="python3-curses-3.6.13-3.81.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694873" comment="python3-dbm-3.6.13-3.81.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51923" version="1" class="patch">
	<metadata>
		<title>libqpdf26-9.0.2-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<description>
These are all security issues fixed in the libqpdf26-9.0.2-1.36 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482383" comment="libqpdf26-9.0.2-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51924" version="1" class="patch">
	<metadata>
		<title>libqt5-qtwebengine-5.15.3-bp153.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-6033" ref_url="https://www.suse.com/security/cve/CVE-2018-6033/" source="CVE"/>
		<reference ref_id="CVE-2019-5786" ref_url="https://www.suse.com/security/cve/CVE-2019-5786/" source="CVE"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="CVE-2021-21118" ref_url="https://www.suse.com/security/cve/CVE-2021-21118/" source="CVE"/>
		<reference ref_id="CVE-2021-21119" ref_url="https://www.suse.com/security/cve/CVE-2021-21119/" source="CVE"/>
		<reference ref_id="CVE-2021-21120" ref_url="https://www.suse.com/security/cve/CVE-2021-21120/" source="CVE"/>
		<reference ref_id="CVE-2021-21121" ref_url="https://www.suse.com/security/cve/CVE-2021-21121/" source="CVE"/>
		<reference ref_id="CVE-2021-21122" ref_url="https://www.suse.com/security/cve/CVE-2021-21122/" source="CVE"/>
		<reference ref_id="CVE-2021-21123" ref_url="https://www.suse.com/security/cve/CVE-2021-21123/" source="CVE"/>
		<reference ref_id="CVE-2021-21125" ref_url="https://www.suse.com/security/cve/CVE-2021-21125/" source="CVE"/>
		<reference ref_id="CVE-2021-21126" ref_url="https://www.suse.com/security/cve/CVE-2021-21126/" source="CVE"/>
		<reference ref_id="CVE-2021-21127" ref_url="https://www.suse.com/security/cve/CVE-2021-21127/" source="CVE"/>
		<reference ref_id="CVE-2021-21128" ref_url="https://www.suse.com/security/cve/CVE-2021-21128/" source="CVE"/>
		<reference ref_id="CVE-2021-21129" ref_url="https://www.suse.com/security/cve/CVE-2021-21129/" source="CVE"/>
		<reference ref_id="CVE-2021-21130" ref_url="https://www.suse.com/security/cve/CVE-2021-21130/" source="CVE"/>
		<reference ref_id="CVE-2021-21131" ref_url="https://www.suse.com/security/cve/CVE-2021-21131/" source="CVE"/>
		<reference ref_id="CVE-2021-21132" ref_url="https://www.suse.com/security/cve/CVE-2021-21132/" source="CVE"/>
		<reference ref_id="CVE-2021-21135" ref_url="https://www.suse.com/security/cve/CVE-2021-21135/" source="CVE"/>
		<reference ref_id="CVE-2021-21137" ref_url="https://www.suse.com/security/cve/CVE-2021-21137/" source="CVE"/>
		<reference ref_id="CVE-2021-21140" ref_url="https://www.suse.com/security/cve/CVE-2021-21140/" source="CVE"/>
		<reference ref_id="CVE-2021-21141" ref_url="https://www.suse.com/security/cve/CVE-2021-21141/" source="CVE"/>
		<reference ref_id="CVE-2021-21145" ref_url="https://www.suse.com/security/cve/CVE-2021-21145/" source="CVE"/>
		<reference ref_id="CVE-2021-21146" ref_url="https://www.suse.com/security/cve/CVE-2021-21146/" source="CVE"/>
		<reference ref_id="CVE-2021-21147" ref_url="https://www.suse.com/security/cve/CVE-2021-21147/" source="CVE"/>
		<reference ref_id="CVE-2021-21148" ref_url="https://www.suse.com/security/cve/CVE-2021-21148/" source="CVE"/>
		<reference ref_id="CVE-2021-21149" ref_url="https://www.suse.com/security/cve/CVE-2021-21149/" source="CVE"/>
		<reference ref_id="CVE-2021-21150" ref_url="https://www.suse.com/security/cve/CVE-2021-21150/" source="CVE"/>
		<reference ref_id="CVE-2021-21152" ref_url="https://www.suse.com/security/cve/CVE-2021-21152/" source="CVE"/>
		<reference ref_id="CVE-2021-21153" ref_url="https://www.suse.com/security/cve/CVE-2021-21153/" source="CVE"/>
		<reference ref_id="CVE-2021-21156" ref_url="https://www.suse.com/security/cve/CVE-2021-21156/" source="CVE"/>
		<reference ref_id="CVE-2021-21157" ref_url="https://www.suse.com/security/cve/CVE-2021-21157/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt5-qtwebengine-5.15.3-bp153.1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6033/">CVE-2018-6033</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5786/">CVE-2019-5786</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21118/">CVE-2021-21118</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21119/">CVE-2021-21119</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21120/">CVE-2021-21120</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21121/">CVE-2021-21121</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21122/">CVE-2021-21122</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21123/">CVE-2021-21123</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21125/">CVE-2021-21125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21126/">CVE-2021-21126</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21127/">CVE-2021-21127</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21128/">CVE-2021-21128</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21129/">CVE-2021-21129</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21130/">CVE-2021-21130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21131/">CVE-2021-21131</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21132/">CVE-2021-21132</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21135/">CVE-2021-21135</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21137/">CVE-2021-21137</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21140/">CVE-2021-21140</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21141/">CVE-2021-21141</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21145/">CVE-2021-21145</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21146/">CVE-2021-21146</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21147/">CVE-2021-21147</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21148/">CVE-2021-21148</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21149/">CVE-2021-21149</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21150/">CVE-2021-21150</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21152/">CVE-2021-21152</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21153/">CVE-2021-21153</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21156/">CVE-2021-21156</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21157/">CVE-2021-21157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694874" comment="libqt5-qtwebengine-5.15.3-bp153.1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51925" version="1" class="patch">
	<metadata>
		<title>libquicktime0-1.2.4+git20180804.fff99cd-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<description>
These are all security issues fixed in the libquicktime0-1.2.4+git20180804.fff99cd-1.19 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487566" comment="libquicktime0-1.2.4+git20180804.fff99cd-1.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51926" version="1" class="patch">
	<metadata>
		<title>librados2-15.2.11.83+g8a15f484c2-3.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818/" source="CVE"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="CVE-2019-10222" ref_url="https://www.suse.com/security/cve/CVE-2019-10222/" source="CVE"/>
		<reference ref_id="CVE-2019-3821" ref_url="https://www.suse.com/security/cve/CVE-2019-3821/" source="CVE"/>
		<reference ref_id="CVE-2020-10736" ref_url="https://www.suse.com/security/cve/CVE-2020-10736/" source="CVE"/>
		<reference ref_id="CVE-2020-1759" ref_url="https://www.suse.com/security/cve/CVE-2020-1759/" source="CVE"/>
		<reference ref_id="CVE-2020-1760" ref_url="https://www.suse.com/security/cve/CVE-2020-1760/" source="CVE"/>
		<reference ref_id="CVE-2020-25660" ref_url="https://www.suse.com/security/cve/CVE-2020-25660/" source="CVE"/>
		<reference ref_id="CVE-2020-25678" ref_url="https://www.suse.com/security/cve/CVE-2020-25678/" source="CVE"/>
		<reference ref_id="CVE-2020-27781" ref_url="https://www.suse.com/security/cve/CVE-2020-27781/" source="CVE"/>
		<reference ref_id="CVE-2020-27839" ref_url="https://www.suse.com/security/cve/CVE-2020-27839/" source="CVE"/>
		<reference ref_id="CVE-2021-20288" ref_url="https://www.suse.com/security/cve/CVE-2021-20288/" source="CVE"/>
		<description>
These are all security issues fixed in the librados2-15.2.11.83+g8a15f484c2-3.22.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10222/">CVE-2019-10222</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3821/">CVE-2019-3821</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10736/">CVE-2020-10736</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-1759/">CVE-2020-1759</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1760/">CVE-2020-1760</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25660/">CVE-2020-25660</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25678/">CVE-2020-25678</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-27781/">CVE-2020-27781</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27839/">CVE-2020-27839</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20288/">CVE-2021-20288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694875" comment="librados2-15.2.11.83+g8a15f484c2-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694876" comment="librbd1-15.2.11.83+g8a15f484c2-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51927" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.15-9.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.15-9.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629212" comment="libraptor2-0-2.0.15-9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51928" version="1" class="patch">
	<metadata>
		<title>libraw16-0.18.9-3.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367/" source="CVE"/>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14265" ref_url="https://www.suse.com/security/cve/CVE-2017-14265/" source="CVE"/>
		<reference ref_id="CVE-2017-14348" ref_url="https://www.suse.com/security/cve/CVE-2017-14348/" source="CVE"/>
		<reference ref_id="CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886/" source="CVE"/>
		<reference ref_id="CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887/" source="CVE"/>
		<reference ref_id="CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890/" source="CVE"/>
		<reference ref_id="CVE-2017-6899" ref_url="https://www.suse.com/security/cve/CVE-2017-6899/" source="CVE"/>
		<reference ref_id="CVE-2018-10528" ref_url="https://www.suse.com/security/cve/CVE-2018-10528/" source="CVE"/>
		<reference ref_id="CVE-2018-10529" ref_url="https://www.suse.com/security/cve/CVE-2018-10529/" source="CVE"/>
		<reference ref_id="CVE-2018-20337" ref_url="https://www.suse.com/security/cve/CVE-2018-20337/" source="CVE"/>
		<reference ref_id="CVE-2018-20363" ref_url="https://www.suse.com/security/cve/CVE-2018-20363/" source="CVE"/>
		<reference ref_id="CVE-2018-20364" ref_url="https://www.suse.com/security/cve/CVE-2018-20364/" source="CVE"/>
		<reference ref_id="CVE-2018-20365" ref_url="https://www.suse.com/security/cve/CVE-2018-20365/" source="CVE"/>
		<reference ref_id="CVE-2018-5813" ref_url="https://www.suse.com/security/cve/CVE-2018-5813/" source="CVE"/>
		<reference ref_id="CVE-2018-5815" ref_url="https://www.suse.com/security/cve/CVE-2018-5815/" source="CVE"/>
		<reference ref_id="CVE-2018-5816" ref_url="https://www.suse.com/security/cve/CVE-2018-5816/" source="CVE"/>
		<reference ref_id="CVE-2018-5817" ref_url="https://www.suse.com/security/cve/CVE-2018-5817/" source="CVE"/>
		<reference ref_id="CVE-2018-5818" ref_url="https://www.suse.com/security/cve/CVE-2018-5818/" source="CVE"/>
		<reference ref_id="CVE-2018-5819" ref_url="https://www.suse.com/security/cve/CVE-2018-5819/" source="CVE"/>
		<reference ref_id="CVE-2020-15503" ref_url="https://www.suse.com/security/cve/CVE-2020-15503/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw16-0.18.9-3.11.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14265/">CVE-2017-14265</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14348/">CVE-2017-14348</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6899/">CVE-2017-6899</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10528/">CVE-2018-10528</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10529/">CVE-2018-10529</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20337/">CVE-2018-20337</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20363/">CVE-2018-20363</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20364/">CVE-2018-20364</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20365/">CVE-2018-20365</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5813/">CVE-2018-5813</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5815/">CVE-2018-5815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5816/">CVE-2018-5816</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5817/">CVE-2018-5817</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5818/">CVE-2018-5818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5819/">CVE-2018-5819</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15503/">CVE-2020-15503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694877" comment="libraw16-0.18.9-bp153.2.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51929" version="1" class="patch">
	<metadata>
		<title>libreoffice-7.1.2.2-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327/" source="CVE"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<reference ref_id="CVE-2017-3157" ref_url="https://www.suse.com/security/cve/CVE-2017-3157/" source="CVE"/>
		<reference ref_id="CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870/" source="CVE"/>
		<reference ref_id="CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882/" source="CVE"/>
		<reference ref_id="CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358/" source="CVE"/>
		<reference ref_id="CVE-2018-10119" ref_url="https://www.suse.com/security/cve/CVE-2018-10119/" source="CVE"/>
		<reference ref_id="CVE-2018-10120" ref_url="https://www.suse.com/security/cve/CVE-2018-10120/" source="CVE"/>
		<reference ref_id="CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055/" source="CVE"/>
		<reference ref_id="CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583/" source="CVE"/>
		<reference ref_id="CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858/" source="CVE"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<reference ref_id="CVE-2019-9848" ref_url="https://www.suse.com/security/cve/CVE-2019-9848/" source="CVE"/>
		<reference ref_id="CVE-2019-9849" ref_url="https://www.suse.com/security/cve/CVE-2019-9849/" source="CVE"/>
		<reference ref_id="CVE-2019-9850" ref_url="https://www.suse.com/security/cve/CVE-2019-9850/" source="CVE"/>
		<reference ref_id="CVE-2019-9851" ref_url="https://www.suse.com/security/cve/CVE-2019-9851/" source="CVE"/>
		<reference ref_id="CVE-2019-9852" ref_url="https://www.suse.com/security/cve/CVE-2019-9852/" source="CVE"/>
		<reference ref_id="CVE-2019-9853" ref_url="https://www.suse.com/security/cve/CVE-2019-9853/" source="CVE"/>
		<reference ref_id="CVE-2019-9854" ref_url="https://www.suse.com/security/cve/CVE-2019-9854/" source="CVE"/>
		<reference ref_id="CVE-2019-9855" ref_url="https://www.suse.com/security/cve/CVE-2019-9855/" source="CVE"/>
		<reference ref_id="CVE-2020-12801" ref_url="https://www.suse.com/security/cve/CVE-2020-12801/" source="CVE"/>
		<reference ref_id="CVE-2020-12802" ref_url="https://www.suse.com/security/cve/CVE-2020-12802/" source="CVE"/>
		<reference ref_id="CVE-2020-12803" ref_url="https://www.suse.com/security/cve/CVE-2020-12803/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-7.1.2.2-2.3 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3157/">CVE-2017-3157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10119/">CVE-2018-10119</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10120/">CVE-2018-10120</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9848/">CVE-2019-9848</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9849/">CVE-2019-9849</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9850/">CVE-2019-9850</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9851/">CVE-2019-9851</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9852/">CVE-2019-9852</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9853/">CVE-2019-9853</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9854/">CVE-2019-9854</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9855/">CVE-2019-9855</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12801/">CVE-2020-12801</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12802/">CVE-2020-12802</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12803/">CVE-2020-12803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630170" comment="libreoffice-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630171" comment="libreoffice-base-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630173" comment="libreoffice-branding-upstream-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630174" comment="libreoffice-calc-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630176" comment="libreoffice-draw-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630177" comment="libreoffice-filters-optional-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630180" comment="libreoffice-gnome-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630181" comment="libreoffice-gtk3-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630182" comment="libreoffice-icon-themes-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630183" comment="libreoffice-impress-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630186" comment="libreoffice-l10n-ar-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630190" comment="libreoffice-l10n-bg-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630196" comment="libreoffice-l10n-bs-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630197" comment="libreoffice-l10n-ca-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630200" comment="libreoffice-l10n-cs-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630202" comment="libreoffice-l10n-da-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630203" comment="libreoffice-l10n-de-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630207" comment="libreoffice-l10n-el-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630208" comment="libreoffice-l10n-en-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630209" comment="libreoffice-l10n-en_GB-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630211" comment="libreoffice-l10n-eo-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630212" comment="libreoffice-l10n-es-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630213" comment="libreoffice-l10n-et-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630215" comment="libreoffice-l10n-fa-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630216" comment="libreoffice-l10n-fi-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630217" comment="libreoffice-l10n-fr-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630229" comment="libreoffice-l10n-hu-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630230" comment="libreoffice-l10n-id-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630232" comment="libreoffice-l10n-it-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630233" comment="libreoffice-l10n-ja-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630240" comment="libreoffice-l10n-ko-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630245" comment="libreoffice-l10n-lt-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630254" comment="libreoffice-l10n-nb-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630256" comment="libreoffice-l10n-nl-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630264" comment="libreoffice-l10n-pl-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630265" comment="libreoffice-l10n-pt_BR-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630268" comment="libreoffice-l10n-ru-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630275" comment="libreoffice-l10n-sk-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630276" comment="libreoffice-l10n-sl-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630281" comment="libreoffice-l10n-sv-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630293" comment="libreoffice-l10n-uk-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630299" comment="libreoffice-l10n-zh_CN-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630300" comment="libreoffice-l10n-zh_TW-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630303" comment="libreoffice-mailmerge-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630304" comment="libreoffice-math-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630306" comment="libreoffice-pyuno-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630307" comment="libreoffice-qt5-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630310" comment="libreoffice-writer-7.1.2.2-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630312" comment="libreofficekit-7.1.2.2-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51930" version="1" class="patch">
	<metadata>
		<title>libreoffice-gtk2-6.2.7.1-8.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327/" source="CVE"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<reference ref_id="CVE-2017-3157" ref_url="https://www.suse.com/security/cve/CVE-2017-3157/" source="CVE"/>
		<reference ref_id="CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870/" source="CVE"/>
		<reference ref_id="CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882/" source="CVE"/>
		<reference ref_id="CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358/" source="CVE"/>
		<reference ref_id="CVE-2018-10119" ref_url="https://www.suse.com/security/cve/CVE-2018-10119/" source="CVE"/>
		<reference ref_id="CVE-2018-10120" ref_url="https://www.suse.com/security/cve/CVE-2018-10120/" source="CVE"/>
		<reference ref_id="CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055/" source="CVE"/>
		<reference ref_id="CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583/" source="CVE"/>
		<reference ref_id="CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858/" source="CVE"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<reference ref_id="CVE-2019-9848" ref_url="https://www.suse.com/security/cve/CVE-2019-9848/" source="CVE"/>
		<reference ref_id="CVE-2019-9849" ref_url="https://www.suse.com/security/cve/CVE-2019-9849/" source="CVE"/>
		<reference ref_id="CVE-2019-9850" ref_url="https://www.suse.com/security/cve/CVE-2019-9850/" source="CVE"/>
		<reference ref_id="CVE-2019-9851" ref_url="https://www.suse.com/security/cve/CVE-2019-9851/" source="CVE"/>
		<reference ref_id="CVE-2019-9852" ref_url="https://www.suse.com/security/cve/CVE-2019-9852/" source="CVE"/>
		<reference ref_id="CVE-2019-9854" ref_url="https://www.suse.com/security/cve/CVE-2019-9854/" source="CVE"/>
		<reference ref_id="CVE-2019-9855" ref_url="https://www.suse.com/security/cve/CVE-2019-9855/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-gtk2-6.2.7.1-8.10.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3157/">CVE-2017-3157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10119/">CVE-2018-10119</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10120/">CVE-2018-10120</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9848/">CVE-2019-9848</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9849/">CVE-2019-9849</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9850/">CVE-2019-9850</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9851/">CVE-2019-9851</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9852/">CVE-2019-9852</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9854/">CVE-2019-9854</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9855/">CVE-2019-9855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694878" comment="libreoffice-gtk2-6.2.7.1-8.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51931" version="1" class="patch">
	<metadata>
		<title>libruby2_5-2_5-2.5.9-4.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-6708" ref_url="https://www.suse.com/security/cve/CVE-2012-6708/" source="CVE"/>
		<reference ref_id="CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2020-8130" ref_url="https://www.suse.com/security/cve/CVE-2020-8130/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_5-2_5-2.5.9-4.17.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2012-6708/">CVE-2012-6708</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8130/">CVE-2020-8130</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628862" comment="libruby2_5-2_5-2.5.9-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628863" comment="ruby2.5-2.5.9-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628866" comment="ruby2.5-stdlib-2.5.9-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51932" version="1" class="patch">
	<metadata>
		<title>libseccomp2-2.4.1-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
These are all security issues fixed in the libseccomp2-2.4.1-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482393" comment="libseccomp2-2.4.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51933" version="1" class="patch">
	<metadata>
		<title>libserf-1-1-1.3.9-2.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3504" ref_url="https://www.suse.com/security/cve/CVE-2014-3504/" source="CVE"/>
		<description>
These are all security issues fixed in the libserf-1-1-1.3.9-2.31 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3504/">CVE-2014-3504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480712" comment="libserf-1-1-1.3.9-2.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51934" version="1" class="patch">
	<metadata>
		<title>libslirp0-4.3.1-1.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libslirp0-4.3.1-1.51 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629864" comment="libslirp0-4.3.1-1.51 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51935" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.28-5.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="CVE-2017-12562" ref_url="https://www.suse.com/security/cve/CVE-2017-12562/" source="CVE"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.28-5.5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12562/">CVE-2017-12562</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481481" comment="libsndfile1-1.0.28-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630093" comment="libsndfile1-32bit-1.0.28-5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51936" version="1" class="patch">
	<metadata>
		<title>libsnmp30-5.7.3-8.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-5.7.3-8.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481482" comment="libsnmp30-5.7.3-8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481483" comment="net-snmp-5.7.3-8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481485" comment="perl-SNMP-5.7.3-8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481486" comment="snmp-mibs-5.7.3-8.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51937" version="1" class="patch">
	<metadata>
		<title>libsolv-tools-0.7.19-3.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
These are all security issues fixed in the libsolv-tools-0.7.19-3.23.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694879" comment="libsolv-tools-0.7.19-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694880" comment="python3-solv-0.7.19-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694881" comment="ruby-solv-0.7.19-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51938" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.68.3-2.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.68.3-2.32 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482399" comment="libsoup-2_4-1-2.68.3-2.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482400" comment="libsoup-lang-2.68.3-2.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487573" comment="typelib-1_0-Soup-2_4-2.68.3-2.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51939" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.38-1.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.38-1.59 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628871" comment="libspice-client-glib-2_0-8-0.38-1.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628872" comment="libspice-client-glib-helper-0.38-1.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628873" comment="libspice-client-gtk-3_0-5-0.38-1.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629986" comment="typelib-1_0-SpiceClientGlib-2_0-0.38-1.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629987" comment="typelib-1_0-SpiceClientGtk-3_0-0.38-1.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51940" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.14.3-1.48 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.14.3-1.48 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629866" comment="libspice-server1-0.14.3-1.48 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51941" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.28.0-3.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936/" source="CVE"/>
		<reference ref_id="CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.28.0-3.9.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482404" comment="libsqlite3-0-3.28.0-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482406" comment="sqlite3-3.28.0-3.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51942" version="1" class="patch">
	<metadata>
		<title>libsrt1-1.3.4-1.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-15784" ref_url="https://www.suse.com/security/cve/CVE-2019-15784/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrt1-1.3.4-1.45 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15784/">CVE-2019-15784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487574" comment="libsrt1-1.3.4-1.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51943" version="1" class="patch">
	<metadata>
		<title>libsrtp2-1-2.2.0-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp2-1-2.2.0-1.34 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487575" comment="libsrtp2-1-2.2.0-1.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51944" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.9.0-4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.9.0-4.13.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628874" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51945" version="1" class="patch">
	<metadata>
		<title>libssh4-0.8.7-10.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933/" source="CVE"/>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh4-0.8.7-10.12.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482409" comment="libssh4-0.8.7-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482410" comment="libssh4-32bit-0.8.7-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51946" version="1" class="patch">
	<metadata>
		<title>libstaroffice-0_0-0-0.0.7-7.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-9432" ref_url="https://www.suse.com/security/cve/CVE-2017-9432/" source="CVE"/>
		<description>
These are all security issues fixed in the libstaroffice-0_0-0-0.0.7-7.3.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9432/">CVE-2017-9432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630314" comment="libstaroffice-0_0-0-0.0.7-7.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51947" version="1" class="patch">
	<metadata>
		<title>libsystemd0-246.13-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-7510" ref_url="https://www.suse.com/security/cve/CVE-2015-7510/" source="CVE"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15687" ref_url="https://www.suse.com/security/cve/CVE-2018-15687/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-21029" ref_url="https://www.suse.com/security/cve/CVE-2018-21029/" source="CVE"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843/" source="CVE"/>
		<reference ref_id="CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-246.13-5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7510/">CVE-2015-7510</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15687/">CVE-2018-15687</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21029/">CVE-2018-21029</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628876" comment="libsystemd0-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628877" comment="libsystemd0-32bit-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628879" comment="libudev1-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628880" comment="libudev1-32bit-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628881" comment="systemd-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628882" comment="systemd-32bit-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628883" comment="systemd-container-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628886" comment="systemd-doc-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628888" comment="systemd-lang-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628889" comment="systemd-sysvinit-246.13-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628890" comment="udev-246.13-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51948" version="1" class="patch">
	<metadata>
		<title>libtag1-1.11.1-4.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-12678" ref_url="https://www.suse.com/security/cve/CVE-2017-12678/" source="CVE"/>
		<reference ref_id="CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.11.1-4.9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12678/">CVE-2017-12678</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628891" comment="libtag1-1.11.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629217" comment="libtag_c0-1.11.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51949" version="1" class="patch">
	<metadata>
		<title>libtasn1-4.13-4.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-4.13-4.5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482427" comment="libtasn1-4.13-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482428" comment="libtasn1-6-4.13-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482429" comment="libtasn1-6-32bit-4.13-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51950" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.27-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.27-1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480757" comment="libthai-data-0.1.27-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480758" comment="libthai0-0.1.27-1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51951" version="1" class="patch">
	<metadata>
		<title>libtiff5-4.0.9-5.30.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-4.0.9-5.30.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628893" comment="libtiff5-4.0.9-5.30.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51952" version="1" class="patch">
	<metadata>
		<title>libtirpc-netconfig-1.2.6-1.131 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-netconfig-1.2.6-1.131 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628895" comment="libtirpc-netconfig-1.2.6-1.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628896" comment="libtirpc3-1.2.6-1.131 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628897" comment="libtirpc3-32bit-1.2.6-1.131 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51953" version="1" class="patch">
	<metadata>
		<title>libtpms0-0.8.2-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-3446" ref_url="https://www.suse.com/security/cve/CVE-2021-3446/" source="CVE"/>
		<reference ref_id="CVE-2021-3505" ref_url="https://www.suse.com/security/cve/CVE-2021-3505/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms0-0.8.2-1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3446/">CVE-2021-3446</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3505/">CVE-2021-3505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629870" comment="libtpms0-0.8.2-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51954" version="1" class="patch">
	<metadata>
		<title>libtss2-esys0-2.4.5-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-24455" ref_url="https://www.suse.com/security/cve/CVE-2020-24455/" source="CVE"/>
		<description>
These are all security issues fixed in the libtss2-esys0-2.4.5-1.11 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24455/">CVE-2020-24455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628898" comment="libtss2-esys0-2.4.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628900" comment="libtss2-mu0-2.4.5-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628902" comment="libtss2-sys0-2.4.5-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51955" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.8.1-1.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.8.1-1.39 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482438" comment="libudisks2-0-2.8.1-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694882" comment="libudisks2-0_btrfs-2.8.1-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482441" comment="udisks2-2.8.1-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482442" comment="udisks2-lang-2.8.1-1.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51956" version="1" class="patch">
	<metadata>
		<title>libunwind-1.5.0-4.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
These are all security issues fixed in the libunwind-1.5.0-4.5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628911" comment="libunwind-1.5.0-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51957" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.7.4-4.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.7.4-4.72 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482443" comment="libupsclient1-2.7.4-4.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488209" comment="nut-2.7.4-4.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694883" comment="nut-cgi-2.7.4-4.72 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51958" version="1" class="patch">
	<metadata>
		<title>libvdpau1-1.1.1-1.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau1-1.1.1-1.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486512" comment="libvdpau1-1.1.1-1.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51959" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer0-0.6.0-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer0-0.6.0-4.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488549" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51960" version="1" class="patch">
	<metadata>
		<title>libvirt-bash-completion-7.1.0-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="CVE-2020-10701" ref_url="https://www.suse.com/security/cve/CVE-2020-10701/" source="CVE"/>
		<reference ref_id="CVE-2020-12430" ref_url="https://www.suse.com/security/cve/CVE-2020-12430/" source="CVE"/>
		<reference ref_id="CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339/" source="CVE"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-bash-completion-7.1.0-4.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10701/">CVE-2020-10701</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12430/">CVE-2020-12430</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629873" comment="libvirt-bash-completion-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629874" comment="libvirt-client-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629875" comment="libvirt-daemon-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629876" comment="libvirt-daemon-config-network-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629878" comment="libvirt-daemon-driver-interface-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629881" comment="libvirt-daemon-driver-network-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629882" comment="libvirt-daemon-driver-nodedev-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629883" comment="libvirt-daemon-driver-nwfilter-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629884" comment="libvirt-daemon-driver-qemu-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629885" comment="libvirt-daemon-driver-secret-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629886" comment="libvirt-daemon-driver-storage-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629887" comment="libvirt-daemon-driver-storage-core-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629888" comment="libvirt-daemon-driver-storage-disk-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629889" comment="libvirt-daemon-driver-storage-iscsi-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629890" comment="libvirt-daemon-driver-storage-iscsi-direct-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629891" comment="libvirt-daemon-driver-storage-logical-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629892" comment="libvirt-daemon-driver-storage-mpath-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629893" comment="libvirt-daemon-driver-storage-rbd-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629894" comment="libvirt-daemon-driver-storage-scsi-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629897" comment="libvirt-daemon-qemu-7.1.0-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628913" comment="libvirt-libs-7.1.0-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51961" version="1" class="patch">
	<metadata>
		<title>libvlc5-3.0.13-bp153.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9625" ref_url="https://www.suse.com/security/cve/CVE-2014-9625/" source="CVE"/>
		<reference ref_id="CVE-2015-5949" ref_url="https://www.suse.com/security/cve/CVE-2015-5949/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-5108" ref_url="https://www.suse.com/security/cve/CVE-2016-5108/" source="CVE"/>
		<reference ref_id="CVE-2017-10699" ref_url="https://www.suse.com/security/cve/CVE-2017-10699/" source="CVE"/>
		<reference ref_id="CVE-2017-9300" ref_url="https://www.suse.com/security/cve/CVE-2017-9300/" source="CVE"/>
		<reference ref_id="CVE-2018-19857" ref_url="https://www.suse.com/security/cve/CVE-2018-19857/" source="CVE"/>
		<reference ref_id="CVE-2019-12874" ref_url="https://www.suse.com/security/cve/CVE-2019-12874/" source="CVE"/>
		<reference ref_id="CVE-2019-13602" ref_url="https://www.suse.com/security/cve/CVE-2019-13602/" source="CVE"/>
		<reference ref_id="CVE-2019-13962" ref_url="https://www.suse.com/security/cve/CVE-2019-13962/" source="CVE"/>
		<reference ref_id="CVE-2019-14437" ref_url="https://www.suse.com/security/cve/CVE-2019-14437/" source="CVE"/>
		<reference ref_id="CVE-2019-14438" ref_url="https://www.suse.com/security/cve/CVE-2019-14438/" source="CVE"/>
		<reference ref_id="CVE-2019-14498" ref_url="https://www.suse.com/security/cve/CVE-2019-14498/" source="CVE"/>
		<reference ref_id="CVE-2019-14533" ref_url="https://www.suse.com/security/cve/CVE-2019-14533/" source="CVE"/>
		<reference ref_id="CVE-2019-14534" ref_url="https://www.suse.com/security/cve/CVE-2019-14534/" source="CVE"/>
		<reference ref_id="CVE-2019-14535" ref_url="https://www.suse.com/security/cve/CVE-2019-14535/" source="CVE"/>
		<reference ref_id="CVE-2019-14776" ref_url="https://www.suse.com/security/cve/CVE-2019-14776/" source="CVE"/>
		<reference ref_id="CVE-2019-14777" ref_url="https://www.suse.com/security/cve/CVE-2019-14777/" source="CVE"/>
		<reference ref_id="CVE-2019-14778" ref_url="https://www.suse.com/security/cve/CVE-2019-14778/" source="CVE"/>
		<reference ref_id="CVE-2019-14970" ref_url="https://www.suse.com/security/cve/CVE-2019-14970/" source="CVE"/>
		<reference ref_id="CVE-2019-5439" ref_url="https://www.suse.com/security/cve/CVE-2019-5439/" source="CVE"/>
		<reference ref_id="CVE-2019-5459" ref_url="https://www.suse.com/security/cve/CVE-2019-5459/" source="CVE"/>
		<reference ref_id="CVE-2019-5460" ref_url="https://www.suse.com/security/cve/CVE-2019-5460/" source="CVE"/>
		<reference ref_id="CVE-2020-13428" ref_url="https://www.suse.com/security/cve/CVE-2020-13428/" source="CVE"/>
		<reference ref_id="CVE-2020-26664" ref_url="https://www.suse.com/security/cve/CVE-2020-26664/" source="CVE"/>
		<description>
These are all security issues fixed in the libvlc5-3.0.13-bp153.1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9625/">CVE-2014-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5949/">CVE-2015-5949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5108/">CVE-2016-5108</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10699/">CVE-2017-10699</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9300/">CVE-2017-9300</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19857/">CVE-2018-19857</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12874/">CVE-2019-12874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13602/">CVE-2019-13602</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13962/">CVE-2019-13962</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14437/">CVE-2019-14437</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14438/">CVE-2019-14438</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14498/">CVE-2019-14498</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14533/">CVE-2019-14533</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14534/">CVE-2019-14534</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14535/">CVE-2019-14535</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14776/">CVE-2019-14776</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14777/">CVE-2019-14777</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14778/">CVE-2019-14778</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14970/">CVE-2019-14970</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5439/">CVE-2019-5439</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5459/">CVE-2019-5459</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5460/">CVE-2019-5460</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13428/">CVE-2020-13428</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26664/">CVE-2020-26664</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694884" comment="libvlc5-3.0.13-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694885" comment="libvlccore9-3.0.13-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694886" comment="vlc-3.0.13-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694887" comment="vlc-codec-gstreamer-3.0.13-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694888" comment="vlc-lang-3.0.13-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694889" comment="vlc-noX-3.0.13-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694890" comment="vlc-qt-3.0.13-bp153.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694891" comment="vlc-vdpau-3.0.13-bp153.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51962" version="1" class="patch">
	<metadata>
		<title>libvmtools0-11.2.5-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools0-11.2.5-1.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628915" comment="libvmtools0-11.2.5-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628916" comment="open-vm-tools-11.2.5-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629219" comment="open-vm-tools-desktop-11.2.5-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51963" version="1" class="patch">
	<metadata>
		<title>libvncclient0-0.9.10-4.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
These are all security issues fixed in the libvncclient0-0.9.10-4.25.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694892" comment="libvncclient0-0.9.10-bp153.2.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51964" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.6-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.6-4.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481533" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630097" comment="libvorbis0-32bit-1.3.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481534" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630098" comment="libvorbisenc2-32bit-1.3.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481535" comment="libvorbisfile3-1.3.6-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51965" version="1" class="patch">
	<metadata>
		<title>libvpx4-1.6.1-6.6.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-1621" ref_url="https://www.suse.com/security/cve/CVE-2016-1621/" source="CVE"/>
		<reference ref_id="CVE-2016-2464" ref_url="https://www.suse.com/security/cve/CVE-2016-2464/" source="CVE"/>
		<reference ref_id="CVE-2017-0641" ref_url="https://www.suse.com/security/cve/CVE-2017-0641/" source="CVE"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126/" source="CVE"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9325" ref_url="https://www.suse.com/security/cve/CVE-2019-9325/" source="CVE"/>
		<reference ref_id="CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx4-1.6.1-6.6.8 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1621/">CVE-2016-1621</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2464/">CVE-2016-2464</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0641/">CVE-2017-0641</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9325/">CVE-2019-9325</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482448" comment="libvpx4-1.6.1-6.6.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51966" version="1" class="patch">
	<metadata>
		<title>libwavpack1-5.4.0-4.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10536" ref_url="https://www.suse.com/security/cve/CVE-2018-10536/" source="CVE"/>
		<reference ref_id="CVE-2018-10537" ref_url="https://www.suse.com/security/cve/CVE-2018-10537/" source="CVE"/>
		<reference ref_id="CVE-2018-10538" ref_url="https://www.suse.com/security/cve/CVE-2018-10538/" source="CVE"/>
		<reference ref_id="CVE-2018-10539" ref_url="https://www.suse.com/security/cve/CVE-2018-10539/" source="CVE"/>
		<reference ref_id="CVE-2018-10540" ref_url="https://www.suse.com/security/cve/CVE-2018-10540/" source="CVE"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767/" source="CVE"/>
		<reference ref_id="CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253/" source="CVE"/>
		<reference ref_id="CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
These are all security issues fixed in the libwavpack1-5.4.0-4.9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10536/">CVE-2018-10536</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10537/">CVE-2018-10537</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10538/">CVE-2018-10538</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10539/">CVE-2018-10539</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10540/">CVE-2018-10540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628918" comment="libwavpack1-5.4.0-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51967" version="1" class="patch">
	<metadata>
		<title>libwebp7-1.0.3-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-8888" ref_url="https://www.suse.com/security/cve/CVE-2016-8888/" source="CVE"/>
		<reference ref_id="CVE-2016-9085" ref_url="https://www.suse.com/security/cve/CVE-2016-9085/" source="CVE"/>
		<description>
These are all security issues fixed in the libwebp7-1.0.3-1.62 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8888/">CVE-2016-8888</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9085/">CVE-2016-9085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482450" comment="libwebp7-1.0.3-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482451" comment="libwebpdemux2-1.0.3-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487581" comment="libwebpmux3-1.0.3-1.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51968" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.8.4-2.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.8.4-2.30 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694893" comment="libwmf-0_2-7-0.2.8.4-bp153.1.32 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51969" version="1" class="patch">
	<metadata>
		<title>libwpd-0_10-10-0.10.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-14226" ref_url="https://www.suse.com/security/cve/CVE-2017-14226/" source="CVE"/>
		<reference ref_id="CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208/" source="CVE"/>
		<description>
These are all security issues fixed in the libwpd-0_10-10-0.10.2-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14226/">CVE-2017-14226</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489168" comment="libwpd-0_10-10-0.10.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51970" version="1" class="patch">
	<metadata>
		<title>libxapian30-1.4.17-bp153.1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-0499" ref_url="https://www.suse.com/security/cve/CVE-2018-0499/" source="CVE"/>
		<description>
These are all security issues fixed in the libxapian30-1.4.17-bp153.1.19 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0499/">CVE-2018-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694894" comment="libxapian30-1.4.17-bp153.1.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51971" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_2-3.2.3-1.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_2-3.2.3-1.28 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628923" comment="libxerces-c-3_2-3.2.3-1.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51972" version="1" class="patch">
	<metadata>
		<title>libxkbcommon-x11-0-0.8.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854/" source="CVE"/>
		<reference ref_id="CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855/" source="CVE"/>
		<reference ref_id="CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856/" source="CVE"/>
		<reference ref_id="CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857/" source="CVE"/>
		<reference ref_id="CVE-2018-15858" ref_url="https://www.suse.com/security/cve/CVE-2018-15858/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<reference ref_id="CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864/" source="CVE"/>
		<description>
These are all security issues fixed in the libxkbcommon-x11-0-0.8.2-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15858/">CVE-2018-15858</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481578" comment="libxkbcommon-x11-0-0.8.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481580" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51973" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.7-3.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.7-3.31.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694895" comment="libxml2-2-2.9.7-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694896" comment="libxml2-2-32bit-2.9.7-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694897" comment="libxml2-tools-2.9.7-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694898" comment="python3-libxml2-python-2.9.7-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51974" version="1" class="patch">
	<metadata>
		<title>libxslt-tools-1.1.32-3.8.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-tools-1.1.32-3.8.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="low" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482466" comment="libxslt-tools-1.1.32-3.8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482467" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51975" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.7-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.7-1.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480828" comment="libyaml-0-2-0.1.7-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51976" version="1" class="patch">
	<metadata>
		<title>libyaml-cpp0_6-0.6.1-4.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-cpp0_6-0.6.1-4.2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628930" comment="libyaml-cpp0_6-0.6.1-4.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51977" version="1" class="patch">
	<metadata>
		<title>libzip5-1.5.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2017-12858" ref_url="https://www.suse.com/security/cve/CVE-2017-12858/" source="CVE"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip5-1.5.1-1.9 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12858/">CVE-2017-12858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480831" comment="libzip5-1.5.1-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51978" version="1" class="patch">
	<metadata>
		<title>libzstd1-1.4.4-1.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-11922" ref_url="https://www.suse.com/security/cve/CVE-2019-11922/" source="CVE"/>
		<reference ref_id="CVE-2021-24031" ref_url="https://www.suse.com/security/cve/CVE-2021-24031/" source="CVE"/>
		<reference ref_id="CVE-2021-24032" ref_url="https://www.suse.com/security/cve/CVE-2021-24032/" source="CVE"/>
		<description>
These are all security issues fixed in the libzstd1-1.4.4-1.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11922/">CVE-2019-11922</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24031/">CVE-2021-24031</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24032/">CVE-2021-24032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628934" comment="libzstd1-1.4.4-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628935" comment="libzstd1-32bit-1.4.4-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51979" version="1" class="patch">
	<metadata>
		<title>libzypp-17.25.10-3.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-17.25.10-3.36.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694899" comment="libzypp-17.25.10-3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51980" version="1" class="patch">
	<metadata>
		<title>login_defs-4.8.1-2.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<description>
These are all security issues fixed in the login_defs-4.8.1-2.43 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628939" comment="login_defs-4.8.1-2.43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628940" comment="shadow-4.8.1-2.43 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51981" version="1" class="patch">
	<metadata>
		<title>logrotate-3.13.0-4.3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.13.0-4.3.9 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481596" comment="logrotate-3.13.0-4.3.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51982" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-1.87 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-1.87 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480839" comment="mailx-12.5-1.87 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51983" version="1" class="patch">
	<metadata>
		<title>mariadb-10.5.8-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0610" ref_url="https://www.suse.com/security/cve/CVE-2016-0610/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10286" ref_url="https://www.suse.com/security/cve/CVE-2017-10286/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2503" ref_url="https://www.suse.com/security/cve/CVE-2019-2503/" source="CVE"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814/" source="CVE"/>
		<reference ref_id="CVE-2020-7221" ref_url="https://www.suse.com/security/cve/CVE-2020-7221/" source="CVE"/>
		<description>
These are all security issues fixed in the mariadb-10.5.8-1.5 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0610/">CVE-2016-0610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10286/">CVE-2017-10286</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901</cve>
	<cve impact="important" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2503/">CVE-2019-2503</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<cve impact="important" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7221/">CVE-2020-7221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629835" comment="mariadb-10.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629836" comment="mariadb-client-10.5.8-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629837" comment="mariadb-errormessages-10.5.8-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51984" version="1" class="patch">
	<metadata>
		<title>messagelib-20.04.2-bp153.1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-10732" ref_url="https://www.suse.com/security/cve/CVE-2019-10732/" source="CVE"/>
		<description>
These are all security issues fixed in the messagelib-20.04.2-bp153.1.29 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10732/">CVE-2019-10732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694900" comment="messagelib-20.04.2-bp153.1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694901" comment="messagelib-lang-20.04.2-bp153.1.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51985" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-4.25.1-3.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-4.25.1-3.17.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628941" comment="mozilla-nspr-4.25.1-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51986" version="1" class="patch">
	<metadata>
		<title>nfs-client-2.1.1-10.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
These are all security issues fixed in the nfs-client-2.1.1-10.12.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694902" comment="nfs-client-2.1.1-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694903" comment="nfs-kernel-server-2.1.1-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51987" version="1" class="patch">
	<metadata>
		<title>okular-20.04.2-bp153.1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1000801" ref_url="https://www.suse.com/security/cve/CVE-2018-1000801/" source="CVE"/>
		<reference ref_id="CVE-2020-9359" ref_url="https://www.suse.com/security/cve/CVE-2020-9359/" source="CVE"/>
		<description>
These are all security issues fixed in the okular-20.04.2-bp153.1.31 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000801/">CVE-2018-1000801</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9359/">CVE-2020-9359</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694904" comment="okular-20.04.2-bp153.1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694905" comment="okular-lang-20.04.2-bp153.1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51988" version="1" class="patch">
	<metadata>
		<title>openconnect-7.08-6.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-16239" ref_url="https://www.suse.com/security/cve/CVE-2019-16239/" source="CVE"/>
		<reference ref_id="CVE-2020-12105" ref_url="https://www.suse.com/security/cve/CVE-2020-12105/" source="CVE"/>
		<reference ref_id="CVE-2020-12823" ref_url="https://www.suse.com/security/cve/CVE-2020-12823/" source="CVE"/>
		<description>
These are all security issues fixed in the openconnect-7.08-6.9.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16239/">CVE-2019-16239</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12105/">CVE-2020-12105</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12823/">CVE-2020-12823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630322" comment="openconnect-7.08-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630325" comment="openconnect-lang-7.08-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51989" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-6.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-6.15.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628951" comment="openslp-2.0.0-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628952" comment="openslp-32bit-2.0.0-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51990" version="1" class="patch">
	<metadata>
		<title>openssh-8.4p1-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-8.4p1-1.30 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628954" comment="openssh-8.4p1-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628955" comment="openssh-clients-8.4p1-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628956" comment="openssh-common-8.4p1-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628958" comment="openssh-server-8.4p1-1.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51991" version="1" class="patch">
	<metadata>
		<title>openssl-1.1.1d-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the openssl-1.1.1d-1.46 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<cve impact="low" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="low" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482336" comment="openssl-1.1.1d-1.46 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51992" version="1" class="patch">
	<metadata>
		<title>openvpn-2.4.3-5.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="CVE-2017-7522" ref_url="https://www.suse.com/security/cve/CVE-2017-7522/" source="CVE"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-9336" ref_url="https://www.suse.com/security/cve/CVE-2018-9336/" source="CVE"/>
		<reference ref_id="CVE-2020-11810" ref_url="https://www.suse.com/security/cve/CVE-2020-11810/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.4.3-5.7.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7522/">CVE-2017-7522</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9336/">CVE-2018-9336</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11810/">CVE-2020-11810</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694906" comment="openvpn-2.4.3-5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51993" version="1" class="patch">
	<metadata>
		<title>ovmf-202008-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<reference ref_id="CVE-2019-14553" ref_url="https://www.suse.com/security/cve/CVE-2019-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-202008-8.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14553/">CVE-2019-14553</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629914" comment="ovmf-202008-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629916" comment="qemu-ovmf-x86_64-202008-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629917" comment="qemu-uefi-aarch64-202008-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51994" version="1" class="patch">
	<metadata>
		<title>p7zip-16.02-14.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-2334" ref_url="https://www.suse.com/security/cve/CVE-2016-2334/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<reference ref_id="CVE-2016-9296" ref_url="https://www.suse.com/security/cve/CVE-2016-9296/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<reference ref_id="CVE-2021-3465" ref_url="https://www.suse.com/security/cve/CVE-2021-3465/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-16.02-14.5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2334/">CVE-2016-2334</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9296/">CVE-2016-9296</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3465/">CVE-2021-3465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694907" comment="p7zip-16.02-14.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694908" comment="p7zip-full-16.02-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51995" version="1" class="patch">
	<metadata>
		<title>pam-1.3.0-6.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="CVE-2018-17953" ref_url="https://www.suse.com/security/cve/CVE-2018-17953/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.3.0-6.29.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17953/">CVE-2018-17953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628960" comment="pam-1.3.0-6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628961" comment="pam-32bit-1.3.0-6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628963" comment="pam-doc-1.3.0-6.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51996" version="1" class="patch">
	<metadata>
		<title>perl-5.26.1-15.87 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312/" source="CVE"/>
		<reference ref_id="CVE-2018-18313" ref_url="https://www.suse.com/security/cve/CVE-2018-18313/" source="CVE"/>
		<reference ref_id="CVE-2018-18314" ref_url="https://www.suse.com/security/cve/CVE-2018-18314/" source="CVE"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-5.26.1-15.87 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18313/">CVE-2018-18313</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18314/">CVE-2018-18314</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628966" comment="perl-5.26.1-15.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628967" comment="perl-base-5.26.1-15.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628968" comment="perl-base-32bit-5.26.1-15.87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628969" comment="perl-core-DB_File-5.26.1-15.87 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51997" version="1" class="patch">
	<metadata>
		<title>perl-Archive-Zip-1.60-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Archive-Zip-1.60-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481620" comment="perl-Archive-Zip-1.60-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51998" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.72-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.72-1.26 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480873" comment="perl-HTML-Parser-3.72-1.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51999" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.06-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.06-1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480874" comment="perl-LWP-Protocol-https-6.06-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52000" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0132-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0132-1.20 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480875" comment="perl-XML-LibXML-2.0132-1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52001" version="1" class="patch">
	<metadata>
		<title>perl-XML-Twig-3.52-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-Twig-3.52-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628974" comment="perl-XML-Twig-3.52-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52002" version="1" class="patch">
	<metadata>
		<title>permissions-20181225-23.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687/" source="CVE"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="CVE-2020-8025" ref_url="https://www.suse.com/security/cve/CVE-2020-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the permissions-20181225-23.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8025/">CVE-2020-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694909" comment="permissions-20181225-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52003" version="1" class="patch">
	<metadata>
		<title>plasma5-desktop-5.18.6-bp153.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<description>
These are all security issues fixed in the plasma5-desktop-5.18.6-bp153.2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694910" comment="plasma5-desktop-5.18.6-bp153.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694911" comment="plasma5-desktop-emojier-5.18.6-bp153.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694912" comment="plasma5-desktop-lang-5.18.6-bp153.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52004" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.3.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.3.8-7.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628978" comment="powerpc-utils-1.3.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52005" version="1" class="patch">
	<metadata>
		<title>ppc64-diag-2.7.6-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the ppc64-diag-2.7.6-3.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628979" comment="ppc64-diag-2.7.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52006" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-5.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487583" comment="ppp-2.4.7-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52007" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-2.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-2.34 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480880" comment="procmail-3.22-2.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52008" version="1" class="patch">
	<metadata>
		<title>python3-cryptography-2.8-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-cryptography-2.8-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628987" comment="python3-cryptography-2.8-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52009" version="1" class="patch">
	<metadata>
		<title>python3-cupshelpers-1.5.7-6.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-cupshelpers-1.5.7-6.27 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486538" comment="python3-cupshelpers-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694913" comment="system-config-printer-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694914" comment="system-config-printer-applet-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486539" comment="system-config-printer-common-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486540" comment="system-config-printer-common-lang-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486541" comment="system-config-printer-dbus-service-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486542" comment="udev-configure-printer-1.5.7-6.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52010" version="1" class="patch">
	<metadata>
		<title>python3-numpy-1.17.3-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-numpy-1.17.3-7.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628989" comment="python3-numpy-1.17.3-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52011" version="1" class="patch">
	<metadata>
		<title>python3-pip-20.0.2-6.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-pip-20.0.2-6.12.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628991" comment="python3-pip-20.0.2-6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52012" version="1" class="patch">
	<metadata>
		<title>python3-requests-2.24.0-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-requests-2.24.0-1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628993" comment="python3-requests-2.24.0-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52013" version="1" class="patch">
	<metadata>
		<title>python3-setuptools-40.5.0-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-setuptools-40.5.0-6.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629000" comment="python3-setuptools-40.5.0-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52014" version="1" class="patch">
	<metadata>
		<title>python3-urllib3-1.25.10-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-urllib3-1.25.10-2.18 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629005" comment="python3-urllib3-1.25.10-2.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52015" version="1" class="patch">
	<metadata>
		<title>qemu-5.2.0-9.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118/" source="CVE"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123/" source="CVE"/>
		<reference ref_id="CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124/" source="CVE"/>
		<reference ref_id="CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191/" source="CVE"/>
		<reference ref_id="CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702/" source="CVE"/>
		<reference ref_id="CVE-2020-10717" ref_url="https://www.suse.com/security/cve/CVE-2020-10717/" source="CVE"/>
		<reference ref_id="CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761/" source="CVE"/>
		<reference ref_id="CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102/" source="CVE"/>
		<reference ref_id="CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-5.2.0-9.18 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="low" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="low" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118</cve>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10717/">CVE-2020-10717</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629929" comment="qemu-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629930" comment="qemu-arm-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629933" comment="qemu-audio-spice-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629934" comment="qemu-block-curl-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629936" comment="qemu-block-rbd-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629937" comment="qemu-block-ssh-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629939" comment="qemu-chardev-spice-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629940" comment="qemu-guest-agent-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629941" comment="qemu-hw-display-qxl-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629942" comment="qemu-hw-display-virtio-gpu-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629943" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629944" comment="qemu-hw-display-virtio-vga-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629946" comment="qemu-hw-usb-redirect-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694915" comment="qemu-hw-usb-smartcard-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629947" comment="qemu-ipxe-1.0.0+-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629948" comment="qemu-ksm-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694916" comment="qemu-microvm-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629951" comment="qemu-ppc-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629953" comment="qemu-seabios-1.14.0_0_g155821a-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629954" comment="qemu-sgabios-8-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629007" comment="qemu-tools-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629956" comment="qemu-ui-curses-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629957" comment="qemu-ui-gtk-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629958" comment="qemu-ui-opengl-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629959" comment="qemu-ui-spice-app-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629960" comment="qemu-ui-spice-core-5.2.0-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629961" comment="qemu-vgabios-1.14.0_0_g155821a-9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629962" comment="qemu-x86-5.2.0-9.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52016" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-5.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-5.9.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482535" comment="rpcbind-0.2.3-5.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52017" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.14.1-29.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.14.1-29.46 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629008" comment="rpm-4.14.1-29.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629009" comment="rpm-32bit-4.14.1-29.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52018" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.3-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.3-4.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482539" comment="rsync-3.1.3-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52019" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.39.0-4.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.39.0-4.10.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629011" comment="rsyslog-8.39.0-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52020" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11+git.20130926-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11+git.20130926-1.34 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486543" comment="rtkit-0.11+git.20130926-1.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52021" version="1" class="patch">
	<metadata>
		<title>ruby2.5-rubygem-nokogiri-1.8.5-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-3740" ref_url="https://www.suse.com/security/cve/CVE-2018-3740/" source="CVE"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby2.5-rubygem-nokogiri-1.8.5-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="low" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-3740/">CVE-2018-3740</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629013" comment="ruby2.5-rubygem-nokogiri-1.8.5-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52022" version="1" class="patch">
	<metadata>
		<title>sane-backends-1.0.32-6.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<description>
These are all security issues fixed in the sane-backends-1.0.32-6.6.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629222" comment="sane-backends-1.0.32-6.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629223" comment="sane-backends-autoconfig-1.0.32-6.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52023" version="1" class="patch">
	<metadata>
		<title>screen-4.6.2-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5618" ref_url="https://www.suse.com/security/cve/CVE-2017-5618/" source="CVE"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<description>
These are all security issues fixed in the screen-4.6.2-5.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5618/">CVE-2017-5618</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629014" comment="screen-4.6.2-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52024" version="1" class="patch">
	<metadata>
		<title>sddm-0.18.0-lp153.1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-7271" ref_url="https://www.suse.com/security/cve/CVE-2014-7271/" source="CVE"/>
		<reference ref_id="CVE-2014-7272" ref_url="https://www.suse.com/security/cve/CVE-2014-7272/" source="CVE"/>
		<reference ref_id="CVE-2015-0856" ref_url="https://www.suse.com/security/cve/CVE-2015-0856/" source="CVE"/>
		<reference ref_id="CVE-2018-14345" ref_url="https://www.suse.com/security/cve/CVE-2018-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-28049" ref_url="https://www.suse.com/security/cve/CVE-2020-28049/" source="CVE"/>
		<description>
These are all security issues fixed in the sddm-0.18.0-lp153.1.31 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7271/">CVE-2014-7271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7272/">CVE-2014-7272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0856/">CVE-2015-0856</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14345/">CVE-2018-14345</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28049/">CVE-2020-28049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694917" comment="sddm-0.18.0-lp153.1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694918" comment="sddm-branding-openSUSE-0.18.0-lp153.1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52025" version="1" class="patch">
	<metadata>
		<title>sharutils-4.15.2-2.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-1000097" ref_url="https://www.suse.com/security/cve/CVE-2018-1000097/" source="CVE"/>
		<description>
These are all security issues fixed in the sharutils-4.15.2-2.21 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000097/">CVE-2018-1000097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480924" comment="sharutils-4.15.2-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480925" comment="sharutils-lang-4.15.2-2.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52026" version="1" class="patch">
	<metadata>
		<title>shim-15.4-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-15.4-2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629015" comment="shim-15.4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52027" version="1" class="patch">
	<metadata>
		<title>spice-vdagent-0.20.0-1.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<description>
These are all security issues fixed in the spice-vdagent-0.20.0-1.51 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629225" comment="spice-vdagent-0.20.0-1.51 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52028" version="1" class="patch">
	<metadata>
		<title>squashfs-4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645/" source="CVE"/>
		<reference ref_id="CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.4-1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629017" comment="squashfs-4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52029" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.5p2-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.5p2-1.5 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629025" comment="sudo-1.9.5p2-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629027" comment="sudo-plugin-python-1.9.5p2-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52030" version="1" class="patch">
	<metadata>
		<title>swtpm-0.5.2-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-28407" ref_url="https://www.suse.com/security/cve/CVE-2020-28407/" source="CVE"/>
		<description>
These are all security issues fixed in the swtpm-0.5.2-1.20 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-28407/">CVE-2020-28407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629991" comment="swtpm-0.5.2-1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52031" version="1" class="patch">
	<metadata>
		<title>tar-1.30-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.30-3.6.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629031" comment="tar-1.30-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629032" comment="tar-lang-1.30-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629033" comment="tar-rmt-1.30-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52032" version="1" class="patch">
	<metadata>
		<title>telepathy-idle-0.2.0-bp153.1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-idle-0.2.0-bp153.1.14 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694919" comment="telepathy-idle-0.2.0-bp153.1.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52033" version="1" class="patch">
	<metadata>
		<title>texlive-lm-fonts-2017.137.2.004svn28119-7.6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-lm-fonts-2017.137.2.004svn28119-7.6.4 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486991" comment="texlive-lm-fonts-2017.137.2.004svn28119-7.6.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52034" version="1" class="patch">
	<metadata>
		<title>tmux-3.1c-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-19387" ref_url="https://www.suse.com/security/cve/CVE-2018-19387/" source="CVE"/>
		<reference ref_id="CVE-2020-27347" ref_url="https://www.suse.com/security/cve/CVE-2020-27347/" source="CVE"/>
		<description>
These are all security issues fixed in the tmux-3.1c-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19387/">CVE-2018-19387</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27347/">CVE-2020-27347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694920" comment="tmux-3.1c-bp153.1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52035" version="1" class="patch">
	<metadata>
		<title>tnftp-20151004-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8517" ref_url="https://www.suse.com/security/cve/CVE-2014-8517/" source="CVE"/>
		<description>
These are all security issues fixed in the tnftp-20151004-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8517/">CVE-2014-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694921" comment="tnftp-20151004-bp153.1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52036" version="1" class="patch">
	<metadata>
		<title>transmission-common-2.94-bp153.1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-5072" ref_url="https://www.suse.com/security/cve/CVE-2018-5072/" source="CVE"/>
		<reference ref_id="CVE-2018-5702" ref_url="https://www.suse.com/security/cve/CVE-2018-5702/" source="CVE"/>
		<description>
These are all security issues fixed in the transmission-common-2.94-bp153.1.20 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="4.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5072/">CVE-2018-5072</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5702/">CVE-2018-5702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694922" comment="transmission-common-2.94-bp153.1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694923" comment="transmission-gtk-2.94-bp153.1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694924" comment="transmission-gtk-lang-2.94-bp153.1.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52037" version="1" class="patch">
	<metadata>
		<title>trousers-0.3.14-6.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-18898" ref_url="https://www.suse.com/security/cve/CVE-2019-18898/" source="CVE"/>
		<description>
These are all security issues fixed in the trousers-0.3.14-6.6.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18898/">CVE-2019-18898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482434" comment="trousers-0.3.14-6.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52038" version="1" class="patch">
	<metadata>
		<title>u-boot-rpiarm64-2021.01-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-18439" ref_url="https://www.suse.com/security/cve/CVE-2018-18439/" source="CVE"/>
		<reference ref_id="CVE-2018-18440" ref_url="https://www.suse.com/security/cve/CVE-2018-18440/" source="CVE"/>
		<reference ref_id="CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648/" source="CVE"/>
		<reference ref_id="CVE-2020-8432" ref_url="https://www.suse.com/security/cve/CVE-2020-8432/" source="CVE"/>
		<description>
These are all security issues fixed in the u-boot-rpiarm64-2021.01-5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18439/">CVE-2018-18439</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18440/">CVE-2018-18440</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8432/">CVE-2020-8432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629037" comment="u-boot-rpiarm64-2021.01-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629038" comment="u-boot-rpiarm64-doc-2021.01-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52039" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20210216-2.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20210216-2.19.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629040" comment="ucode-intel-20210216-2.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52040" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.6-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.6-3.2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629042" comment="unixODBC-2.3.6-3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52041" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-4.8.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-4.8.13 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481670" comment="unzip-6.00-4.8.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694925" comment="unzip-doc-6.00-4.8.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52042" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.19.0.4-2.48 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.19.0.4-2.48 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480953" comment="update-alternatives-1.19.0.4-2.48 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52043" version="1" class="patch">
	<metadata>
		<title>vim-8.0.1568-5.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
These are all security issues fixed in the vim-8.0.1568-5.14.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629044" comment="vim-8.0.1568-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629045" comment="vim-data-8.0.1568-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629046" comment="vim-data-common-8.0.1568-5.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52044" version="1" class="patch">
	<metadata>
		<title>virt-install-3.2.0-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-10183" ref_url="https://www.suse.com/security/cve/CVE-2019-10183/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-install-3.2.0-5.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10183/">CVE-2019-10183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629995" comment="virt-install-3.2.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629996" comment="virt-manager-3.2.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629997" comment="virt-manager-common-3.2.0-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52045" version="1" class="patch">
	<metadata>
		<title>virtualbox-guest-tools-6.1.20-lp153.1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-6588" ref_url="https://www.suse.com/security/cve/CVE-2014-6588/" source="CVE"/>
		<reference ref_id="CVE-2014-6589" ref_url="https://www.suse.com/security/cve/CVE-2014-6589/" source="CVE"/>
		<reference ref_id="CVE-2014-6590" ref_url="https://www.suse.com/security/cve/CVE-2014-6590/" source="CVE"/>
		<reference ref_id="CVE-2014-6595" ref_url="https://www.suse.com/security/cve/CVE-2014-6595/" source="CVE"/>
		<reference ref_id="CVE-2015-0377" ref_url="https://www.suse.com/security/cve/CVE-2015-0377/" source="CVE"/>
		<reference ref_id="CVE-2015-0418" ref_url="https://www.suse.com/security/cve/CVE-2015-0418/" source="CVE"/>
		<reference ref_id="CVE-2015-0427" ref_url="https://www.suse.com/security/cve/CVE-2015-0427/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4813" ref_url="https://www.suse.com/security/cve/CVE-2015-4813/" source="CVE"/>
		<reference ref_id="CVE-2015-4896" ref_url="https://www.suse.com/security/cve/CVE-2015-4896/" source="CVE"/>
		<reference ref_id="CVE-2016-0678" ref_url="https://www.suse.com/security/cve/CVE-2016-0678/" source="CVE"/>
		<reference ref_id="CVE-2016-5501" ref_url="https://www.suse.com/security/cve/CVE-2016-5501/" source="CVE"/>
		<reference ref_id="CVE-2016-5538" ref_url="https://www.suse.com/security/cve/CVE-2016-5538/" source="CVE"/>
		<reference ref_id="CVE-2016-5545" ref_url="https://www.suse.com/security/cve/CVE-2016-5545/" source="CVE"/>
		<reference ref_id="CVE-2016-5605" ref_url="https://www.suse.com/security/cve/CVE-2016-5605/" source="CVE"/>
		<reference ref_id="CVE-2016-5608" ref_url="https://www.suse.com/security/cve/CVE-2016-5608/" source="CVE"/>
		<reference ref_id="CVE-2016-5610" ref_url="https://www.suse.com/security/cve/CVE-2016-5610/" source="CVE"/>
		<reference ref_id="CVE-2016-5611" ref_url="https://www.suse.com/security/cve/CVE-2016-5611/" source="CVE"/>
		<reference ref_id="CVE-2017-10392" ref_url="https://www.suse.com/security/cve/CVE-2017-10392/" source="CVE"/>
		<reference ref_id="CVE-2017-10407" ref_url="https://www.suse.com/security/cve/CVE-2017-10407/" source="CVE"/>
		<reference ref_id="CVE-2017-10408" ref_url="https://www.suse.com/security/cve/CVE-2017-10408/" source="CVE"/>
		<reference ref_id="CVE-2017-10428" ref_url="https://www.suse.com/security/cve/CVE-2017-10428/" source="CVE"/>
		<reference ref_id="CVE-2017-3290" ref_url="https://www.suse.com/security/cve/CVE-2017-3290/" source="CVE"/>
		<reference ref_id="CVE-2017-3316" ref_url="https://www.suse.com/security/cve/CVE-2017-3316/" source="CVE"/>
		<reference ref_id="CVE-2017-3332" ref_url="https://www.suse.com/security/cve/CVE-2017-3332/" source="CVE"/>
		<reference ref_id="CVE-2017-3513" ref_url="https://www.suse.com/security/cve/CVE-2017-3513/" source="CVE"/>
		<reference ref_id="CVE-2017-3538" ref_url="https://www.suse.com/security/cve/CVE-2017-3538/" source="CVE"/>
		<reference ref_id="CVE-2017-3558" ref_url="https://www.suse.com/security/cve/CVE-2017-3558/" source="CVE"/>
		<reference ref_id="CVE-2017-3559" ref_url="https://www.suse.com/security/cve/CVE-2017-3559/" source="CVE"/>
		<reference ref_id="CVE-2017-3561" ref_url="https://www.suse.com/security/cve/CVE-2017-3561/" source="CVE"/>
		<reference ref_id="CVE-2017-3563" ref_url="https://www.suse.com/security/cve/CVE-2017-3563/" source="CVE"/>
		<reference ref_id="CVE-2017-3575" ref_url="https://www.suse.com/security/cve/CVE-2017-3575/" source="CVE"/>
		<reference ref_id="CVE-2017-3576" ref_url="https://www.suse.com/security/cve/CVE-2017-3576/" source="CVE"/>
		<reference ref_id="CVE-2017-3587" ref_url="https://www.suse.com/security/cve/CVE-2017-3587/" source="CVE"/>
		<reference ref_id="CVE-2017-3733" ref_url="https://www.suse.com/security/cve/CVE-2017-3733/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-2676" ref_url="https://www.suse.com/security/cve/CVE-2018-2676/" source="CVE"/>
		<reference ref_id="CVE-2018-2685" ref_url="https://www.suse.com/security/cve/CVE-2018-2685/" source="CVE"/>
		<reference ref_id="CVE-2018-2686" ref_url="https://www.suse.com/security/cve/CVE-2018-2686/" source="CVE"/>
		<reference ref_id="CVE-2018-2687" ref_url="https://www.suse.com/security/cve/CVE-2018-2687/" source="CVE"/>
		<reference ref_id="CVE-2018-2688" ref_url="https://www.suse.com/security/cve/CVE-2018-2688/" source="CVE"/>
		<reference ref_id="CVE-2018-2689" ref_url="https://www.suse.com/security/cve/CVE-2018-2689/" source="CVE"/>
		<reference ref_id="CVE-2018-2690" ref_url="https://www.suse.com/security/cve/CVE-2018-2690/" source="CVE"/>
		<reference ref_id="CVE-2018-2693" ref_url="https://www.suse.com/security/cve/CVE-2018-2693/" source="CVE"/>
		<reference ref_id="CVE-2018-2694" ref_url="https://www.suse.com/security/cve/CVE-2018-2694/" source="CVE"/>
		<reference ref_id="CVE-2018-2698" ref_url="https://www.suse.com/security/cve/CVE-2018-2698/" source="CVE"/>
		<reference ref_id="CVE-2018-2830" ref_url="https://www.suse.com/security/cve/CVE-2018-2830/" source="CVE"/>
		<reference ref_id="CVE-2018-2831" ref_url="https://www.suse.com/security/cve/CVE-2018-2831/" source="CVE"/>
		<reference ref_id="CVE-2018-2835" ref_url="https://www.suse.com/security/cve/CVE-2018-2835/" source="CVE"/>
		<reference ref_id="CVE-2018-2836" ref_url="https://www.suse.com/security/cve/CVE-2018-2836/" source="CVE"/>
		<reference ref_id="CVE-2018-2837" ref_url="https://www.suse.com/security/cve/CVE-2018-2837/" source="CVE"/>
		<reference ref_id="CVE-2018-2842" ref_url="https://www.suse.com/security/cve/CVE-2018-2842/" source="CVE"/>
		<reference ref_id="CVE-2018-2843" ref_url="https://www.suse.com/security/cve/CVE-2018-2843/" source="CVE"/>
		<reference ref_id="CVE-2018-2844" ref_url="https://www.suse.com/security/cve/CVE-2018-2844/" source="CVE"/>
		<reference ref_id="CVE-2018-2845" ref_url="https://www.suse.com/security/cve/CVE-2018-2845/" source="CVE"/>
		<reference ref_id="CVE-2018-2860" ref_url="https://www.suse.com/security/cve/CVE-2018-2860/" source="CVE"/>
		<reference ref_id="CVE-2018-2909" ref_url="https://www.suse.com/security/cve/CVE-2018-2909/" source="CVE"/>
		<reference ref_id="CVE-2018-3005" ref_url="https://www.suse.com/security/cve/CVE-2018-3005/" source="CVE"/>
		<reference ref_id="CVE-2018-3055" ref_url="https://www.suse.com/security/cve/CVE-2018-3055/" source="CVE"/>
		<reference ref_id="CVE-2018-3085" ref_url="https://www.suse.com/security/cve/CVE-2018-3085/" source="CVE"/>
		<reference ref_id="CVE-2018-3086" ref_url="https://www.suse.com/security/cve/CVE-2018-3086/" source="CVE"/>
		<reference ref_id="CVE-2018-3087" ref_url="https://www.suse.com/security/cve/CVE-2018-3087/" source="CVE"/>
		<reference ref_id="CVE-2018-3088" ref_url="https://www.suse.com/security/cve/CVE-2018-3088/" source="CVE"/>
		<reference ref_id="CVE-2018-3089" ref_url="https://www.suse.com/security/cve/CVE-2018-3089/" source="CVE"/>
		<reference ref_id="CVE-2018-3090" ref_url="https://www.suse.com/security/cve/CVE-2018-3090/" source="CVE"/>
		<reference ref_id="CVE-2018-3091" ref_url="https://www.suse.com/security/cve/CVE-2018-3091/" source="CVE"/>
		<reference ref_id="CVE-2018-3287" ref_url="https://www.suse.com/security/cve/CVE-2018-3287/" source="CVE"/>
		<reference ref_id="CVE-2018-3288" ref_url="https://www.suse.com/security/cve/CVE-2018-3288/" source="CVE"/>
		<reference ref_id="CVE-2018-3289" ref_url="https://www.suse.com/security/cve/CVE-2018-3289/" source="CVE"/>
		<reference ref_id="CVE-2018-3290" ref_url="https://www.suse.com/security/cve/CVE-2018-3290/" source="CVE"/>
		<reference ref_id="CVE-2018-3291" ref_url="https://www.suse.com/security/cve/CVE-2018-3291/" source="CVE"/>
		<reference ref_id="CVE-2018-3292" ref_url="https://www.suse.com/security/cve/CVE-2018-3292/" source="CVE"/>
		<reference ref_id="CVE-2018-3293" ref_url="https://www.suse.com/security/cve/CVE-2018-3293/" source="CVE"/>
		<reference ref_id="CVE-2018-3294" ref_url="https://www.suse.com/security/cve/CVE-2018-3294/" source="CVE"/>
		<reference ref_id="CVE-2018-3295" ref_url="https://www.suse.com/security/cve/CVE-2018-3295/" source="CVE"/>
		<reference ref_id="CVE-2018-3296" ref_url="https://www.suse.com/security/cve/CVE-2018-3296/" source="CVE"/>
		<reference ref_id="CVE-2018-3297" ref_url="https://www.suse.com/security/cve/CVE-2018-3297/" source="CVE"/>
		<reference ref_id="CVE-2018-3298" ref_url="https://www.suse.com/security/cve/CVE-2018-3298/" source="CVE"/>
		<reference ref_id="CVE-2018-3309" ref_url="https://www.suse.com/security/cve/CVE-2018-3309/" source="CVE"/>
		<reference ref_id="CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543/" source="CVE"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-2446" ref_url="https://www.suse.com/security/cve/CVE-2019-2446/" source="CVE"/>
		<reference ref_id="CVE-2019-2448" ref_url="https://www.suse.com/security/cve/CVE-2019-2448/" source="CVE"/>
		<reference ref_id="CVE-2019-2450" ref_url="https://www.suse.com/security/cve/CVE-2019-2450/" source="CVE"/>
		<reference ref_id="CVE-2019-2451" ref_url="https://www.suse.com/security/cve/CVE-2019-2451/" source="CVE"/>
		<reference ref_id="CVE-2019-2500" ref_url="https://www.suse.com/security/cve/CVE-2019-2500/" source="CVE"/>
		<reference ref_id="CVE-2019-2501" ref_url="https://www.suse.com/security/cve/CVE-2019-2501/" source="CVE"/>
		<reference ref_id="CVE-2019-2504" ref_url="https://www.suse.com/security/cve/CVE-2019-2504/" source="CVE"/>
		<reference ref_id="CVE-2019-2505" ref_url="https://www.suse.com/security/cve/CVE-2019-2505/" source="CVE"/>
		<reference ref_id="CVE-2019-2506" ref_url="https://www.suse.com/security/cve/CVE-2019-2506/" source="CVE"/>
		<reference ref_id="CVE-2019-2508" ref_url="https://www.suse.com/security/cve/CVE-2019-2508/" source="CVE"/>
		<reference ref_id="CVE-2019-2509" ref_url="https://www.suse.com/security/cve/CVE-2019-2509/" source="CVE"/>
		<reference ref_id="CVE-2019-2511" ref_url="https://www.suse.com/security/cve/CVE-2019-2511/" source="CVE"/>
		<reference ref_id="CVE-2019-2520" ref_url="https://www.suse.com/security/cve/CVE-2019-2520/" source="CVE"/>
		<reference ref_id="CVE-2019-2521" ref_url="https://www.suse.com/security/cve/CVE-2019-2521/" source="CVE"/>
		<reference ref_id="CVE-2019-2522" ref_url="https://www.suse.com/security/cve/CVE-2019-2522/" source="CVE"/>
		<reference ref_id="CVE-2019-2523" ref_url="https://www.suse.com/security/cve/CVE-2019-2523/" source="CVE"/>
		<reference ref_id="CVE-2019-2524" ref_url="https://www.suse.com/security/cve/CVE-2019-2524/" source="CVE"/>
		<reference ref_id="CVE-2019-2525" ref_url="https://www.suse.com/security/cve/CVE-2019-2525/" source="CVE"/>
		<reference ref_id="CVE-2019-2526" ref_url="https://www.suse.com/security/cve/CVE-2019-2526/" source="CVE"/>
		<reference ref_id="CVE-2019-2527" ref_url="https://www.suse.com/security/cve/CVE-2019-2527/" source="CVE"/>
		<reference ref_id="CVE-2019-2548" ref_url="https://www.suse.com/security/cve/CVE-2019-2548/" source="CVE"/>
		<reference ref_id="CVE-2019-2552" ref_url="https://www.suse.com/security/cve/CVE-2019-2552/" source="CVE"/>
		<reference ref_id="CVE-2019-2553" ref_url="https://www.suse.com/security/cve/CVE-2019-2553/" source="CVE"/>
		<reference ref_id="CVE-2019-2554" ref_url="https://www.suse.com/security/cve/CVE-2019-2554/" source="CVE"/>
		<reference ref_id="CVE-2019-2555" ref_url="https://www.suse.com/security/cve/CVE-2019-2555/" source="CVE"/>
		<reference ref_id="CVE-2019-2556" ref_url="https://www.suse.com/security/cve/CVE-2019-2556/" source="CVE"/>
		<reference ref_id="CVE-2019-2574" ref_url="https://www.suse.com/security/cve/CVE-2019-2574/" source="CVE"/>
		<reference ref_id="CVE-2019-2656" ref_url="https://www.suse.com/security/cve/CVE-2019-2656/" source="CVE"/>
		<reference ref_id="CVE-2019-2657" ref_url="https://www.suse.com/security/cve/CVE-2019-2657/" source="CVE"/>
		<reference ref_id="CVE-2019-2678" ref_url="https://www.suse.com/security/cve/CVE-2019-2678/" source="CVE"/>
		<reference ref_id="CVE-2019-2679" ref_url="https://www.suse.com/security/cve/CVE-2019-2679/" source="CVE"/>
		<reference ref_id="CVE-2019-2680" ref_url="https://www.suse.com/security/cve/CVE-2019-2680/" source="CVE"/>
		<reference ref_id="CVE-2019-2690" ref_url="https://www.suse.com/security/cve/CVE-2019-2690/" source="CVE"/>
		<reference ref_id="CVE-2019-2696" ref_url="https://www.suse.com/security/cve/CVE-2019-2696/" source="CVE"/>
		<reference ref_id="CVE-2019-2703" ref_url="https://www.suse.com/security/cve/CVE-2019-2703/" source="CVE"/>
		<reference ref_id="CVE-2019-2721" ref_url="https://www.suse.com/security/cve/CVE-2019-2721/" source="CVE"/>
		<reference ref_id="CVE-2019-2722" ref_url="https://www.suse.com/security/cve/CVE-2019-2722/" source="CVE"/>
		<reference ref_id="CVE-2019-2723" ref_url="https://www.suse.com/security/cve/CVE-2019-2723/" source="CVE"/>
		<reference ref_id="CVE-2019-2848" ref_url="https://www.suse.com/security/cve/CVE-2019-2848/" source="CVE"/>
		<reference ref_id="CVE-2019-2850" ref_url="https://www.suse.com/security/cve/CVE-2019-2850/" source="CVE"/>
		<reference ref_id="CVE-2019-2859" ref_url="https://www.suse.com/security/cve/CVE-2019-2859/" source="CVE"/>
		<reference ref_id="CVE-2019-2863" ref_url="https://www.suse.com/security/cve/CVE-2019-2863/" source="CVE"/>
		<reference ref_id="CVE-2019-2864" ref_url="https://www.suse.com/security/cve/CVE-2019-2864/" source="CVE"/>
		<reference ref_id="CVE-2019-2865" ref_url="https://www.suse.com/security/cve/CVE-2019-2865/" source="CVE"/>
		<reference ref_id="CVE-2019-2866" ref_url="https://www.suse.com/security/cve/CVE-2019-2866/" source="CVE"/>
		<reference ref_id="CVE-2019-2867" ref_url="https://www.suse.com/security/cve/CVE-2019-2867/" source="CVE"/>
		<reference ref_id="CVE-2019-2873" ref_url="https://www.suse.com/security/cve/CVE-2019-2873/" source="CVE"/>
		<reference ref_id="CVE-2019-2874" ref_url="https://www.suse.com/security/cve/CVE-2019-2874/" source="CVE"/>
		<reference ref_id="CVE-2019-2875" ref_url="https://www.suse.com/security/cve/CVE-2019-2875/" source="CVE"/>
		<reference ref_id="CVE-2019-2876" ref_url="https://www.suse.com/security/cve/CVE-2019-2876/" source="CVE"/>
		<reference ref_id="CVE-2019-2877" ref_url="https://www.suse.com/security/cve/CVE-2019-2877/" source="CVE"/>
		<reference ref_id="CVE-2019-2926" ref_url="https://www.suse.com/security/cve/CVE-2019-2926/" source="CVE"/>
		<reference ref_id="CVE-2019-2944" ref_url="https://www.suse.com/security/cve/CVE-2019-2944/" source="CVE"/>
		<reference ref_id="CVE-2019-2984" ref_url="https://www.suse.com/security/cve/CVE-2019-2984/" source="CVE"/>
		<reference ref_id="CVE-2019-3002" ref_url="https://www.suse.com/security/cve/CVE-2019-3002/" source="CVE"/>
		<reference ref_id="CVE-2019-3005" ref_url="https://www.suse.com/security/cve/CVE-2019-3005/" source="CVE"/>
		<reference ref_id="CVE-2019-3017" ref_url="https://www.suse.com/security/cve/CVE-2019-3017/" source="CVE"/>
		<reference ref_id="CVE-2019-3021" ref_url="https://www.suse.com/security/cve/CVE-2019-3021/" source="CVE"/>
		<reference ref_id="CVE-2019-3026" ref_url="https://www.suse.com/security/cve/CVE-2019-3026/" source="CVE"/>
		<reference ref_id="CVE-2019-3028" ref_url="https://www.suse.com/security/cve/CVE-2019-3028/" source="CVE"/>
		<reference ref_id="CVE-2019-3031" ref_url="https://www.suse.com/security/cve/CVE-2019-3031/" source="CVE"/>
		<reference ref_id="CVE-2020-14628" ref_url="https://www.suse.com/security/cve/CVE-2020-14628/" source="CVE"/>
		<reference ref_id="CVE-2020-14629" ref_url="https://www.suse.com/security/cve/CVE-2020-14629/" source="CVE"/>
		<reference ref_id="CVE-2020-14646" ref_url="https://www.suse.com/security/cve/CVE-2020-14646/" source="CVE"/>
		<reference ref_id="CVE-2020-14647" ref_url="https://www.suse.com/security/cve/CVE-2020-14647/" source="CVE"/>
		<reference ref_id="CVE-2020-14648" ref_url="https://www.suse.com/security/cve/CVE-2020-14648/" source="CVE"/>
		<reference ref_id="CVE-2020-14649" ref_url="https://www.suse.com/security/cve/CVE-2020-14649/" source="CVE"/>
		<reference ref_id="CVE-2020-14650" ref_url="https://www.suse.com/security/cve/CVE-2020-14650/" source="CVE"/>
		<reference ref_id="CVE-2020-14673" ref_url="https://www.suse.com/security/cve/CVE-2020-14673/" source="CVE"/>
		<reference ref_id="CVE-2020-14674" ref_url="https://www.suse.com/security/cve/CVE-2020-14674/" source="CVE"/>
		<reference ref_id="CVE-2020-14675" ref_url="https://www.suse.com/security/cve/CVE-2020-14675/" source="CVE"/>
		<reference ref_id="CVE-2020-14676" ref_url="https://www.suse.com/security/cve/CVE-2020-14676/" source="CVE"/>
		<reference ref_id="CVE-2020-14677" ref_url="https://www.suse.com/security/cve/CVE-2020-14677/" source="CVE"/>
		<reference ref_id="CVE-2020-14694" ref_url="https://www.suse.com/security/cve/CVE-2020-14694/" source="CVE"/>
		<reference ref_id="CVE-2020-14695" ref_url="https://www.suse.com/security/cve/CVE-2020-14695/" source="CVE"/>
		<reference ref_id="CVE-2020-14698" ref_url="https://www.suse.com/security/cve/CVE-2020-14698/" source="CVE"/>
		<reference ref_id="CVE-2020-14699" ref_url="https://www.suse.com/security/cve/CVE-2020-14699/" source="CVE"/>
		<reference ref_id="CVE-2020-14700" ref_url="https://www.suse.com/security/cve/CVE-2020-14700/" source="CVE"/>
		<reference ref_id="CVE-2020-14703" ref_url="https://www.suse.com/security/cve/CVE-2020-14703/" source="CVE"/>
		<reference ref_id="CVE-2020-14704" ref_url="https://www.suse.com/security/cve/CVE-2020-14704/" source="CVE"/>
		<reference ref_id="CVE-2020-14707" ref_url="https://www.suse.com/security/cve/CVE-2020-14707/" source="CVE"/>
		<reference ref_id="CVE-2020-14711" ref_url="https://www.suse.com/security/cve/CVE-2020-14711/" source="CVE"/>
		<reference ref_id="CVE-2020-14712" ref_url="https://www.suse.com/security/cve/CVE-2020-14712/" source="CVE"/>
		<reference ref_id="CVE-2020-14713" ref_url="https://www.suse.com/security/cve/CVE-2020-14713/" source="CVE"/>
		<reference ref_id="CVE-2020-14714" ref_url="https://www.suse.com/security/cve/CVE-2020-14714/" source="CVE"/>
		<reference ref_id="CVE-2020-14715" ref_url="https://www.suse.com/security/cve/CVE-2020-14715/" source="CVE"/>
		<reference ref_id="CVE-2020-2674" ref_url="https://www.suse.com/security/cve/CVE-2020-2674/" source="CVE"/>
		<reference ref_id="CVE-2020-2678" ref_url="https://www.suse.com/security/cve/CVE-2020-2678/" source="CVE"/>
		<reference ref_id="CVE-2020-2681" ref_url="https://www.suse.com/security/cve/CVE-2020-2681/" source="CVE"/>
		<reference ref_id="CVE-2020-2682" ref_url="https://www.suse.com/security/cve/CVE-2020-2682/" source="CVE"/>
		<reference ref_id="CVE-2020-2689" ref_url="https://www.suse.com/security/cve/CVE-2020-2689/" source="CVE"/>
		<reference ref_id="CVE-2020-2690" ref_url="https://www.suse.com/security/cve/CVE-2020-2690/" source="CVE"/>
		<reference ref_id="CVE-2020-2691" ref_url="https://www.suse.com/security/cve/CVE-2020-2691/" source="CVE"/>
		<reference ref_id="CVE-2020-2692" ref_url="https://www.suse.com/security/cve/CVE-2020-2692/" source="CVE"/>
		<reference ref_id="CVE-2020-2693" ref_url="https://www.suse.com/security/cve/CVE-2020-2693/" source="CVE"/>
		<reference ref_id="CVE-2020-2698" ref_url="https://www.suse.com/security/cve/CVE-2020-2698/" source="CVE"/>
		<reference ref_id="CVE-2020-2701" ref_url="https://www.suse.com/security/cve/CVE-2020-2701/" source="CVE"/>
		<reference ref_id="CVE-2020-2702" ref_url="https://www.suse.com/security/cve/CVE-2020-2702/" source="CVE"/>
		<reference ref_id="CVE-2020-2703" ref_url="https://www.suse.com/security/cve/CVE-2020-2703/" source="CVE"/>
		<reference ref_id="CVE-2020-2704" ref_url="https://www.suse.com/security/cve/CVE-2020-2704/" source="CVE"/>
		<reference ref_id="CVE-2020-2705" ref_url="https://www.suse.com/security/cve/CVE-2020-2705/" source="CVE"/>
		<reference ref_id="CVE-2020-2725" ref_url="https://www.suse.com/security/cve/CVE-2020-2725/" source="CVE"/>
		<reference ref_id="CVE-2020-2726" ref_url="https://www.suse.com/security/cve/CVE-2020-2726/" source="CVE"/>
		<reference ref_id="CVE-2020-2727" ref_url="https://www.suse.com/security/cve/CVE-2020-2727/" source="CVE"/>
		<reference ref_id="CVE-2021-2074" ref_url="https://www.suse.com/security/cve/CVE-2021-2074/" source="CVE"/>
		<reference ref_id="CVE-2021-2129" ref_url="https://www.suse.com/security/cve/CVE-2021-2129/" source="CVE"/>
		<reference ref_id="CVE-2021-2264" ref_url="https://www.suse.com/security/cve/CVE-2021-2264/" source="CVE"/>
		<description>
These are all security issues fixed in the virtualbox-guest-tools-6.1.20-lp153.1.8 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6588/">CVE-2014-6588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6589/">CVE-2014-6589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6590/">CVE-2014-6590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6595/">CVE-2014-6595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0377/">CVE-2015-0377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0418/">CVE-2015-0418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0427/">CVE-2015-0427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4813/">CVE-2015-4813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4896/">CVE-2015-4896</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0678/">CVE-2016-0678</cve>
	<cve impact="critical" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5501/">CVE-2016-5501</cve>
	<cve impact="critical" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5538/">CVE-2016-5538</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5545/">CVE-2016-5545</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-5605/">CVE-2016-5605</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5608/">CVE-2016-5608</cve>
	<cve impact="critical" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5610/">CVE-2016-5610</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-5611/">CVE-2016-5611</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10392/">CVE-2017-10392</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10407/">CVE-2017-10407</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10408/">CVE-2017-10408</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10428/">CVE-2017-10428</cve>
	<cve impact="moderate" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3290/">CVE-2017-3290</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3316/">CVE-2017-3316</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3332/">CVE-2017-3332</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3513/">CVE-2017-3513</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3538/">CVE-2017-3538</cve>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-3558/">CVE-2017-3558</cve>
	<cve impact="moderate" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-3559/">CVE-2017-3559</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3561/">CVE-2017-3561</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3563/">CVE-2017-3563</cve>
	<cve impact="moderate" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3575/">CVE-2017-3575</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3576/">CVE-2017-3576</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3587/">CVE-2017-3587</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3733/">CVE-2017-3733</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2676/">CVE-2018-2676</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2685/">CVE-2018-2685</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2686/">CVE-2018-2686</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2687/">CVE-2018-2687</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2688/">CVE-2018-2688</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2689/">CVE-2018-2689</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2690/">CVE-2018-2690</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2693/">CVE-2018-2693</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2694/">CVE-2018-2694</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2698/">CVE-2018-2698</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2830/">CVE-2018-2830</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2831/">CVE-2018-2831</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2835/">CVE-2018-2835</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2836/">CVE-2018-2836</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2837/">CVE-2018-2837</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2842/">CVE-2018-2842</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2843/">CVE-2018-2843</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2844/">CVE-2018-2844</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2845/">CVE-2018-2845</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2860/">CVE-2018-2860</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2909/">CVE-2018-2909</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3005/">CVE-2018-3005</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3055/">CVE-2018-3055</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3085/">CVE-2018-3085</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3086/">CVE-2018-3086</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3087/">CVE-2018-3087</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3088/">CVE-2018-3088</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3089/">CVE-2018-3089</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3090/">CVE-2018-3090</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3091/">CVE-2018-3091</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3287/">CVE-2018-3287</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3288/">CVE-2018-3288</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3289/">CVE-2018-3289</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3290/">CVE-2018-3290</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3291/">CVE-2018-3291</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3292/">CVE-2018-3292</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3293/">CVE-2018-3293</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3294/">CVE-2018-3294</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3295/">CVE-2018-3295</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3296/">CVE-2018-3296</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3297/">CVE-2018-3297</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3298/">CVE-2018-3298</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3309/">CVE-2018-3309</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2446/">CVE-2019-2446</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2448/">CVE-2019-2448</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2450/">CVE-2019-2450</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2451/">CVE-2019-2451</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2500/">CVE-2019-2500</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2501/">CVE-2019-2501</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2504/">CVE-2019-2504</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2505/">CVE-2019-2505</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2506/">CVE-2019-2506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2508/">CVE-2019-2508</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2509/">CVE-2019-2509</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2511/">CVE-2019-2511</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2520/">CVE-2019-2520</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2521/">CVE-2019-2521</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2522/">CVE-2019-2522</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2523/">CVE-2019-2523</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2524/">CVE-2019-2524</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2525/">CVE-2019-2525</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2526/">CVE-2019-2526</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2527/">CVE-2019-2527</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2548/">CVE-2019-2548</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2552/">CVE-2019-2552</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2553/">CVE-2019-2553</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2554/">CVE-2019-2554</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2555/">CVE-2019-2555</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2556/">CVE-2019-2556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2574/">CVE-2019-2574</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2656/">CVE-2019-2656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2657/">CVE-2019-2657</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2678/">CVE-2019-2678</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2679/">CVE-2019-2679</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2680/">CVE-2019-2680</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2690/">CVE-2019-2690</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2696/">CVE-2019-2696</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2703/">CVE-2019-2703</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2721/">CVE-2019-2721</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2722/">CVE-2019-2722</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2723/">CVE-2019-2723</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2848/">CVE-2019-2848</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2850/">CVE-2019-2850</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2859/">CVE-2019-2859</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2863/">CVE-2019-2863</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2864/">CVE-2019-2864</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2865/">CVE-2019-2865</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2866/">CVE-2019-2866</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2867/">CVE-2019-2867</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2873/">CVE-2019-2873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2874/">CVE-2019-2874</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2875/">CVE-2019-2875</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2876/">CVE-2019-2876</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2877/">CVE-2019-2877</cve>
	<cve impact="moderate" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2926/">CVE-2019-2926</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2944/">CVE-2019-2944</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2984/">CVE-2019-2984</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3002/">CVE-2019-3002</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3005/">CVE-2019-3005</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3017/">CVE-2019-3017</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3021/">CVE-2019-3021</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3026/">CVE-2019-3026</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3028/">CVE-2019-3028</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3031/">CVE-2019-3031</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14628/">CVE-2020-14628</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14629/">CVE-2020-14629</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14646/">CVE-2020-14646</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14647/">CVE-2020-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14648/">CVE-2020-14648</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14649/">CVE-2020-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14650/">CVE-2020-14650</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14673/">CVE-2020-14673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14674/">CVE-2020-14674</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14675/">CVE-2020-14675</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14676/">CVE-2020-14676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14677/">CVE-2020-14677</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14694/">CVE-2020-14694</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14695/">CVE-2020-14695</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14698/">CVE-2020-14698</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14699/">CVE-2020-14699</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14700/">CVE-2020-14700</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14703/">CVE-2020-14703</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14704/">CVE-2020-14704</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14707/">CVE-2020-14707</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14711/">CVE-2020-14711</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14712/">CVE-2020-14712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14713/">CVE-2020-14713</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14714/">CVE-2020-14714</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14715/">CVE-2020-14715</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2674/">CVE-2020-2674</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2678/">CVE-2020-2678</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2681/">CVE-2020-2681</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2682/">CVE-2020-2682</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2689/">CVE-2020-2689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2690/">CVE-2020-2690</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2691/">CVE-2020-2691</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2692/">CVE-2020-2692</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2693/">CVE-2020-2693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2698/">CVE-2020-2698</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2701/">CVE-2020-2701</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2702/">CVE-2020-2702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2703/">CVE-2020-2703</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2704/">CVE-2020-2704</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2705/">CVE-2020-2705</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2725/">CVE-2020-2725</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2726/">CVE-2020-2726</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2727/">CVE-2020-2727</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2074/">CVE-2021-2074</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2129/">CVE-2021-2129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2264/">CVE-2021-2264</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694926" comment="virtualbox-guest-tools-6.1.20-lp153.1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694927" comment="virtualbox-guest-x11-6.1.20-lp153.1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694928" comment="virtualbox-kmp-default-6.1.20_k5.3.18_57-lp153.1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52046" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-1.53 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486554" comment="vorbis-tools-1.4.0-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486555" comment="vorbis-tools-lang-1.4.0-1.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52047" version="1" class="patch">
	<metadata>
		<title>vsftpd-3.0.3-7.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-3.0.3-7.16.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629998" comment="vsftpd-3.0.3-7.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52048" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3+git20180125-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3+git20180125-1.17 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480957" comment="w3m-0.5.3+git20180125-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52049" version="1" class="patch">
	<metadata>
		<title>wget-1.20.3-3.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-7665" ref_url="https://www.suse.com/security/cve/CVE-2015-7665/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="CVE-2018-20483" ref_url="https://www.suse.com/security/cve/CVE-2018-20483/" source="CVE"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.20.3-3.9.2 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7665/">CVE-2015-7665</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20483/">CVE-2018-20483</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482565" comment="wget-1.20.3-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694929" comment="wget-lang-1.20.3-3.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52050" version="1" class="patch">
	<metadata>
		<title>wicked-0.6.65-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902/" source="CVE"/>
		<reference ref_id="CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903/" source="CVE"/>
		<reference ref_id="CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216/" source="CVE"/>
		<reference ref_id="CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217/" source="CVE"/>
		<description>
These are all security issues fixed in the wicked-0.6.65-2.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629048" comment="wicked-0.6.65-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629049" comment="wicked-service-0.6.65-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52051" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.9-4.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144/" source="CVE"/>
		<reference ref_id="CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145/" source="CVE"/>
		<reference ref_id="CVE-2015-4146" ref_url="https://www.suse.com/security/cve/CVE-2015-4146/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-5315" ref_url="https://www.suse.com/security/cve/CVE-2015-5315/" source="CVE"/>
		<reference ref_id="CVE-2015-5316" ref_url="https://www.suse.com/security/cve/CVE-2015-5316/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2016-4476" ref_url="https://www.suse.com/security/cve/CVE-2016-4476/" source="CVE"/>
		<reference ref_id="CVE-2016-4477" ref_url="https://www.suse.com/security/cve/CVE-2016-4477/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.9-4.29.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4146/">CVE-2015-4146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5315/">CVE-2015-5315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5316/">CVE-2015-5316</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4476/">CVE-2016-4476</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4477/">CVE-2016-4477</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629050" comment="wpa_supplicant-2.9-4.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52052" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.1.3+20190413-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.1.3+20190413-1.24 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482570" comment="xdg-utils-1.1.3+20190413-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52053" version="1" class="patch">
	<metadata>
		<title>xen-libs-4.14.1_16-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963/" source="CVE"/>
		<reference ref_id="CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-11743" ref_url="https://www.suse.com/security/cve/CVE-2020-11743/" source="CVE"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25598" ref_url="https://www.suse.com/security/cve/CVE-2020-25598/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25602" ref_url="https://www.suse.com/security/cve/CVE-2020-25602/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="CVE-2020-29040" ref_url="https://www.suse.com/security/cve/CVE-2020-29040/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29567" ref_url="https://www.suse.com/security/cve/CVE-2020-29567/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="CVE-2021-28687" ref_url="https://www.suse.com/security/cve/CVE-2021-28687/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-libs-4.14.1_16-1.6 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="low" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11743/">CVE-2020-11743</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25598/">CVE-2020-25598</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25602/">CVE-2020-25602</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-29040/">CVE-2020-29040</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29567/">CVE-2020-29567</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28687/">CVE-2021-28687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629051" comment="xen-libs-4.14.1_16-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52054" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15.4-bp153.1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15.4-bp153.1.16 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694930" comment="xinetd-2.3.15.4-bp153.1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52055" version="1" class="patch">
	<metadata>
		<title>xorg-x11-essentials-7.6_1-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-essentials-7.6_1-1.22 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480965" comment="xorg-x11-essentials-7.6_1-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481675" comment="xrdb-1.1.0-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52056" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-1.20.3-22.5.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-1.20.3-22.5.30.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629053" comment="xorg-x11-server-1.20.3-22.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629054" comment="xorg-x11-server-extra-1.20.3-22.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684245" comment="xorg-x11-server-wayland-1.20.3-22.5.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52057" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.44-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.44-5.3.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629055" comment="xscreensaver-5.44-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629056" comment="xscreensaver-data-5.44-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629057" comment="xscreensaver-lang-5.44-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52058" version="1" class="patch">
	<metadata>
		<title>yast2-security-4.3.16-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-3700" ref_url="https://www.suse.com/security/cve/CVE-2019-3700/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-security-4.3.16-1.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3700/">CVE-2019-3700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629060" comment="yast2-security-4.3.16-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52059" version="1" class="patch">
	<metadata>
		<title>yast2-users-4.3.10-1.41 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-4.3.10-1.41 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629061" comment="yast2-users-4.3.10-1.41 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52060" version="1" class="patch">
	<metadata>
		<title>zypper-1.14.43-3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<description>
These are all security issues fixed in the zypper-1.14.43-3.20.1 package on the GA media of openSUSE Leap 15.3.		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629062" comment="zypper-1.14.43-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629063" comment="zypper-log-1.14.43-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629064" comment="zypper-needs-restarting-1.14.43-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52061" version="1" class="patch">
	<metadata>
		<title>Security update for live555 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1146283" ref_url="https://bugzilla.suse.com/1146283" source="BUGZILLA"/>
		<reference ref_id="1185874" ref_url="https://bugzilla.suse.com/1185874" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15232" ref_url="https://www.suse.com/security/cve/CVE-2019-15232/" source="CVE"/>
		<reference ref_id="CVE-2021-28899" ref_url="https://www.suse.com/security/cve/CVE-2021-28899/" source="CVE"/>
		<description>
This update for live555 fixes the following issues:

Update to 2021.05.22:

- Lots of fixes and updates, including the security fix for CVE-2021-28899 (boo#1185874)
  and CVE-2019-15232 (boo#1146283).  See the list in http://live555.com/liveMedia/public/changelog.txt
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146283">SUSE bug 1146283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185874">SUSE bug 1185874</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15232/">CVE-2019-15232</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28899/">CVE-2021-28899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624294" comment="libBasicUsageEnvironment1-2021.05.22-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624295" comment="libUsageEnvironment3-2021.05.22-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624296" comment="libgroupsock30-2021.05.22-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624297" comment="libliveMedia94-2021.05.22-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624298" comment="live555-2021.05.22-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624299" comment="live555-devel-2021.05.22-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52062" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2B2UD46YGBOYO64SOPMOM6DQAL6FGCHZ/" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- Update to version 1.16.3:
 - CVE-2021-3185: buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking() (bsc#1181255)
 - amcvideodec: fix sync meta copying not taking a reference
 - audiobuffersplit: Perform discont tracking on running time
 - audiobuffersplit: Specify in the template caps that only interleaved audio is supported
 - audiobuffersplit: Unset DISCONT flag if not discontinuous
 - autoconvert: Fix lock-less exchange or free condition
 - autoconvert: fix compiler warnings with g_atomic on recent GLib versions
 - avfvideosrc: element requests camera permissions even with capture-screen property is true
 - codecparsers: h264parser: guard against ref_pic_markings overflow
 - dtlsconnection: Avoid segmentation fault when no srtp capabilities are negotiated
 - dtls/connection: fix EOF handling with openssl 1.1.1e
 - fdkaacdec: add support for mpegversion=2
 - hls: Check nettle version to ensure AES128 support
 - ipcpipeline: Rework compiler checks
 - interlace: Increment phase_index before checking if we're at the end of the phase
 - h264parser: Do not allocate too large size of memory for registered user data SEI
 - ladspa: fix unbounded integer properties
 - modplug: avoid division by zero
 - msdkdec: Fix GstMsdkContext leak
 - msdkenc: fix leaks on windows
 - musepackdec: Don't fail all queries if no sample rate is known yet
 - openslessink: Allow openslessink to handle 48kHz streams.
 - opencv: allow compilation against 4.2.x
 - proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc
 - vulkan: Drop use of VK_RESULT_BEGIN_RANGE
 - wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset
 - wasapi: Fix possible deadlock while downwards state change
 - waylandsink: Clear window when pipeline is stopped
 - webrtc: Support non-trickle ICE candidates in the SDP
 - webrtc: Unmap all non-binary buffers received via the datachannel
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-09"/>
	<updated date="2021-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624470" comment="gstreamer-plugins-bad-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624471" comment="gstreamer-plugins-bad-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624472" comment="gstreamer-plugins-bad-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624473" comment="gstreamer-plugins-bad-chromaprint-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624474" comment="gstreamer-plugins-bad-chromaprint-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624475" comment="gstreamer-plugins-bad-chromaprint-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624476" comment="gstreamer-plugins-bad-devel-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624477" comment="gstreamer-plugins-bad-doc-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624478" comment="gstreamer-plugins-bad-fluidsynth-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624479" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624480" comment="gstreamer-plugins-bad-fluidsynth-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624481" comment="gstreamer-plugins-bad-lang-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624482" comment="libgstadaptivedemux-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624483" comment="libgstadaptivedemux-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624484" comment="libgstadaptivedemux-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624485" comment="libgstbadaudio-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624486" comment="libgstbadaudio-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624487" comment="libgstbadaudio-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624488" comment="libgstbasecamerabinsrc-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624489" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624490" comment="libgstbasecamerabinsrc-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624491" comment="libgstcodecparsers-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624492" comment="libgstcodecparsers-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624493" comment="libgstcodecparsers-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624494" comment="libgstinsertbin-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624495" comment="libgstinsertbin-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624496" comment="libgstinsertbin-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624497" comment="libgstisoff-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624498" comment="libgstisoff-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624499" comment="libgstisoff-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624500" comment="libgstmpegts-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624501" comment="libgstmpegts-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624502" comment="libgstmpegts-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624503" comment="libgstphotography-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624504" comment="libgstphotography-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624505" comment="libgstphotography-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624506" comment="libgstplayer-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624507" comment="libgstplayer-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624508" comment="libgstplayer-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624509" comment="libgstsctp-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624510" comment="libgstsctp-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624511" comment="libgstsctp-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624512" comment="libgsturidownloader-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624513" comment="libgsturidownloader-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624514" comment="libgsturidownloader-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624515" comment="libgstwayland-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624516" comment="libgstwayland-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624517" comment="libgstwayland-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624518" comment="libgstwebrtc-1_0-0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624519" comment="libgstwebrtc-1_0-0-32bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624520" comment="libgstwebrtc-1_0-0-64bit-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624521" comment="typelib-1_0-GstInsertBin-1_0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624522" comment="typelib-1_0-GstMpegts-1_0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624523" comment="typelib-1_0-GstPlayer-1_0-1.16.3-lp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624524" comment="typelib-1_0-GstWebRTC-1_0-1.16.3-lp153.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52063" version="1" class="patch">
	<metadata>
		<title>Security update for solo (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186848" ref_url="https://bugzilla.suse.com/1186848" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27208" ref_url="https://www.suse.com/security/cve/CVE-2020-27208/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KVSCA7DKULXER7BGQ3YJN34AY5RPCIU5/" source="SUSE-SU"/>
		<description>
This update for solo fixes the following issues:

Update to Solo 4.1.2

* Fix boo#1186848 CVE-202-27208, security issue in firmware
  source that is part of the source package.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186848">SUSE bug 1186848</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27208/">CVE-2020-27208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624526" comment="solo-udev-4.1.2-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52064" version="1" class="patch">
	<metadata>
		<title>Security update for claws-mail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1174457" ref_url="https://bugzilla.suse.com/1174457" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15917" ref_url="https://www.suse.com/security/cve/CVE-2020-15917/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2VE6WDEXX6HETWFB6EGOWAEY6QQSAI6E/" source="SUSE-SU"/>
		<description>
This update for claws-mail fixes the following issues:

Update to 3.18.0

  * Support for the OAuth2 authorisation protocol has been added for
    IMAP, POP and SMTP using custom, user-generated client IDs.
    OAuth2 preferences are found in the Account Preferences on the
    Receive page (for POP: Authenticate before POP connection, for
    IMAP: Authentication method); the Send page (SMTP authentication:
    Authentication method); and on a dedicated OAuth2 page.
  * The option 'Save (X-)Face in address book if possible' has been
    added to the /Message View/Text Options preferences page.
    Previously the (X-)Face would be saved automatically, therefore
    this option is turned on by default.
  * The Image Viewer has been reworked. New options have been added to
    /Message View/Image Viewer: when resizing images, either fit the
    image width or fit the image height to the available space.
    Fitting the image height is the default. Regardless of this
    setting, when displaying images inline they will fit the height.
    When displaying an image, left-clicking the image will toggle
    between full size and reduced size; right-clicking will toggle
    between fitting the height and fitting the width.
  * When re-editing a saved message, it is now possible to use
    /Options/Remove References.
  * It is now possible to attempt to retrieve a missing GPG key via
    WKD.
  * The man page has been updated.
  * Updated translations: Brazilian Portuguese, British English,
    Catalan, Czech, Danish, Dutch, French, Polish, Romanian, Russian,
    Slovak, Spanish, Traditional Chinese, Turkish.
  * bug fixes: claws#2411, claws#4326, claws#4394, claws#4431,
               claws#4445, claws#4447, claws#4455, claws#4473
    - stop WM's X button from causing GPG key fetch attempt
    - Make fancy respect default font size for messageview
    - harden link checker before accepting click
    - non-display of (X-)Face when prefs_common.enable_avatars
      is AVATARS_ENABLE_RENDER (2)
    - debian bug #983778, 'Segfault on selecting empty 'X-Face'
      custom header'

  * It is now possible to 'Inherit Folder properties and processing
    rules from parent folder' when creating new folders with the
    move message and copy message dialogues.
  * A Phishing warning is now shown when copying a phishing URL, (in
    addition to clicking a phishing URL).
  * The progress window when importing an mbox file is now more
    responsive.
  * A warning dialogue is shown if the selected privacy system is
    'None' and automatic signing amd/or encrypting is enabled.
  * Python plugin: pkgconfig is now used to check for python2. This
    enables the Python plugin (which uses python2) to be built on
    newer systems which have both python2 and python3.

  Bug fixes:

  * bug 3922, 'minimize to tray on startup not working'
  * bug 4220, 'generates files in cache without content'
  * bug 4325, 'Following redirects when retrieving image'
  * bug 4342, 'Import mbox file command doesn't work twice on a row'
  * fix STARTTLS protocol violation CVE-2020-15917 boo#1174457)
  * fix initial debug line
  * fix fat-fingered crash when v (hiding msgview) is pressed
    just before c (check signature)
  * fix non-translation of some Templates strings

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174457">SUSE bug 1174457</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15917/">CVE-2020-15917</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625222" comment="claws-mail-3.18.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625223" comment="claws-mail-devel-3.18.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625224" comment="claws-mail-lang-3.18.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52065" version="1" class="patch">
	<metadata>
		<title>Security update for fossil (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187988" ref_url="https://bugzilla.suse.com/1187988" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:1050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQ44KVDTB6D2MENE7C2YPVCSV3BXT3B4/" source="SUSE-SU"/>
		<description>
This update for fossil fixes the following issues:

fossil 2.16:

  * Add the fossil patch command
  * Improve the fossil ui command to work on check-out directories
    and remote machines
  * web UI improvements
  * Add fossil bisect run command for improved automation of bisects
  * Improve fossil merge handling of renames
  * wiki now defaults to markdown
  * email alerts can now be set to expire to prevent sending mail
    to abandoned accounts forever

fossil 2.15.2:

  * Fix the client-side TLS so that it verifies that the server
    hostname matches its certificate (boo#1187988)

fossil 2.15.1:

  * fix access to tables starting 'fx_' in ticket report

fossil 2.15:

  * Relax default Content Security policy to allow images to be
    loaded from any URL
  * Updates to skins and their configuration options
  * Built-in skin can now be selected via the skin= request
    parameter and the /skins page.
  * /cookies page can now now  delete individual cookies
  * Various extensions to diff displaz and operations
  * Add the --list option to the tarball, zip, and sqlar commands.
  * New TH1 commands: 'builtin_request_js', 'capexpr', 'foreach',
    'lappend', and 'string match'
  * The leaves command now shows the branch point of each leaf.
  * The fossil add command refuses to add files whose names are
    reserved by Windows (ex: 'aux') unless the --allow-reserved
    option is included.

fossil 2.14

  * add fossil chat
  * enhanced fossil clone
  * performance optimization
  * enhanced documents
  * Pikchr improvements
  * Schema Update Notice #1: This release drops a trigger from 
  the database schema
  * Schema Update Notice #2: This release changes how the descriptions
  of wiki edits are stored in the EVENT table, for improved display
  on timelines


fossil 2.13:

  * wiki improvements: interwiki links, markup features
  * support for rendering pikchr markup scriptions
  * line number modes support interactive selection of range of
    lines to hyperlink to
  * Enhance finfo page to track a file across renames
- minimum/bundled version of sqlite increased to 3.34.0
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-17"/>
	<updated date="2021-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187988">SUSE bug 1187988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625451" comment="fossil-2.16-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52066" version="1" class="patch">
	<metadata>
		<title>Security update for nextcloud (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181445" ref_url="https://bugzilla.suse.com/1181445" source="BUGZILLA"/>
		<reference ref_id="1181803" ref_url="https://bugzilla.suse.com/1181803" source="BUGZILLA"/>
		<reference ref_id="1181804" ref_url="https://bugzilla.suse.com/1181804" source="BUGZILLA"/>
		<reference ref_id="1188247" ref_url="https://bugzilla.suse.com/1188247" source="BUGZILLA"/>
		<reference ref_id="1188248" ref_url="https://bugzilla.suse.com/1188248" source="BUGZILLA"/>
		<reference ref_id="1188249" ref_url="https://bugzilla.suse.com/1188249" source="BUGZILLA"/>
		<reference ref_id="1188250" ref_url="https://bugzilla.suse.com/1188250" source="BUGZILLA"/>
		<reference ref_id="1188251" ref_url="https://bugzilla.suse.com/1188251" source="BUGZILLA"/>
		<reference ref_id="1188252" ref_url="https://bugzilla.suse.com/1188252" source="BUGZILLA"/>
		<reference ref_id="1188253" ref_url="https://bugzilla.suse.com/1188253" source="BUGZILLA"/>
		<reference ref_id="1188254" ref_url="https://bugzilla.suse.com/1188254" source="BUGZILLA"/>
		<reference ref_id="1188255" ref_url="https://bugzilla.suse.com/1188255" source="BUGZILLA"/>
		<reference ref_id="1188256" ref_url="https://bugzilla.suse.com/1188256" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8293" ref_url="https://www.suse.com/security/cve/CVE-2020-8293/" source="CVE"/>
		<reference ref_id="CVE-2020-8294" ref_url="https://www.suse.com/security/cve/CVE-2020-8294/" source="CVE"/>
		<reference ref_id="CVE-2020-8295" ref_url="https://www.suse.com/security/cve/CVE-2020-8295/" source="CVE"/>
		<reference ref_id="CVE-2021-32678" ref_url="https://www.suse.com/security/cve/CVE-2021-32678/" source="CVE"/>
		<reference ref_id="CVE-2021-32679" ref_url="https://www.suse.com/security/cve/CVE-2021-32679/" source="CVE"/>
		<reference ref_id="CVE-2021-32680" ref_url="https://www.suse.com/security/cve/CVE-2021-32680/" source="CVE"/>
		<reference ref_id="CVE-2021-32688" ref_url="https://www.suse.com/security/cve/CVE-2021-32688/" source="CVE"/>
		<reference ref_id="CVE-2021-32703" ref_url="https://www.suse.com/security/cve/CVE-2021-32703/" source="CVE"/>
		<reference ref_id="CVE-2021-32705" ref_url="https://www.suse.com/security/cve/CVE-2021-32705/" source="CVE"/>
		<reference ref_id="CVE-2021-32725" ref_url="https://www.suse.com/security/cve/CVE-2021-32725/" source="CVE"/>
		<reference ref_id="CVE-2021-32726" ref_url="https://www.suse.com/security/cve/CVE-2021-32726/" source="CVE"/>
		<reference ref_id="CVE-2021-32734" ref_url="https://www.suse.com/security/cve/CVE-2021-32734/" source="CVE"/>
		<reference ref_id="CVE-2021-32741" ref_url="https://www.suse.com/security/cve/CVE-2021-32741/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBA6BUWCG7GXG6XVXJPYJLSFVWJRSYU7/" source="SUSE-SU"/>
		<description>
This update for nextcloud fixes the following issues:

nextcloud was updated to 20.0.11:

- Fix boo#1188247 - CVE-2021-32678: OCS API response ratelimits are not applied
- Fix boo#1188248 - CVE-2021-32679: filenames where not escaped by default in controllers using DownloadResponse
- Fix boo#1188249 - CVE-2021-32680: share expiration date wasn't properly logged
- Fix boo#1188250 - CVE-2021-32688: lacking permission check with application specific tokens
- Fix boo#1188251 - CVE-2021-32703: lack of ratelimiting on the shareinfo endpoint
- Fix boo#1188252 - CVE-2021-32705: lack of ratelimiting on the public DAV endpoint
- Fix boo#1188253 - CVE-2021-32725: default share permissions were not being respected for federated reshares of files and folders
- Fix boo#1188254 - CVE-2021-32726: webauthn tokens were not deleted after a user has been deleted
- Fix boo#1188255 - CVE-2021-32734: possible full path disclosure on shared files
- Fix boo#1188256 - CVE-2021-32741: lack of ratelimiting on the public share link mount endpoint
- Bump handlebars from 4.7.6 to 4.7.7 (server#26900)
- Bump lodash from 4.17.20 to 4.17.21 (server#26909)
- Bump hosted-git-info from 2.8.8 to 2.8.9 (server#26920)
- Don't break OCC if an app is breaking in it's Application class (server#26954)
- Add bruteforce protection to the shareinfo endpoint (server#26956)
- Ignore readonly flag for directories (server#26965)
- Throttle MountPublicLinkController when share is not found (server#26971)
- Respect default share permissions for federated reshares (server#27001)
- Harden apptoken check (server#27014)
- Use parent wrapper to properly handle moves on the same source/target storage (server#27016)
- Fix error when using CORS with no auth credentials (server#27027)
- Fix return value of getStorageInfo when 'quota_include_external_storage' is enabled (server#27108)
- Bump patch dependencies (server#27183)
- Use noreply@ as email address for share emails (server#27209)
- Bump p-queue from 6.6.1 to 6.6.2 (server#27226)
- Bump browserslist from 4.14.0 to 4.16.6 (server#27247)
- Bump webpack from 4.44.1 to 4.44.2 (server#27297)
- Properly use limit and offset for search in Jail wrapper (server#27308)
- Make user:report command scale (server#27319)
- Properly log expiration date removal in audit log (server#27325)
- Propagate throttling on OCS response (server#27337)
- Set umask before operations that create local files (server#27349)
- Escape filename in Content-Disposition (server#27360)
- Don't update statuses to offline again and again (server#27412)
- Header must contain a colon (server#27456)
- Activate constraint check for oracle / pqsql also for 20 (server#27523)
- Only allow removing existing shares that would not be allowed due to reshare restrictions (server#27552)
- Bump ws from 7.3.1 to 7.5.0 (server#27570)
- Properly cleanup entries of WebAuthn on user deletion (server#27596)
- Throttle on public DAV endpoint (server#27617)
- Bump vue-loader from 15.9.3 to 15.9.7 (server#27639)
- Bump eslint-plugin-standard from 4.0.1 to 4.0.2 (server#27651)
- Validate the theming color also on CLI (server#27680)
- Downstream encryption:fix-encrypted-version for repairing bad signature errors (server#27728)
- Remove encodeURI code (files_pdfviewer#396)
- Only ask for permissions on HTTPS (notifications#998)
- Fix sorting if one of the file name is only composed with number (photos#785)
- Backport 20 fix Photos not shown in large browser windows #630 (#686) (photos#810)
- Update File.vue (photos#813)
- Update chart.js (serverinfo#309)
- Only return workspace property for top node in a propfind request (text#1611)
- ViewerComponent: pass on autofocus to EditorWrapper (text#1647)
- Use text/plain as content type for fetching the document (text#1692)
- Log exceptions that happen on unknown exception and return generic messages (text#1698)
- Add fixup (viewer#924)
- Fix: fullscreen for Firefox (viewer#929)

Update to 20.0.7

- Catch NotFoundException when querying quota (server#25315)
- CalDAV] Validate notified emails (server#25324)
- Fix/app fetcher php compat comparison (server#25347)
- Show the actual error on share requests (server#25352)
- Fix parameter provided as string not array (server#25366)
- The objectid is a string (server#25374)
- 20.0.7 final (server#25387)
- Properly handle SMB ACL blocking scanning a directory (server#25421)
- Don't break completely when creating the digest fail for one user (activity#556)
- Only attempt to use a secure view if hide download is actually set (files_pdfviewer#296)
- Fix opening PDF files with special characters in their name (files_pdfviewer#298)
- Fix PDF viewer failing on Edge (not based on Chromium) (files_pdfviewer#299)
- Cannot unfold plain text notifications (notifications#846)
- Remove EPUB mimetype (text#1391)

Update to 20.0.6

- Make sure to do priority app upgrades first (server#25077)
- Respect DB restrictions on number of arguments in statements and queries (server#25120)
- Add a hint about the direction of priority (server#25143)
- Do not redirect to logout after login (server#25146)
- Fix comparison of PHP versions (server#25152)
- Add 'composer.lock' for acceptance tests to git (server#25178)
- Update CRL due to revoked gravatar.crl (server#25190)
- Don't log keys on checkSignature (server#25193)
- Update 3rdparty after Archive_Tar (server#25199)
- Bump CA bundle (server#25219)
- Update handling of user credentials (server#25225)
- Fix encoding issue with OC.Notification.show (server#25244)
- Also use storage copy when dav copying directories (server#25261)
- Silence log message (server#25263)
- Extend ILDAPProvider to allow reading arbitrairy ldap attributes for users (server#25276)
- Do not obtain userFolder of a federated user (server#25278)
- Bump pear/archive_tar from 1.4.11 to 1.4.12 (3rdparty#603)
- Add gitignore entry for .github folder of dependencies (3rdparty#604)
- Clear event array on getting them (activity#551)

Update to 20.0.5

- Don't log params of imagecreatefromstring (server#24546)
- Use storage copy implementation when doing dav copy
  (server#24590)
- Use in objectstore copy (server#24592)
- Add tel, note, org and title search (server#24697)
- Check php compatibility of app store app releases
  (server#24698)
- Fix #24682]: ensure federation cloud id is retruned if FN
  property not found (server#24709)
- Do not include non-required scripts on the upgrade page
  (server#24714)
- LDAP: fix inGroup for memberUid type of group memberships
  (server#24716)
- Cancel user search requests to avoid duplicate results being
  added (server#24728)
- Also unset the other possible unused paramters (server#24751)
- Enables the file name check also to match name of mountpoints
  (server#24760)
- Fixes sharing to group ids with characters that are being url
  encoded (server#24763)
- Limit getIncomplete query to one row (server#24791)
- Fix Argon2 descriptions (server#24792)
- Actually set the TTL on redis set (server#24798)
- Allow to force rename a conflicting calendar (server#24806)
- Fix IPv6 localhost regex (server#24823)
- Catch the error on heartbeat update (server#24826)
- Make oc_files_trash.auto_id a bigint (server#24853)
- Fix total upload size overwritten by next upload (server#24854)
- Avoid huge exception argument logging (server#24876)
- Make share results distinguishable if there are more than one
  with the exact same display name (server#24878)
- Add migration for oc_share_external columns (server#24963)
- Don't throw a 500 when importing a broken ics reminder file
  (server#24972)
- Fix unreliable ViewTest (server#24976)
- Update root.crl due to revocation of transmission.crt
  (server#24990)
- Set the JSCombiner cache if needed (server#24997)
- Fix column name to check prior to deleting (server#25009)
- Catch throwable instead of exception (server#25013)
- Set the user language when adding the footer (server#25019)
- Change defaultapp in config.sample.php to dashboard to improve
  docs and align it to source code (server#25030)
- Fix clearing the label of a share (server#25035)
- Update psalm-baseline.xml (server#25066)
- Don't remove assignable column for now (server#25074)
- Add setup check to verify that the used DB version is still
  supported… (server#25076)
- Correctly set the user for activity parsing when preparing
  a notifica… (activity#542)
- Bump vue-virtual-grid from 2.2.1 to 2.3.0 (photos#597)
- Catch possible database exceptions when fetching document data
  (text#1221)
- Make sure we have the proper PHP version installed before
  running composer (text#1234)
- Revert removal of transformResponse (text#1235)
- Bump prosemirror-view from 1.16.1 to 1.16.5 (text#1255)
- Bump @babel/preset-env from 7.12.1 to 7.12.11 (text#1257)
- Bump babel-loader from 8.1.0 to 8.2.2 (text#1259)
- Bump eslint-plugin-standard from 4.0.2 to 4.1.0 (text#1261)
- Bump vue-loader from 15.9.5 to 15.9.6 (text#1263)
- Bump prosemirror-model from 1.12.0 to 1.13.1 (text#1265)
- Bump core-js from 3.7.0 to 3.8.1 (text#1266)
- Bump stylelint from 13.7.2 to 13.8.0 (text#1269)
- Bump @babel/plugin-transform-runtime from 7.12.1 to 7.12.10
  (text#1271)
- Bump sass-loader from 10.0.5 to 10.1.0 (text#1273)
- Bump webpack-merge from 5.3.0 to 5.7.2 (text#1274)
- Bump @babel/core from 7.12.3 to 7.12.10 (text#1277)
- Bump cypress from 5.1.0 to 5.6.0 (text#1278)
- Bump @vue/test-utils from 1.1.1 to 1.1.2 (text#1279)
- Bump webpack-merge from 5.7.2 to 5.7.3 (text#1303)

- The apache subpackage must require the main package, otherwise it
  will not be uninstalled when the main package is uninstalled.

Update to 20.0.4

- Avoid dashboard crash when accessibility app is not installed (server#24636)
- Bump ini from 1.3.5 to 1.3.7 (server#24649)
- Handle owncloud migration to latest release (server#24653)
- Use string for storing a OCM remote id (server#24654)
- Fix MySQL database size calculation (serverinfo#262)
- Bump cypress-io/github-action@v2 (viewer#722)
- Fix] sidebar opening animation (viewer#723)
- Fix not.exist cypress and TESTING checks (viewer#725)

- Put apache configuration files in separate subpackage.

- Use apache-rpm-macros for SUSE.
- Change oc_* macros to nc_* macros.
- Insert macro apache_serverroot also in cron files.

Update to 20.0.3

* Check quota of subdirectories when uploading to them (server#24181)
* CircleId too short in some request (server#24196)
* Missing level in ScopedPsrLogger (server#24212)
* Fix nextcloud logo in email notifications misalignment (server#24228)
* Allow selecting multiple columns with SELECT DISTINCT (server#24230)
* Use file name instead of path in 'not allowed to share' message (server#24231)
* Fix setting images through occ for theming (server#24232)
* Use regex when searching on single file shares (server#24239)
* Harden EncryptionLegacyCipher a bit (server#24249)
* Update ScanLegacyFormat.php (server#24258)
* Simple typo in comments (server#24259)
* Use correct year for generated birthdays events (server#24263)
* Delete files that exceed trashbin size immediately (server#24297)
* Update sabre/xml to fix XML parsing errors (server#24311)
* Only check path for being accessible when the storage is a object home (server#24325)
* Avoid empty null default with value that will be inserted anyways (server#24333)
* Fix contacts menu position and show uid as a tooltip (server#24342)
* Fix the config key on the sharing expire checkbox (server#24346)
* Set the display name of federated sharees from addressbook (server#24353)
* Catch storage not available in versions expire command (server#24367)
* Use proper bundles for files client and fileinfo (server#24377)
* Properly encode path when fetching inherited shares (server#24387)
* Formatting remote sharer should take protocol, path into account (server#24391)
* Make sure we add new line between vcf groups exports (server#24443)
* Fix public calendars shared to circles (server#24446)
* Store scss variables under a different prefix for each theming config version (server#24453)
* External storages: save group ids not display names in configuration (server#24455)
* Use correct l10n source in files_sharing JS code (server#24462)
* Set frame-ancestors to none if none are filled (server#24477)
* Move the password fiels of chaging passwords to post (server#24478)
* Move the global password for files external to post (server#24479)
* Only attempt to move to trash if a file is not in appdata (server#24483)
* Fix loading mtime of new file in conflict dialog in firefox (server#24491)
* Harden setup check for TLS version if host is not reachable (server#24502)
* Fix file size computation on 32bit platforms (server#24509)
* Allow subscription to indicate that a userlimit is reached (server#24511)
* Set mountid for personal external storage mounts (server#24513)
* Only execute plain mimetype check for directories and do the fallback… (server#24517)
* Fix vsprint parameter (server#24527)
* Replace abandoned log normalizer with our fork (server#24530)
* Add icon to user limit notification (server#24531)
* Also run repair steps when encryption is disabled but a legacy key is present (server#24532)
* [3rdparty][security] Archive TAR to 1.4.11 (server#24534)
* Generate a new session id if the decrypting the session data fails (server#24553)
* Revert 'Do not read certificate bundle from data dir by default' (server#24556)
* Dont use system composer for autoload checker (server#24557)
* Remember me is not an app_password (server#24563)
* Do not load nonexisting setup.js (server#24582)
* Update sabre/xml to fix XML parsing errors (3rdparty#529)
* Use composer v1 on CI (3rdparty#532)
* Bump pear/archive_tar from 1.4.9 to 1.4.11 (3rdparty#536)
* Replace abandoned log normalizer with our fork (3rdparty#543)
* Allow nullable values as subject params (activity#535)
* Don't log when unknown array is null (notifications#803)
* Feat/virtual grid (photos#550)
* Make sure we have a string to localecompare to (photos#583)
* Always get recommendations for dashboard if enabled (recommendations#336)
* Properly fetch oracle database information (serverinfo#258)
* Also register to urlChanged event to update RichWorkspace (text#1181)
* Move away from GET (text#1214)

Update to 20.0.2
   
* CVE-2020-8293: Fixed input validation which allowed users to store unlimited 
  data in workflow rules (boo#1181445). 
* CVE-2020-8294: Fixed a missing link validation (boo#1181803).
* Inidicate preview availability in share api responses (server#23419)
* CalDavBackend: check if timerange is array before accessing (server#23563)
* Some emojis are in CHAR_CATEGORY_GENERAL_OTHER_TYPES (server#23575)
* Also expire share type email (server#23583)
* Only use index of mount point when it is there (server#23611)
* Only retry fetching app store data once every 5 minutes in case it fails (server#23633)
* Bring back the restore share button (server#23636)
* Fix updates of NULL appconfig values (server#23641)
* Fix sharing input placeholder for emails (server#23646)
* Use bigint for fileid in filecache_extended (server#23690)
* Enable theming background transparency (server#23699)
* Fix sharer flag on ldap:show-remnants when user owned more than a single share (server#23702)
* Make sure the function signatures of the backgroundjob match (server#23710)
* Check if array elements exist before using them (server#23713)
* Fix default quota display value in user row (server#23726)
* Use lib instead if core as l10n module in OC_Files (server#23727)
* Specify accept argument to avatar upload input field (server#23732)
* Save email as lower case (server#23733)
* Reset avatar cropper before showing (server#23736)
* Also run the SabreAuthInitEvent for the main server (server#23745)
* Type the \OCP\IUserManager::callForAllUsers closure with Psalm (server#23749)
* Type the \OCP\AppFramework\Services\IInitialState::provideLazyInitial… (server#23751)
* Don't overwrite the event if we use it later (server#23753)
* Inform the user when flow config data exceeds thresholds (server#23759)
* Type the \OCP\IUserManager::callForSeenUsers closure with Psalm (server#23763)
* Catch errors when closing file conflict dialog (server#23774)
* Document the backend registered events of LDAP (server#23779)
* Fetch the logger and system config once for all query builder instances (server#23787)
* Type the event dispatcher listener callables with Psalm (server#23789)
* Only run phpunit when 'php' changed (server#23794)
* Remove bold font-weight and lower font-size for empty search box (server#23829)
* No need to check if there is an avatar available, because it is gener… (server#23846)
* Ensure filepicker list is empty before populating (server#23850)
* UserStatus: clear status message if message is null (server#23858)
* Fix grid view toggle in tags view (server#23874)
* Restrict query when searching for versions of trashbin files (server#23884)
* Fix potentially passing null to events where IUser is expected (server#23894)
* Make user status styles scoped (server#23899)
* Move help to separate stylesheet (server#23900)
* Add default font size (server#23902)
* Do not emit UserCreatedEvent twice (server#23917)
* Bearer must be in the start of the auth header (server#23924)
* Fix casting of integer and boolean on Oracle (server#23935)
* Skip already loaded apps in loadApps (server#23948)
* Fix repair mimetype step to not leave stray cursors (server#23950)
* Improve query type detection (server#23951)
* Fix iLike() falsely turning escaped % and _ into wildcards (server#23954)
* Replace some usages of OC_DB in OC\Share\* with query builder (server#23955)
* Use query builder instead of OC_DB in trashbin (server#23971)
* Fix greatest/least order for oracle (server#23975)
* Fix link share label placeholder not showing (server#23992)
* Unlock when promoting to exclusive lock fails (server#23995)
* Make sure root storage is valid before checking its size (server#23996)
* Use query builder instead of OC_DB in OC\Files\* (server#23998)
* Shortcut to avoid file system setup when generating the logo URL (server#24001)
* Remove old legacy scripts references (server#24004)
* Fix js search in undefined ocs response (server#24012)
* Don't leave cursors open (server#24033)
* Fix sharing tab state not matching resharing admin settings (server#24044)
* Run unit tests against oracle (server#24049)
* Use png icons in caldav reminder emails (server#24050)
* Manually iterate over calendardata when oracle is used (server#24058)
* Make is_user_defined nullable so we can store false on oracle (server#24079)
* Fix default internal expiration date enforce (server#24081)
* Register new command db:add-missing-primary-keys (server#24106)
* Convert the card resource to a string if necessary (server#24114)
* Don't throw on SHOW VERSION query (server#24147)
* Bump dompurify to 2.2.2 (server#24153)
* Set up FS before querying storage info in settings (server#24156)
* Fix default internal expiration date (server#24159)
* CircleId too short in some request (server#24178)
* Revert 'circleId too short in some request' (server#24183)
* Missing level in ScopedPsrLogger (server#24212)
* Fix activity spinner on empty activity (activity#523)
* Add OCI github action (activity#528)
* Disable download button by default (files_pdfviewer#257)
* Feat/dependabot ga/stable20 (firstrunwizard#442)
* Fix loading notifications without a message on oracle (notifications#796)
* Do not setup appdata in constructor to avoid errors causing the whole instance to stop working (text#1105)
* Bump eslint-plugin-standard from 4.0.1 to 4.0.2 (text#1125)
* Bump sass-loader from 10.0.1 to 10.0.5 (text#1134)
* Bump webpack from 4.44.1 to 4.44.2 (text#1140)
* Bump dependencies to version in range (text#1164)
* Validate link on click (text#1166)
* Add migration to fix oracle issues with the database schema (text#1177)
* Bump cypress from 4.12.1 to 5.1.0 (text#1179)
* Fix URL escaping of shared files (viewer#681)
* Fix component click outside and cleanup structure (viewer#684)

Update to 20.0.1

No changelog from upstream at this time.

Update to 20.0.0

* Changes
  The three biggest features we introduce with Nextcloud 20 are:
  - Our new dashboard provides a great starting point for the day
    with over a dozen widgets ranging from Twitter and Github to 
    Moodle and Zammad already available
  - Search was unified, bringing search results of Nextcloud apps
    as well as external services like Gitlab, Jira and Discourse
    in one place
  - Talk introduced bridging to other platforms including MS Teams,
    Slack, IRC, Matrix and a dozen others
  * Some other improvements we want to highlight include:
    - Notifications and Activities were brought together, making 
      sure you won’t miss anything important
    - We added a ‘status’ setting so you can communicate to other
      users what you are up to
    - Talk also brings dashboard and search integration, emoji picker,
      upload view, camera and microphone settings, mute and more
    - Calendar integrates in dashboard and search, introduced a list 
      view and design improvements
    - Mail introduces threaded view, mailbox management and more
    - Deck integrates with dashboard and search, introduces Calendar
      integration, modal view for card editing and series of smaller 
      improvements
    - Flow adds push notification and webhooks so other web apps
      can easily integrate with Nextcloud
    - Text introduced direct linking to files in Nextcloud
    - Files lets you add a description to public link shares
+ Read the full announcement on our blog
- NC-SA-2020-037
- CVE-2020-8295: Fixed Denial of service attack when resetting the password for a user(boo#1181804)
- Update to 20.0.11
- Fix boo#1188247 - CVE-2021-32678: OCS API response ratelimits are not applied
- Fix boo#1188248 - CVE-2021-32679: filenames where not escaped by default in controllers using DownloadResponse
- Fix boo#1188249 - CVE-2021-32680: share expiration date wasn't properly logged
- Fix boo#1188250 - CVE-2021-32688: lacking permission check with application specific tokens
- Fix boo#1188251 - CVE-2021-32703: lack of ratelimiting on the shareinfo endpoint
- Fix boo#1188252 - CVE-2021-32705: lack of ratelimiting on the public DAV endpoint
- Fix boo#1188253 - CVE-2021-32725: default share permissions were not being respected for federated reshares of files and folders
- Fix boo#1188254 - CVE-2021-32726: webauthn tokens were not deleted after a user has been deleted
- Fix boo#1188255 - CVE-2021-32734: possible full path disclosure on shared files
- Fix boo#1188256 - CVE-2021-32741: lack of ratelimiting on the public share link mount endpoint
- Bump handlebars from 4.7.6 to 4.7.7 (server#26900)
- Bump lodash from 4.17.20 to 4.17.21 (server#26909)
- Bump hosted-git-info from 2.8.8 to 2.8.9 (server#26920)
- Don't break OCC if an app is breaking in it's Application class (server#26954)
- Add bruteforce protection to the shareinfo endpoint (server#26956)
- Ignore readonly flag for directories (server#26965)
- Throttle MountPublicLinkController when share is not found (server#26971)
- Respect default share permissions for federated reshares (server#27001)
- Harden apptoken check (server#27014)
- Use parent wrapper to properly handle moves on the same source/target storage (server#27016)
- Fix error when using CORS with no auth credentials (server#27027)
- Fix return value of getStorageInfo when 'quota_include_external_storage' is enabled (server#27108)
- Bump patch dependencies (server#27183)
- Use noreply@ as email address for share emails (server#27209)
- Bump p-queue from 6.6.1 to 6.6.2 (server#27226)
- Bump browserslist from 4.14.0 to 4.16.6 (server#27247)
- Bump webpack from 4.44.1 to 4.44.2 (server#27297)
- Properly use limit and offset for search in Jail wrapper (server#27308)
- Make user:report command scale (server#27319)
- Properly log expiration date removal in audit log (server#27325)
- Propagate throttling on OCS response (server#27337)
- Set umask before operations that create local files (server#27349)
- Escape filename in Content-Disposition (server#27360)
- Don't update statuses to offline again and again (server#27412)
- Header must contain a colon (server#27456)
- Activate constraint check for oracle / pqsql also for 20 (server#27523)
- Only allow removing existing shares that would not be allowed due to reshare restrictions (server#27552)
- Bump ws from 7.3.1 to 7.5.0 (server#27570)
- Properly cleanup entries of WebAuthn on user deletion (server#27596)
- Throttle on public DAV endpoint (server#27617)
- Bump vue-loader from 15.9.3 to 15.9.7 (server#27639)
- Bump eslint-plugin-standard from 4.0.1 to 4.0.2 (server#27651)
- Validate the theming color also on CLI (server#27680)
- Downstream encryption:fix-encrypted-version for repairing bad signature errors (server#27728)
- Remove encodeURI code (files_pdfviewer#396)
- Only ask for permissions on HTTPS (notifications#998)
- Fix sorting if one of the file name is only composed with number (photos#785)
- Backport 20 fix Photos not shown in large browser windows #630 (#686) (photos#810)
- Update File.vue (photos#813)
- Update chart.js (serverinfo#309)
- Only return workspace property for top node in a propfind request (text#1611)
- ViewerComponent: pass on autofocus to EditorWrapper (text#1647)
- Use text/plain as content type for fetching the document (text#1692)
- Log exceptions that happen on unknown exception and return generic messages (text#1698)
- Add fixup (viewer#924)
- Fix: fullscreen for Firefox (viewer#929)

Update to 20.0.7

- Catch NotFoundException when querying quota (server#25315)
- CalDAV] Validate notified emails (server#25324)
- Fix/app fetcher php compat comparison (server#25347)
- Show the actual error on share requests (server#25352)
- Fix parameter provided as string not array (server#25366)
- The objectid is a string (server#25374)
- 20.0.7 final (server#25387)
- Properly handle SMB ACL blocking scanning a directory (server#25421)
- Don't break completely when creating the digest fail for one user (activity#556)
- Only attempt to use a secure view if hide download is actually set (files_pdfviewer#296)
- Fix opening PDF files with special characters in their name (files_pdfviewer#298)
- Fix PDF viewer failing on Edge (not based on Chromium) (files_pdfviewer#299)
- Cannot unfold plain text notifications (notifications#846)
- Remove EPUB mimetype (text#1391)

Update to 20.0.6

- Make sure to do priority app upgrades first (server#25077)
- Respect DB restrictions on number of arguments in statements and queries (server#25120)
- Add a hint about the direction of priority (server#25143)
- Do not redirect to logout after login (server#25146)
- Fix comparison of PHP versions (server#25152)
- Add 'composer.lock' for acceptance tests to git (server#25178)
- Update CRL due to revoked gravatar.crl (server#25190)
- Don't log keys on checkSignature (server#25193)
- Update 3rdparty after Archive_Tar (server#25199)
- Bump CA bundle (server#25219)
- Update handling of user credentials (server#25225)
- Fix encoding issue with OC.Notification.show (server#25244)
- Also use storage copy when dav copying directories (server#25261)
- Silence log message (server#25263)
- Extend ILDAPProvider to allow reading arbitrairy ldap attributes for users (server#25276)
- Do not obtain userFolder of a federated user (server#25278)
- Bump pear/archive_tar from 1.4.11 to 1.4.12 (3rdparty#603)
- Add gitignore entry for .github folder of dependencies (3rdparty#604)
- Clear event array on getting them (activity#551)

Update to 20.0.5

- Don't log params of imagecreatefromstring (server#24546)
- Use storage copy implementation when doing dav copy
  (server#24590)
- Use in objectstore copy (server#24592)
- Add tel, note, org and title search (server#24697)
- Check php compatibility of app store app releases
  (server#24698)
- Fix #24682]: ensure federation cloud id is retruned if FN
  property not found (server#24709)
- Do not include non-required scripts on the upgrade page
  (server#24714)
- LDAP: fix inGroup for memberUid type of group memberships
  (server#24716)
- Cancel user search requests to avoid duplicate results being
  added (server#24728)
- Also unset the other possible unused paramters (server#24751)
- Enables the file name check also to match name of mountpoints
  (server#24760)
- Fixes sharing to group ids with characters that are being url
  encoded (server#24763)
- Limit getIncomplete query to one row (server#24791)
- Fix Argon2 descriptions (server#24792)
- Actually set the TTL on redis set (server#24798)
- Allow to force rename a conflicting calendar (server#24806)
- Fix IPv6 localhost regex (server#24823)
- Catch the error on heartbeat update (server#24826)
- Make oc_files_trash.auto_id a bigint (server#24853)
- Fix total upload size overwritten by next upload (server#24854)
- Avoid huge exception argument logging (server#24876)
- Make share results distinguishable if there are more than one
  with the exact same display name (server#24878)
- Add migration for oc_share_external columns (server#24963)
- Don't throw a 500 when importing a broken ics reminder file
  (server#24972)
- Fix unreliable ViewTest (server#24976)
- Update root.crl due to revocation of transmission.crt
  (server#24990)
- Set the JSCombiner cache if needed (server#24997)
- Fix column name to check prior to deleting (server#25009)
- Catch throwable instead of exception (server#25013)
- Set the user language when adding the footer (server#25019)
- Change defaultapp in config.sample.php to dashboard to improve
  docs and align it to source code (server#25030)
- Fix clearing the label of a share (server#25035)
- Update psalm-baseline.xml (server#25066)
- Don't remove assignable column for now (server#25074)
- Add setup check to verify that the used DB version is still
  supported… (server#25076)
- Correctly set the user for activity parsing when preparing
  a notifica… (activity#542)
- Bump vue-virtual-grid from 2.2.1 to 2.3.0 (photos#597)
- Catch possible database exceptions when fetching document data
  (text#1221)
- Make sure we have the proper PHP version installed before
  running composer (text#1234)
- Revert removal of transformResponse (text#1235)
- Bump prosemirror-view from 1.16.1 to 1.16.5 (text#1255)
- Bump @babel/preset-env from 7.12.1 to 7.12.11 (text#1257)
- Bump babel-loader from 8.1.0 to 8.2.2 (text#1259)
- Bump eslint-plugin-standard from 4.0.2 to 4.1.0 (text#1261)
- Bump vue-loader from 15.9.5 to 15.9.6 (text#1263)
- Bump prosemirror-model from 1.12.0 to 1.13.1 (text#1265)
- Bump core-js from 3.7.0 to 3.8.1 (text#1266)
- Bump stylelint from 13.7.2 to 13.8.0 (text#1269)
- Bump @babel/plugin-transform-runtime from 7.12.1 to 7.12.10
  (text#1271)
- Bump sass-loader from 10.0.5 to 10.1.0 (text#1273)
- Bump webpack-merge from 5.3.0 to 5.7.2 (text#1274)
- Bump @babel/core from 7.12.3 to 7.12.10 (text#1277)
- Bump cypress from 5.1.0 to 5.6.0 (text#1278)
- Bump @vue/test-utils from 1.1.1 to 1.1.2 (text#1279)
- Bump webpack-merge from 5.7.2 to 5.7.3 (text#1303)

- The apache subpackage must require the main package, otherwise it
  will not be uninstalled when the main package is uninstalled.

Update to 20.0.4

- Avoid dashboard crash when accessibility app is not installed (server#24636)
- Bump ini from 1.3.5 to 1.3.7 (server#24649)
- Handle owncloud migration to latest release (server#24653)
- Use string for storing a OCM remote id (server#24654)
- Fix MySQL database size calculation (serverinfo#262)
- Bump cypress-io/github-action@v2 (viewer#722)
- Fix] sidebar opening animation (viewer#723)
- Fix not.exist cypress and TESTING checks (viewer#725)

- Put apache configuration files in separate subpackage.

- Use apache-rpm-macros for SUSE.
- Change oc_* macros to nc_* macros.
- Insert macro apache_serverroot also in cron files.

Update to 20.0.3

* Check quota of subdirectories when uploading to them (server#24181)
* CircleId too short in some request (server#24196)
* Missing level in ScopedPsrLogger (server#24212)
* Fix nextcloud logo in email notifications misalignment (server#24228)
* Allow selecting multiple columns with SELECT DISTINCT (server#24230)
* Use file name instead of path in 'not allowed to share' message (server#24231)
* Fix setting images through occ for theming (server#24232)
* Use regex when searching on single file shares (server#24239)
* Harden EncryptionLegacyCipher a bit (server#24249)
* Update ScanLegacyFormat.php (server#24258)
* Simple typo in comments (server#24259)
* Use correct year for generated birthdays events (server#24263)
* Delete files that exceed trashbin size immediately (server#24297)
* Update sabre/xml to fix XML parsing errors (server#24311)
* Only check path for being accessible when the storage is a object home (server#24325)
* Avoid empty null default with value that will be inserted anyways (server#24333)
* Fix contacts menu position and show uid as a tooltip (server#24342)
* Fix the config key on the sharing expire checkbox (server#24346)
* Set the display name of federated sharees from addressbook (server#24353)
* Catch storage not available in versions expire command (server#24367)
* Use proper bundles for files client and fileinfo (server#24377)
* Properly encode path when fetching inherited shares (server#24387)
* Formatting remote sharer should take protocol, path into account (server#24391)
* Make sure we add new line between vcf groups exports (server#24443)
* Fix public calendars shared to circles (server#24446)
* Store scss variables under a different prefix for each theming config version (server#24453)
* External storages: save group ids not display names in configuration (server#24455)
* Use correct l10n source in files_sharing JS code (server#24462)
* Set frame-ancestors to none if none are filled (server#24477)
* Move the password fiels of chaging passwords to post (server#24478)
* Move the global password for files external to post (server#24479)
* Only attempt to move to trash if a file is not in appdata (server#24483)
* Fix loading mtime of new file in conflict dialog in firefox (server#24491)
* Harden setup check for TLS version if host is not reachable (server#24502)
* Fix file size computation on 32bit platforms (server#24509)
* Allow subscription to indicate that a userlimit is reached (server#24511)
* Set mountid for personal external storage mounts (server#24513)
* Only execute plain mimetype check for directories and do the fallback… (server#24517)
* Fix vsprint parameter (server#24527)
* Replace abandoned log normalizer with our fork (server#24530)
* Add icon to user limit notification (server#24531)
* Also run repair steps when encryption is disabled but a legacy key is present (server#24532)
* [3rdparty][security] Archive TAR to 1.4.11 (server#24534)
* Generate a new session id if the decrypting the session data fails (server#24553)
* Revert 'Do not read certificate bundle from data dir by default' (server#24556)
* Dont use system composer for autoload checker (server#24557)
* Remember me is not an app_password (server#24563)
* Do not load nonexisting setup.js (server#24582)
* Update sabre/xml to fix XML parsing errors (3rdparty#529)
* Use composer v1 on CI (3rdparty#532)
* Bump pear/archive_tar from 1.4.9 to 1.4.11 (3rdparty#536)
* Replace abandoned log normalizer with our fork (3rdparty#543)
* Allow nullable values as subject params (activity#535)
* Don't log when unknown array is null (notifications#803)
* Feat/virtual grid (photos#550)
* Make sure we have a string to localecompare to (photos#583)
* Always get recommendations for dashboard if enabled (recommendations#336)
* Properly fetch oracle database information (serverinfo#258)
* Also register to urlChanged event to update RichWorkspace (text#1181)
* Move away from GET (text#1214)

Update to 20.0.2
   
* CVE-2020-8293: Fixed input validation which allowed users to store unlimited 
  data in workflow rules (boo#1181445). 
* CVE-2020-8294: Fixed a missing link validation (boo#1181803).
* Inidicate preview availability in share api responses (server#23419)
* CalDavBackend: check if timerange is array before accessing (server#23563)
* Some emojis are in CHAR_CATEGORY_GENERAL_OTHER_TYPES (server#23575)
* Also expire share type email (server#23583)
* Only use index of mount point when it is there (server#23611)
* Only retry fetching app store data once every 5 minutes in case it fails (server#23633)
* Bring back the restore share button (server#23636)
* Fix updates of NULL appconfig values (server#23641)
* Fix sharing input placeholder for emails (server#23646)
* Use bigint for fileid in filecache_extended (server#23690)
* Enable theming background transparency (server#23699)
* Fix sharer flag on ldap:show-remnants when user owned more than a single share (server#23702)
* Make sure the function signatures of the backgroundjob match (server#23710)
* Check if array elements exist before using them (server#23713)
* Fix default quota display value in user row (server#23726)
* Use lib instead if core as l10n module in OC_Files (server#23727)
* Specify accept argument to avatar upload input field (server#23732)
* Save email as lower case (server#23733)
* Reset avatar cropper before showing (server#23736)
* Also run the SabreAuthInitEvent for the main server (server#23745)
* Type the \OCP\IUserManager::callForAllUsers closure with Psalm (server#23749)
* Type the \OCP\AppFramework\Services\IInitialState::provideLazyInitial… (server#23751)
* Don't overwrite the event if we use it later (server#23753)
* Inform the user when flow config data exceeds thresholds (server#23759)
* Type the \OCP\IUserManager::callForSeenUsers closure with Psalm (server#23763)
* Catch errors when closing file conflict dialog (server#23774)
* Document the backend registered events of LDAP (server#23779)
* Fetch the logger and system config once for all query builder instances (server#23787)
* Type the event dispatcher listener callables with Psalm (server#23789)
* Only run phpunit when 'php' changed (server#23794)
* Remove bold font-weight and lower font-size for empty search box (server#23829)
* No need to check if there is an avatar available, because it is gener… (server#23846)
* Ensure filepicker list is empty before populating (server#23850)
* UserStatus: clear status message if message is null (server#23858)
* Fix grid view toggle in tags view (server#23874)
* Restrict query when searching for versions of trashbin files (server#23884)
* Fix potentially passing null to events where IUser is expected (server#23894)
* Make user status styles scoped (server#23899)
* Move help to separate stylesheet (server#23900)
* Add default font size (server#23902)
* Do not emit UserCreatedEvent twice (server#23917)
* Bearer must be in the start of the auth header (server#23924)
* Fix casting of integer and boolean on Oracle (server#23935)
* Skip already loaded apps in loadApps (server#23948)
* Fix repair mimetype step to not leave stray cursors (server#23950)
* Improve query type detection (server#23951)
* Fix iLike() falsely turning escaped % and _ into wildcards (server#23954)
* Replace some usages of OC_DB in OC\Share\* with query builder (server#23955)
* Use query builder instead of OC_DB in trashbin (server#23971)
* Fix greatest/least order for oracle (server#23975)
* Fix link share label placeholder not showing (server#23992)
* Unlock when promoting to exclusive lock fails (server#23995)
* Make sure root storage is valid before checking its size (server#23996)
* Use query builder instead of OC_DB in OC\Files\* (server#23998)
* Shortcut to avoid file system setup when generating the logo URL (server#24001)
* Remove old legacy scripts references (server#24004)
* Fix js search in undefined ocs response (server#24012)
* Don't leave cursors open (server#24033)
* Fix sharing tab state not matching resharing admin settings (server#24044)
* Run unit tests against oracle (server#24049)
* Use png icons in caldav reminder emails (server#24050)
* Manually iterate over calendardata when oracle is used (server#24058)
* Make is_user_defined nullable so we can store false on oracle (server#24079)
* Fix default internal expiration date enforce (server#24081)
* Register new command db:add-missing-primary-keys (server#24106)
* Convert the card resource to a string if necessary (server#24114)
* Don't throw on SHOW VERSION query (server#24147)
* Bump dompurify to 2.2.2 (server#24153)
* Set up FS before querying storage info in settings (server#24156)
* Fix default internal expiration date (server#24159)
* CircleId too short in some request (server#24178)
* Revert 'circleId too short in some request' (server#24183)
* Missing level in ScopedPsrLogger (server#24212)
* Fix activity spinner on empty activity (activity#523)
* Add OCI github action (activity#528)
* Disable download button by default (files_pdfviewer#257)
* Feat/dependabot ga/stable20 (firstrunwizard#442)
* Fix loading notifications without a message on oracle (notifications#796)
* Do not setup appdata in constructor to avoid errors causing the whole instance to stop working (text#1105)
* Bump eslint-plugin-standard from 4.0.1 to 4.0.2 (text#1125)
* Bump sass-loader from 10.0.1 to 10.0.5 (text#1134)
* Bump webpack from 4.44.1 to 4.44.2 (text#1140)
* Bump dependencies to version in range (text#1164)
* Validate link on click (text#1166)
* Add migration to fix oracle issues with the database schema (text#1177)
* Bump cypress from 4.12.1 to 5.1.0 (text#1179)
* Fix URL escaping of shared files (viewer#681)
* Fix component click outside and cleanup structure (viewer#684)

Update to 20.0.1

No changelog from upstream at this time.

Update to 20.0.0

* Changes
  The three biggest features we introduce with Nextcloud 20 are:
  - Our new dashboard provides a great starting point for the day
    with over a dozen widgets ranging from Twitter and Github to 
    Moodle and Zammad already available
  - Search was unified, bringing search results of Nextcloud apps
    as well as external services like Gitlab, Jira and Discourse
    in one place
  - Talk introduced bridging to other platforms including MS Teams,
    Slack, IRC, Matrix and a dozen others
  * Some other improvements we want to highlight include:
    - Notifications and Activities were brought together, making 
      sure you won’t miss anything important
    - We added a ‘status’ setting so you can communicate to other
      users what you are up to
    - Talk also brings dashboard and search integration, emoji picker,
      upload view, camera and microphone settings, mute and more
    - Calendar integrates in dashboard and search, introduced a list 
      view and design improvements
    - Mail introduces threaded view, mailbox management and more
    - Deck integrates with dashboard and search, introduces Calendar
      integration, modal view for card editing and series of smaller 
      improvements
    - Flow adds push notification and webhooks so other web apps
      can easily integrate with Nextcloud
    - Text introduced direct linking to files in Nextcloud
    - Files lets you add a description to public link shares
+ Read the full announcement on our blog
- NC-SA-2020-037
- CVE-2020-8295: Fixed Denial of service attack when resetting the password for a user(boo#1181804)
- Update to 20.0.11
- Fix boo#1188247 - CVE-2021-32678: OCS API response ratelimits are not applied
- Fix boo#1188248 - CVE-2021-32679: filenames where not escaped by default in controllers using DownloadResponse
- Fix boo#1188249 - CVE-2021-32680: share expiration date wasn't properly logged
- Fix boo#1188250 - CVE-2021-32688: lacking permission check with application specific tokens
- Fix boo#1188251 - CVE-2021-32703: lack of ratelimiting on the shareinfo endpoint
- Fix boo#1188252 - CVE-2021-32705: lack of ratelimiting on the public DAV endpoint
- Fix boo#1188253 - CVE-2021-32725: default share permissions were not being respected for federated reshares of files and folders
- Fix boo#1188254 - CVE-2021-32726: webauthn tokens were not deleted after a user has been deleted
- Fix boo#1188255 - CVE-2021-32734: possible full path disclosure on shared files
- Fix boo#1188256 - CVE-2021-32741: lack of ratelimiting on the public share link mount endpoint
- Bump handlebars from 4.7.6 to 4.7.7 (server#26900)
- Bump lodash from 4.17.20 to 4.17.21 (server#26909)
- Bump hosted-git-info from 2.8.8 to 2.8.9 (server#26920)
- Don't break OCC if an app is breaking in it's Application class (server#26954)
- Add bruteforce protection to the shareinfo endpoint (server#26956)
- Ignore readonly flag for directories (server#26965)
- Throttle MountPublicLinkController when share is not found (server#26971)
- Respect default share permissions for federated reshares (server#27001)
- Harden apptoken check (server#27014)
- Use parent wrapper to properly handle moves on the same source/target storage (server#27016)
- Fix error when using CORS with no auth credentials (server#27027)
- Fix return value of getStorageInfo when 'quota_include_external_storage' is enabled (server#27108)
- Bump patch dependencies (server#27183)
- Use noreply@ as email address for share emails (server#27209)
- Bump p-queue from 6.6.1 to 6.6.2 (server#27226)
- Bump browserslist from 4.14.0 to 4.16.6 (server#27247)
- Bump webpack from 4.44.1 to 4.44.2 (server#27297)
- Properly use limit and offset for search in Jail wrapper (server#27308)
- Make user:report command scale (server#27319)
- Properly log expiration date removal in audit log (server#27325)
- Propagate throttling on OCS response (server#27337)
- Set umask before operations that create local files (server#27349)
- Escape filename in Content-Disposition (server#27360)
- Don't update statuses to offline again and again (server#27412)
- Header must contain a colon (server#27456)
- Activate constraint check for oracle / pqsql also for 20 (server#27523)
- Only allow removing existing shares that would not be allowed due to reshare restrictions (server#27552)
- Bump ws from 7.3.1 to 7.5.0 (server#27570)
- Properly cleanup entries of WebAuthn on user deletion (server#27596)
- Throttle on public DAV endpoint (server#27617)
- Bump vue-loader from 15.9.3 to 15.9.7 (server#27639)
- Bump eslint-plugin-standard from 4.0.1 to 4.0.2 (server#27651)
- Validate the theming color also on CLI (server#27680)
- Downstream encryption:fix-encrypted-version for repairing bad signature errors (server#27728)
- Remove encodeURI code (files_pdfviewer#396)
- Only ask for permissions on HTTPS (notifications#998)
- Fix sorting if one of the file name is only composed with number (photos#785)
- Backport 20 fix Photos not shown in large browser windows #630 (#686) (photos#810)
- Update File.vue (photos#813)
- Update chart.js (serverinfo#309)
- Only return workspace property for top node in a propfind request (text#1611)
- ViewerComponent: pass on autofocus to EditorWrapper (text#1647)
- Use text/plain as content type for fetching the document (text#1692)
- Log exceptions that happen on unknown exception and return generic messages (text#1698)
- Add fixup (viewer#924)
- Fix: fullscreen for Firefox (viewer#929)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181445">SUSE bug 1181445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181803">SUSE bug 1181803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181804">SUSE bug 1181804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188247">SUSE bug 1188247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188248">SUSE bug 1188248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188249">SUSE bug 1188249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188250">SUSE bug 1188250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188251">SUSE bug 1188251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188252">SUSE bug 1188252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188253">SUSE bug 1188253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188254">SUSE bug 1188254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188255">SUSE bug 1188255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188256">SUSE bug 1188256</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8293/">CVE-2020-8293</cve>
	<cve impact="low" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8294/">CVE-2020-8294</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8295/">CVE-2020-8295</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32678/">CVE-2021-32678</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32679/">CVE-2021-32679</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32680/">CVE-2021-32680</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32688/">CVE-2021-32688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32703/">CVE-2021-32703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32705/">CVE-2021-32705</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32725/">CVE-2021-32725</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32726/">CVE-2021-32726</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32734/">CVE-2021-32734</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32741/">CVE-2021-32741</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625709" comment="nextcloud-20.0.11-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625710" comment="nextcloud-apache-20.0.11-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52067" version="1" class="patch">
	<metadata>
		<title>Security update for icinga2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180147" ref_url="https://bugzilla.suse.com/1180147" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29663" ref_url="https://www.suse.com/security/cve/CVE-2020-29663/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1069-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RXCOMXKKWZ7PYODPH5SO5SSBKRXIJWA/" source="SUSE-SU"/>
		<description>
This update for icinga2 fixes the following issues:

Update to 2.12.4

  * Bugfixes

    - Fix a crash when notification objects are deleted using the
      API #8782
    - Fix crashes that might occur during downtime scheduling if
      host or downtime objects are deleted using the API #8785
    - Fix an issue where notifications may incorrectly be skipped
      after a downtime ends #8775
    - Don't send reminder notification if the notification is still
      suppressed by a time period #8808
    - Fix an issue where attempting to create a duplicate object
      using the API might result in the original object being
      deleted #8787
    - IDO: prioritize program status updates #8809
    - Improve exceptions handling, including a fix for an uncaught
      exception on Windows #8777
    - Retry file rename operations on Windows to avoid intermittent
      locking issues #8771

  * Enhancements

    - Support Boost 1.74 (Ubuntu 21.04, Fedora 34) #8792

Update to 2.12.3

  * Security

    - Fix that revoked certificates due for renewal will 
      automatically be renewed ignoring the CRL 
      (Advisory / CVE-2020-29663 - fixes boo#1180147 )

  * Bugfixes

    - Improve config sync locking - resolves high load issues on
      Windows #8511
    - Fix runtime config updates being ignored for objects without
      zone #8549
    - Use proper buffer size for OpenSSL error messages #8542

  * Enhancements

    - On checkable recovery: re-check children that have a problem
      #8506

Update to 2.12.2

  * Bugfixes

    - Fix a connection leak with misconfigured agents #8483
    - Properly sync changes of config objects in global zones done
      via the API #8474 #8470
    - Prevent other clients from being disconnected when replaying
      the cluster log takes very long #8496
    - Avoid duplicate connections between endpoints #8465
    - Ignore incoming config object updates for unknown zones #8461
    - Check timestamps before removing files in config sync #8495

  * Enhancements

    - Include HTTP status codes in log #8467
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180147">SUSE bug 1180147</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29663/">CVE-2020-29663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625711" comment="icinga2-2.12.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625712" comment="icinga2-bin-2.12.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625713" comment="icinga2-common-2.12.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625714" comment="icinga2-doc-2.12.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625715" comment="icinga2-ido-mysql-2.12.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625716" comment="icinga2-ido-pgsql-2.12.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625717" comment="nano-icinga2-2.12.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625718" comment="vim-icinga2-2.12.4-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52068" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188373" ref_url="https://bugzilla.suse.com/1188373" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30541" ref_url="https://www.suse.com/security/cve/CVE-2021-30541/" source="CVE"/>
		<reference ref_id="CVE-2021-30559" ref_url="https://www.suse.com/security/cve/CVE-2021-30559/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-30561" ref_url="https://www.suse.com/security/cve/CVE-2021-30561/" source="CVE"/>
		<reference ref_id="CVE-2021-30562" ref_url="https://www.suse.com/security/cve/CVE-2021-30562/" source="CVE"/>
		<reference ref_id="CVE-2021-30563" ref_url="https://www.suse.com/security/cve/CVE-2021-30563/" source="CVE"/>
		<reference ref_id="CVE-2021-30564" ref_url="https://www.suse.com/security/cve/CVE-2021-30564/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEDHHJT7UKCU4N3Q5EL6PGUNNHXGEIYQ/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 91.0.4472.164 (boo#1188373)

* CVE-2021-30559: Out of bounds write in ANGLE
* CVE-2021-30541: Use after free in V8
* CVE-2021-30560: Use after free in Blink XSLT
* CVE-2021-30561: Type Confusion in V8
* CVE-2021-30562: Use after free in WebSerial
* CVE-2021-30563: Type Confusion in V8
* CVE-2021-30564: Heap buffer overflow in WebXR
* Various fixes from internal audits, fuzzing and other initiatives

		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188373">SUSE bug 1188373</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30541/">CVE-2021-30541</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30559/">CVE-2021-30559</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30561/">CVE-2021-30561</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30562/">CVE-2021-30562</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30563/">CVE-2021-30563</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30564/">CVE-2021-30564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626047" comment="chromedriver-91.0.4472.164-bp153.2.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626048" comment="chromium-91.0.4472.164-bp153.2.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52069" version="1" class="patch">
	<metadata>
		<title>Security update for icinga2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-29663" ref_url="https://www.suse.com/security/cve/CVE-2020-29663/" source="CVE"/>
		<reference ref_id="CVE-2021-32739" ref_url="https://www.suse.com/security/cve/CVE-2021-32739/" source="CVE"/>
		<reference ref_id="CVE-2021-32743" ref_url="https://www.suse.com/security/cve/CVE-2021-32743/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AG46DROWC4ZEVBNIZC5IYVVFYH4FMFCS/" source="SUSE-SU"/>
		<description>
This update for icinga2 fixes the following issues:

icinga2 was updated to 2.12.5:

  Version 2.12.5 fixes two security vulnerabilities that may lead
  to privilege escalation for authenticated API users.
  Other improvements include several bugfixes related to downtimes,
  downtime notifications, and more reliable connection handling.

  * Security

    - Don't expose the PKI ticket salt via the API. This may lead
      to privilege escalation for authenticated API users by them
      being able to request certificates for other identities
      (CVE-2021-32739)

    - Don't expose IdoMysqlConnection, IdoPgsqlConnection, and
      ElasticsearchWriter passwords via the API
      (CVE-2021-32743)

    Depending on your setup, manual intervention beyond installing
    the new versions may be required, so please read the more
    detailed information in the release blog post carefully.

  * Bugfixes

    - Don't send downtime end notification if downtime hasn't
      started #8878
    - Don't let a failed downtime creation block the others #8871
    - Support downtimes and comments for checkables with long names
      #8870
    - Trigger fixed downtimes immediately if the current time
      matches (instead of waiting for the timer) #8891
    - Add configurable timeout for full connection handshake #8872
  * Enhancements
    - Replace existing downtimes on ScheduledDowntime change #8880
    - Improve crashlog #8869
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-24"/>
	<updated date="2021-07-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29663/">CVE-2020-29663</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32739/">CVE-2021-32739</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32743/">CVE-2021-32743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626655" comment="icinga2-2.12.5-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626656" comment="icinga2-bin-2.12.5-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626657" comment="icinga2-common-2.12.5-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626658" comment="icinga2-doc-2.12.5-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626659" comment="icinga2-ido-mysql-2.12.5-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626660" comment="icinga2-ido-pgsql-2.12.5-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626661" comment="nano-icinga2-2.12.5-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626662" comment="vim-icinga2-2.12.5-bp153.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52070" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188045" ref_url="https://bugzilla.suse.com/1188045" source="BUGZILLA"/>
		<reference ref_id="1188105" ref_url="https://bugzilla.suse.com/1188105" source="BUGZILLA"/>
		<reference ref_id="1188535" ref_url="https://bugzilla.suse.com/1188535" source="BUGZILLA"/>
		<reference ref_id="1188536" ref_url="https://bugzilla.suse.com/1188536" source="BUGZILLA"/>
		<reference ref_id="1188537" ref_url="https://bugzilla.suse.com/1188537" source="BUGZILLA"/>
		<reference ref_id="1188538" ref_url="https://bugzilla.suse.com/1188538" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2409" ref_url="https://www.suse.com/security/cve/CVE-2021-2409/" source="CVE"/>
		<reference ref_id="CVE-2021-2442" ref_url="https://www.suse.com/security/cve/CVE-2021-2442/" source="CVE"/>
		<reference ref_id="CVE-2021-2443" ref_url="https://www.suse.com/security/cve/CVE-2021-2443/" source="CVE"/>
		<reference ref_id="CVE-2021-2454" ref_url="https://www.suse.com/security/cve/CVE-2021-2454/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQOOU7OS5PW5QXPE2UITMUDKYSU7JH54/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

Version bump to 6.1.24 (released July 20 2021 by Oracle)

  This is a maintenance release. The following items were fixed and/or added:

- Storage: Fixed starting a VM if a device is attached to a VirtIO SCSI port higher than 30 (bug #20213)
- Storage: Improvement to DVD medium change signaling
- Serial: Fixed a the guest missing interrupts under certain circumstances (6.0 regression, bug #18668)
- Audio: Multiple fixes and enhancements
- Network: Fixed connectivity issue with virtio-net after resuming VM with disconnected link
- Network: Fixed UDP GSO fragmentation issue with missing 8 bytes of payload at the end of the first fragment
- API: Fixed VM configuration for recent Windows Server versions
- Extension Pack: Fixed issues with USB webcam pass-through on Linux
- Host and guest driver: Fix small memory leak (bug #20280)
- Linux host and guest: Support kernel version 5.13 (bug #20456)
- Linux host and guest: Introduce support for SUSE SLES/SLED 15 SP3 kernels (bug #20396)
- Linux host: Installer will not attempt to build kernel modules if system already has them installed and modules versions match current version
- Guest Additions: Fixed crash on using shared clipboard (bug #19165)
- Linux Guest Additions: Introduce support for Ubuntu specific kernels (bug #20325)
- Solaris guest: Increased default memory and disk sizes
- EFI: Support network booting with the E1000 network controller emulation
- EFI: Stability improvements (bug #20090)

- This release fixes boo#1188535, VUL-0: CVE-2021-2454,
                     boo#1188536, VUL-0: CVE-2021-2409,
                     boo#1188537, VUL-0: CVE-2021-2442, and
                     boo#1188538, VUL-0: CVE-2021-2443.

- Add vboximg-mount to packaging. boo#1188045.
- Fix CONFIG_RANDOMIZE_KSTACK_OFFSET_DEFAULT problem with kernel 5.13 as shown in boo#1188105. 
- Disable the build of kmp vboxvideo, at least temporarily. 
- Correct WantedBy entry in vboxadd-service
- Require which for /usr/lib/virtualbox/vboxadd-service
- fix license packaging, small cruft cleanup (avoid owning directories provided by filesystem rpm) 		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188045">SUSE bug 1188045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188105">SUSE bug 1188105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188535">SUSE bug 1188535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188536">SUSE bug 1188536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188537">SUSE bug 1188537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188538">SUSE bug 1188538</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2409/">CVE-2021-2409</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2442/">CVE-2021-2442</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-2443/">CVE-2021-2443</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2454/">CVE-2021-2454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627974" comment="python3-virtualbox-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627975" comment="virtualbox-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627976" comment="virtualbox-devel-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627977" comment="virtualbox-guest-desktop-icons-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627978" comment="virtualbox-guest-source-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627979" comment="virtualbox-guest-tools-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627980" comment="virtualbox-guest-x11-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627981" comment="virtualbox-host-source-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627982" comment="virtualbox-kmp-default-6.1.24_k5.3.18_59.16-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627983" comment="virtualbox-kmp-preempt-6.1.24_k5.3.18_59.16-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627984" comment="virtualbox-qt-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627985" comment="virtualbox-vnc-6.1.24-lp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627986" comment="virtualbox-websrv-6.1.24-lp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52071" version="1" class="patch">
	<metadata>
		<title>Security update for balsa (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42QNVR5Y3Z3YQLA2G7H66ZAGRYHVNWHT/" source="SUSE-SU"/>
		<description>
This update for balsa fixes the following issues:

Update to version 2.6.1

- CVE-2020-13645: fix server identity verification (boo#1172460)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628101" comment="balsa-2.6.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628102" comment="balsa-lang-2.6.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52072" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-30541" ref_url="https://www.suse.com/security/cve/CVE-2021-30541/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<reference ref_id="CVE-2021-30561" ref_url="https://www.suse.com/security/cve/CVE-2021-30561/" source="CVE"/>
		<reference ref_id="CVE-2021-30562" ref_url="https://www.suse.com/security/cve/CVE-2021-30562/" source="CVE"/>
		<reference ref_id="CVE-2021-30563" ref_url="https://www.suse.com/security/cve/CVE-2021-30563/" source="CVE"/>
		<reference ref_id="CVE-2021-30564" ref_url="https://www.suse.com/security/cve/CVE-2021-30564/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5MSUD6KYHZ34U3ICGDUX4DAHAE4L7BB/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to version 77.0.4054.277

- DNA-94291 Video conference popout doesnt remember its size after resizing
- DNA-94399 Incorrect icon for wp.pl in address bar dropdown - DNA-94462 Low quality of default wallpaper on windows
- The update to chromium 91.0.4472.164 fixes following issues:
  CVE-2021-30541, CVE-2021-30560, CVE-2021-30561, CVE-2021-30562,
  CVE-2021-30563, CVE-2021-30564
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30541/">CVE-2021-30541</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30561/">CVE-2021-30561</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30562/">CVE-2021-30562</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30563/">CVE-2021-30563</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30564/">CVE-2021-30564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694931" comment="opera-77.0.4054.277-lp153.2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52073" version="1" class="patch">
	<metadata>
		<title>Security update for aria2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189107" ref_url="https://bugzilla.suse.com/1189107" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3500" ref_url="https://www.suse.com/security/cve/CVE-2019-3500/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3RWOJOX6LLCQBYIEUS2KKAEEPLXW6WP/" source="SUSE-SU"/>
		<description>
This update for aria2 fixes the following issues:

Update to version 1.35.0:

* Drop SSLv3.0 and TLSv1.0 and add TLSv1.3
* TLSv1.3 support is added for GNUTLS and OpenSSL.
* Platform: Fix compilation without deprecated OpenSSL APIs
* Remove linux getrandom and use C++ stdlib instead
* Don't send Accept Metalink header if Metalink is disabled

- Move bash completion to better location

Update to version 1.34.0:

* UnknownLengthPieceStorage: return piece length show something
  in console status when downloading items with unknown content length
* Fix bug that signal handler does not work with libaria2 when
  aria2::RUN_ONCE is passed to aria2::run().
* Retry on HTTP 502
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189107">SUSE bug 1189107</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3500/">CVE-2019-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630374" comment="aria2-1.35.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630375" comment="aria2-devel-1.35.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630376" comment="aria2-lang-1.35.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630377" comment="libaria2-0-1.35.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52074" version="1" class="patch">
	<metadata>
		<title>Recommended update for seamonkey (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2021:1129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZ6H2V6TXYVFN4JWUSAXGDCS7XUAMPFD/" source="SUSE-SU"/>
		<description>

This update ships seamonkey to openSUSE Leap 15.3 and Packagehub 15-SP3.
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Low</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630378" comment="seamonkey-2.53.8.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630379" comment="seamonkey-dom-inspector-2.53.8.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630380" comment="seamonkey-irc-2.53.8.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52075" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188590" ref_url="https://bugzilla.suse.com/1188590" source="BUGZILLA"/>
		<reference ref_id="1189006" ref_url="https://bugzilla.suse.com/1189006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30565" ref_url="https://www.suse.com/security/cve/CVE-2021-30565/" source="CVE"/>
		<reference ref_id="CVE-2021-30566" ref_url="https://www.suse.com/security/cve/CVE-2021-30566/" source="CVE"/>
		<reference ref_id="CVE-2021-30567" ref_url="https://www.suse.com/security/cve/CVE-2021-30567/" source="CVE"/>
		<reference ref_id="CVE-2021-30568" ref_url="https://www.suse.com/security/cve/CVE-2021-30568/" source="CVE"/>
		<reference ref_id="CVE-2021-30569" ref_url="https://www.suse.com/security/cve/CVE-2021-30569/" source="CVE"/>
		<reference ref_id="CVE-2021-30571" ref_url="https://www.suse.com/security/cve/CVE-2021-30571/" source="CVE"/>
		<reference ref_id="CVE-2021-30572" ref_url="https://www.suse.com/security/cve/CVE-2021-30572/" source="CVE"/>
		<reference ref_id="CVE-2021-30573" ref_url="https://www.suse.com/security/cve/CVE-2021-30573/" source="CVE"/>
		<reference ref_id="CVE-2021-30574" ref_url="https://www.suse.com/security/cve/CVE-2021-30574/" source="CVE"/>
		<reference ref_id="CVE-2021-30575" ref_url="https://www.suse.com/security/cve/CVE-2021-30575/" source="CVE"/>
		<reference ref_id="CVE-2021-30576" ref_url="https://www.suse.com/security/cve/CVE-2021-30576/" source="CVE"/>
		<reference ref_id="CVE-2021-30577" ref_url="https://www.suse.com/security/cve/CVE-2021-30577/" source="CVE"/>
		<reference ref_id="CVE-2021-30578" ref_url="https://www.suse.com/security/cve/CVE-2021-30578/" source="CVE"/>
		<reference ref_id="CVE-2021-30579" ref_url="https://www.suse.com/security/cve/CVE-2021-30579/" source="CVE"/>
		<reference ref_id="CVE-2021-30581" ref_url="https://www.suse.com/security/cve/CVE-2021-30581/" source="CVE"/>
		<reference ref_id="CVE-2021-30582" ref_url="https://www.suse.com/security/cve/CVE-2021-30582/" source="CVE"/>
		<reference ref_id="CVE-2021-30584" ref_url="https://www.suse.com/security/cve/CVE-2021-30584/" source="CVE"/>
		<reference ref_id="CVE-2021-30585" ref_url="https://www.suse.com/security/cve/CVE-2021-30585/" source="CVE"/>
		<reference ref_id="CVE-2021-30588" ref_url="https://www.suse.com/security/cve/CVE-2021-30588/" source="CVE"/>
		<reference ref_id="CVE-2021-30589" ref_url="https://www.suse.com/security/cve/CVE-2021-30589/" source="CVE"/>
		<reference ref_id="CVE-2021-30590" ref_url="https://www.suse.com/security/cve/CVE-2021-30590/" source="CVE"/>
		<reference ref_id="CVE-2021-30591" ref_url="https://www.suse.com/security/cve/CVE-2021-30591/" source="CVE"/>
		<reference ref_id="CVE-2021-30592" ref_url="https://www.suse.com/security/cve/CVE-2021-30592/" source="CVE"/>
		<reference ref_id="CVE-2021-30593" ref_url="https://www.suse.com/security/cve/CVE-2021-30593/" source="CVE"/>
		<reference ref_id="CVE-2021-30594" ref_url="https://www.suse.com/security/cve/CVE-2021-30594/" source="CVE"/>
		<reference ref_id="CVE-2021-30596" ref_url="https://www.suse.com/security/cve/CVE-2021-30596/" source="CVE"/>
		<reference ref_id="CVE-2021-30597" ref_url="https://www.suse.com/security/cve/CVE-2021-30597/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 92.0.4515.131 (boo#1189006)

* CVE-2021-30590: Heap buffer overflow in Bookmarks
* CVE-2021-30591: Use after free in File System API
* CVE-2021-30592: Out of bounds write in Tab Groups
* CVE-2021-30593: Out of bounds read in Tab Strip
* CVE-2021-30594: Use after free in Page Info UI
* CVE-2021-30596: Incorrect security UI in Navigation
* CVE-2021-30597: Use after free in Browser UI

Chromium 92.0.4515.107 (boo#1188590)

* CVE-2021-30565: Out of bounds write in Tab Groups
* CVE-2021-30566: Stack buffer overflow in Printing
* CVE-2021-30567: Use after free in DevTools
* CVE-2021-30568: Heap buffer overflow in WebGL
* CVE-2021-30569: Use after free in sqlite
* CVE-2021-30571: Insufficient policy enforcement in DevTools
* CVE-2021-30572: Use after free in Autofill
* CVE-2021-30573: Use after free in GPU
* CVE-2021-30574: Use after free in protocol handling
* CVE-2021-30575: Out of bounds read in Autofill
* CVE-2021-30576: Use after free in DevTools
* CVE-2021-30577: Insufficient policy enforcement in Installer
* CVE-2021-30578: Uninitialized Use in Media
* CVE-2021-30579: Use after free in UI framework
* CVE-2021-30581: Use after free in DevTools
* CVE-2021-30582: Inappropriate implementation in Animation
* CVE-2021-30584: Incorrect security UI in Downloads
* CVE-2021-30585: Use after free in sensor handling
* CVE-2021-30588: Type Confusion in V8
* CVE-2021-30589: Insufficient validation of untrusted input in Sharing

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-11"/>
	<updated date="2021-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188590">SUSE bug 1188590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189006">SUSE bug 1189006</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30565/">CVE-2021-30565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30566/">CVE-2021-30566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30567/">CVE-2021-30567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30568/">CVE-2021-30568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30569/">CVE-2021-30569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30571/">CVE-2021-30571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30572/">CVE-2021-30572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30573/">CVE-2021-30573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30574/">CVE-2021-30574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30575/">CVE-2021-30575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30576/">CVE-2021-30576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30577/">CVE-2021-30577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30578/">CVE-2021-30578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30579/">CVE-2021-30579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30581/">CVE-2021-30581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30582/">CVE-2021-30582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30584/">CVE-2021-30584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30585/">CVE-2021-30585</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-30588/">CVE-2021-30588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30589/">CVE-2021-30589</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30590/">CVE-2021-30590</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30591/">CVE-2021-30591</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30592/">CVE-2021-30592</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30593/">CVE-2021-30593</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30594/">CVE-2021-30594</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30596/">CVE-2021-30596</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30597/">CVE-2021-30597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630381" comment="chromedriver-92.0.4515.131-bp153.2.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630382" comment="chromium-92.0.4515.131-bp153.2.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52076" version="1" class="patch">
	<metadata>
		<title>Security update for prosody (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188976" ref_url="https://bugzilla.suse.com/1188976" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37601" ref_url="https://www.suse.com/security/cve/CVE-2021-37601/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFQIQ2726F5P4HAPY7BLDPPFSDMPRVNM/" source="SUSE-SU"/>
		<description>
This update for prosody fixes the following issues:

prosody was updated to 0.11.10:

Security:

* MUC: Fix logic for access to affiliation lists CVE-2021-37601 (boo#1188976)

    https://prosody.im/security/advisory_20210722/

Minor changes:

* prosodyctl: Add ‘limits’ to known globals to warn about misplacing it
* util.ip: Fix netmask for link-local address range
* mod_pep: Remove obsolete node restoration code
* util.pubsub: Fix traceback if node data not initialized
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-21"/>
	<updated date="2021-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188976">SUSE bug 1188976</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37601/">CVE-2021-37601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631416" comment="prosody-0.11.10-bp153.2.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52077" version="1" class="patch">
	<metadata>
		<title>Security update for libhts (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187917" ref_url="https://bugzilla.suse.com/1187917" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36403" ref_url="https://www.suse.com/security/cve/CVE-2020-36403/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBQ3P4CDK2RZWTSHMKMA7FGIAJRHWW4Q/" source="SUSE-SU"/>
		<description>

This update of libhts fixes the following security issue:

- CVE-2020-36403: Fixed an out-of-bounds write access in vcf_parse_format() (bsc#1187917)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-22"/>
	<updated date="2021-08-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1187917">SUSE bug 1187917</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36403/">CVE-2020-36403</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631525" comment="bgzip-1.10.2-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631526" comment="htsfile-1.10.2-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631527" comment="libhts-devel-1.10.2-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631528" comment="libhts-devel-64bit-1.10.2-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631529" comment="libhts3-1.10.2-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631530" comment="libhts3-64bit-1.10.2-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631531" comment="tabix-1.10.2-bp153.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52078" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189490" ref_url="https://bugzilla.suse.com/1189490" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30598" ref_url="https://www.suse.com/security/cve/CVE-2021-30598/" source="CVE"/>
		<reference ref_id="CVE-2021-30599" ref_url="https://www.suse.com/security/cve/CVE-2021-30599/" source="CVE"/>
		<reference ref_id="CVE-2021-30600" ref_url="https://www.suse.com/security/cve/CVE-2021-30600/" source="CVE"/>
		<reference ref_id="CVE-2021-30601" ref_url="https://www.suse.com/security/cve/CVE-2021-30601/" source="CVE"/>
		<reference ref_id="CVE-2021-30602" ref_url="https://www.suse.com/security/cve/CVE-2021-30602/" source="CVE"/>
		<reference ref_id="CVE-2021-30603" ref_url="https://www.suse.com/security/cve/CVE-2021-30603/" source="CVE"/>
		<reference ref_id="CVE-2021-30604" ref_url="https://www.suse.com/security/cve/CVE-2021-30604/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLKBL5CUVIWVYXUEMSQDAWNVPLFIWUZE/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 92.0.4515.159 (boo#1189490):

  * CVE-2021-30598: Type Confusion in V8
* CVE-2021-30599: Type Confusion in V8
* CVE-2021-30600: Use after free in Printing
* CVE-2021-30601: Use after free in Extensions API
* CVE-2021-30602: Use after free in WebRTC
* CVE-2021-30603: Race in WebAudio
* CVE-2021-30604: Use after free in ANGLE
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189490">SUSE bug 1189490</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30598/">CVE-2021-30598</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30599/">CVE-2021-30599</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30600/">CVE-2021-30600</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30601/">CVE-2021-30601</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30602/">CVE-2021-30602</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30603/">CVE-2021-30603</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30604/">CVE-2021-30604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631573" comment="chromedriver-92.0.4515.159-bp153.2.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631574" comment="chromium-92.0.4515.159-bp153.2.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52079" version="1" class="patch">
	<metadata>
		<title>Security update for libspf2 (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189104" ref_url="https://bugzilla.suse.com/1189104" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20314" ref_url="https://www.suse.com/security/cve/CVE-2021-20314/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3DLLSVZFKUI7FKS5LSGOHVGEIIGA7GFO/" source="SUSE-SU"/>
		<description>

This update for libspf2 fixes the following issue:

- CVE-2021-20314: A remote overflow in SPF parsing could lead to remote code execution (bsc#1189104)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1189104">SUSE bug 1189104</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20314/">CVE-2021-20314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631817" comment="libspf2-2-1.2.10-bp153.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631818" comment="libspf2-devel-1.2.10-bp153.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631819" comment="libspf2-tools-1.2.10-bp153.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52080" version="1" class="patch">
	<metadata>
		<title>Security update for cacti, cacti-spine (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188188" ref_url="https://bugzilla.suse.com/1188188" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14424" ref_url="https://www.suse.com/security/cve/CVE-2020-14424/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBZLNMUSFBOJOEX22NOPCJOWBJDHPBAA/" source="SUSE-SU"/>
		<description>
This update for cacti, cacti-spine fixes the following issues:

cacti-spine 1.2.18:

* Fix missing time parameter on FROM_UNIXTIME function

cacti 1.2.18:

* CVE-2020-14424: Lack of escaping on template import can lead to
  XSS exposure under 'midwinter' theme (boo#1188188)
* Real time graphs can expose XSS issue
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188188">SUSE bug 1188188</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14424/">CVE-2020-14424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631820" comment="cacti-1.2.18-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631821" comment="cacti-spine-1.2.18-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52081" version="1" class="patch">
	<metadata>
		<title>Security update for tor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189489" ref_url="https://bugzilla.suse.com/1189489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38385" ref_url="https://www.suse.com/security/cve/CVE-2021-38385/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZNA4UBO42ISVK2GMMR2H5RCFMPHLYVV/" source="SUSE-SU"/>
		<description>
This update for tor fixes the following issues:

tor 0.4.6.7:

* Fix a DoS via a remotely triggerable assertion failure
  (boo#1189489, TROVE-2021-007, CVE-2021-38385)

tor 0.4.6.6:

* Enable the deterministic RNG for unit tests that covers the
  address set bloomfilter-based API's

tor 0.4.6.5

* Add controller support for creating v3 onion services with
  client auth
* When voting on a relay with a Sybil-like appearance, add the
  Sybil flag when clearing out the other flags. This lets a relay
  operator know why their relay hasn't been included in the
  consensus
* Relays now report how overloaded they are
* Add a new DoS subsystem to control the rate of client
  connections for relays
* Relays now publish statistics about v3 onions services
* Improve circuit timeout algorithm for client performance
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189489">SUSE bug 1189489</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38385/">CVE-2021-38385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631822" comment="tor-0.4.6.7-bp153.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52082" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-30590" ref_url="https://www.suse.com/security/cve/CVE-2021-30590/" source="CVE"/>
		<reference ref_id="CVE-2021-30591" ref_url="https://www.suse.com/security/cve/CVE-2021-30591/" source="CVE"/>
		<reference ref_id="CVE-2021-30592" ref_url="https://www.suse.com/security/cve/CVE-2021-30592/" source="CVE"/>
		<reference ref_id="CVE-2021-30593" ref_url="https://www.suse.com/security/cve/CVE-2021-30593/" source="CVE"/>
		<reference ref_id="CVE-2021-30594" ref_url="https://www.suse.com/security/cve/CVE-2021-30594/" source="CVE"/>
		<reference ref_id="CVE-2021-30596" ref_url="https://www.suse.com/security/cve/CVE-2021-30596/" source="CVE"/>
		<reference ref_id="CVE-2021-30597" ref_url="https://www.suse.com/security/cve/CVE-2021-30597/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAM7DBKPG7SO56B3HM7RJ5NXFLCFPWT/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

opera was updated to version 78.0.4093.147

- CHR-8251 Update chromium on desktop-stable-92-4093
  to 92.0.4515.131
- DNA-93036 Opera not starting after closing window.
  Processes still working.
- DNA-94516 Add ‘Detach tab’ entry to tab menu
- DNA-94584 [Mac] Sidebar setup not closed after press
  ‘Add extensions’ button
- DNA-94761 Crash when trying to record “Chrome developer” trace
- DNA-94790 Crash at opera::VideoConferenceTabDetachController::
  OnBrowserAboutToStartClosing(Browser*)
- The update to chromium 92.0.4515.131 fixes following issues:
  CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593,
  CVE-2021-30594, CVE-2021-30596, CVE-2021-30597

Update to version 78.0.4093.112

- DNA-94466 Implement sorting Pinboards in overview
- DNA-94582 Add access to APIs for showing pinboard icon in
  sidebar
- DNA-94603 Suspicious pinboards events
- DNA-94625 Disable opr.pinboardPrivate.getThumbnail() for
  local files
- DNA-94640 Promote O78 to stable
- DNA-94661 Missing translations for some languages
- Complete Opera 78.0 changelog at: https://blogs.opera.com/desktop/changelog-for-78/  

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30590/">CVE-2021-30590</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30591/">CVE-2021-30591</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30592/">CVE-2021-30592</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30593/">CVE-2021-30593</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30594/">CVE-2021-30594</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30596/">CVE-2021-30596</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30597/">CVE-2021-30597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694932" comment="opera-78.0.4093.147-lp153.2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52083" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-30598" ref_url="https://www.suse.com/security/cve/CVE-2021-30598/" source="CVE"/>
		<reference ref_id="CVE-2021-30599" ref_url="https://www.suse.com/security/cve/CVE-2021-30599/" source="CVE"/>
		<reference ref_id="CVE-2021-30600" ref_url="https://www.suse.com/security/cve/CVE-2021-30600/" source="CVE"/>
		<reference ref_id="CVE-2021-30601" ref_url="https://www.suse.com/security/cve/CVE-2021-30601/" source="CVE"/>
		<reference ref_id="CVE-2021-30602" ref_url="https://www.suse.com/security/cve/CVE-2021-30602/" source="CVE"/>
		<reference ref_id="CVE-2021-30603" ref_url="https://www.suse.com/security/cve/CVE-2021-30603/" source="CVE"/>
		<reference ref_id="CVE-2021-30604" ref_url="https://www.suse.com/security/cve/CVE-2021-30604/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AONJYVX4FYNEW6Z2RBON633JUD667L7M/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

opera was updated to version 78.0.4093.184

- CHR-8533 Update chromium on desktop-stable-92-4093 to
  92.0.4515.159
- DNA-93472 Reattaching to other browsers
- DNA-93741 Multiple hint slots
- DNA-93742 Allow displaying unobtrusive external hints
- DNA-93744 Add slots in toolbar action view
- DNA-94230 Improve text contrast for Speed Dials
- DNA-94724 [Mac] Add macOS dark theme wallpaper with easy setup
- DNA-94786 Crash at base::SupportsUserData::
  SetUserData(void const*, std::__1::unique_ptr)
- DNA-94807 Allow scripts access opera version and product info
- DNA-94862 Continue on shopping Amazon doesn’t work correct
- DNA-94870 Add an addonsPrivate function to install with
  permissions dialog first
- DNA-95064 Revert DNA-93714 on stable
- The update to chromium 92.0.4515.159 fixes following issues: 
  CVE-2021-30598, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601,
  CVE-2021-30602, CVE-2021-30603, CVE-2021-30604
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30598/">CVE-2021-30598</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30599/">CVE-2021-30599</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30600/">CVE-2021-30600</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30601/">CVE-2021-30601</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30602/">CVE-2021-30602</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30603/">CVE-2021-30603</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30604/">CVE-2021-30604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694933" comment="opera-78.0.4093.184-lp153.2.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52084" version="1" class="patch">
	<metadata>
		<title>Security update for gifsicle (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2021:1249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7LT4ZGSUVTVP4M6DZMXIWJ67JSPE3CZI/" source="SUSE-SU"/>
		<description>
This update for gifsicle fixes the following issues:

Update to version 1.93:

* Fix security bug on certain resize operations with `--resize-method=box`
* Fix problems with colormapless GIFs.

Update to version 1.92

* Add `--lossy` option from Kornel Lipiński.
* Remove an assertion failure possible with
  `--conserve-memory` + `--colors` + `--careful`.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632726" comment="gifsicle-1.93-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52085" version="1" class="patch">
	<metadata>
		<title>Security update for nextcloud (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190291" ref_url="https://bugzilla.suse.com/1190291" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32766" ref_url="https://www.suse.com/security/cve/CVE-2021-32766/" source="CVE"/>
		<reference ref_id="CVE-2021-32800" ref_url="https://www.suse.com/security/cve/CVE-2021-32800/" source="CVE"/>
		<reference ref_id="CVE-2021-32801" ref_url="https://www.suse.com/security/cve/CVE-2021-32801/" source="CVE"/>
		<reference ref_id="CVE-2021-32802" ref_url="https://www.suse.com/security/cve/CVE-2021-32802/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGLFYZROCOIJAG7C45FNC4EUIMNFJRIL/" source="SUSE-SU"/>
		<description>
This update for nextcloud fixes the following issues:

Update to 20.0.12

Fix boo#1190291 

- CVE-2021-32766 (CWE-209): Generation of Error Message Containing Sensitive Information 
- CVE-2021-32800 (CWE-306): Missing Authentication for Critical Function 
- CVE-2021-32801 (CWE-532): Insertion of Sensitive Information into Log File 
- CVE-2021-32802 (CWE-829): Inclusion of Functionality from Untrusted Control Sphere 

Changes

- Bump vue-router from 3.4.3 to 3.4.9 (server#27224)
- Bump v-click-outside from 3.1.1 to 3.1.2 (server#27232)
- Bump url-search-params-polyfill from 8.1.0 to 8.1.1 (server#27236)
- Bump debounce from 1.2.0 to 1.2.1 (server#27646)
- Bump vue and vue-template-compiler (server#27701)
- Design fixes to app-settings button (server#27745)
- Reset checksum when writing files to object store (server#27754)
- Run s3 tests again (server#27804)
- Fix in locking cache check (server#27829)
- Bump dompurify from 2.2.8 to 2.2.9 (server#27836)
- Make search popup usable on mobile, too (server#27858)
- Cache images on browser (server#27863)
- Fix dark theme on public link shares (server#27895)
- Make user status usable on mobile (server#27897)
- Do not escape display name in dashboard welcome text (server#27913)
- Bump moment-timezone from 0.5.31 to 0.5.33 (server#27924)
- Fix newfileMenu on public page (server#27941)
- Fix svg icons disapearing in app navigation when text overflows (server#27955)
- Bump bootstrap from 4.5.2 to 4.5.3 (server#27965)
- Show registered breadcrumb detail views in breadcrumb menu (server#27970)
- Fix regression in file sidebar (server#27976)
- Bump exports-loader from 1.1.0 to 1.1.1 (server#27984)
- Bump @nextcloud/capabilities from 1.0.2 to 1.0.4 (server#27985)
- Bump @nextcloud/vue-dashboard from 1.0.0 to 1.0.1 (server#27988)
- Improve notcreatable permissions hint (server#28006)
- Update CRL due to revoked twofactor_nextcloud_notification.crt (server#28018)
- Bump sass-loader from 10.0.2 to 10.0.5 (server#28032)
- Increase footer height for longer menus (server#28045)
- Mask password for Redis and RedisCluster on connection failure (server#28054)
- Fix missing theming for login button (server#28065)
- Fix overlapping of elements in certain views (server#28072)
- Disable HEIC image preview provider for performance concerns (server#28081)
- Improve provider check (server#28087)
- Sanitize more functions from the encryption app (server#28091)
- Hide download button for public preview of audio files (server#28096)
- L10n: HTTP in capital letters (server#28107)
- Fix dark theme in file exists dialog (server#28111)
- Let memory limit set in tests fit the used amount (server#28125)
- User management - Add icon to user groups (server#28172)
- Bump marked from 1.1.1 to 1.1.2 (server#28187)
- Fix variable override in file view (server#28191)
- Bump regenerator-runtime from 0.13.7 to 0.13.9 (server#28207)
- Bump url-loader from 4.1.0 to 4.1.1 (server#28208)
- Fix Files breadcrumbs being hidden even if there is enough space (server#28224)
- Dont apply jail search filter is on the root (server#28241)
- Check that php was compiled with argon2 support or that the php-sodium extensions is installed (server#28289)
- Fix preference name when generating notifications (activity#603)
- Fix monochrome icon detection for correct dark mode invert (activity#607)
- Fix 'Enable notification emails' (activity#613)
- Show add, del and restored files within by and self filter (activity#616)
- Link from app-navigation-settings to personal settings (activity#625)
- Fix pdfviewer design (files_pdfviewer#446)
- Include version number in firstrunwizard (firstrunwizard#570)
- Use notification main link if no parameter has a link (notifications#1040)
- Bump sass-loader from 10.1.0 to 10.1.1 (text#1360)
- Bump @babel/plugin-transform-runtime from 7.13.9 to 7.13.15 (text#1548)
- Bump @babel/preset-env from 7.13.9 to 7.13.15 (text#1550)
- Bump vue-loader from 15.9.6 to 15.9.7 (text#1592)
- Unify error responses and add logging where appropriate (text#1719)
- Disable header timeout on mobile (viewer#978)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-14"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190291">SUSE bug 1190291</bugzilla>
	<cve impact="critical" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32766/">CVE-2021-32766</cve>
	<cve impact="critical" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32800/">CVE-2021-32800</cve>
	<cve impact="critical" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32801/">CVE-2021-32801</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32802/">CVE-2021-32802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632771" comment="nextcloud-20.0.12-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632772" comment="nextcloud-apache-20.0.12-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52086" version="1" class="patch">
	<metadata>
		<title>Security update for fail2ban (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1145181" ref_url="https://bugzilla.suse.com/1145181" source="BUGZILLA"/>
		<reference ref_id="1146856" ref_url="https://bugzilla.suse.com/1146856" source="BUGZILLA"/>
		<reference ref_id="1180738" ref_url="https://bugzilla.suse.com/1180738" source="BUGZILLA"/>
		<reference ref_id="1188610" ref_url="https://bugzilla.suse.com/1188610" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32749" ref_url="https://www.suse.com/security/cve/CVE-2021-32749/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RYBYCPVAMLJBPZO42ZMSVOQTCNN3YNQS/" source="SUSE-SU"/>
		<description>
This update for fail2ban fixes the following issues:

- CVE-2021-32749: prevent a command injection via mail command (boo#1188610)

- Integrate change to resolve boo#1146856 and boo#1180738

Update to 0.11.2

- increased stability, filter and action updates
  
New Features and Enhancements

* fail2ban-regex:
  - speedup formatted output (bypass unneeded stats creation)
  - extended with prefregex statistic
  - more informative output for `datepattern` (e. g. set from filter) - pattern : description
* parsing of action in jail-configs considers space between action-names as separator also
  (previously only new-line was allowed), for example `action = a b` would specify 2 actions `a` and `b`
* new filter and jail for GitLab recognizing failed application logins (gh#fail2ban/fail2ban#2689)
* new filter and jail for Grafana recognizing failed application logins (gh#fail2ban/fail2ban#2855)
* new filter and jail for SoftEtherVPN recognizing failed application logins (gh#fail2ban/fail2ban#2723)
* `filter.d/guacamole.conf` extended with `logging` parameter to follow webapp-logging if it's configured 
  (gh#fail2ban/fail2ban#2631)
* `filter.d/bitwarden.conf` enhanced to support syslog (gh#fail2ban/fail2ban#2778)
* introduced new prefix `{UNB}` for `datepattern` to disable word boundaries in regex;
* datetemplate: improved anchor detection for capturing groups `(^...)`;
* datepattern: improved handling with wrong recognized timestamps (timezones, no datepattern, etc)
  as well as some warnings signaling user about invalid pattern or zone (gh#fail2ban/fail2ban#2814):
  - filter gets mode in-operation, which gets activated if filter starts processing of new messages;
    in this mode a timestamp read from log-line that appeared recently (not an old line), deviating too much
    from now (up too 24h), will be considered as now (assuming a timezone issue), so could avoid unexpected 
    bypass of failure (previously exceeding `findtime`);
  - better interaction with non-matching optional datepattern or invalid timestamps;
  - implements special datepattern `{NONE}` - allow to find failures totally without date-time in log messages,
  whereas filter will use now as timestamp (gh#fail2ban/fail2ban#2802)
* performance optimization of `datepattern` (better search algorithm in datedetector, especially for single template);
* fail2ban-client: extended to unban IP range(s) by subnet (CIDR/mask) or hostname (DNS), gh#fail2ban/fail2ban#2791;
* extended capturing of alternate tags in filter, allowing combine of multiple groups to single tuple token with new tag
  prefix `&lt;F-TUPLE_`, that would combine value of `&lt;F-V&gt;` with all value of `&lt;F-TUPLE_V?_n?&gt;` tags (gh#fail2ban/fail2ban#2755)
- Fixes
* [stability] prevent race condition - no ban if filter (backend) is continuously busy if
  too many messages will be found in log, e. g. initial scan of large log-file or journal (gh#fail2ban/fail2ban#2660)
* pyinotify-backend sporadically avoided initial scanning of log-file by start
* python 3.9 compatibility (and Travis CI support)
* restoring a large number (500+ depending on files ulimit) of current bans when using PyPy fixed
* manual ban is written to database, so can be restored by restart (gh#fail2ban/fail2ban#2647)
* `jail.conf`: don't specify `action` directly in jails (use `action_` or `banaction` instead)
* no mails-action added per default anymore (e. g. to allow that `action = %(action_mw)s` should be specified
  per jail or in default section in jail.local), closes gh#fail2ban/fail2ban#2357
* ensure we've unique action name per jail (also if parameter `actname` is not set but name deviates from standard name, gh#fail2ban/fail2ban#2686)
* don't use `%(banaction)s` interpolation because it can be complex value (containing `[...]` and/or quotes), 
  so would bother the action interpolation
* fixed type conversion in config readers (take place after all interpolations get ready), that allows to 
  specify typed parameters variable (as substitutions) as well as to supply it in other sections or as init parameters.
* `action.d/*-ipset*.conf`: several ipset actions fixed (no timeout per default anymore), so no discrepancy
  between ipset and fail2ban (removal from ipset will be managed by fail2ban only, gh#fail2ban/fail2ban#2703)
* `action.d/cloudflare.conf`: fixed `actionunban` (considering new-line chars and optionally real json-parsing
 with `jq`, gh#fail2ban/fail2ban#2140, gh#fail2ban/fail2ban#2656)
* `action.d/nftables.conf` (type=multiport only): fixed port range selector, replacing `:` with `-` (gh#fail2ban/fail2ban#2763)
* `action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-` (gh#fail2ban/fail2ban#2821)
* `action.d/bsd-ipfw.conf`: fixed selection of rule-no by large list or initial `lowest_rule_num` (gh#fail2ban/fail2ban#2836)
* `filter.d/common.conf`: avoid substitute of default values in related `lt_*` section, `__prefix_line`
  should be interpolated in definition section (inside the filter-config, gh#fail2ban/fail2ban#2650)
* `filter.d/dovecot.conf`: 
  - add managesieve and submission support (gh#fail2ban/fail2ban#2795);
  - accept messages with more verbose logging (gh#fail2ban/fail2ban#2573);
* `filter.d/courier-smtp.conf`: prefregex extended to consider port in log-message (gh#fail2ban/fail2ban#2697)
* `filter.d/traefik-auth.conf`: filter extended with parameter mode (`normal`, `ddos`, `aggressive`) to handle 
  the match of username differently (gh#fail2ban/fail2ban#2693):
  - `normal`: matches 401 with supplied username only
  - `ddos`: matches 401 without supplied username only
  - `aggressive`: matches 401 and any variant (with and without username)
* `filter.d/sshd.conf`: normalizing of user pattern in all RE's, allowing empty user (gh#fail2ban/fail2ban#2749)

Update to 0.11.1:

* Increment ban time (+ observer) functionality introduced.
* Database functionality extended with bad ips.
* New tags (usable in actions):
  - `&lt;bancount&gt;` - ban count of this offender if known as bad
    (started by 1 for unknown)
  - `&lt;bantime&gt;` - current ban-time of the ticket
    (prolongation can be retarded up to 10 sec.)
* Introduced new action command `actionprolong` to prolong ban-time
  (e. g. set new timeout if expected);
* algorithm of restore current bans after restart changed:
  update the restored ban-time (and therefore 
  end of ban) of the ticket with ban-time of jail (as maximum),
  for all tickets with ban-time greater (or persistent)
* added new setup-option `--without-tests` to skip building
  and installing of tests files (gh-2287).
* added new command `fail2ban-client get &lt;JAIL&gt; banip ?sep-char|--with-time?`
  to get the banned ip addresses (gh-1916).
* purge database will be executed now (within observer).
 restoring currently banned ip after service restart fixed
  (now &lt; timeofban + bantime), ignore old log failures (already banned)
* upgrade database: update new created table `bips` with entries
  from table `bans` (allows restore current bans after
  upgrade from version &lt;= 0.10)

- removal of SuSEfirewall2-fail2ban for factory versions since SuSEfirewall2
  will be removed from Factory (see sr#713247):
* removed references to SuSEfirewall2 service
* use references to SuSEfirewall2 only for older distributions
* Removed installation recommendation of the fail2ban-SuSEfirewall2
  package for all distributions as it is deprecated.
- changed fail2ban unit file location (boo#1145181, gh#fail2ban/fail2ban#2474)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145181">SUSE bug 1145181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146856">SUSE bug 1146856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180738">SUSE bug 1180738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188610">SUSE bug 1188610</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32749/">CVE-2021-32749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632951" comment="fail2ban-0.11.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632952" comment="monitoring-plugins-fail2ban-0.11.2-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52087" version="1" class="patch">
	<metadata>
		<title>Security update for haserl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187671" ref_url="https://bugzilla.suse.com/1187671" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29133" ref_url="https://www.suse.com/security/cve/CVE-2021-29133/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVYZKN3OCXW2QGY6YJEPECSXP6JIERGL/" source="SUSE-SU"/>
		<description>
This update for haserl fixes the following issues:

Update to version 0.9.36:

* Fixed: Its possible to issue a PUT request without a CONTENT-TYPE.
  Assume an octet-stream in that case.
  This is CVE-2021-29133 and boo#1187671
* Change the Prefix for variables to be the REQUEST_METHOD
  (PUT/DELETE/GET/POST) THIS IS A BREAKING CHANGE
* Mitigations vs running haserl to get access to files not
  available to the user.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187671">SUSE bug 1187671</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29133/">CVE-2021-29133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632955" comment="haserl-0.9.36-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52088" version="1" class="patch">
	<metadata>
		<title>Security update for php-composer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185376" ref_url="https://bugzilla.suse.com/1185376" source="BUGZILLA"/>
		<reference ref_id="1187416" ref_url="https://bugzilla.suse.com/1187416" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29472" ref_url="https://www.suse.com/security/cve/CVE-2021-29472/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ALRJGAG4EXTTIEI2CGMZH3NCUQIQUTQ/" source="SUSE-SU"/>
		<description>
This update for php-composer fixes the following issues:

- Require php-mbstring as requested in boo#1187416

- Version 1.10.22

  * Security: Fixed command injection vulnerability in HgDriver/HgDownloader 
    and hardened other VCS drivers and downloaders
    (GHSA-h5h8-pc6h-jvvx / CVE-2021-29472), boo#1185376

- Version 1.10.21

  * Fixed support for new GitHub OAuth token format
  * Fixed processes silently ignoring the CWD when it does not exist

- Version 1.10.20

  * Fixed exclude-from-classmap causing regex issues when having too many paths
  * Fixed compatibility issue with Symfony 4/5

- Version 1.10.17

  * Fixed Bitbucket API authentication issue
  * Fixed parsing of Composer 2 lock files breaking in some rare conditions

- Version 1.10.16

  * Added warning to validate command for cases where packages provide/
    replace a package that they also require
  * Fixed JSON schema validation issue with PHPStorm
  * Fixed symlink handling in archive command

- Version 1.10.15

  * Fixed path repo version guessing issue

- Version 1.10.14

  * Fixed version guesser to look at remote branches as well as local
    ones
  * Fixed path repositories version guessing to handle edge cases where
    version is different from the VCS-guessed version
  * Fixed COMPOSER env var causing issues when combined with the global
    command
  * Fixed a few issues dealing with PHP without openssl extension (not
    recommended at all but sometimes needed for testing)

- Version 1.10.13

  * Fixed regressions with old version validation
  * Fixed invalid root aliases not being reported

- Version 1.10.12

  * Fixed regressions with old version validation

- Version 1.10.11

  * Fixed more PHP 8 compatibility issues
  * Fixed regression in handling of CTRL-C when xdebug is loaded
  * Fixed status handling of broken symlinks

- Version 1.10.10

  * Fixed create-project not triggering events while installing the
    root package
  * Fixed PHP 8 compatibility issue
  * Fixed self-update to avoid automatically upgrading to the next
    major version once it becomes stable

- Version 1.10.9

  * Fixed Bitbucket redirect loop when credentials are outdated
  * Fixed GitLab auth prompt wording
  * Fixed self-update handling of files requiring admin permissions
    to write to on Windows (it now does a UAC prompt)
  * Fixed parsing issues in funding.yml files

- Version 1.10.8

  * Fixed compatibility issue with git being configured to show
    signatures by default
  * Fixed discarding of local changes when updating packages to include
    untracked files
  * Several minor fixes

- Version 1.10.7

  * Fixed PHP 8 deprecations
  * Fixed detection of pcntl_signal being in disabled_functions when
    pcntl_async_signal is allowed

- Version 1.10.6

  * Fixed version guessing to take composer-runtime-api and
    composer-plugin-api requirements into account to avoid selecting
    packages which require Composer 2
  * Fixed package name validation to allow several dashes following
    each other
  * Fixed post-status-cmd script not firing when there were no
    changes to be displayed
  * Fixed composer-runtime-api support on Composer 1.x, the package
    is now present as 1.0.0
  * Fixed support for composer show --name-only --self
  * Fixed detection of GitLab URLs when handling authentication in
    some cases

- Version 1.10.5

  * Fixed self-update on PHP &lt;5.6, seriously please upgrade
  * Fixed 1.10.2 regression with PATH resolution in scripts

- Version 1.10.4

  * Fixed 1.10.2 regression in path symlinking with absolute path
    repos

- Version 1.10.3

  * Fixed invalid --2 flag warning in self-update when no channel is
    requested

- Version 1.10.2

  * Added --1 flag to self-update command which can be added to
    automated self-update runs to make sure it won't automatically
    jump to 2.0 once that is released
  * Fixed path repository symlinks being made relative when the repo
    url is defined as absolute paths
  * Fixed potential issues when using 'composer ...' in scripts and
    composer/composer was also required in the project
  * Fixed 1.10.0 regression when downloading GitHub archives from
    non-API URLs
  * Fixed handling of malformed info in fund command
  * Fixed Symfony5 compatibility issues in a few commands

- Version 1.10.1

  * Fixed path repository warning on empty path when using wildcards
  * Fixed superfluous warnings when generating optimized autoloaders

- Version 1.10.0

  * Breaking: composer global exec ... now executes the process in
    the current working directory instead of executing it in the
    global directory.
  * Warning: Added a warning when class names are being loaded by a
    PSR-4 or PSR-0 rule only due to classmap optimization, but would
    not otherwise be autoloadable. Composer 2.0 will stop autoloading
    these classes so make sure you fix your autoload configs.
  * Added new funding key to composer.json to describe ways your package's
    maintenance can be funded. This reads info from GitHub's FUNDING.yml
    by default so better configure it there so it shows on GitHub and
    Composer/Packagist
  * Added composer fund command to show funding info of your dependencies
  * Added bearer auth config to authenticate using Authorization:
    Bearer &lt;token&gt; headers
  * Added plugin-api-version in composer.lock so third-party tools can
    know which Composer version was used to generate a lock file
  * Added support for --format=json output for show command when showing
    a single package
  * Added support for configuring suggestions using config command,
    e.g. composer config suggest.foo/bar some text
  * Added support for configuring fine-grained preferred-install using
    config command, e.g. composer config preferred-install.foo/* dist
  * Added @putenv script handler to set environment variables from
    composer.json for following scripts
  * Added lock option that can be set to false, in which case no
    composer.lock file will be generated
  * Added --add-repository flag to create-project command which will
    persist the repo given in --repository into the composer.json of
    the package being installed
  * Fixed issue where --no-dev autoload generation was excluding some
    packages which should not have been excluded
  * Added support for IPv6 addresses in NO_PROXY
  * Added package homepage display in the show command
  * Added debug info about HTTP authentications
  * Added Symfony 5 compatibility
  * Added --fixed flag to require command to make it use a fixed constraint
    instead of a ^x.y constraint when adding the requirement
  * Fixed exclude-from-classmap matching subsets of directories e.g.
    foo/ was excluding foobar/
  * Fixed archive command to persist file permissions inside the zip files
  * Fixed init/require command to avoid suggesting packages which are
    already selected in the search results
  * Fixed create-project UX issues
  * Fixed filemtime for vendor/composer/* files is now only changing
    when the files actually change
  * Fixed issues detecting docker environment with an active open_basedir

- Version 1.9.3
  * Fixed GitHub deprecation of access_token query parameter, now
    using Authorization header

- Version 1.9.2
  * Fixed minor git driver bugs
  * Fixed schema validation for version field to allow dev-* versions
    too
  * Fixed external processes' output being formatted even though it
    should not
  * Fixed issue with path repositories when trying to install feature
    branches

- Version 1.9.1
  * Fixed various credential handling issues with gitlab and github
  * Fixed credentials being present in git remotes in Composer cache
    and vendor directory when not using SSH keys
  * Fixed composer why not listing replacers as a reason something
    is present
  * Fixed various PHP 7.4 compatibility issues
  * Fixed root warnings always present in Docker containers, setting
    COMPOSER_ALLOW_SUPERUSER is not necessary anymore
  * Fixed GitHub access tokens leaking into debug-verbosity output
  * Fixed several edge case issues detecting GitHub, Bitbucket and
    GitLab repository types
  * Fixed Composer asking if you want to use a composer.json in a
    parent directory when ran in non-interactive mode
  * Fixed classmap autoloading issue finding classes located within
    a few non-PHP context blocks (?&gt;...&lt;?php)

- Version 1.9.0
  * Added a --no-cache flag available on all commands to run with
    the cache disabled
  * Added PHP_BINARY as env var pointing to the PHP process when
    executing Composer scripts as shell scripts
  * Added a use-github-api config option which can set the no-api
    flag on all GitHub VCS repositories declared
  * Added a static helper you can preprend to a script to avoid
    process timeouts, 'Composer\\Config::disableProcessTimeout'
  * Added Event::getOriginatingEvent to retrieve an event's original
    event when a script handler forwards to another one
  * Added support for autoloading directly from a phar file
  * Fixed loading order of plugins to always initialize them in order
    of dependencies
  * Fixed various network-mount related issues
  * Fixed --ignore-platform-reqs not ignoring conflict rules against
    platform packages

- Version 1.8.6
  * Fixed handling of backslash-escapes handling in compoesr.json
    when using the require command
  * Fixed create-project not following classmap-authoritative and
    apcu-autoloader config values
  * Fixed HHVM version warning showing up in some cases when it was
    not in use
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185376">SUSE bug 1185376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187416">SUSE bug 1187416</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29472/">CVE-2021-29472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633662" comment="php-composer-1.10.22-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52089" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190096" ref_url="https://bugzilla.suse.com/1190096" source="BUGZILLA"/>
		<reference ref_id="1190476" ref_url="https://bugzilla.suse.com/1190476" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30606" ref_url="https://www.suse.com/security/cve/CVE-2021-30606/" source="CVE"/>
		<reference ref_id="CVE-2021-30607" ref_url="https://www.suse.com/security/cve/CVE-2021-30607/" source="CVE"/>
		<reference ref_id="CVE-2021-30608" ref_url="https://www.suse.com/security/cve/CVE-2021-30608/" source="CVE"/>
		<reference ref_id="CVE-2021-30609" ref_url="https://www.suse.com/security/cve/CVE-2021-30609/" source="CVE"/>
		<reference ref_id="CVE-2021-30610" ref_url="https://www.suse.com/security/cve/CVE-2021-30610/" source="CVE"/>
		<reference ref_id="CVE-2021-30611" ref_url="https://www.suse.com/security/cve/CVE-2021-30611/" source="CVE"/>
		<reference ref_id="CVE-2021-30612" ref_url="https://www.suse.com/security/cve/CVE-2021-30612/" source="CVE"/>
		<reference ref_id="CVE-2021-30613" ref_url="https://www.suse.com/security/cve/CVE-2021-30613/" source="CVE"/>
		<reference ref_id="CVE-2021-30614" ref_url="https://www.suse.com/security/cve/CVE-2021-30614/" source="CVE"/>
		<reference ref_id="CVE-2021-30615" ref_url="https://www.suse.com/security/cve/CVE-2021-30615/" source="CVE"/>
		<reference ref_id="CVE-2021-30616" ref_url="https://www.suse.com/security/cve/CVE-2021-30616/" source="CVE"/>
		<reference ref_id="CVE-2021-30617" ref_url="https://www.suse.com/security/cve/CVE-2021-30617/" source="CVE"/>
		<reference ref_id="CVE-2021-30618" ref_url="https://www.suse.com/security/cve/CVE-2021-30618/" source="CVE"/>
		<reference ref_id="CVE-2021-30619" ref_url="https://www.suse.com/security/cve/CVE-2021-30619/" source="CVE"/>
		<reference ref_id="CVE-2021-30620" ref_url="https://www.suse.com/security/cve/CVE-2021-30620/" source="CVE"/>
		<reference ref_id="CVE-2021-30621" ref_url="https://www.suse.com/security/cve/CVE-2021-30621/" source="CVE"/>
		<reference ref_id="CVE-2021-30622" ref_url="https://www.suse.com/security/cve/CVE-2021-30622/" source="CVE"/>
		<reference ref_id="CVE-2021-30623" ref_url="https://www.suse.com/security/cve/CVE-2021-30623/" source="CVE"/>
		<reference ref_id="CVE-2021-30624" ref_url="https://www.suse.com/security/cve/CVE-2021-30624/" source="CVE"/>
		<reference ref_id="CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625/" source="CVE"/>
		<reference ref_id="CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626/" source="CVE"/>
		<reference ref_id="CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627/" source="CVE"/>
		<reference ref_id="CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628/" source="CVE"/>
		<reference ref_id="CVE-2021-30629" ref_url="https://www.suse.com/security/cve/CVE-2021-30629/" source="CVE"/>
		<reference ref_id="CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630/" source="CVE"/>
		<reference ref_id="CVE-2021-30631" ref_url="https://www.suse.com/security/cve/CVE-2021-30631/" source="CVE"/>
		<reference ref_id="CVE-2021-30632" ref_url="https://www.suse.com/security/cve/CVE-2021-30632/" source="CVE"/>
		<reference ref_id="CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 93.0.4577.63 (boo#1190096):

* CVE-2021-30606: Use after free in Blink
* CVE-2021-30607: Use after free in Permissions
* CVE-2021-30608: Use after free in Web Share
* CVE-2021-30609: Use after free in Sign-In
* CVE-2021-30610: Use after free in Extensions API
* CVE-2021-30611: Use after free in WebRTC
* CVE-2021-30612: Use after free in WebRTC
* CVE-2021-30613: Use after free in Base internals
* CVE-2021-30614: Heap buffer overflow in TabStrip
* CVE-2021-30615: Cross-origin data leak in Navigation
* CVE-2021-30616: Use after free in Media
* CVE-2021-30617: Policy bypass in Blink
* CVE-2021-30618: Inappropriate implementation in DevTools
* CVE-2021-30619: UI Spoofing in Autofill
* CVE-2021-30620: Insufficient policy enforcement in Blink
* CVE-2021-30621: UI Spoofing in Autofill
* CVE-2021-30622: Use after free in WebApp Installs
* CVE-2021-30623: Use after free in Bookmarks
* CVE-2021-30624: Use after free in Autofill

Chromium 93.0.4577.82 (boo#1190476):

* CVE-2021-30625: Use after free in Selection API
* CVE-2021-30626: Out of bounds memory access in ANGLE
* CVE-2021-30627: Type Confusion in Blink layout
* CVE-2021-30628: Stack buffer overflow in ANGLE
* CVE-2021-30629: Use after free in Permissions
* CVE-2021-30630: Inappropriate implementation in Blink
* CVE-2021-30631: Type Confusion in Blink layout
* CVE-2021-30632: Out of bounds write in V8
* CVE-2021-30633: Use after free in Indexed DB API
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190096">SUSE bug 1190096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190476">SUSE bug 1190476</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30606/">CVE-2021-30606</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30607/">CVE-2021-30607</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30608/">CVE-2021-30608</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30609/">CVE-2021-30609</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30610/">CVE-2021-30610</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30611/">CVE-2021-30611</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30612/">CVE-2021-30612</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30613/">CVE-2021-30613</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30614/">CVE-2021-30614</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30615/">CVE-2021-30615</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30616/">CVE-2021-30616</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30617/">CVE-2021-30617</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30618/">CVE-2021-30618</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30619/">CVE-2021-30619</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30620/">CVE-2021-30620</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30621/">CVE-2021-30621</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30622/">CVE-2021-30622</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30623/">CVE-2021-30623</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30624/">CVE-2021-30624</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30629/">CVE-2021-30629</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30631/">CVE-2021-30631</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30632/">CVE-2021-30632</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633663" comment="chromedriver-93.0.4577.82-bp153.2.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633664" comment="chromium-93.0.4577.82-bp153.2.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52090" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-30606" ref_url="https://www.suse.com/security/cve/CVE-2021-30606/" source="CVE"/>
		<reference ref_id="CVE-2021-30607" ref_url="https://www.suse.com/security/cve/CVE-2021-30607/" source="CVE"/>
		<reference ref_id="CVE-2021-30608" ref_url="https://www.suse.com/security/cve/CVE-2021-30608/" source="CVE"/>
		<reference ref_id="CVE-2021-30609" ref_url="https://www.suse.com/security/cve/CVE-2021-30609/" source="CVE"/>
		<reference ref_id="CVE-2021-30610" ref_url="https://www.suse.com/security/cve/CVE-2021-30610/" source="CVE"/>
		<reference ref_id="CVE-2021-30611" ref_url="https://www.suse.com/security/cve/CVE-2021-30611/" source="CVE"/>
		<reference ref_id="CVE-2021-30612" ref_url="https://www.suse.com/security/cve/CVE-2021-30612/" source="CVE"/>
		<reference ref_id="CVE-2021-30613" ref_url="https://www.suse.com/security/cve/CVE-2021-30613/" source="CVE"/>
		<reference ref_id="CVE-2021-30614" ref_url="https://www.suse.com/security/cve/CVE-2021-30614/" source="CVE"/>
		<reference ref_id="CVE-2021-30615" ref_url="https://www.suse.com/security/cve/CVE-2021-30615/" source="CVE"/>
		<reference ref_id="CVE-2021-30616" ref_url="https://www.suse.com/security/cve/CVE-2021-30616/" source="CVE"/>
		<reference ref_id="CVE-2021-30617" ref_url="https://www.suse.com/security/cve/CVE-2021-30617/" source="CVE"/>
		<reference ref_id="CVE-2021-30618" ref_url="https://www.suse.com/security/cve/CVE-2021-30618/" source="CVE"/>
		<reference ref_id="CVE-2021-30619" ref_url="https://www.suse.com/security/cve/CVE-2021-30619/" source="CVE"/>
		<reference ref_id="CVE-2021-30620" ref_url="https://www.suse.com/security/cve/CVE-2021-30620/" source="CVE"/>
		<reference ref_id="CVE-2021-30621" ref_url="https://www.suse.com/security/cve/CVE-2021-30621/" source="CVE"/>
		<reference ref_id="CVE-2021-30622" ref_url="https://www.suse.com/security/cve/CVE-2021-30622/" source="CVE"/>
		<reference ref_id="CVE-2021-30623" ref_url="https://www.suse.com/security/cve/CVE-2021-30623/" source="CVE"/>
		<reference ref_id="CVE-2021-30624" ref_url="https://www.suse.com/security/cve/CVE-2021-30624/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDRKVDFEPABXRR653626WGJRZWK5HZ7Y/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

opera was updated to version 79.0.4143.22

- CHR-8550 Update chromium on desktop-stable-93-4143 to
  93.0.4577.58
- CHR-8557 Update chromium on desktop-stable-93-4143 to
  93.0.4577.63
- DNA-94641 [Linux] Proprietary media codecs not working in
  snap builds
- DNA-95076 [Linux] Page crash with media content
- DNA-95084 [Mac] Cannot quit through menu with snapshot
  editor open
- DNA-95138 Add setting to synchronize Pinboards
- DNA-95157 Crash at -[OperaCrApplication sendEvent:]
- DNA-95204 Opera 79 translations
- DNA-95240 The pinboard thumbnail cannot be generated anymore
- DNA-95278 Existing Pinboards might be missing
- DNA-95292 Enable #bookmarks-trash-cleaner on all streams
- DNA-95293 Enable #easy-files-downloads-folder on all streams
- DNA-95383 Promote O79 to stable

- Complete Opera 79.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-79/ 

- The update to chromium 93.0.4577.58 fixes following issues:
  CVE-2021-30606, CVE-2021-30607, CVE-2021-30608, CVE-2021-30609,
  CVE-2021-30610, CVE-2021-30611, CVE-2021-30612, CVE-2021-30613,
  CVE-2021-30614, CVE-2021-30615, CVE-2021-30616, CVE-2021-30617,
  CVE-2021-30618, CVE-2021-30619, CVE-2021-30620, CVE-2021-30621,
  CVE-2021-30622, CVE-2021-30623, CVE-2021-30624
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-25"/>
	<updated date="2021-09-25"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30606/">CVE-2021-30606</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30607/">CVE-2021-30607</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30608/">CVE-2021-30608</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30609/">CVE-2021-30609</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30610/">CVE-2021-30610</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30611/">CVE-2021-30611</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30612/">CVE-2021-30612</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30613/">CVE-2021-30613</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30614/">CVE-2021-30614</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30615/">CVE-2021-30615</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30616/">CVE-2021-30616</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30617/">CVE-2021-30617</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30618/">CVE-2021-30618</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30619/">CVE-2021-30619</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30620/">CVE-2021-30620</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30621/">CVE-2021-30621</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30622/">CVE-2021-30622</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30623/">CVE-2021-30623</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30624/">CVE-2021-30624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694934" comment="opera-79.0.4143.22-lp153.2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52091" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-14275: stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).

This update was imported from the SUSE:SLE-15:Update update project.		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-28"/>
	<updated date="2021-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634487" comment="transfig-3.2.8a-bp153.3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52092" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625/" source="CVE"/>
		<reference ref_id="CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626/" source="CVE"/>
		<reference ref_id="CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627/" source="CVE"/>
		<reference ref_id="CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628/" source="CVE"/>
		<reference ref_id="CVE-2021-30629" ref_url="https://www.suse.com/security/cve/CVE-2021-30629/" source="CVE"/>
		<reference ref_id="CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630/" source="CVE"/>
		<reference ref_id="CVE-2021-30631" ref_url="https://www.suse.com/security/cve/CVE-2021-30631/" source="CVE"/>
		<reference ref_id="CVE-2021-30632" ref_url="https://www.suse.com/security/cve/CVE-2021-30632/" source="CVE"/>
		<reference ref_id="CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32OSJUOT5EKYB352W3UZ3NLUB6N4FXCT/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Opera was updated to version 79.0.4143.50

- CHR-8571 Update chromium on desktop-stable-93-4143
  to 93.0.4577.82
- DNA-94104 ContinueShoppingOnEbayBrowserTest.ShouldDisplayOffers
  TilesStartingWithMostActiveOnes fails
- DNA-94894 [Rich Hint] Agent API permissions
- DNA-94989 Wrong color and appearance of subpages in the settings
- DNA-95241 “Switch to tab” button is visible only on hover
- DNA-95286 Add unit tests to pinboard sync related logic in browser
- DNA-95372 [Mac retina screen] Snapshot doesnt capture cropped area
- DNA-95526 Some webstore extensions are not verified properly
- The update to chromium 93.0.4577.82 fixes following issues:
  CVE-2021-30625, CVE-2021-30626, CVE-2021-30627, CVE-2021-30628,
  CVE-2021-30629, CVE-2021-30630, CVE-2021-30631, CVE-2021-30632,
  CVE-2021-30633
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-04"/>
	<updated date="2021-10-04"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30629/">CVE-2021-30629</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30631/">CVE-2021-30631</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30632/">CVE-2021-30632</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694935" comment="opera-79.0.4143.50-lp153.2.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52093" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190765" ref_url="https://bugzilla.suse.com/1190765" source="BUGZILLA"/>
		<reference ref_id="1191166" ref_url="https://bugzilla.suse.com/1191166" source="BUGZILLA"/>
		<reference ref_id="1191204" ref_url="https://bugzilla.suse.com/1191204" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37956" ref_url="https://www.suse.com/security/cve/CVE-2021-37956/" source="CVE"/>
		<reference ref_id="CVE-2021-37957" ref_url="https://www.suse.com/security/cve/CVE-2021-37957/" source="CVE"/>
		<reference ref_id="CVE-2021-37958" ref_url="https://www.suse.com/security/cve/CVE-2021-37958/" source="CVE"/>
		<reference ref_id="CVE-2021-37959" ref_url="https://www.suse.com/security/cve/CVE-2021-37959/" source="CVE"/>
		<reference ref_id="CVE-2021-37960" ref_url="https://www.suse.com/security/cve/CVE-2021-37960/" source="CVE"/>
		<reference ref_id="CVE-2021-37961" ref_url="https://www.suse.com/security/cve/CVE-2021-37961/" source="CVE"/>
		<reference ref_id="CVE-2021-37962" ref_url="https://www.suse.com/security/cve/CVE-2021-37962/" source="CVE"/>
		<reference ref_id="CVE-2021-37963" ref_url="https://www.suse.com/security/cve/CVE-2021-37963/" source="CVE"/>
		<reference ref_id="CVE-2021-37964" ref_url="https://www.suse.com/security/cve/CVE-2021-37964/" source="CVE"/>
		<reference ref_id="CVE-2021-37965" ref_url="https://www.suse.com/security/cve/CVE-2021-37965/" source="CVE"/>
		<reference ref_id="CVE-2021-37966" ref_url="https://www.suse.com/security/cve/CVE-2021-37966/" source="CVE"/>
		<reference ref_id="CVE-2021-37967" ref_url="https://www.suse.com/security/cve/CVE-2021-37967/" source="CVE"/>
		<reference ref_id="CVE-2021-37968" ref_url="https://www.suse.com/security/cve/CVE-2021-37968/" source="CVE"/>
		<reference ref_id="CVE-2021-37969" ref_url="https://www.suse.com/security/cve/CVE-2021-37969/" source="CVE"/>
		<reference ref_id="CVE-2021-37970" ref_url="https://www.suse.com/security/cve/CVE-2021-37970/" source="CVE"/>
		<reference ref_id="CVE-2021-37971" ref_url="https://www.suse.com/security/cve/CVE-2021-37971/" source="CVE"/>
		<reference ref_id="CVE-2021-37972" ref_url="https://www.suse.com/security/cve/CVE-2021-37972/" source="CVE"/>
		<reference ref_id="CVE-2021-37973" ref_url="https://www.suse.com/security/cve/CVE-2021-37973/" source="CVE"/>
		<reference ref_id="CVE-2021-37974" ref_url="https://www.suse.com/security/cve/CVE-2021-37974/" source="CVE"/>
		<reference ref_id="CVE-2021-37975" ref_url="https://www.suse.com/security/cve/CVE-2021-37975/" source="CVE"/>
		<reference ref_id="CVE-2021-37976" ref_url="https://www.suse.com/security/cve/CVE-2021-37976/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1339-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDJ2M5H37726GXT3YZBJRSXV3JYGN7CL/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 94.0.4606.54 (boo#1190765):

* CVE-2021-37956: Use after free in Offline use
* CVE-2021-37957: Use after free in WebGPU
* CVE-2021-37958: Inappropriate implementation in Navigation
* CVE-2021-37959: Use after free in Task Manager
* CVE-2021-37960: Inappropriate implementation in Blink graphics
* CVE-2021-37961: Use after free in Tab Strip
* CVE-2021-37962: Use after free in Performance Manager
* CVE-2021-37963: Side-channel information leakage in DevTools
* CVE-2021-37964: Inappropriate implementation in ChromeOS Networking
* CVE-2021-37965: Inappropriate implementation in Background Fetch API
* CVE-2021-37966: Inappropriate implementation in Compositing
* CVE-2021-37967: Inappropriate implementation in Background Fetch API
* CVE-2021-37968: Inappropriate implementation in Background Fetch API
* CVE-2021-37969: Inappropriate implementation in Google Updater
* CVE-2021-37970: Use after free in File System API
* CVE-2021-37971: Incorrect security UI in Web Browser UI
* CVE-2021-37972: Out of bounds read in libjpeg-turbo

Chromium 94.0.4606.61 (boo#1191166):

* CVE-2021-37973: Use after free in Portals

Chromium 94.0.4606.71 (boo#1191204):

* CVE-2021-37974 : Use after free in Safe Browsing
* CVE-2021-37975 : Use after free in V8
* CVE-2021-37976 : Information leak in core
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-11"/>
	<updated date="2021-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190765">SUSE bug 1190765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191166">SUSE bug 1191166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191204">SUSE bug 1191204</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37956/">CVE-2021-37956</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37957/">CVE-2021-37957</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-37958/">CVE-2021-37958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37959/">CVE-2021-37959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-37960/">CVE-2021-37960</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37961/">CVE-2021-37961</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37962/">CVE-2021-37962</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37963/">CVE-2021-37963</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-37964/">CVE-2021-37964</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37965/">CVE-2021-37965</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-37966/">CVE-2021-37966</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37967/">CVE-2021-37967</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37968/">CVE-2021-37968</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37969/">CVE-2021-37969</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37970/">CVE-2021-37970</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-37971/">CVE-2021-37971</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37972/">CVE-2021-37972</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37973/">CVE-2021-37973</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37974/">CVE-2021-37974</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37975/">CVE-2021-37975</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37976/">CVE-2021-37976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651541" comment="chromedriver-94.0.4606.71-bp153.2.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651542" comment="chromium-94.0.4606.71-bp153.2.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52094" version="1" class="patch">
	<metadata>
		<title>Security update for mupdf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190175" ref_url="https://bugzilla.suse.com/1190175" source="BUGZILLA"/>
		<reference ref_id="1190176" ref_url="https://bugzilla.suse.com/1190176" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16600" ref_url="https://www.suse.com/security/cve/CVE-2020-16600/" source="CVE"/>
		<reference ref_id="CVE-2020-19609" ref_url="https://www.suse.com/security/cve/CVE-2020-19609/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GVBNGQ7UFOBASFEEHWPUJV3UG7BWUIRH/" source="SUSE-SU"/>
		<description>
This update for mupdf fixes the following issues:

- CVE-2020-19609: Fixed heap-based buffer overflow in tiff_expand_colormap() when parsing TIFF files (boo#1190176)
- CVE-2020-16600: Fixed use-after-free when a valid page was followed by a page with invalid pixmap dimensions (boo#1190175)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-11"/>
	<updated date="2021-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190175">SUSE bug 1190175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190176">SUSE bug 1190176</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16600/">CVE-2020-16600</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19609/">CVE-2020-19609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651543" comment="mupdf-1.12.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651544" comment="mupdf-devel-static-1.12.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52095" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-37974" ref_url="https://www.suse.com/security/cve/CVE-2021-37974/" source="CVE"/>
		<reference ref_id="CVE-2021-37975" ref_url="https://www.suse.com/security/cve/CVE-2021-37975/" source="CVE"/>
		<reference ref_id="CVE-2021-37976" ref_url="https://www.suse.com/security/cve/CVE-2021-37976/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAX3Q57Z6FBAZI5TMEFWFYPK5JXVPRKE/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

opera was updated to version 80.0.4170.16

Fixes:

  - CHR-8590 Update chromium on desktop-stable-94-4170
    to 94.0.4606.61
  - DNA-95347 Make InstallerStep::Run async
  - DNA-95420 First suggestion in address field is often not
    highlighted
  - DNA-95613 Browser closing itself after closing SD/first tab
    and last opened tab
  - DNA-95725 Promote O80 to stable
  - DNA-95781 Import fixes for CVE-2021-37975, CVE-2021-37976 and
    CVE-2021-37974 to desktop-stable-94-4170

- Complete Opera 80.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-80/
- Drop Provides/Obsoletes for opera-gtk and opera-kde4
  opera-gtk and opera-kde4 were last used in openSUSE 13.1

Opera was updated to version 79.0.4143.72

Fixes:

  - DNA-94933 Add emoji panel to address bar
  - DNA-95210 Add emoji YAT address bar suggestions
  - DNA-95221 Emoji button stuck in address bar
  - DNA-95325 Make y.at navigations to be reported with page_views
    events
  - DNA-95327 Add “Emojis” context menu option in address bar field
  - DNA-95339 Add YAT emoji url suggestion to search? dialog
  - DNA-95364 Add browser feature flag
  - DNA-95416 Remove emoji button from address bar
  - DNA-95439 Enable #yat-emoji-addresses on developer stream
  - DNA-95441 [Mac big sur] Emoji are not shown in address bar url
  - DNA-95445 Crash when removing unsynced pinboard bookmark with
    sync enabled
  - DNA-95512 Allow to show title and timer for simple banners
  - DNA-95516 Wrong label in settings for themes
  - DNA-95679 Temporarily disable AB test for a new autoupdater
    logic

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37974/">CVE-2021-37974</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37975/">CVE-2021-37975</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37976/">CVE-2021-37976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694936" comment="opera-80.0.4170.16-lp153.2.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52096" version="1" class="patch">
	<metadata>
		<title>Security update for mbedtls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189589" ref_url="https://bugzilla.suse.com/1189589" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-24119" ref_url="https://www.suse.com/security/cve/CVE-2021-24119/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36R5MNRZX7IWOTML46RHIYNDAV7YDYQN/" source="SUSE-SU"/>
		<description>
This update for mbedtls fixes the following issues:

* CVE-2021-24119: Fixed side-channel vulnerability in base64 PEM [boo#1189589]

  Guard against strong local side channel attack against base64 tables by making access aceess to them use constant flow code.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189589">SUSE bug 1189589</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24119/">CVE-2021-24119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652872" comment="libmbedcrypto3-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652873" comment="libmbedcrypto3-32bit-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652874" comment="libmbedcrypto3-64bit-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652875" comment="libmbedtls12-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652876" comment="libmbedtls12-32bit-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652877" comment="libmbedtls12-64bit-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652878" comment="libmbedx509-0-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652879" comment="libmbedx509-0-32bit-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652880" comment="libmbedx509-0-64bit-2.16.9-bp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652881" comment="mbedtls-devel-2.16.9-bp153.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52097" version="1" class="patch">
	<metadata>
		<title>Security update for ssh-audit (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F33WEA5KQR7XFYMXJPGRCG4IZX75GFRO/" source="SUSE-SU"/>
		<description>
This update for ssh-audit fixes the following issues:

ssh-audit was updated to version 2.5.0

* Fixed crash when running host key tests.
* Handles server connection failures more gracefully.
* Now prints JSON with indents when -jj is used (useful for
  debugging).
* Added MD5 fingerprints to verbose output.
* Added -d/--debug option for getting debugging output.
* Updated JSON output to include MD5 fingerprints. Note that
  this results in a breaking change in the 'fingerprints'
  dictionary format.
* Updated OpenSSH 8.1 (and earlier) policies to include
  rsa-sha2-512 and rsa-sha2-256.
* Added OpenSSH v8.6 &amp; v8.7 policies.
* Added 3 new key exchanges:

  + gss-gex-sha1-eipGX3TCiQSrx573bT1o1Q==
  + gss-group1-sha1-eipGX3TCiQSrx573bT1o1Q==
  + gss-group14-sha1-eipGX3TCiQSrx573bT1o1Q==
* Added 3 new MACs:

  + hmac-ripemd160-96
  + AEAD_AES_128_GCM
  + AEAD_AES_256_GCM

Update to version 2.4.0

* Added multi-threaded scanning support.
* Added version check for OpenSSH user enumeration (CVE-2018-15473).
* Added deprecation note to host key types based on SHA-1.
* Added extra warnings for SSHv1.
* Added built-in hardened OpenSSH v8.5 policy.
* Upgraded warnings to failures for host key types based on SHA-1
* Fixed crash when receiving unexpected response during host key
  test.
* Fixed hang against older Cisco devices during host key test &amp;
  gex test.
* Fixed improper termination while scanning multiple targets when
  one target returns an error.
* Dropped support for Python 3.5 (which reached EOL in Sept.2020)
* Added 1 new key exchange: sntrup761x25519-sha512@openssh.com.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652882" comment="ssh-audit-2.5.0-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52098" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191844" ref_url="https://bugzilla.suse.com/1191844" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37981" ref_url="https://www.suse.com/security/cve/CVE-2021-37981/" source="CVE"/>
		<reference ref_id="CVE-2021-37982" ref_url="https://www.suse.com/security/cve/CVE-2021-37982/" source="CVE"/>
		<reference ref_id="CVE-2021-37983" ref_url="https://www.suse.com/security/cve/CVE-2021-37983/" source="CVE"/>
		<reference ref_id="CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984/" source="CVE"/>
		<reference ref_id="CVE-2021-37985" ref_url="https://www.suse.com/security/cve/CVE-2021-37985/" source="CVE"/>
		<reference ref_id="CVE-2021-37986" ref_url="https://www.suse.com/security/cve/CVE-2021-37986/" source="CVE"/>
		<reference ref_id="CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987/" source="CVE"/>
		<reference ref_id="CVE-2021-37988" ref_url="https://www.suse.com/security/cve/CVE-2021-37988/" source="CVE"/>
		<reference ref_id="CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989/" source="CVE"/>
		<reference ref_id="CVE-2021-37990" ref_url="https://www.suse.com/security/cve/CVE-2021-37990/" source="CVE"/>
		<reference ref_id="CVE-2021-37991" ref_url="https://www.suse.com/security/cve/CVE-2021-37991/" source="CVE"/>
		<reference ref_id="CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992/" source="CVE"/>
		<reference ref_id="CVE-2021-37993" ref_url="https://www.suse.com/security/cve/CVE-2021-37993/" source="CVE"/>
		<reference ref_id="CVE-2021-37994" ref_url="https://www.suse.com/security/cve/CVE-2021-37994/" source="CVE"/>
		<reference ref_id="CVE-2021-37995" ref_url="https://www.suse.com/security/cve/CVE-2021-37995/" source="CVE"/>
		<reference ref_id="CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PA4QP5O5NS7MLCPJRQA74564MFVWF24/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 95.0.4638.54 (boo#1191844):

* CVE-2021-37981: Heap buffer overflow in Skia
* CVE-2021-37982: Use after free in Incognito
* CVE-2021-37983: Use after free in Dev Tools
* CVE-2021-37984: Heap buffer overflow in PDFium
* CVE-2021-37985: Use after free in V8
* CVE-2021-37986: Heap buffer overflow in Settings
* CVE-2021-37987: Use after free in Network APIs
* CVE-2021-37988: Use after free in Profiles
* CVE-2021-37989: Inappropriate implementation in Blink
* CVE-2021-37990: Inappropriate implementation in WebView
* CVE-2021-37991: Race in V8
* CVE-2021-37992: Out of bounds read in WebAudio
* CVE-2021-37993: Use after free in PDF Accessibility
* CVE-2021-37996: Insufficient validation of untrusted input in Downloads
* CVE-2021-37994: Inappropriate implementation in iFrame Sandbox
* CVE-2021-37995: Inappropriate implementation in WebApp Installer
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191844">SUSE bug 1191844</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37981/">CVE-2021-37981</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37982/">CVE-2021-37982</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37983/">CVE-2021-37983</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37985/">CVE-2021-37985</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37986/">CVE-2021-37986</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37988/">CVE-2021-37988</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37990/">CVE-2021-37990</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37991/">CVE-2021-37991</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37993/">CVE-2021-37993</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37994/">CVE-2021-37994</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37995/">CVE-2021-37995</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653341" comment="chromedriver-95.0.4638.54-bp153.2.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653342" comment="chromium-95.0.4638.54-bp153.2.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52099" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191104" ref_url="https://bugzilla.suse.com/1191104" source="BUGZILLA"/>
		<reference ref_id="1191526" ref_url="https://bugzilla.suse.com/1191526" source="BUGZILLA"/>
		<reference ref_id="1191869" ref_url="https://bugzilla.suse.com/1191869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2475" ref_url="https://www.suse.com/security/cve/CVE-2021-2475/" source="CVE"/>
		<reference ref_id="CVE-2021-35538" ref_url="https://www.suse.com/security/cve/CVE-2021-35538/" source="CVE"/>
		<reference ref_id="CVE-2021-35540" ref_url="https://www.suse.com/security/cve/CVE-2021-35540/" source="CVE"/>
		<reference ref_id="CVE-2021-35542" ref_url="https://www.suse.com/security/cve/CVE-2021-35542/" source="CVE"/>
		<reference ref_id="CVE-2021-35545" ref_url="https://www.suse.com/security/cve/CVE-2021-35545/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TGGPXPQHCHAYI4TLQLUQ74AESTO2Y6W/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

Version bump to 6.1.28 (released October 19 2021 by Oracle)

This is a maintenance release. The following items were fixed and/or added:

- VMM: Fixed guru meditation while booting nested-guests accessing debug registers under certain conditions
- UI: Bug fixes for touchpad-based scrolling
- VMSVGA: Fixed VM black screen issue on first resize after restoring from saved state (bug #20067)
- VMSVGA: Fixed display corruption on Linux Mint (bug #20513)
- Storage: Fixed a possible write error under certain circumstances when using VHD images (bug #20512)
- Network: Multiple updates in virtio-net device support
- Network: Disconnecting cable in saved VM state now is handled properly by virtio-net
- Network: More administrative control over network ranges, see user manual
- NAT: Fixed not rejecting TFTP requests with absolute pathnames (bug #20589)
- Audio: Fixed VM session aborting after PC hibernation (bug #20516)
- Audio: Fixed setting the line-in volume of the HDA emulation on modern Linux guests
- Audio: Fixed resuming playback of the AC'97 emulation while a snapshot has been taken
- API: Added bindings support for Python 3.9 (bug #20252)
- API: Fixed rare hang of VM when changing settings at runtime
- Linux host: Improved kernel modules installation detection which prevents unnecessary modules rebuild
- Host Services: Shared Clipboard: Prevent guest clipboard reset when clipboard sharing is disabled (bug #20487)
- Host Services: Shared Clipboard over VRDP: Fixed to continue working when guest service reconnects to host (bug #20366)
- Host Services: Shared Clipboard over VRDP: Fixed preventing remote RDP client to hang when guest has no clipboard data to report
- Linux Host and Guest: Introduced initial support for kernels 5.14 and 5.15
- Linux Host and Guest: Introduced initial support for RHEL 8.5 kernel
- Windows Guest: Introduced Windows 11 guest support, including unattended installation
- Fixes CVE-2021-35538, CVE-2021-35545, CVE-2021-35540, CVE-2021-35542, and CVE-2021-2475 (boo#1191869)

- Use kernel_module_directory macro for kernel modules (boo#1191526)
- Finish UsrMerge for VirtualBox components (boo#1191104).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191104">SUSE bug 1191104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191526">SUSE bug 1191526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191869">SUSE bug 1191869</bugzilla>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2475/">CVE-2021-2475</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35538/">CVE-2021-35538</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35540/">CVE-2021-35540</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35542/">CVE-2021-35542</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35545/">CVE-2021-35545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653361" comment="python3-virtualbox-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653362" comment="virtualbox-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653363" comment="virtualbox-devel-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653364" comment="virtualbox-guest-desktop-icons-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653365" comment="virtualbox-guest-source-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653366" comment="virtualbox-guest-tools-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653367" comment="virtualbox-guest-x11-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653368" comment="virtualbox-host-source-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653369" comment="virtualbox-kmp-default-6.1.28_k5.3.18_59.27-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653370" comment="virtualbox-kmp-preempt-6.1.28_k5.3.18_59.27-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653371" comment="virtualbox-qt-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653372" comment="virtualbox-vnc-6.1.28-lp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653373" comment="virtualbox-websrv-6.1.28-lp153.2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52100" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-37974" ref_url="https://www.suse.com/security/cve/CVE-2021-37974/" source="CVE"/>
		<reference ref_id="CVE-2021-37975" ref_url="https://www.suse.com/security/cve/CVE-2021-37975/" source="CVE"/>
		<reference ref_id="CVE-2021-37976" ref_url="https://www.suse.com/security/cve/CVE-2021-37976/" source="CVE"/>
		<reference ref_id="CVE-2021-37977" ref_url="https://www.suse.com/security/cve/CVE-2021-37977/" source="CVE"/>
		<reference ref_id="CVE-2021-37978" ref_url="https://www.suse.com/security/cve/CVE-2021-37978/" source="CVE"/>
		<reference ref_id="CVE-2021-37979" ref_url="https://www.suse.com/security/cve/CVE-2021-37979/" source="CVE"/>
		<reference ref_id="CVE-2021-37980" ref_url="https://www.suse.com/security/cve/CVE-2021-37980/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF6Y247TQDOSNNT7RURWBHGHDS3V4YYD/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Opera was updated to version 80.0.4170.63

- CHR-8612 Update chromium on desktop-stable-94-4170 to
  94.0.4606.81
- DNA-95434 Crash at opera::ThemesService::UpdateCurrentTheme()
- The update to chromium 94.0.4606.81 fixes following issues:
  CVE-2021-37977, CVE-2021-37978, CVE-2021-37979, CVE-2021-37980

Opera was updated to version 80.0.4170.40

- CHR-8598 Update chromium on desktop-stable-94-4170 to
  94.0.4606.71
- DNA-95221 Emoji button stuck in address bar
- DNA-95325 Make y.at navigations to be reported with
  page_views events
- DNA-95327 Add “Emojis” context menu option in address
  bar field
- DNA-95339 Add YAT emoji url suggestion to search? dialog
- DNA-95416 Remove emoji button from address bar
- DNA-95439 Enable #yat-emoji-addresses on developer stream
- DNA-95441 [Mac big sur] Emoji are not shown in address
  bar url
- DNA-95514 Crash at resource_coordinator::TabLifecycleUnitSource
  ::TabLifecycleUnit::OnLifecycleUnitStateChanged(mojom::
  LifecycleUnitState, mojom::LifecycleUnitStateChangeReason)
- DNA-95746 Enable #reader-mode everywhere
- DNA-95865 Numbers are recognized as emojis
- DNA-95866 Change Yat text in selection popup
- DNA-95867 Show that buttons are clickable in selection popup
- The update to chromium 94.0.4606.71 fixes following issues: 
  CVE-2021-37974, CVE-2021-37975, CVE-2021-37976
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-01"/>
	<updated date="2021-11-01"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37974/">CVE-2021-37974</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37975/">CVE-2021-37975</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37976/">CVE-2021-37976</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37977/">CVE-2021-37977</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37978/">CVE-2021-37978</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37979/">CVE-2021-37979</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37980/">CVE-2021-37980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694937" comment="opera-80.0.4170.63-lp153.2.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52101" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192184" ref_url="https://bugzilla.suse.com/1192184" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37997" ref_url="https://www.suse.com/security/cve/CVE-2021-37997/" source="CVE"/>
		<reference ref_id="CVE-2021-37998" ref_url="https://www.suse.com/security/cve/CVE-2021-37998/" source="CVE"/>
		<reference ref_id="CVE-2021-37999" ref_url="https://www.suse.com/security/cve/CVE-2021-37999/" source="CVE"/>
		<reference ref_id="CVE-2021-38000" ref_url="https://www.suse.com/security/cve/CVE-2021-38000/" source="CVE"/>
		<reference ref_id="CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001/" source="CVE"/>
		<reference ref_id="CVE-2021-38002" ref_url="https://www.suse.com/security/cve/CVE-2021-38002/" source="CVE"/>
		<reference ref_id="CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LILU2Q77SAPFWPTS2P4ZOLY6WZ3NJCJN/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 95.0.4638.69 (boo#1192184):

* CVE-2021-37997: Use after free in Sign-In
* CVE-2021-37998: Use after free in Garbage Collection
* CVE-2021-37999: Insufficient data validation in New Tab Page
* CVE-2021-38000: Insufficient validation of untrusted input in Intents
* CVE-2021-38001: Type Confusion in V8
* CVE-2021-38002: Use after free in Web Transport
* CVE-2021-38003: Inappropriate implementation in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-08"/>
	<updated date="2021-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192184">SUSE bug 1192184</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37997/">CVE-2021-37997</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37998/">CVE-2021-37998</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-37999/">CVE-2021-37999</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38000/">CVE-2021-38000</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38002/">CVE-2021-38002</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654388" comment="chromedriver-95.0.4638.69-bp153.2.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654389" comment="chromium-95.0.4638.69-bp153.2.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52102" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c

This update was imported from the SUSE:SLE-15:Update update project.
This update was imported from the openSUSE:Leap:15.2:Update update project.		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656964" comment="transfig-3.2.8b-bp153.3.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52103" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-37981" ref_url="https://www.suse.com/security/cve/CVE-2021-37981/" source="CVE"/>
		<reference ref_id="CVE-2021-37982" ref_url="https://www.suse.com/security/cve/CVE-2021-37982/" source="CVE"/>
		<reference ref_id="CVE-2021-37983" ref_url="https://www.suse.com/security/cve/CVE-2021-37983/" source="CVE"/>
		<reference ref_id="CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984/" source="CVE"/>
		<reference ref_id="CVE-2021-37985" ref_url="https://www.suse.com/security/cve/CVE-2021-37985/" source="CVE"/>
		<reference ref_id="CVE-2021-37986" ref_url="https://www.suse.com/security/cve/CVE-2021-37986/" source="CVE"/>
		<reference ref_id="CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987/" source="CVE"/>
		<reference ref_id="CVE-2021-37988" ref_url="https://www.suse.com/security/cve/CVE-2021-37988/" source="CVE"/>
		<reference ref_id="CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989/" source="CVE"/>
		<reference ref_id="CVE-2021-37990" ref_url="https://www.suse.com/security/cve/CVE-2021-37990/" source="CVE"/>
		<reference ref_id="CVE-2021-37991" ref_url="https://www.suse.com/security/cve/CVE-2021-37991/" source="CVE"/>
		<reference ref_id="CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992/" source="CVE"/>
		<reference ref_id="CVE-2021-37993" ref_url="https://www.suse.com/security/cve/CVE-2021-37993/" source="CVE"/>
		<reference ref_id="CVE-2021-37994" ref_url="https://www.suse.com/security/cve/CVE-2021-37994/" source="CVE"/>
		<reference ref_id="CVE-2021-37995" ref_url="https://www.suse.com/security/cve/CVE-2021-37995/" source="CVE"/>
		<reference ref_id="CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSJTYYACW4ZIYYE5GRTELXFUOV6TOKYT/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to version 81.0.4196.31:

- DNA-95733 Implement the “Manage” menu in card details view
- DNA-95736 Update UI for paused card
- DNA-95791 Crash at base::operator&lt;
- DNA-95794 Sometimes the sidebar UI fails to load
- DNA-95812 Retrieve cards info when showing autofill
- DNA-96035 Cannot create virtual card on Sandbox environment
- DNA-96147 “Buy” button does not work
- DNA-96168 Update contributors list
- DNA-96211 Enable #fast-tab-tooltip on all streams
- DNA-96231 Promote O81 to stable
- Complete Opera 80.1 changelog at: https://blogs.opera.com/desktop/changelog-for-81/

Update to version 81.0.4196.27

- CHR-8623 Update chromium on desktop-stable-95-4196 to
  95.0.4638.54
- DNA-92384 Better segmenting of hint users
- DNA-95523 Allow sorting in multi-card view
- DNA-95659 Flow of Lastcard on first login
- DNA-95735 Implement the button that reveals full card
  details
- DNA-95747 Better way to handle expired funding card
- DNA-95949 [Mac Retina] Clicking active tab should scroll
  to the top
- DNA-95993 Update icon used for Yat in address bar dropdown
- DNA-96021 Cleared download item view is never deleted
- DNA-96036 Occupation field in 'Account – Edit' is shown
  twice
- DNA-96127 Upgrade plan button does nothing
- DNA-96138 'Add Card' button does not change to
  'Upgrade Plan' after adding card
- The update to chromium 95.0.4638.54 fixes following issues:
CVE-2021-37981, CVE-2021-37982, CVE-2021-37983, CVE-2021-37984,
CVE-2021-37985, CVE-2021-37986, CVE-2021-37987, CVE-2021-37988,
CVE-2021-37989, CVE-2021-37990, CVE-2021-37991, CVE-2021-37992,
CVE-2021-37993, CVE-2021-37994, CVE-2021-37995, CVE-2021-37996

Update to version 80.0.4170.72

- DNA-95522 Change card view to show all types of cards
- DNA-95523 Allow sorting in multi-card view
- DNA-95524 Allow searching for cards by name
- DNA-95658 Allow user to add a card
- DNA-95659 Flow of Lastcard on first login
- DNA-95660 Implement editing card details
- DNA-95699 Add card details view
- DNA-95733 Implement the “Manage” menu in card details view
- DNA-95735 Implement the button that reveals full card details
- DNA-95736 Update UI for paused card
- DNA-95747 Better way to handle expired funding card
- DNA-95794 Sometimes the sidebar UI fails to load
- DNA-95812 Retrieve cards info when showing autofill
- DNA-96036 Occupation field in ‘Account – Edit’ is shown twice
- DNA-96127 Upgrade plan button does nothing
- DNA-96138 “Add Card” button does not change to “Upgrade Plan”
  after adding card
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37981/">CVE-2021-37981</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37982/">CVE-2021-37982</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37983/">CVE-2021-37983</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37985/">CVE-2021-37985</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37986/">CVE-2021-37986</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37988/">CVE-2021-37988</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37990/">CVE-2021-37990</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37991/">CVE-2021-37991</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37993/">CVE-2021-37993</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37994/">CVE-2021-37994</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37995/">CVE-2021-37995</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694938" comment="opera-81.0.4196.31-lp153.2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52104" version="1" class="patch">
	<metadata>
		<title>Security update for hylafax+ (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191571" ref_url="https://bugzilla.suse.com/1191571" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:1494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCN4RDNPZFEC7XOGPRWL5FYCRIUMWEFW/" source="SUSE-SU"/>
		<description>

hylafax+ was updated to version 7.0.4:

* README.SUSE renamed 
* hylafax.diff added for boo#1191571 (pre-correction)
* Dependencies on systemd-services adjusted
* retry training twice at the same bitrate unless FTT (26 Aug 2021)
* add missing reason messages for session failures (21 Aug 2021)
* stop attempts to send or receive signals if the call ended prematurely (16-19 Aug 2021)
* add Class1HasRMHookIndication (16 Aug 2021)
* don't attempt sending DCN if we're already on hook (15, 17 Aug 2021)
* end session sooner if receiver hangs up immediately after TCF or during prologue (14 Aug 2021)
* fix some behavior following frame reception timeouts (13 Aug 2021)
* improve behavior if procedural interrupt fails (12 Aug 2021)
* handle sender repeating RR after we transmit MCF (10 Aug 2021)
* add session logging of receipt of CFR/FTT signals (3 Aug 2021)
* cope with receipt of PPR following CTC (3 Aug 2021)
* attempt to cope with NSF/CSI/DIS after PPS, CTR, ERR, RR and improve coping with
  the same after MPS/EOP/EOM (2, 12, 14, 18 Aug 2021)
* identify DCN after PPS as a receiver abort (2 Aug 2021)
* attempt to cope with receipt of CTR after sending PPS (2 Aug 2021)
* remove use of deprecated libtiff integer types and 'register' storage class specifier (25 Jul 2021)
* don't employ senderFumblesECM if V.34-Fax was negotiated (25 Jul 2021)
* update configure to accept libtiff v4.2 and v4.3 (24 Jul 2021)
* fix page handling 'botch' if a job's first and previous attempts were on a proxy (20 Jul 2021)
* fix data timeout for bitrates less than 14400 bps when non-zero scanline time (15 Jul 2021)
* try to cope with T.38 invite stutter at beginning of send (15 Jul 2021)
* decouple session logging from direct filesystem I/O (15 Jul 2021)
* try to help receivers who may expect initial 1-bits to start high-speed data (8, 9 Jul, 4 Aug 2021)
* improve tenacity of 'persistent' ECM (26 Jun 2021)
* maintain the same SSL Fax passcode during a single session (20 May 2021)
* log detection of binary file transfer support in receivers (1 Apr 2021)
* add support for SiLabs Si2417/Si2435 (5 Feb 2021)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-21"/>
	<updated date="2021-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191571">SUSE bug 1191571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657216" comment="hylafax+-7.0.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657217" comment="hylafax+-client-7.0.4-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657218" comment="libfaxutil7_0_4-7.0.4-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52105" version="1" class="patch">
	<metadata>
		<title>Security update for tor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192658" ref_url="https://bugzilla.suse.com/1192658" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22929" ref_url="https://www.suse.com/security/cve/CVE-2021-22929/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZELBVBNTOTNRG5IP3NQWA756AE37TH5Y/" source="SUSE-SU"/>
		<description>
This update for tor fixes the following issues:

tor 0.4.6.8:

* Improving reporting of general overload state for DNS timeout
  errors by relays
* Regenerate fallback directories for October 2021
* Bug fixes for onion services
* CVE-2021-22929: do not log v2 onion services access attempt 
  warnings on disk excessively (TROVE-2021-008, boo#1192658)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-29"/>
	<updated date="2021-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192658">SUSE bug 1192658</bugzilla>
	<cve impact="low" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22929/">CVE-2021-22929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658612" comment="tor-0.4.6.8-bp153.2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52106" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1028975" ref_url="https://bugzilla.suse.com/1028975" source="BUGZILLA"/>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1133678" ref_url="https://bugzilla.suse.com/1133678" source="BUGZILLA"/>
		<reference ref_id="1148788" ref_url="https://bugzilla.suse.com/1148788" source="BUGZILLA"/>
		<reference ref_id="1150345" ref_url="https://bugzilla.suse.com/1150345" source="BUGZILLA"/>
		<reference ref_id="1150366" ref_url="https://bugzilla.suse.com/1150366" source="BUGZILLA"/>
		<reference ref_id="1151190" ref_url="https://bugzilla.suse.com/1151190" source="BUGZILLA"/>
		<reference ref_id="1157498" ref_url="https://bugzilla.suse.com/1157498" source="BUGZILLA"/>
		<reference ref_id="1160285" ref_url="https://bugzilla.suse.com/1160285" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161335" ref_url="https://bugzilla.suse.com/1161335" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163588" ref_url="https://bugzilla.suse.com/1163588" source="BUGZILLA"/>
		<reference ref_id="1167163" ref_url="https://bugzilla.suse.com/1167163" source="BUGZILLA"/>
		<reference ref_id="1169614" ref_url="https://bugzilla.suse.com/1169614" source="BUGZILLA"/>
		<reference ref_id="1171164" ref_url="https://bugzilla.suse.com/1171164" source="BUGZILLA"/>
		<reference ref_id="1171173" ref_url="https://bugzilla.suse.com/1171173" source="BUGZILLA"/>
		<reference ref_id="1171569" ref_url="https://bugzilla.suse.com/1171569" source="BUGZILLA"/>
		<reference ref_id="1171580" ref_url="https://bugzilla.suse.com/1171580" source="BUGZILLA"/>
		<reference ref_id="1171686" ref_url="https://bugzilla.suse.com/1171686" source="BUGZILLA"/>
		<reference ref_id="1171879" ref_url="https://bugzilla.suse.com/1171879" source="BUGZILLA"/>
		<reference ref_id="1171882" ref_url="https://bugzilla.suse.com/1171882" source="BUGZILLA"/>
		<reference ref_id="1173221" ref_url="https://bugzilla.suse.com/1173221" source="BUGZILLA"/>
		<reference ref_id="1174504" ref_url="https://bugzilla.suse.com/1174504" source="BUGZILLA"/>
		<reference ref_id="1175720" ref_url="https://bugzilla.suse.com/1175720" source="BUGZILLA"/>
		<reference ref_id="1175867" ref_url="https://bugzilla.suse.com/1175867" source="BUGZILLA"/>
		<reference ref_id="1178475" ref_url="https://bugzilla.suse.com/1178475" source="BUGZILLA"/>
		<reference ref_id="1178476" ref_url="https://bugzilla.suse.com/1178476" source="BUGZILLA"/>
		<reference ref_id="1183669" ref_url="https://bugzilla.suse.com/1183669" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687/" source="CVE"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Update to version 20200127:

* Makefile: Leap 15.3 still uses /etc, so adjust the installation setup

Update to version 20181225:

* mgetty: faxq-helper now finally reside in /usr/libexec
* libksysguard5: Updated path for ksgrd_network_helper
* kdesu: Updated path for kdesud
* sbin_dirs cleanup: these binaries have already been moved to /usr/sbin
* mariadb: revert auth_pam_tool to /usr/lib{,64} again
* cleanup: revert virtualbox back to plain /usr/lib
* cleanup: remove deprecated /etc/ssh/sshd_config
* hawk_invoke is not part of newer hawk2 packages anymore
* cleanup: texlive-filesystem: public now resides in libexec
* cleanup: authbind: helper now resides in libexec
* cleanup: polkit: the agent now also resides in libexec
* libexec cleanup: 'inn' news binaries now reside in libexec
* whitelist please (boo#1183669)
* Fix enlightenment paths
* usbauth: drop compatibility variable for libexec
* usbauth: Updated path for usbauth-npriv
* profiles: finish usage of variable for polkit-agent-helper-1
* Makefile: fix custom flags support when using make command line variables
* added information about know limitations of this approach
* Makefile: compile with LFO support to fix 32-bit emulation on 64-bit hosts (boo#1178476)
* Makefile: support CXXFLAGS and LDFLAGS override / extension via make/env variables (boo#1178475)
* profiles: prepare /usr/sbin versions of profile entries (boo#1029961)
* profiles: use new variables feature to remove redundant entries
* profiles: remove now superfluous squid pinger paths (boo#1171569)
* tests: implement basic tests for new the new variable feature
* tests: avoid redundant specification of test names by using class names
* regtests: split up base types and actual test implementation
* man pages: add documentation about variables, update copyrights
* chkstat: implement support for variables in profile paths
* chkstat: prepare reuse of config file locations
* chkstat: fix some typos and whitespace
* etc/permissions: remove unnecessary, duplicate, outdated entries
* etc/permissions: remove trailing whitespace
* ksgrd_network_helper: remove obviously wrong path
* adjust squid pinger path (boo#1171569)
* mgetty: remove long dead (or never existing) locks directory (boo#1171882)
* squid: remove basic_pam_auth which doesn't need special perms (boo#1171569)
* cleanup now useless /usr/lib entries after move to /usr/libexec (boo#1171164)
* drop (f)ping capabilities in favor of ICMP_PROTO sockets (boo#1174504)
* whitelist Xorg setuid-root wrapper (boo#1175867)
* screen: remove /run/uscreens covered by systemd-tmpfiles (boo#1171879)
* Add /usr/libexec for cockpit-session as new path
* physlock: whitelist with tight restrictions (boo#1175720)
* mtr-packet: stop requiring dialout group
* etc/permissions: fix mtr permission
* list_permissions: improve output format
* list_permissions: support globbing in --path argument
* list_permissions: implement simplifications suggested in PR#92
* list_permissions: new tool for better path configuration overview
* regtest: support new getcap output format in libcap-2.42
* regtest: print individual test case errors to stderr
* etc/permissions: remove static /var/spool/* dirs
* etc/permissions: remove outdated entries
* etc/permissions: remove unnecessary static dirs and devices
* screen: remove now unused /var/run/uscreens
* Revert 'etc/permissions: remove entries for bind-chrootenv'
* rework permissions.local text (boo#1173221)
* dbus-1: adjust to new libexec dir location (boo#1171164)
* permission profiles: reinstate kdesud for kde5
* etc/permissions: remove entries for bind-chrootenv
* etc/permissions: remove traceroute entry
* VirtualBox: remove outdated entry which is only a symlink any more
* /bin/su: remove path refering to symlink
* etc/permissions: remove legacy RPM directory entries
* /etc/permissions: remove outdated sudo directories
* singularity: remove outdated setuid-binary entries
* chromium: remove now unneeded chrome_sandbox entry (boo#1163588)
* dbus-1: remove deprecated alternative paths
* PolicyKit: remove outdated entries last used in SLE-11
* pcp: remove no longer needed / conflicting entries
* gnats: remove entries for package removed from Factory
* kdelibs4: remove entries for package removed from Factory
* v4l-base: remove entries for package removed from Factory
* mailman: remove entries for package deleted from Factory
* gnome-pty-helper: remove dead entry no longer part of the vte package
* gnokii: remove entries for package no longer in Factory
* xawtv (v4l-conf): correct group ownership in easy profile
* systemd-journal: remove unnecessary profile entries
* thttp: make makeweb entry usable in the secure profile (boo#1171580)
* profiles: add entries for enlightenment (boo#1171686)
* permissions fixed profile: utempter: reinstate libexec compatibility entry
* chkstat: fix sign conversion warnings on non 32-bit architectures
* chkstat: allow simultaneous use of `--set` and `--system`
* regtest: adjust TestUnkownOwnership test to new warning output behaviour
* whitelist texlive public binary (boo#1171686)
* fixed permissions: adjust to new libexec dir location (boo#1171164)
* chkstat: don't print warning about unknown user/group by default
* Makefile: link with --as-needed, move libs to the end of the command line
* setuid bit for cockpit (boo#1169614)
* Fix paranoid mode for newgidmap and newuidmap (boo#1171173)
* chkstat: collectProfilePaths(): use directory_iterator to simplify code
* chkstat: collectProfilePaths(): prefer /usr over /etc
* regtest: add relative symlink corner case to TestSymlinkBehaviour
* Chkstat::parseProfile(): avoid use of raw pointer
* parseSysconfig(): only emmit warning if value is non-empty
* incorporate a bunch of PR #56 review comments
* regtest: add test for correct ownership change
* chkstat: final pass over refactored code
* chkstat: finish refactoring of safeOpen()
* chkstat: improve/fix output of mismatches
* chkstat: support numerical owner/group specification in profiles
* chkstat: safeOpen: simplify path handling by using a std::string
* chkstat regtest: support debug build
* chkstat: start refactoring of safe_open() -&gt; safeOpen()
* chkstat: processEntries: pull out change logic into applyChanges()
* chkstat: processEntries: pull out safety check logic
* chkstat: processEntries: separate printing code and simplify ownership flags
* chkstat: processEntries: also add file_status and *_ok flags to EntryContext
* chkstat: processEntries: also add caps to EntryContext
* chkstat: also move fd_path into EntryContext
* chkstat: processEntries(): introduce EntryContext data structure
* chkstat: introduce class type to deal with capabilities
* chkstat: overhaul of the main entry processing loop
* chkstat: smaller cleanup of Chkstat::run()
* chkstat: remove last global variables `root` and `rootl`
* chkstat: refactor parsing of permission profiles
* chkstat: replace global `permlist` by STL map
* chkstat: remove now obsolete usage() function
* chkstat: refactor collection of permission files
* regtest: support --after-test-enter-shell
* chkstat: change global euid variable into const class member
* chkstat: replace global level, nlevel by a vector data structure
* chkstat: refactor check_fscaps_enabled()
* chkstat: refactor parse_sysconfig as a member function Chkstat::parseSysconfig
* chkstat: introduce separate processArguments() and refactor --files logic
* chkstat: replace C style chkecklist by std::set
* chkstat: refactor command line parsing
* allow /usr/libexec in addition to /usr/lib (boo#1171164)
* whitelist s390-tools setgid bit on log directory (boo#1167163)
* whitelist WMP (boo#1161335)
* regtest: improve readability of path variables by using literals
* regtest: adjust test suite to new path locations in /usr/share/permissions
* regtest: only catch explicit FileNotFoundError
* regtest: provide valid home directory in /root
* regtest: mount permissions src repository in /usr/src/permissions
* regtest: move initialialization of TestBase paths into the prepare() function
* chkstat: suppport new --config-root command line option
* fix spelling of icingacmd group
* chkstat: fix readline() on platforms with unsigned char
* remove capability whitelisting for radosgw
* whitelist ceph log directory (boo#1150366)
* adjust testsuite to post CVE-2020-8013 link handling
* testsuite: add option to not mount /proc
* do not follow symlinks that are the final path element: CVE-2020-8013
* add a test for symlinked directories
* fix relative symlink handling
* include cpp compat headers, not C headers
* Move permissions and permissions.* except .local to /usr/share/permissions
* regtest: fix the static PATH list which was missing /usr/bin
* regtest: also unshare the PID namespace to support /proc mounting
* regtest: bindMount(): explicitly reject read-only recursive mounts
* Makefile: force remove upon clean target to prevent bogus errors
* regtest: by default automatically (re)build chkstat before testing
* regtest: add test for symlink targets
* regtest: make capability setting tests optional
* regtest: fix capability assertion helper logic
* regtests: add another test case that catches set*id or caps in world-writable sub-trees
* regtest: add another test that catches when privilege bits are set for special files
* regtest: add test case for user owned symlinks
* regtest: employ subuid and subgid feature in user namespace
* regtest: add another test case that covers unknown user/group config
* regtest: add another test that checks rejection of insecure mixed-owner paths
* regtest: add test that checks for rejection of world-writable paths
* regtest: add test for detection of unexpected parent directory ownership
* regtest: add further helper functions, allow access to main instance
* regtest: introduce some basic coloring support to improve readability
* regtest: sort imports, another piece of rationale
* regtest: add capability test case
* regtest: improve error flagging of test cases and introduce warnings
* regtest: support caps
* regtest: add a couple of command line parameter test cases
* regtest: add another test that checks whether the default profile works
* regtests: add tests for correct application of local profiles
* regtest: add further test cases that test correct profile application
* regtest: simplify test implementation and readability
* regtest: add helpers for permissions.d per package profiles
* regtest: support read-only bind mounts, also bind-mount permissions repo
* tests: introduce a regression test suite for chkstat
* Makefile: allow to build test version programmatically
* README.md: add basic readme file that explains the repository's purpose
* chkstat: change and harmonize coding style
* chkstat: switch to C++ compilation unit
* remove obsolete/broken entries for rcp/rsh/rlogin
* chkstat: handle symlinks in final path elements correctly
* Revert 'Revert 'mariadb: settings for new auth_pam_tool (boo#1160285)''
* Revert 'mariadb: settings for new auth_pam_tool (boo#1160285)'
* mariadb: settings for new auth_pam_tool (boo#1160285)
*  add read-only fallback when /proc is not mounted (boo#1160764)
* capability handling fixes (boo#1161779)
* better error message when refusing to fix dir perms (#32)
* fix paths of ksysguard whitelisting
* fix zero-termination of error message for overly long paths
* fix misleading indendation
* fix changing of capabilities
* fix warning text for unlisted files
* fix error message with insecure sym links
* remove useless if around realloc()
* fix invalid free() when permfiles points to argv
* use path-based operations with /proc/self/fd/X to avoid errors due to O_PATH
* add .gitignore for chkstat binary
* add/fix compiler warnings, free memory at exit
* only open regular files/directories without O_PATH, fix stat buffer initialization
* update
* rewrite while protecting against symlinks and races
* fix whitespace
* faxq-helper: correct 'secure' permission for trusted group (boo#1157498)
* whitelist ksysguard network helper (boo#1151190)
* fix syntax of paranoid profile
* fix squid permissions (boo#1093414, CVE-2019-3688)
* setgid bit for nagios directory (boo#1028975, boo#1150345)
* global: removal of unneeded SuSEconfig file and directory
* global: restructure repository layout
* dumpcap: remove 'other' executable bit because of capabilities (boo#1148788, CVE-2019-3687)
* add one more missing slash for icinga2
* fix more missing slashes for directories
* cron directory permissions: add slashes
* iputils: Add capability permissions for clockdiff
* iputils/ping: Drop effective capability
* iputils/ping6: Remove definitions
* singluarity: Add starter-suid for version 3.2.0
* removed entry for /var/cache/man. Conflicts with packaging and man:man is the better setting anyway (boo#1133678)
* fixed error in description of permissions.paranoid. Make it clear that this is not a usable profile, but intended as a base for own developments
* Misleading comment fix
* removed old entry for wodim
* removed old entry for netatalk
* removed old entry for suidperl
* removed old entriy for utempter
* removed old entriy for hostname
* removed old directory entries
* removed old entry for qemu-bridge-helper
* removed old entries for pccardctl
* removed old entries for isdnctrl
* removed old entries for unix(2)_chkpwd
* removed old entries for mount.nfs
* removed old entries for (u)mount
* removed old entry for fileshareset
* removed old entries for KDE
* removed old entry for heartbeat
* removed old entry for gnome-control-center
* removed old entry for pcp
* removed old entry for lpdfilter
* removed old entry for scotty
* removed old entry for ia32el
* removed old entry for squid
* removed old qpopper whitelist
* removed pt_chown entries. Not needed anymore and a bad idea anyway
* removed old majordomo entry
* removed stale entries for old ncpfs tools
* removed old entry for rmtab
* Fixed type in icinga2 whitelist entry
* New whitelisting for /usr/lib/virtualbox/VirtualBoxVM and removed stale entries for VirtualBox
* Removed whitelist for /usr/bin/su.core. According to comment a temporary hack introduced 2012 to help moving su from coretuils to util-linux. I couldn't find it anywhere, so we don't need it anymore
* Remove entry for /usr/bin/yaps. We don't ship it anymore and the group that is used doesn't exists anymore starting with Leap 15, so it will not work there anyway. Users using this (old) package can do this individually
* removed entry for /etc/ftpaccess. We currently don't have it anywhere (and judging from my search this has been the case for quite a while)
* Ensure consistency of entries, otherwise switching between settings becomes problematic
* Fix spelling of SUSE
* adjust settings for amanda to current binary layout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-02"/>
	<updated date="2021-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028975">SUSE bug 1028975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133678">SUSE bug 1133678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148788">SUSE bug 1148788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150345">SUSE bug 1150345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150366">SUSE bug 1150366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151190">SUSE bug 1151190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157498">SUSE bug 1157498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160285">SUSE bug 1160285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161335">SUSE bug 1161335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163588">SUSE bug 1163588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167163">SUSE bug 1167163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169614">SUSE bug 1169614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171164">SUSE bug 1171164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171173">SUSE bug 1171173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171569">SUSE bug 1171569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171580">SUSE bug 1171580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171686">SUSE bug 1171686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171879">SUSE bug 1171879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171882">SUSE bug 1171882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173221">SUSE bug 1173221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174504">SUSE bug 1174504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175720">SUSE bug 1175720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175867">SUSE bug 1175867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178475">SUSE bug 1178475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178476">SUSE bug 1178476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183669">SUSE bug 1183669</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658912" comment="permissions-20200127-lp153.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658913" comment="permissions-zypp-plugin-20200127-lp153.24.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52107" version="1" class="patch">
	<metadata>
		<title>Security update for singularity (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193273" ref_url="https://bugzilla.suse.com/1193273" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1525-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L3AGIEOXZIUUEYYMWKJCJCQI7V235UTR/" source="SUSE-SU"/>
		<description>
This update for singularity fixes the following issues:

Update to 3.8.5:

- CVE-2021-41190: Fixed OCI manifest and index parsing confusion (boo#1193273).
- Building Singularity from source requires go greater or equal 1.16. We now aim
  to support the two most recent stable versions of Go. This
  corresponds to the Go Release Maintenance Policy
- Sourcing a script based on PATH is now permitted, fixing a
  regression introduced in 3.6.0.
- Environment variables in container definition files are
  properly scoped, fixing a regression introduced in 3.8.0.
- Fix the oras contexts to avoid hangs upon failed pushes to 
  Harbor registry.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-04"/>
	<updated date="2021-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193273">SUSE bug 1193273</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659015" comment="singularity-3.8.5-bp153.2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52108" version="1" class="patch">
	<metadata>
		<title>Security update for hiredis (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191331" ref_url="https://bugzilla.suse.com/1191331" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32765" ref_url="https://www.suse.com/security/cve/CVE-2021-32765/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2J7PHNSWD2ZHOSNIVUJTW2HJ34RJDBG/" source="SUSE-SU"/>
		<description>
This update for hiredis fixes the following issues:

- CVE-2021-32765: Fix integer/buffer (boo#1191331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191331">SUSE bug 1191331</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32765/">CVE-2021-32765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659080" comment="hiredis-0.13.3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659081" comment="hiredis-devel-0.13.3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659082" comment="libhiredis0_13-0.13.3-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52109" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192310" ref_url="https://bugzilla.suse.com/1192310" source="BUGZILLA"/>
		<reference ref_id="1192734" ref_url="https://bugzilla.suse.com/1192734" source="BUGZILLA"/>
		<reference ref_id="1193519" ref_url="https://bugzilla.suse.com/1193519" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38005" ref_url="https://www.suse.com/security/cve/CVE-2021-38005/" source="CVE"/>
		<reference ref_id="CVE-2021-38006" ref_url="https://www.suse.com/security/cve/CVE-2021-38006/" source="CVE"/>
		<reference ref_id="CVE-2021-38007" ref_url="https://www.suse.com/security/cve/CVE-2021-38007/" source="CVE"/>
		<reference ref_id="CVE-2021-38008" ref_url="https://www.suse.com/security/cve/CVE-2021-38008/" source="CVE"/>
		<reference ref_id="CVE-2021-38009" ref_url="https://www.suse.com/security/cve/CVE-2021-38009/" source="CVE"/>
		<reference ref_id="CVE-2021-38010" ref_url="https://www.suse.com/security/cve/CVE-2021-38010/" source="CVE"/>
		<reference ref_id="CVE-2021-38011" ref_url="https://www.suse.com/security/cve/CVE-2021-38011/" source="CVE"/>
		<reference ref_id="CVE-2021-38012" ref_url="https://www.suse.com/security/cve/CVE-2021-38012/" source="CVE"/>
		<reference ref_id="CVE-2021-38013" ref_url="https://www.suse.com/security/cve/CVE-2021-38013/" source="CVE"/>
		<reference ref_id="CVE-2021-38014" ref_url="https://www.suse.com/security/cve/CVE-2021-38014/" source="CVE"/>
		<reference ref_id="CVE-2021-38015" ref_url="https://www.suse.com/security/cve/CVE-2021-38015/" source="CVE"/>
		<reference ref_id="CVE-2021-38016" ref_url="https://www.suse.com/security/cve/CVE-2021-38016/" source="CVE"/>
		<reference ref_id="CVE-2021-38017" ref_url="https://www.suse.com/security/cve/CVE-2021-38017/" source="CVE"/>
		<reference ref_id="CVE-2021-38018" ref_url="https://www.suse.com/security/cve/CVE-2021-38018/" source="CVE"/>
		<reference ref_id="CVE-2021-38019" ref_url="https://www.suse.com/security/cve/CVE-2021-38019/" source="CVE"/>
		<reference ref_id="CVE-2021-38020" ref_url="https://www.suse.com/security/cve/CVE-2021-38020/" source="CVE"/>
		<reference ref_id="CVE-2021-38021" ref_url="https://www.suse.com/security/cve/CVE-2021-38021/" source="CVE"/>
		<reference ref_id="CVE-2021-38022" ref_url="https://www.suse.com/security/cve/CVE-2021-38022/" source="CVE"/>
		<reference ref_id="CVE-2021-4052" ref_url="https://www.suse.com/security/cve/CVE-2021-4052/" source="CVE"/>
		<reference ref_id="CVE-2021-4053" ref_url="https://www.suse.com/security/cve/CVE-2021-4053/" source="CVE"/>
		<reference ref_id="CVE-2021-4054" ref_url="https://www.suse.com/security/cve/CVE-2021-4054/" source="CVE"/>
		<reference ref_id="CVE-2021-4055" ref_url="https://www.suse.com/security/cve/CVE-2021-4055/" source="CVE"/>
		<reference ref_id="CVE-2021-4056" ref_url="https://www.suse.com/security/cve/CVE-2021-4056/" source="CVE"/>
		<reference ref_id="CVE-2021-4057" ref_url="https://www.suse.com/security/cve/CVE-2021-4057/" source="CVE"/>
		<reference ref_id="CVE-2021-4058" ref_url="https://www.suse.com/security/cve/CVE-2021-4058/" source="CVE"/>
		<reference ref_id="CVE-2021-4059" ref_url="https://www.suse.com/security/cve/CVE-2021-4059/" source="CVE"/>
		<reference ref_id="CVE-2021-4061" ref_url="https://www.suse.com/security/cve/CVE-2021-4061/" source="CVE"/>
		<reference ref_id="CVE-2021-4062" ref_url="https://www.suse.com/security/cve/CVE-2021-4062/" source="CVE"/>
		<reference ref_id="CVE-2021-4063" ref_url="https://www.suse.com/security/cve/CVE-2021-4063/" source="CVE"/>
		<reference ref_id="CVE-2021-4064" ref_url="https://www.suse.com/security/cve/CVE-2021-4064/" source="CVE"/>
		<reference ref_id="CVE-2021-4065" ref_url="https://www.suse.com/security/cve/CVE-2021-4065/" source="CVE"/>
		<reference ref_id="CVE-2021-4066" ref_url="https://www.suse.com/security/cve/CVE-2021-4066/" source="CVE"/>
		<reference ref_id="CVE-2021-4067" ref_url="https://www.suse.com/security/cve/CVE-2021-4067/" source="CVE"/>
		<reference ref_id="CVE-2021-4068" ref_url="https://www.suse.com/security/cve/CVE-2021-4068/" source="CVE"/>
		<reference ref_id="CVE-2021-4078" ref_url="https://www.suse.com/security/cve/CVE-2021-4078/" source="CVE"/>
		<reference ref_id="CVE-2021-4079" ref_url="https://www.suse.com/security/cve/CVE-2021-4079/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2H3B3VUHNFAXDEK6YLKWJWLKWC4NOIPM/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Ensure newer libs and LLVM is used on Leap (boo#1192310)
- Explicitly BuildRequire python3-six. 

Chromium 96.0.4664.93 (boo#1193519):

* CVE-2021-4052: Use after free in web apps
* CVE-2021-4053: Use after free in UI
* CVE-2021-4079: Out of bounds write in WebRTC
* CVE-2021-4054: Incorrect security UI in autofill
* CVE-2021-4078: Type confusion in V8
* CVE-2021-4055: Heap buffer overflow in extensions
* CVE-2021-4056: Type Confusion in loader
* CVE-2021-4057: Use after free in file API
* CVE-2021-4058: Heap buffer overflow in ANGLE
* CVE-2021-4059: Insufficient data validation in loader
* CVE-2021-4061: Type Confusion in V8
* CVE-2021-4062: Heap buffer overflow in BFCache
* CVE-2021-4063: Use after free in developer tools
* CVE-2021-4064: Use after free in screen capture
* CVE-2021-4065: Use after free in autofill
* CVE-2021-4066: Integer underflow in ANGLE
* CVE-2021-4067: Use after free in window manager
* CVE-2021-4068: Insufficient validation of untrusted input in new tab page

Chromium 96.0.4664.45 (boo#1192734):

* CVE-2021-38007: Type Confusion in V8
* CVE-2021-38008: Use after free in media
* CVE-2021-38009: Inappropriate implementation in cache
* CVE-2021-38006: Use after free in storage foundation
* CVE-2021-38005: Use after free in loader
* CVE-2021-38010: Inappropriate implementation in service workers
* CVE-2021-38011: Use after free in storage foundation
* CVE-2021-38012: Type Confusion in V8
* CVE-2021-38013: Heap buffer overflow in fingerprint recognition
* CVE-2021-38014: Out of bounds write in Swiftshader
* CVE-2021-38015: Inappropriate implementation in input
* CVE-2021-38016: Insufficient policy enforcement in background fetch
* CVE-2021-38017: Insufficient policy enforcement in iframe sandbox
* CVE-2021-38018: Inappropriate implementation in navigation
* CVE-2021-38019: Insufficient policy enforcement in CORS
* CVE-2021-38020: Insufficient policy enforcement in contacts picker
* CVE-2021-38021: Inappropriate implementation in referrer
* CVE-2021-38022: Inappropriate implementation in WebAuthentication

Lord of the Browsers: The Two Compilers:

* Go back to GCC
Lord of the Browsers: The Two Compilers:

* Go back to GCC
* GCC: LTO removes needed assembly symbols
* Clang: issues with libstdc++

* GCC: LTO removes needed assembly symbols
* Clang: issues with libstdc++

		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192310">SUSE bug 1192310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192734">SUSE bug 1192734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193519">SUSE bug 1193519</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38005/">CVE-2021-38005</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38006/">CVE-2021-38006</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38007/">CVE-2021-38007</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38008/">CVE-2021-38008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38009/">CVE-2021-38009</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38010/">CVE-2021-38010</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38011/">CVE-2021-38011</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38012/">CVE-2021-38012</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38013/">CVE-2021-38013</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38014/">CVE-2021-38014</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38015/">CVE-2021-38015</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38016/">CVE-2021-38016</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38017/">CVE-2021-38017</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38018/">CVE-2021-38018</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38019/">CVE-2021-38019</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38020/">CVE-2021-38020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38021/">CVE-2021-38021</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38022/">CVE-2021-38022</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4052/">CVE-2021-4052</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4053/">CVE-2021-4053</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4054/">CVE-2021-4054</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4055/">CVE-2021-4055</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4056/">CVE-2021-4056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4057/">CVE-2021-4057</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4058/">CVE-2021-4058</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4059/">CVE-2021-4059</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4061/">CVE-2021-4061</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4062/">CVE-2021-4062</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4063/">CVE-2021-4063</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4064/">CVE-2021-4064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4065/">CVE-2021-4065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4066/">CVE-2021-4066</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4067/">CVE-2021-4067</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4068/">CVE-2021-4068</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4078/">CVE-2021-4078</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4079/">CVE-2021-4079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659630" comment="chromedriver-96.0.4664.93-bp153.2.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659631" comment="chromium-96.0.4664.93-bp153.2.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52110" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2021:1588-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCXLQHPHQDAKQFBGGGAOTGPB45CUZWL6/" source="SUSE-SU"/>
		<description>
This update for seamonkey fixes the following issues:

update to SeaMonkey 2.53.10.1

  * Security fix for NSS code bug 1737470.
  * Only use networks and servers in lower case in ChatZilla bug
    1742502.
  * Change classic form icon in SeaMonkey composer bug 1710915.
  * Addition fixes for SeaMonkey 32x32 default icons on Windows and
    macOS bug 1729153.
  * SeaMonkey 2.53.10.1 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.10.1 shares most parts of the mail and news code
    with Thunderbird. Please read the Thunderbird 60.0 release notes
    for specific changes and security fixes in this release.
  * Additional important security fixes up to Current Firefox 91.4 ESR
    and a few enhancements have been backported. We will continue to
    enhance SeaMonkey security in subsequent 2.53.x beta and release
    versions as fast as we are able to.

update to SeaMonkey 2.53.10

  * Minor fixes for testdisplay command in ChatZilla bug 1727976.
  * Show CTCP requests (excluding ACTION and DCC) bug 1722156.
  * IRCv3: Add support for server-time bug 1724586.
  * Add localization note for network editor dialog width in ChatZilla
    bug 1727977.
  * IRCv3: Add support for extended-join and account-notify bug
    1722159.
  * Add ability to collapse message groups in ChatZilla bug 1724588.
  * Fix JS strict warnings in unescapeTagValue in ChatZilla bug
    1727989.
  * IRCv3: Add support for invite-notify bug 1722161.
  * IRCv3: Add support for batch bug 1724589.
  * Fix JS strict warning in addHistory in cZ static.js bug 1727992.
  * IRCv3: Add support for cap-notify bug 1722162.
  * Stop using canonical name as collection keys in ChatZilla bug
    1728025.
  * IRCv3: Add support for TLS and STS bug 1722166.
  * Helper function for renaming irc server properties in ChatZilla
    bug 1728027.
  * IRCv3: Add support for MONITOR bug 1722174.
  * Remove use of msg.commasp in ChatZilla bug 1726965.
  * Allow shiftKey to modify behaviour of link clicking in cZ bug
    1713458.
  * IRCv3: Add support for echo-message bug 1722211.
  * In ChatZilla make /commands return all matches starting with
    pattern bug 1726966.
  * Use SeaMonkey prefs to determine how links behave in cZ bug
    1713467.
  * Allow parameters to be localised in ChatZilla bug 1724105.
  * Add identify command to cZ and hook into password management bug
    1713470.
  * IRCv3.1: Implement SASL with PLAIN mechanism bug 1717545.
  * IRCv3: Add support for message tags bug 1724584.
  * Add last read message divider to ChatZilla bug 1729159.
  * IRCv3: Add support for account-tag bug 1724585.
  * Missing option 'text encoding Unicode/UTF-8' in preferences -
    Mailnews bug 1679260.
  * Detect Crashreporter using AppConstants in SeaMonkey bug 1735236.
  * Link about LEGACY extensions in Add-ons Manager is broken bug
    1656797.
  * Update help for clear private data preferences and dialog bug
    1728911.
  * Fix typo in cs_nav_prefs_appearance bug 1737473.
  * Drop leftover 'Edit Menu' comment from messageWindow.xul and
    addressbook.xul bug 1725121.
  * Add dummy tab routines to SeaMonkey mailnews tab browser bug
    1735243.
  * Folder pane and tab/window title not updated correctly when
    opening in new tab bug 1726940.
  * Allow mail tab bar to be controlled separately to browser tab bar
    bug 1724515.
  * Copy any user set values for new mail.tabs prefs bug 1729165.
  * Merge Master Passwords and Passwords pref panes into a single pref
    pane bug 1728099.
  * Move warning about redirection pref from Content to Privacy &amp;
    Security pane bug 1728185.
  * Move website icons prefs from content pref pane to browser pref
    pane bug 1727425.
  * Move browser / mailnews system integration prefs into advanced
    pane bug 1727659.
  * Have separate opentabfor.middleclick for mailnews bug 1727948.
  * Add removeBrowser helper for tabbrowser bug 1730391.
  * Put &lt;browser&gt; in a &lt;stack&gt; so it's easy to overlay bug 1730392.
  * Allow browser focus to be avoided bug 1720003.
  * SeaMonkey 32x32 default icon has light stripe at the bottom bug
    1729153.
  * Support &lt;input type=time&gt; and &lt;input type=date&gt; in SeaMonkey bug
    1730408.
  * Middleclick on browser tab handled twice (closes tab and loads URL
    from primary or clipboard) bug 1734407.
  * Unable to create a new 'Saved Search Folder' using 'Save View as a
    Folder...' bug 1738669.
  * Enable compression for standard http connections bug 1728996.
  * Support VS2022 for compiling under Windows bug 1728988.
  * SeaMonkey 2.53.10 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.10 shares most parts of the mail and news code
    with Thunderbird. Please read the Thunderbird 60.0 release notes
    for specific changes and security fixes in this release.
  * Additional important security fixes up to Current Firefox 78.15
    ESR and a few enhancements have been backported. We will continue
    to enhance SeaMonkey security in subsequent 2.53.x beta and
    release versions as fast as we are able to.

update to SeaMonkey 2.53.9.1

  * Fix the lazy loading of images from some websites bug 1727967.
  * Move certain font family defaults from serif to sans serif bug
    1727982.
  * SeaMonkey 2.53.9.1 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.9.1 shares most parts of the mail and news code
    with Thunderbird. Please read the Thunderbird 60.0 release notes
    for specific changes and security fixes in this release.
  * Additional important security fixes up to Current Firefox 78.14
    ESR and a few enhancements have been backported. We will continue
    to enhance SeaMonkey security in subsequent 2.53.x beta and
    release versions as fast as we are able to.

update to SeaMonkey 2.53.9

  * There is now an option to clear browser history during shutdown
    bug 1621445.
  * Uninstall plugin command for ChatZilla bug 541719.
  * Update icons used in ChatZilla status bar bug 1710238 and bug
    1710249.
  * Make ChatZilla understand mIRC color code 99 bug 1710298.
  * Implement IRCv3 basic CAP negotiation bug 1717539 and CAP LIST and
    update CAP ACK and CAP LS bug 1710313.
  * Use Unicode instead of images for emojis in ChatZilla bug 1711375
    and add some extra emojis bug 1711376.
  * Use SeaMonkey's configured web search rather than a separate one
    in ChatZilla bug 1712498.
  * Add a networks editor to ChatZilla bug 1716232.
  * Implement IRCv3 away-notify bug 1717543, chghost and
    userhost-in-names bug 1717544, self-messaging bug 1722212 and WHOX
    bug 1722214.
  * Link to SeaMonkey website in debugQA for verification sites and
    development section bug 1685606.
  * Send button should be disable until we have a recipient bug
    104973.
  * Remove need to use a modifier for marking messages as unread bug
    1719216.
  * SeaMonkey 2.53.9 uses the same backend as Firefox and contains the
    relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.9 shares most parts of the mail and news code with
    Thunderbird. Please read the Thunderbird 60.0 release notes for
    specific changes and security fixes in this release.
  * Additional important security fixes up to Current Firefox 78.13
    ESR and a few enhancements have been backported. We will continue
    to enhance SeaMonkey security in subsequent 2.53.x beta and
    release versions as fast as we are able to.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-16"/>
	<updated date="2021-12-16"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660145" comment="seamonkey-2.53.10.1-bp153.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660146" comment="seamonkey-dom-inspector-2.53.10.1-bp153.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660147" comment="seamonkey-irc-2.53.10.1-bp153.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52111" version="1" class="patch">
	<metadata>
		<title>Security update for barrier (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-42072" ref_url="https://www.suse.com/security/cve/CVE-2021-42072/" source="CVE"/>
		<reference ref_id="CVE-2021-42073" ref_url="https://www.suse.com/security/cve/CVE-2021-42073/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HJIFZZMEQZI47KRZYVOPBZN725K3KS3/" source="SUSE-SU"/>
		<description>
This update for barrier fixes the following issues:

Updated to version 2.4.0:

Barrier now supports client identity verification (fixes CVE-2021-42072,
CVE-2021-42073).

Previously a malicious client could connect to Barrier server without any
authentication and send application-level messages. This made the attack
surface of Barrier significantly larger. Additionally, in case the malicious
client got possession of a valid screen name by brute forcing or other means
it could modify the clipboard contents of the server.
To support seamless upgrades from older versions of Barrier this is
currently disabled by default. The feature can be enabled in the settings
dialog. If enabled, older clients of Barrier will be rejected.
Barrier now uses SHA256 fingerprints for establishing security of encrypted
SSL connections. After upgrading client to new version the existing server
fingerprint will need to be approved again. Client and server will show both
SHA1 and SHA256 server fingerprints to allow interoperability with older
versions of Barrier.

Bugfixes:

* Fixed build failure on mips*el and riscv64 architecture.
* Barrier no longer uses openssl CLI tool for any operations and hooks into
  the openssl library directly.
* More X11 clipboard MIME types have been mapped to corresponding converters
  (#344).
* Fixed setup of multiple actions associated with a hotkey.
* Fixed setup of hotkeys with special characters such as comma and semicolon
  (#778).
* Fixed transfer of non-ASCII characters coming from a Windows server in
  certain cases (#527).
* Barrier will now regenerate server certificate if it's invalid instead of
  failing to launch (#802)
* Added support for additional keys on Sun Microsystems USB keyboards (#784).
* Updated Chinese translation.
* Updated Slovak translation.
* Theme icons are now preferred to icons distributed together with Barrier
  (#471).

Features:

* Added --drop-target option that improves drag and drop support on Windows
  when Barrier is being run as a portable app.
* The --enable-crypto command line option has been made the default to reduce
  chances of accidental security mishaps when configuring Barrier from command
  line. A new --disable-crypto command line option has been added to
  explicitly disable encryption.
* Added support for randomart images for easier comparison of SSL certificate
  fingerprints. The algorithm is identical to what OpenSSH uses.
* Implemented a configuration option for Server GUI auto-start.
* Made it possible to use keyboard instead of mouse to modify screen layout.
* Added support for keyboard backlight media keys
* Added support for Eisu_toggle and Muhenkan keys
* Added --profile-dir option that allows to select custom profile directory.

submitted upstream at https://github.com/symless/synergy-core/pull/6261

* Bug #4749 - Clipboard thread race condition causes assertion
* Bug #4720 - Plugin download shows 'Could not get Linux package
* Bug #4712 - Unable to send clipboard with size above 1KB when
* Bug #4690 - Log line 'activeDesktop' does not use logging
* Enhancement #4901 - Auto restart when running from GUI in
* Bug #4650 - SSL error log message repeats excessively and
* Bug #4601 - Large clipboard data with SSL causes 'protocol is
* Bug #4593 - Locking Windows server causes SSL_ERROR_SSL to
* Bug #4538 - Windows service crashes intermittently with no
* Bug #4566 - Client or server crashes with 'ssl handshake
* Bug #4706 - Installer is not output to build config dir
* Bug #4704 - Plugin 'ns' release build is overwritten with
* Bug #4697 - Timing can allow an SSL socket to be used after
* Enhancement #4661 - Log error but do not crash when failing
* Enhancement #4708 - Download ns plugin for specific Mac
* Enhancement #4587 - Include OpenSSL binaries in source for
* Enhancement #4695 - Automatically upload plugins as
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-19"/>
	<updated date="2021-12-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42072/">CVE-2021-42072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42073/">CVE-2021-42073</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660233" comment="barrier-2.4.0-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52112" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193713" ref_url="https://bugzilla.suse.com/1193713" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4098" ref_url="https://www.suse.com/security/cve/CVE-2021-4098/" source="CVE"/>
		<reference ref_id="CVE-2021-4099" ref_url="https://www.suse.com/security/cve/CVE-2021-4099/" source="CVE"/>
		<reference ref_id="CVE-2021-4100" ref_url="https://www.suse.com/security/cve/CVE-2021-4100/" source="CVE"/>
		<reference ref_id="CVE-2021-4101" ref_url="https://www.suse.com/security/cve/CVE-2021-4101/" source="CVE"/>
		<reference ref_id="CVE-2021-4102" ref_url="https://www.suse.com/security/cve/CVE-2021-4102/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGS65TJIBHZIF3QKXXU62A2KR5NRUCPQ/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 96.0.4664.110 (boo#1193713):

* CVE-2021-4098: Insufficient data validation in Mojo
* CVE-2021-4099: Use after free in Swiftshader
* CVE-2021-4100: Object lifecycle issue in ANGLE
* CVE-2021-4101: Heap buffer overflow in Swiftshader
* CVE-2021-4102: Use after free in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193713">SUSE bug 1193713</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4098/">CVE-2021-4098</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4099/">CVE-2021-4099</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4100/">CVE-2021-4100</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4101/">CVE-2021-4101</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4102/">CVE-2021-4102</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660315" comment="chromedriver-96.0.4664.110-bp153.2.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660316" comment="chromium-96.0.4664.110-bp153.2.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52113" version="1" class="patch">
	<metadata>
		<title>Security update for nextcloud (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192028" ref_url="https://bugzilla.suse.com/1192028" source="BUGZILLA"/>
		<reference ref_id="1192030" ref_url="https://bugzilla.suse.com/1192030" source="BUGZILLA"/>
		<reference ref_id="1192031" ref_url="https://bugzilla.suse.com/1192031" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41177" ref_url="https://www.suse.com/security/cve/CVE-2021-41177/" source="CVE"/>
		<reference ref_id="CVE-2021-41178" ref_url="https://www.suse.com/security/cve/CVE-2021-41178/" source="CVE"/>
		<reference ref_id="CVE-2021-41179" ref_url="https://www.suse.com/security/cve/CVE-2021-41179/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPS4NA73653ZFLPRD3JJVTUZZ4PYGDUS/" source="SUSE-SU"/>
		<description>

This update for nextcloud fixes the following issues:

Update to 20.0.14

Security issues fixed:

* CVE-2021-41179: Fix boo#1192028 - (CWE-304): Two-Factor Authentication not enforced for pages marked as public
* CVE-2021-41178: Fix boo#1192030 - (CWE-434): File Traversal affecting SVG files on Nextcloud Server
* CVE-2021-41177: Fix boo#1192031 - (CWE-799): Rate-limits not working on instances without configured memory cache backend

Changes:

- Add command to repair broken filesystem trees (server#26630)
- Ensure that user and group IDs in LDAP's tables are also max 64chars (server#28971)
- Change output format of Psalm to Github (server#29048)
- File-upload: Correctly handle error responses for HTTP2 (server#29069)
- Allow 'TwoFactor Nextcloud Notifications' to pull the state of the 2F… (server#29072)
- Add a few sensitive config keys (server#29085)
- Fix path of file_get_contents (server#29095)
- Update the certificate bundle (server#29098)
- Keep pw based auth tokens valid when pw-less login happens (server#29131)
- Properly handle folder deletion on external s3 storage (server#29158)
- Tokens without password should not trigger changed password invalidation (server#29166)
- Don't further setup disabled users when logging in with apache (server#29167)
- Add 'supported'-label to all supported apps (server#29181)
- 21] generate a better optimized query for path prefix search filters (server#29192)
- Keep group restrictions when reenabling apps after an update (server#29198)
- Add proper message to created share not found (server#29205)
- Add documentation for files_no_background_scan (server#29219)
- Don't setup the filesystem to check for a favicon we don't use anyway (server#29223)
- Fix background scan doc in config (server#29253)
- Get `filesize()` if `file_exists()` (server#29290)
- Fix unable to login errors due to file system not being initialized (server#29291)
- Update 3rdparty ref (server#29297)
- Bump icewind/streams from 0.7.3 to 0.7.5 in files_external (server#29298)
- Fix app upgrade (server#29303)
- Avoid PHP errors when the LDAP attribute is not found (server#29314)
- Fix security issues when copying groupfolder with advanced ACL (server#29366)
- Scheduling plugin not updating responding attendee status (server#29387)
- Make calendar schedule options translatable (server#29388)
- Add whitelist for apps inside of the server repo (server#29396)
- Handle files with `is_file` instead of `file_exists` (server#29417)
- Fixes an undefined index when getAccessList returns an empty array (server#29421)
- Extra fixes needed for icewind/streams update to 0.7.2 (server#29426)
- Backport #29260: Respect user enumeration settings in user status lists (server#29429)
- Implement local filtering in file list (server#29441)
- Detect mimetype by content only with content (server#29457)
- Update CRL (server#29505)
- Update update-psalm-baseline workflow (server#29548)
- Bump icewind/streams from 0.7.1 to 0.7.5 (3rdparty#855)
- Bump version (files_pdfviewer#512)
- Fix deleting notifications with numeric user ID (notifications#1090)
- Add integration tests for push registration (notifications#1097)
- Restore old device signature so the proxy works again (notifications#1105)
- Bump vue and vue-template-compiler (photos#864)
- Bump prosemirror-schema-list from 1.1.5 to 1.1.6 (text#1868)
- Additional checks for workspace controller (text#1887)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192028">SUSE bug 1192028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192030">SUSE bug 1192030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192031">SUSE bug 1192031</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41177/">CVE-2021-41177</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41178/">CVE-2021-41178</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41179/">CVE-2021-41179</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660317" comment="nextcloud-20.0.14-bp153.2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660318" comment="nextcloud-apache-20.0.14-bp153.2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52114" version="1" class="patch">
	<metadata>
		<title>Security update for netdata (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1139094" ref_url="https://bugzilla.suse.com/1139094" source="BUGZILLA"/>
		<reference ref_id="1139095" ref_url="https://bugzilla.suse.com/1139095" source="BUGZILLA"/>
		<reference ref_id="1139098" ref_url="https://bugzilla.suse.com/1139098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18836" ref_url="https://www.suse.com/security/cve/CVE-2018-18836/" source="CVE"/>
		<reference ref_id="CVE-2018-18837" ref_url="https://www.suse.com/security/cve/CVE-2018-18837/" source="CVE"/>
		<reference ref_id="CVE-2018-18838" ref_url="https://www.suse.com/security/cve/CVE-2018-18838/" source="CVE"/>
		<reference ref_id="CVE-2018-18839" ref_url="https://www.suse.com/security/cve/CVE-2018-18839/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B3RB4W3NEKHZUPUSNCSRLXDVEK64S5SL/" source="SUSE-SU"/>
		<description>
This update for netdata fixes the following issues:

Update to 1.31.0 (go.d.plugin 0.29.0)

The v1.31.0 release of Netdata comes with re-packaged and
redesigned elements of the dashboard to help you focus on your
metrics, even more Linux kernel insights via eBPF, on-node machine
learning to help you find anomalies, and much more.
This release contains 10 new collectors, 54 improvements (7 in the
dashboard), 31 documentation updates, and 29 bug fixes.
At a glance
We re-packaged and redesigned portions of the dashboard to improve
the overall experience. Part of this effort is better handling of
dashboard code during installation—anyone using third-party
packages (such as the Netdata Homebrew formula) will start seeing
new features and the new designs starting today. The timeframe
picker has moved to the top panel, and just to its right are two
counters with live CRITICAL and WARNING alarm statuses for your
node. Click on either of these two open the alarms modal.
We've also pushed a number of powerful new collectors, including
directory cache monitoring via eBPF. By monitoring directory cache,
developers and SREs alike can find opportunities to optimize memory
usage and reduce disk-intensive operations.
Our new Z-scores and changefinder collectors use machine learning
to let you know, at a glance, when key metrics start to behave
oddly. We'd love to get feedback on these sophisticated, subjective
new brand of collectors!

Improvements

  * Automatically trigger Helmchart PR on Agent release.
    (gh#netdata/netdata#11084)
  * Implement ACLK env endpoint. (gh#netdata/netdata#10833)
  * Implement new HTTPS client for ACLK. (gh#netdata/netdata#10805)
  * Update ACLK passwd endpoint to match specifications of the new
    architecture. (gh#netdata/netdata#10859)
  * Implement ACLK new backoff (TBEB) architecture.
    (gh#netdata/netdata#10941)
  * Add functionality to store node_id for a host.
    (gh#netdata/netdata#11059)
  * Remove version negotiation from ACLK-NG.
    (gh#netdata/netdata#10980)
  * Persist claim IDs in local database for parent and children.
    (gh#netdata/netdata#10993)
  * Provide more agent analytics to PostHog.
    (gh#netdata/netdata#11020)
  * Reduce logging when sending agent analytics.
    (gh#netdata/netdata#11091)
  * Remove error message on Netdata restart.
    (gh#netdata/netdata#8685)
  * Add a timeout when sending anonymous statistics using curl.
    (gh#netdata/netdata#11010)
  * Improve dash-example.html. (gh#netdata/netdata#10870)
  * Add host_cloud_enabled attribute to analytics.
    (gh#netdata/netdata#11100)

Dashboard

  * Bundle the react dashboard code into the agent repo directly.
    (gh#netdata/netdata#11139)
  * Add dashboard info strings for systemdunits collector.
    (gh#netdata/netdata#10904)
  * Update dashboard version to v2.17.0. (gh#netdata/netdata#10856)

    + Top bar, side panel and overall navigation has been
      redesigned.
    + Top bar now includes a light bulb icon with news/features and
      the number of CRITICAL or WARNING alarms.
    + Documentation and settings buttons moved to the sidebar.
    + Improved rendering of sign in/sign up option button along
      with an operational status option (under user settings).
    + In the left panel, nodes show a status badge and are now
      searchable if there are more than 4.

Health

  * Improvements

    + Add charts configuration option to templates.
      (gh#netdata/netdata#11054)
    + Add new attributes to health configuration files.
      (gh#netdata/netdata#10961)
    + Add inconsistent state to the mysql_galera_cluster_state
      alarm. (gh#netdata/netdata#10945)
    + Add systemdunits collector alarms. (gh#netdata/netdata#10906)
    + Use average instead of sum in VerneMQ alarms.
      (gh#netdata/netdata#11037)
    + Check configuration for CUSTOM and MSTEAM.
      (gh#netdata/netdata#11113)
    + Reduce alarms notifications dump logging.
      (gh#netdata/netdata#11116)

  * Bug fixes

    + Add synchronization.conf to the Makefile.
      (gh#netdata/netdata#10907)
    + Fix Microsoft Teams naming. (gh#netdata/netdata#9905)

Collectors

  * New

    + Add a chart for out of memory kills.
      (gh#netdata/netdata#10880)
    + Add a chart with Netdata uptime. (gh#netdata/netdata#10997)
    + Add a module for ZFS pool state. (gh#netdata/netdata#11071)
    + Add a plugin for the system clock synchronization state.
      (gh#netdata/netdata#10895)
    + Add new charts for extended disk metrics.
      (gh#netdata/netdata#10939)
    + Add support for renaming libvirtd LXC containers.
      (gh#netdata/netdata#11006)
    + Add a metric for Percpu memory. (gh#netdata/netdata#10964)
    + Add an eBPF directory cache collector.
      (gh#netdata/netdata#10855)
    + Add a Z-scores python collector. (gh#netdata/netdata#10673)
    + Add changefinder python collector. (gh#netdata/netdata#10672)

  * Improvements

    + Remove dots in cgroup IDs. (gh#netdata/netdata#11050)
    + Add support for attribute 249 (NAND Writes 1GiB) to the
      smartd_log module. (gh#netdata/netdata#10872)
    + Add RAID level to the mdstat collector chart families.
      (gh#netdata/netdata#11024)
    + Update fping version. (gh#netdata/netdata#10977)
    + Add plugin and module names to the python.d.plugin runtime
      charts. (gh#netdata/netdata#11007)
    + Move global stats to a separate thread.
      (gh#netdata/netdata#10991)
    + Add memory size adjustments for eBPF hash tables.
      (gh#netdata/netdata#10962)
    + Add improvements to anomalies collector.
      (gh#netdata/netdata#11003)
    + Add support for loading of kprobe names in the eBPF plugin.
      (gh#netdata/netdata#11034)
    + Don't repeat the cgroup discovery cleanup info message.
      (gh#netdata/netdata#11101)
    + Change ACLK statistics charts units from kB/s to KiB/s.
      (gh#netdata/netdata#11103)

  * Bug fixes

    + Fix the detection of cgroups v2 by checking the version of
      the default cgroup mountpoint. (gh#netdata/netdata#11102)
    + Fix eBPF cachestat chart type. (gh#netdata/netdata#11074)
    + Fix gaps in eBPF cachestat charts. (gh#netdata/netdata#10972)
    + Fix detection of opensipsctl executable.
      (gh#netdata/netdata#10978)
    + Fix network interfaces detection when using virsh.
      (gh#netdata/netdata#11096)
    + Fix eBPF plugin crash during shutdown.
      (gh#netdata/netdata#10957)

Exporting

  * Improvements

    + Allow the remote write configuration to have multiple
      destinations (gh#netdata/netdata#11005)

  * Bug fixes

    + Fix backend chart filtering backward compatibility.
      (gh#netdata/netdata#11002)

Bug fixes

  * Reduce the number of ACLK chart updates during chart
    obsoletion. (gh#netdata/netdata#11133)
  * Fix SSL random failures when using multithreaded web server
    with OpenSSL &lt; 1.1.0. (gh#netdata/netdata#11089)
  * Fix storing an NULL claim ID on a parent node.
    (gh#netdata/netdata#11036)
  * Prevent MQTT connection attempt on OTP failure.
    (gh#netdata/netdata#10839)
  * Rename struct fields from class to classification.
    (gh#netdata/netdata#11019)
  * Fix spelling mistakes in various components:
    + aclk (gh#netdata/netdata#10910)
    + build (gh#netdata/netdata#10909)
    + collectors (gh#netdata/netdata#10912)
    + daemon (gh#netdata/netdata#10913)
    + database (gh#netdata/netdata#10914)
    + exporting (gh#netdata/netdata#10915)
    + libnetdata (gh#netdata/netdata#10917)
    + health (gh#netdata/netdata#10916)
    + streaming (gh#netdata/netdata#10919)
    + tests (gh#netdata/netdata#10920)
    + backend (gh#netdata/netdata#10911)
    + bidirectional (gh#netdata/netdata#10918)
    + HTTP API (gh#netdata/netdata#10921)
    + web (gh#netdata/netdata#10922)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139094">SUSE bug 1139094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139095">SUSE bug 1139095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139098">SUSE bug 1139098</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18836/">CVE-2018-18836</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18837/">CVE-2018-18837</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18838/">CVE-2018-18838</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18839/">CVE-2018-18839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660319" comment="netdata-1.31.0-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52115" version="1" class="patch">
	<metadata>
		<title>Security update for kafka (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1631-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BQ3YNECTWF6XMIQDZ7C5QEDQ3QPQT4W/" source="SUSE-SU"/>
		<description>

This security update of kafka fixes the following issue:

- CVE-2021-4104: Remove JMSAppender from log4j jars during build to prevent bsc#1193662, 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-28"/>
	<updated date="2021-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661880" comment="kafka-kit-2.1.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661881" comment="kafka-source-2.1.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52116" version="1" class="patch">
	<metadata>
		<title>Security update for c-toxcore (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193667" ref_url="https://bugzilla.suse.com/1193667" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44847" ref_url="https://www.suse.com/security/cve/CVE-2021-44847/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MUGBIA3IOPBRCHCVWXL5KMYQ6TB5Z5XI/" source="SUSE-SU"/>
		<description>
c-toxcore was updated fo fix a securiy issue:

- CVE-2021-44847: Fixed a buffer overflow in handle_request in DHT.c which could lead to remote DoS and potential code execution (boo#1193667)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-30"/>
	<updated date="2021-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193667">SUSE bug 1193667</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44847/">CVE-2021-44847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662148" comment="c-toxcore-0.2.13-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662149" comment="c-toxcore-daemon-0.2.13-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662150" comment="c-toxcore-devel-0.2.13-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662151" comment="libtoxcore2-0.2.13-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52117" version="1" class="patch">
	<metadata>
		<title>Security update for postrsd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180251" ref_url="https://bugzilla.suse.com/1180251" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35573" ref_url="https://www.suse.com/security/cve/CVE-2020-35573/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOF2UA3DXYGYPKJVCZWZ5HMXL2PTHSJR/" source="SUSE-SU"/>
		<description>

postrsd was updated to release 1.11 [boo#1180251]:

  * Drop group privileges as well as user privileges
  * Fixed: The subprocess that talks to Postfix could be caused
    to hang with a very long email address. [CVE-2020-35573]

- Update to release 1.6

  * Fix endianness issue with SHA-1 implementation
  * Add dual stack support
  * Make SRS separator configurable		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-30"/>
	<updated date="2021-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180251">SUSE bug 1180251</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35573/">CVE-2020-35573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662152" comment="postsrsd-1.11-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52118" version="1" class="patch">
	<metadata>
		<title>Security update for privoxy (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193584" ref_url="https://bugzilla.suse.com/1193584" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44540" ref_url="https://www.suse.com/security/cve/CVE-2021-44540/" source="CVE"/>
		<reference ref_id="CVE-2021-44541" ref_url="https://www.suse.com/security/cve/CVE-2021-44541/" source="CVE"/>
		<reference ref_id="CVE-2021-44542" ref_url="https://www.suse.com/security/cve/CVE-2021-44542/" source="CVE"/>
		<reference ref_id="CVE-2021-44543" ref_url="https://www.suse.com/security/cve/CVE-2021-44543/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QYO5MMUZFNF4G2ZDKAE76JYKJCV2JPWK/" source="SUSE-SU"/>
		<description>
This update for privoxy fixes the following issues:

privoxy was updated to 3.0.33 (boo#1193584):

* CVE-2021-44543: Encode the template name to prevent XSS
  (cross-side scripting) when Privoxy is configured to servce
  the user-manual itself
* CVE-2021-44540: Free memory of compiled pattern spec
  before bailing
* CVE-2021-44541: Free header memory when failing to get the
  request destination.
* CVE-2021-44542: Prevent memory leaks when handling errors
* Disable fast-redirects for a number of domains
* Update default block lists
* Many bug fixes and minor enhancements
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-30"/>
	<updated date="2021-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193584">SUSE bug 1193584</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44540/">CVE-2021-44540</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44541/">CVE-2021-44541</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44542/">CVE-2021-44542</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44543/">CVE-2021-44543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662153" comment="privoxy-3.0.33-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662154" comment="privoxy-doc-3.0.33-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52119" version="1" class="patch">
	<metadata>
		<title>Security update for upx (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186238" ref_url="https://bugzilla.suse.com/1186238" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24119" ref_url="https://www.suse.com/security/cve/CVE-2020-24119/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:0813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V2GCFGL5HHPU3GIC7XYIPIMYFFLH2M4U/" source="SUSE-SU"/>
		<description>
This update for upx fixes the following issues:

- CVE-2020-24119: Fixed a heap buffer overflow in p_lx_elf.cpp (boo#1186238)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-30"/>
	<updated date="2021-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186238">SUSE bug 1186238</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24119/">CVE-2020-24119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009511072" comment="upx-3.96-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52120" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-30506" ref_url="https://www.suse.com/security/cve/CVE-2021-30506/" source="CVE"/>
		<reference ref_id="CVE-2021-30507" ref_url="https://www.suse.com/security/cve/CVE-2021-30507/" source="CVE"/>
		<reference ref_id="CVE-2021-30508" ref_url="https://www.suse.com/security/cve/CVE-2021-30508/" source="CVE"/>
		<reference ref_id="CVE-2021-30509" ref_url="https://www.suse.com/security/cve/CVE-2021-30509/" source="CVE"/>
		<reference ref_id="CVE-2021-30510" ref_url="https://www.suse.com/security/cve/CVE-2021-30510/" source="CVE"/>
		<reference ref_id="CVE-2021-30511" ref_url="https://www.suse.com/security/cve/CVE-2021-30511/" source="CVE"/>
		<reference ref_id="CVE-2021-30512" ref_url="https://www.suse.com/security/cve/CVE-2021-30512/" source="CVE"/>
		<reference ref_id="CVE-2021-30513" ref_url="https://www.suse.com/security/cve/CVE-2021-30513/" source="CVE"/>
		<reference ref_id="CVE-2021-30514" ref_url="https://www.suse.com/security/cve/CVE-2021-30514/" source="CVE"/>
		<reference ref_id="CVE-2021-30515" ref_url="https://www.suse.com/security/cve/CVE-2021-30515/" source="CVE"/>
		<reference ref_id="CVE-2021-30516" ref_url="https://www.suse.com/security/cve/CVE-2021-30516/" source="CVE"/>
		<reference ref_id="CVE-2021-30517" ref_url="https://www.suse.com/security/cve/CVE-2021-30517/" source="CVE"/>
		<reference ref_id="CVE-2021-30518" ref_url="https://www.suse.com/security/cve/CVE-2021-30518/" source="CVE"/>
		<reference ref_id="CVE-2021-30519" ref_url="https://www.suse.com/security/cve/CVE-2021-30519/" source="CVE"/>
		<reference ref_id="CVE-2021-30520" ref_url="https://www.suse.com/security/cve/CVE-2021-30520/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:0828-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NV4ZBYMJFXP7FZOUO25I6RQ7DTPT3AO/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to version 76.0.4017.154

- CHR-8420 Update chromium on desktop-stable-90-4017 to
  90.0.4430.212
- DNA-92411 Bookmarks breadcrumbs wrong color when pressed in
  dark mode
- DNA-92587 Sync settings: “Use old password” button doesn’t work
- DNA-92672 Make it possible for agent to inject scripts into
  startpage
- DNA-92712 Add SD reload API
- DNA-93190 The bookmark can’t be opened in Workspace 5-6
- DNA-93247 Reopen last closed tab shortcut opens random tab on
  new window
- DNA-93294 Binary diff for opera_browser.dll is not created on
  32-bit builds
- DNA-93313 Add opauto test to cover DNA-93190
- DNA-93368 Fix an error in Polish translation
- DNA-93408 [Windows] widevine_cdm_component_installer does not
  compile on desktop-stable-90-4017
- The update to chromium 90.0.4430.212 fixes following issues:    
  CVE-2021-30506, CVE-2021-30507, CVE-2021-30508, CVE-2021-30509,
  CVE-2021-30510, CVE-2021-30511, CVE-2021-30512, CVE-2021-30513,
  CVE-2021-30514, CVE-2021-30515, CVE-2021-30516, CVE-2021-30517,
  CVE-2021-30518, CVE-2021-30519, CVE-2021-30520
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30506/">CVE-2021-30506</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30507/">CVE-2021-30507</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30508/">CVE-2021-30508</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30509/">CVE-2021-30509</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30510/">CVE-2021-30510</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30511/">CVE-2021-30511</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30512/">CVE-2021-30512</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30513/">CVE-2021-30513</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30514/">CVE-2021-30514</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30515/">CVE-2021-30515</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30516/">CVE-2021-30516</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30517/">CVE-2021-30517</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30518/">CVE-2021-30518</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30519/">CVE-2021-30519</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30520/">CVE-2021-30520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694939" comment="opera-76.0.4017.154-lp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52121" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186458" ref_url="https://bugzilla.suse.com/1186458" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21212" ref_url="https://www.suse.com/security/cve/CVE-2021-21212/" source="CVE"/>
		<reference ref_id="CVE-2021-30521" ref_url="https://www.suse.com/security/cve/CVE-2021-30521/" source="CVE"/>
		<reference ref_id="CVE-2021-30522" ref_url="https://www.suse.com/security/cve/CVE-2021-30522/" source="CVE"/>
		<reference ref_id="CVE-2021-30523" ref_url="https://www.suse.com/security/cve/CVE-2021-30523/" source="CVE"/>
		<reference ref_id="CVE-2021-30524" ref_url="https://www.suse.com/security/cve/CVE-2021-30524/" source="CVE"/>
		<reference ref_id="CVE-2021-30525" ref_url="https://www.suse.com/security/cve/CVE-2021-30525/" source="CVE"/>
		<reference ref_id="CVE-2021-30526" ref_url="https://www.suse.com/security/cve/CVE-2021-30526/" source="CVE"/>
		<reference ref_id="CVE-2021-30527" ref_url="https://www.suse.com/security/cve/CVE-2021-30527/" source="CVE"/>
		<reference ref_id="CVE-2021-30528" ref_url="https://www.suse.com/security/cve/CVE-2021-30528/" source="CVE"/>
		<reference ref_id="CVE-2021-30529" ref_url="https://www.suse.com/security/cve/CVE-2021-30529/" source="CVE"/>
		<reference ref_id="CVE-2021-30530" ref_url="https://www.suse.com/security/cve/CVE-2021-30530/" source="CVE"/>
		<reference ref_id="CVE-2021-30531" ref_url="https://www.suse.com/security/cve/CVE-2021-30531/" source="CVE"/>
		<reference ref_id="CVE-2021-30532" ref_url="https://www.suse.com/security/cve/CVE-2021-30532/" source="CVE"/>
		<reference ref_id="CVE-2021-30533" ref_url="https://www.suse.com/security/cve/CVE-2021-30533/" source="CVE"/>
		<reference ref_id="CVE-2021-30534" ref_url="https://www.suse.com/security/cve/CVE-2021-30534/" source="CVE"/>
		<reference ref_id="CVE-2021-30535" ref_url="https://www.suse.com/security/cve/CVE-2021-30535/" source="CVE"/>
		<reference ref_id="CVE-2021-30536" ref_url="https://www.suse.com/security/cve/CVE-2021-30536/" source="CVE"/>
		<reference ref_id="CVE-2021-30537" ref_url="https://www.suse.com/security/cve/CVE-2021-30537/" source="CVE"/>
		<reference ref_id="CVE-2021-30538" ref_url="https://www.suse.com/security/cve/CVE-2021-30538/" source="CVE"/>
		<reference ref_id="CVE-2021-30539" ref_url="https://www.suse.com/security/cve/CVE-2021-30539/" source="CVE"/>
		<reference ref_id="CVE-2021-30540" ref_url="https://www.suse.com/security/cve/CVE-2021-30540/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5KKDV2D4YM2QDZBKGBLQ726LJLT6BI/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 91.0.4472.77 (boo#1186458):

* Support Managed configuration API for Web Applications
* WebOTP API: cross-origin iframe support
* CSS custom counter styles
* Support JSON Modules
* Clipboard: read-only files support
* Remove webkitBeforeTextInserted &amp; webkitEditableCOntentChanged JS events
* Honor media HTML attribute for link icon
* Import Assertions
* Class static initializer blocks
* Ergonomic brand checks for private fields
* Expose WebAssembly SIMD
* New Feature: WebTransport
* ES Modules for service workers ('module' type option)
* Suggested file name and location for the File System Access API
* adaptivePTime property for RTCRtpEncodingParameters
* Block HTTP port 10080 - mitigation for NAT Slipstream 2.0 attack
* Support WebSockets over HTTP/2
* Support 103 Early Hints for Navigation
* CVE-2021-30521: Heap buffer overflow in Autofill
* CVE-2021-30522: Use after free in WebAudio
* CVE-2021-30523: Use after free in WebRTC
* CVE-2021-30524: Use after free in TabStrip
* CVE-2021-30525: Use after free in TabGroups
* CVE-2021-30526: Out of bounds write in TabStrip
* CVE-2021-30527: Use after free in WebUI
* CVE-2021-30528: Use after free in WebAuthentication
* CVE-2021-30529: Use after free in Bookmarks
* CVE-2021-30530: Out of bounds memory access in WebAudio
* CVE-2021-30531: Insufficient policy enforcement in Content Security Policy
* CVE-2021-30532: Insufficient policy enforcement in Content Security Policy
* CVE-2021-30533: Insufficient policy enforcement in PopupBlocker
* CVE-2021-30534: Insufficient policy enforcement in iFrameSandbox
* CVE-2021-30535: Double free in ICU
* CVE-2021-21212: Insufficient data validation in networking
* CVE-2021-30536: Out of bounds read in V8
* CVE-2021-30537: Insufficient policy enforcement in cookies
* CVE-2021-30538: Insufficient policy enforcement in content security policy
* CVE-2021-30539: Insufficient policy enforcement in content security policy
* CVE-2021-30540: Incorrect security UI in payments
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186458">SUSE bug 1186458</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21212/">CVE-2021-21212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30521/">CVE-2021-30521</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30522/">CVE-2021-30522</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30523/">CVE-2021-30523</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30524/">CVE-2021-30524</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30525/">CVE-2021-30525</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30526/">CVE-2021-30526</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30527/">CVE-2021-30527</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30528/">CVE-2021-30528</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30529/">CVE-2021-30529</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30530/">CVE-2021-30530</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30531/">CVE-2021-30531</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30532/">CVE-2021-30532</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30533/">CVE-2021-30533</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30534/">CVE-2021-30534</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30535/">CVE-2021-30535</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30536/">CVE-2021-30536</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30537/">CVE-2021-30537</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30538/">CVE-2021-30538</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30539/">CVE-2021-30539</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30540/">CVE-2021-30540</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009511074" comment="chromedriver-91.0.4472.77-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009511075" comment="chromium-91.0.4472.77-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52122" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187141" ref_url="https://bugzilla.suse.com/1187141" source="BUGZILLA"/>
		<reference ref_id="1187481" ref_url="https://bugzilla.suse.com/1187481" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30544" ref_url="https://www.suse.com/security/cve/CVE-2021-30544/" source="CVE"/>
		<reference ref_id="CVE-2021-30545" ref_url="https://www.suse.com/security/cve/CVE-2021-30545/" source="CVE"/>
		<reference ref_id="CVE-2021-30546" ref_url="https://www.suse.com/security/cve/CVE-2021-30546/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-30548" ref_url="https://www.suse.com/security/cve/CVE-2021-30548/" source="CVE"/>
		<reference ref_id="CVE-2021-30549" ref_url="https://www.suse.com/security/cve/CVE-2021-30549/" source="CVE"/>
		<reference ref_id="CVE-2021-30550" ref_url="https://www.suse.com/security/cve/CVE-2021-30550/" source="CVE"/>
		<reference ref_id="CVE-2021-30551" ref_url="https://www.suse.com/security/cve/CVE-2021-30551/" source="CVE"/>
		<reference ref_id="CVE-2021-30552" ref_url="https://www.suse.com/security/cve/CVE-2021-30552/" source="CVE"/>
		<reference ref_id="CVE-2021-30553" ref_url="https://www.suse.com/security/cve/CVE-2021-30553/" source="CVE"/>
		<reference ref_id="CVE-2021-30554" ref_url="https://www.suse.com/security/cve/CVE-2021-30554/" source="CVE"/>
		<reference ref_id="CVE-2021-30555" ref_url="https://www.suse.com/security/cve/CVE-2021-30555/" source="CVE"/>
		<reference ref_id="CVE-2021-30556" ref_url="https://www.suse.com/security/cve/CVE-2021-30556/" source="CVE"/>
		<reference ref_id="CVE-2021-30557" ref_url="https://www.suse.com/security/cve/CVE-2021-30557/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 91.0.4472.114 (boo#1187481)

* CVE-2021-30554: Use after free in WebGL
* CVE-2021-30555: Use after free in Sharing
* CVE-2021-30556: Use after free in WebAudio
* CVE-2021-30557: Use after free in TabGroups
* CVE-2021-30544: Use after free in BFCache
* CVE-2021-30545: Use after free in Extensions
* CVE-2021-30546: Use after free in Autofill
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-30548: Use after free in Loader
* CVE-2021-30549: Use after free in Spell check
* CVE-2021-30550: Use after free in Accessibility
* CVE-2021-30551: Type Confusion in V8
* CVE-2021-30552: Use after free in Extensions
* CVE-2021-30553: Use after free in Network service
* Fix use-after-free in SendTabToSelfSubMenuModel
* Destroy system-token NSSCertDatabase on the IO thread
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187481">SUSE bug 1187481</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30544/">CVE-2021-30544</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30545/">CVE-2021-30545</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30546/">CVE-2021-30546</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30548/">CVE-2021-30548</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30549/">CVE-2021-30549</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30550/">CVE-2021-30550</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30551/">CVE-2021-30551</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30552/">CVE-2021-30552</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30553/">CVE-2021-30553</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30554/">CVE-2021-30554</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30555/">CVE-2021-30555</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30556/">CVE-2021-30556</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30557/">CVE-2021-30557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615935" comment="chromedriver-91.0.4472.114-bp153.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615936" comment="chromium-91.0.4472.114-bp153.2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52123" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-30544" ref_url="https://www.suse.com/security/cve/CVE-2021-30544/" source="CVE"/>
		<reference ref_id="CVE-2021-30545" ref_url="https://www.suse.com/security/cve/CVE-2021-30545/" source="CVE"/>
		<reference ref_id="CVE-2021-30546" ref_url="https://www.suse.com/security/cve/CVE-2021-30546/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="CVE-2021-30548" ref_url="https://www.suse.com/security/cve/CVE-2021-30548/" source="CVE"/>
		<reference ref_id="CVE-2021-30549" ref_url="https://www.suse.com/security/cve/CVE-2021-30549/" source="CVE"/>
		<reference ref_id="CVE-2021-30550" ref_url="https://www.suse.com/security/cve/CVE-2021-30550/" source="CVE"/>
		<reference ref_id="CVE-2021-30551" ref_url="https://www.suse.com/security/cve/CVE-2021-30551/" source="CVE"/>
		<reference ref_id="CVE-2021-30552" ref_url="https://www.suse.com/security/cve/CVE-2021-30552/" source="CVE"/>
		<reference ref_id="CVE-2021-30553" ref_url="https://www.suse.com/security/cve/CVE-2021-30553/" source="CVE"/>
		<reference ref_id="CVE-2021-30554" ref_url="https://www.suse.com/security/cve/CVE-2021-30554/" source="CVE"/>
		<reference ref_id="CVE-2021-30555" ref_url="https://www.suse.com/security/cve/CVE-2021-30555/" source="CVE"/>
		<reference ref_id="CVE-2021-30556" ref_url="https://www.suse.com/security/cve/CVE-2021-30556/" source="CVE"/>
		<reference ref_id="CVE-2021-30557" ref_url="https://www.suse.com/security/cve/CVE-2021-30557/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to version 77.0.4054.146

  - CHR-8458 Update chromium on desktop-stable-91-4054 to 91.0.4472.114
  - DNA-92171 Create active linkdiscovery service
  - DNA-92388 Fix and unskip WorkspacesEmoji.testChooseEmojiAsWorkspaceIcon when possible
  - DNA-93101 Tabs are being snoozed when tab snoozing is disabled
  - DNA-93386 Update pinboard view when item changes
  - DNA-93448 Make browser ready for Developer release
  - DNA-93491 Fix failing tests after enabling #pinboard flag
  - DNA-93498 Add additional music services
  - DNA-93503 Blank popup on clicking toolbar icon with popup open
  - DNA-93561 Do not allow zoom different from 100% in Pinboard popup
  - DNA-93637 ctrl+9 shortcut is inconsistent with other browsers
  - DNA-93644 Create route for `import open tabs` to `pinboard`
  - DNA-93664 Adapt popup to design
  - DNA-93702 Turn on flags on developer
  - DNA-93737 [Pinboard] Remove Mock API
  - DNA-93745 Unable to open the popup after opening it several times
  - DNA-93776 Popup closes and reopens when clicking the toolbar button
  - DNA-93786 DCHECK after opening popup
  - DNA-93802 Crash at views::Widget::GetNativeView() const
  - DNA-93810 Add pinboard icon to sidebar
  - DNA-93825 Add pinboard to Opera menu
  - DNA-93833 [Player] Implement seeking for new services
  - DNA-93845 Do not log output of snapcraft on console
  - DNA-93864 Create feature flag for start page sync banner
  - DNA-93865 Implement start page banner
  - DNA-93867 Use version from package instead of repository
  - DNA-93878 [Player] Crash when current player service becomes
    unavailable when user location changes
  - DNA-93953 ‘Send image to Pinboard’ has the wrong position
    in the context menu
  - DNA-93987 Disable zooming popup contents like in other popups
  - DNA-93989 Change internal URL to opera://pinboards
  - DNA-93990 Update strings to reflect new standards
  - DNA-93992 Add Pinboards to Opera settings
  - DNA-93993 Pinboard translations from Master
  - DNA-94011 Enable feature flags for Reborn 5 on stable
  - DNA-94019 Add a direct link to settings
  - DNA-94088 Internal pages provoke not saving other pages to
    the Pinboard
  - DNA-94111 [O77] Sidebar setup does not open
  - DNA-94139 Crash at 
    opera::(anonymous namespace)::PinboardPopupWebView::RemovedFromWidget()
- The update to chromium 91.0.4472.114 fixes following issues:
  CVE-2021-30554, CVE-2021-30555, CVE-2021-30556, CVE-2021-30557
  CVE-2021-30544, CVE-2021-30545, CVE-2021-30546, CVE-2021-30547, 
  CVE-2021-30548, CVE-2021-30549, CVE-2021-30550, CVE-2021-30551,
  CVE-2021-30552, CVE-2021-30553
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-01"/>
	<updated date="2021-07-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30544/">CVE-2021-30544</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30545/">CVE-2021-30545</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30546/">CVE-2021-30546</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30548/">CVE-2021-30548</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30549/">CVE-2021-30549</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30550/">CVE-2021-30550</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30551/">CVE-2021-30551</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30552/">CVE-2021-30552</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30553/">CVE-2021-30553</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30554/">CVE-2021-30554</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30555/">CVE-2021-30555</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30556/">CVE-2021-30556</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30557/">CVE-2021-30557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694940" comment="opera-77.0.4054.146-lp153.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52124" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182918" ref_url="https://bugzilla.suse.com/1182918" source="BUGZILLA"/>
		<reference ref_id="1186361" ref_url="https://bugzilla.suse.com/1186361" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2145" ref_url="https://www.suse.com/security/cve/CVE-2021-2145/" source="CVE"/>
		<reference ref_id="CVE-2021-2250" ref_url="https://www.suse.com/security/cve/CVE-2021-2250/" source="CVE"/>
		<reference ref_id="CVE-2021-2264" ref_url="https://www.suse.com/security/cve/CVE-2021-2264/" source="CVE"/>
		<reference ref_id="CVE-2021-2266" ref_url="https://www.suse.com/security/cve/CVE-2021-2266/" source="CVE"/>
		<reference ref_id="CVE-2021-2279" ref_url="https://www.suse.com/security/cve/CVE-2021-2279/" source="CVE"/>
		<reference ref_id="CVE-2021-2280" ref_url="https://www.suse.com/security/cve/CVE-2021-2280/" source="CVE"/>
		<reference ref_id="CVE-2021-2281" ref_url="https://www.suse.com/security/cve/CVE-2021-2281/" source="CVE"/>
		<reference ref_id="CVE-2021-2282" ref_url="https://www.suse.com/security/cve/CVE-2021-2282/" source="CVE"/>
		<reference ref_id="CVE-2021-2283" ref_url="https://www.suse.com/security/cve/CVE-2021-2283/" source="CVE"/>
		<reference ref_id="CVE-2021-2284" ref_url="https://www.suse.com/security/cve/CVE-2021-2284/" source="CVE"/>
		<reference ref_id="CVE-2021-2285" ref_url="https://www.suse.com/security/cve/CVE-2021-2285/" source="CVE"/>
		<reference ref_id="CVE-2021-2286" ref_url="https://www.suse.com/security/cve/CVE-2021-2286/" source="CVE"/>
		<reference ref_id="CVE-2021-2287" ref_url="https://www.suse.com/security/cve/CVE-2021-2287/" source="CVE"/>
		<reference ref_id="CVE-2021-2291" ref_url="https://www.suse.com/security/cve/CVE-2021-2291/" source="CVE"/>
		<reference ref_id="CVE-2021-2296" ref_url="https://www.suse.com/security/cve/CVE-2021-2296/" source="CVE"/>
		<reference ref_id="CVE-2021-2297" ref_url="https://www.suse.com/security/cve/CVE-2021-2297/" source="CVE"/>
		<reference ref_id="CVE-2021-2306" ref_url="https://www.suse.com/security/cve/CVE-2021-2306/" source="CVE"/>
		<reference ref_id="CVE-2021-2309" ref_url="https://www.suse.com/security/cve/CVE-2021-2309/" source="CVE"/>
		<reference ref_id="CVE-2021-2310" ref_url="https://www.suse.com/security/cve/CVE-2021-2310/" source="CVE"/>
		<reference ref_id="CVE-2021-2312" ref_url="https://www.suse.com/security/cve/CVE-2021-2312/" source="CVE"/>
		<reference ref_id="CVE-2021-25319" ref_url="https://www.suse.com/security/cve/CVE-2021-25319/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:0977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATNJPOC23AR5PQLUDKUL5FXOOPOM3VDD/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

- Update vboxdrv.sh per boo#1186361

Version bump to 6.1.22 (released April 29 2021 by Oracle)

- This is a maintenance release. The following items were fixed and/or added:
- VMM: Improved performance of 64-bit Windows and Solaris guests when Hyper-V is used on recent Windows 10 hosts
- VMM: Fixed frequent crashes of 64-bit Windows Vista and Server 2003 guests when Hyper-V is used
- GUI: Fixed regression where user was not able to save unset default shortcuts (bug #20305)
- Storage: Fixed regression in LsiLogic SAS controller emulation caused VM crash (bug #20323)
- Linux Guest Additions: Fixed issue when it was not possible to run executables from mounted share (bug #20320)
- Fixes for CVE-2021-2145 CVE-2021-2250 CVE-2021-2264 CVE-2021-2266 CVE-2021-2279 CVE-2021-2280
            CVE-2021-2281 CVE-2021-2282 CVE-2021-2283 CVE-2021-2284 CVE-2021-2285 CVE-2021-2286
            CVE-2021-2287 CVE-2021-2291 CVE-2021-2296 CVE-2021-2297 CVE-2021-2306 CVE-2021-2309
            CVE-2021-2310 CVE-2021-2312

- Improve autostart security boo#1182918. 		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-09"/>
	<updated date="2021-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182918">SUSE bug 1182918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186361">SUSE bug 1186361</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2145/">CVE-2021-2145</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2250/">CVE-2021-2250</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2264/">CVE-2021-2264</cve>
	<cve impact="important" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2266/">CVE-2021-2266</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2279/">CVE-2021-2279</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2280/">CVE-2021-2280</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2281/">CVE-2021-2281</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2282/">CVE-2021-2282</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2283/">CVE-2021-2283</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2284/">CVE-2021-2284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2285/">CVE-2021-2285</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2286/">CVE-2021-2286</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2287/">CVE-2021-2287</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2291/">CVE-2021-2291</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2296/">CVE-2021-2296</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2297/">CVE-2021-2297</cve>
	<cve impact="important" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2306/">CVE-2021-2306</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2309/">CVE-2021-2309</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2310/">CVE-2021-2310</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2312/">CVE-2021-2312</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25319/">CVE-2021-25319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624198" comment="python3-virtualbox-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624199" comment="virtualbox-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624200" comment="virtualbox-devel-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624201" comment="virtualbox-guest-desktop-icons-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624202" comment="virtualbox-guest-source-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624203" comment="virtualbox-guest-tools-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624204" comment="virtualbox-guest-x11-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624205" comment="virtualbox-host-source-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624206" comment="virtualbox-kmp-default-6.1.22_k5.3.18_59.5-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624207" comment="virtualbox-kmp-preempt-6.1.22_k5.3.18_59.5-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624208" comment="virtualbox-qt-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624209" comment="virtualbox-vnc-6.1.22-lp153.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624210" comment="virtualbox-websrv-6.1.22-lp153.2.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52125" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: change user to news before calling innupgrade to avoid a 'inn' to 'root' privilege escalation [boo#1182321] 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624300" comment="inn-2.6.2-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624301" comment="inn-devel-2.6.2-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624302" comment="mininews-2.6.2-bp153.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52126" version="1" class="patch">
	<metadata>
		<title>Security update for singularity (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186619" ref_url="https://bugzilla.suse.com/1186619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136/" source="CVE"/>
		<reference ref_id="CVE-2021-32635" ref_url="https://www.suse.com/security/cve/CVE-2021-32635/" source="CVE"/>
		<description>
This update for singularity fixes the following issues:

Update to version 3.7.4  (boo#1186619)

- Fix for CVE-2021-32635:  

  Due to incorrect use of a default URL, singularity action commands
  (run/shell/exec) specifying a container using a library:// URI will always
  attempt to retrieve the container from the default remote endpoint
  (cloud.sylabs.io) rather than the configured remote endpoint. An attacker may
  be able to push a malicious container to the default remote endpoint with a
  URI that is identical to the URI used by a victim with a non-default remote
  endpoint, thus executing the malicious container. 

- Disabled ppc64le builds as these are non pie builds and so not
  suiteable for the distribution in SLE and ppc64le is not relevant
  for openSUSE

Update to version 3.7.3

- Fix for CVE-2021-29136:

  A dependency used to extract docker/OCI image layers can be
  tricked into modifying host files by creating a malicious layer
  that has a symlink with the name '.' (or '/'), when running as root.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186619">SUSE bug 1186619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-32635/">CVE-2021-32635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624303" comment="singularity-3.7.4-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52127" version="1" class="patch">
	<metadata>
		<title>Security update for htmldoc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184424" ref_url="https://bugzilla.suse.com/1184424" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20308" ref_url="https://www.suse.com/security/cve/CVE-2021-20308/" source="CVE"/>
		<description>
This update for htmldoc fixes the following issues:

htmldoc was updated to version 1.9.12:

* Fixed buffer-overflow CVE-2021-20308 ( boo#1184424 )
* Fixed a crash bug with 'data:' URIs and EPUB output
* Fixed several other crash bugs
* Fixed JPEG error handling
* Fixed some minor issues
* Removed the bundled libjpeg, libpng, and zlib.

update to 1.9.11:

- Added high-resolution desktop icons for Linux.
- Updated the internal HTTP library to fix truncation of redirection URLs
- Fixed a regression in the handling of character entities for UTF-8 input
- The `--numbered` option did not work when the table-of-contents was disabled
- Fixed packaging issues on macOS and Windows
- Now ignore sRGB profile errors in PNG files
- The GUI would crash when saving
- Page comments are now allowed in `pre` text

update to 1.9.9:

- Added support for a `HTMLDOC.filename` META keyword that controls the filename
  reported in CGI mode; the default remains 'htmldoc.pdf' (Issue #367)
- Fixed a paragraph formatting issue with large inline images (Issue #369)
- Fixed a buffer underflow issue (Issue #370)
- Fixed PDF page numbers (Issue #371)
- Added support for a new `L` header/footer format (`$LETTERHEAD`), which
  inserts a letterhead image at its full size (Issue #372, Issue #373,
  Issue #375)
- Updated the build documentation (Issue #374)
- Refactored the PRE rendering code to work around compiler optimization bugs
- Added support for links with targets (Issue #351)
- Fixed a table rowspan + valign bug (Issue #360)
- Added support for data URIs (Issue #340)
- HTMLDOC no longer includes a PDF table of contents when converting a single
  web page (Issue #344)
- Updated the markdown support with external links, additional inline markup,
  and hard line breaks.
- Links in markdown text no longer render with a leading space as part of the
  link (Issue #346)
- Fixed a buffer underflow bug discovered by AddressSanitizer.
- Fixed a bug in UTF-8 support (Issue #348)
- PDF output now includes the base language of the input document(s)
- Optimized the loading of font widths (Issue #354)
- Optimized PDF page resources (Issue #356)
- Optimized the base memory used for font widths (Issue #357)
- Added proper `&amp;shy;` support (Issue #361)
- Title files can now be markdown.
- The GUI did not support EPUB output.
- Empty markdown table cells were not rendered in PDF or PostScript output.
- The automatically-generated title page now supports both 'docnumber' and
  'version' metadata.
- Added support for dc:subject and dc:language metadata in EPUB output from the
  HTML keywords and lang values.
- Added support for the subject and language metadata in markdown input.
- Fixed a buffer underflow bug (Issue #338)
- `htmldoc --help` now reports whether HTTPS URLs are supported (Issue #339)
- Fixed an issue with HTML title pages and EPUB output.
- Inline fixed-width text is no longer reduced in size automatically
- Optimized initialization of font width data (Issue #334)
- Fixed formatting bugs with aligned images (Issue #322, Issue #324)
- Fixed support for three digit '#RGB' color values (Issue #323)
- Fixed character set support for markdown metadata.
- Updated libpng to v1.6.34 (Issue #326)
- The makefiles did not use the CPPFLAGS value (Issue #328)
- Added Markdown table support.
- Fixed parsing of TBODY, TFOOT, and THEAD elements in HTML files.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184424">SUSE bug 1184424</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20308/">CVE-2021-20308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624304" comment="htmldoc-1.9.12-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52128" version="1" class="patch">
	<metadata>
		<title>Security update for tor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179331" ref_url="https://bugzilla.suse.com/1179331" source="BUGZILLA"/>
		<reference ref_id="1181244" ref_url="https://bugzilla.suse.com/1181244" source="BUGZILLA"/>
		<reference ref_id="1187322" ref_url="https://bugzilla.suse.com/1187322" source="BUGZILLA"/>
		<reference ref_id="1187323" ref_url="https://bugzilla.suse.com/1187323" source="BUGZILLA"/>
		<reference ref_id="1187324" ref_url="https://bugzilla.suse.com/1187324" source="BUGZILLA"/>
		<reference ref_id="1187325" ref_url="https://bugzilla.suse.com/1187325" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34548" ref_url="https://www.suse.com/security/cve/CVE-2021-34548/" source="CVE"/>
		<reference ref_id="CVE-2021-34549" ref_url="https://www.suse.com/security/cve/CVE-2021-34549/" source="CVE"/>
		<reference ref_id="CVE-2021-34550" ref_url="https://www.suse.com/security/cve/CVE-2021-34550/" source="CVE"/>
		<description>
This update for tor fixes the following issues:

tor 0.4.5.9

* Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322)
* Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
* Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324)
* Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)

tor 0.4.5.8

* https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
* allow Linux sandbox with Glibc 2.33
* several other minor features and bugfixes (see announcement)

- Fix logging issue due to systemd picking up stdout - boo#1181244
  Continue to log notices to syslog by default.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179331">SUSE bug 1179331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181244">SUSE bug 1181244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187322">SUSE bug 1187322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187323">SUSE bug 1187323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187324">SUSE bug 1187324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187325">SUSE bug 1187325</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34548/">CVE-2021-34548</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34549/">CVE-2021-34549</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34550/">CVE-2021-34550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624305" comment="tor-0.4.5.9-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52129" version="1" class="patch">
	<metadata>
		<title>Security update for prosody (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186027" ref_url="https://bugzilla.suse.com/1186027" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32917" ref_url="https://www.suse.com/security/cve/CVE-2021-32917/" source="CVE"/>
		<reference ref_id="CVE-2021-32918" ref_url="https://www.suse.com/security/cve/CVE-2021-32918/" source="CVE"/>
		<reference ref_id="CVE-2021-32919" ref_url="https://www.suse.com/security/cve/CVE-2021-32919/" source="CVE"/>
		<reference ref_id="CVE-2021-32920" ref_url="https://www.suse.com/security/cve/CVE-2021-32920/" source="CVE"/>
		<description>
This update for prosody fixes the following issues:

- Update to 0.11.9:
  * mod_limits, prosody.cfg.lua: Enable rate limits by default
  * certmanager: Disable renegotiation by default
  * mod_proxy65: Restrict access to local c2s connections by default
  * util.startup: Set more aggressive defaults for GC
  * mod_c2s, mod_s2s, mod_component, mod_bosh, mod_websockets: Set default stanza size limits
  * mod_authinternal{plain,hashed}: Use constant-time string comparison for secrets
  * mod_dialback: Remove dialback-without-dialback feature
  * mod_dialback: Use constant-time comparison with hmac
- Prosody XMPP server advisory 2021-05-12 (boo#1186027)
  * Including CVE-2021-32919, CVE-2021-32917, CVE-2021-32917, CVE-2021-32920, CVE-2021-32918
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186027">SUSE bug 1186027</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32917/">CVE-2021-32917</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32918/">CVE-2021-32918</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32919/">CVE-2021-32919</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32920/">CVE-2021-32920</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624306" comment="prosody-0.11.9-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52130" version="1" class="patch">
	<metadata>
		<title>Security update for libxls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179532" ref_url="https://bugzilla.suse.com/1179532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27819" ref_url="https://www.suse.com/security/cve/CVE-2020-27819/" source="CVE"/>
		<description>
This update for libxls fixes the following issues:

libxls was updated to release 1.6.2:

* Fix NULL pointer dereferences in the xls2csv tool [boo#1179532] [CVE-2020-27819]

Update to release 1.6.1

* Enabled decoding of non-Unicode character sets in older
  (BIFF5) XLS files.
* Improved string conversion performance in newer files.

update to 1.5.3:

* Allow truncated XLS files
* Fix long-standing 'extra column' bug #73
* Support for RSTRING records (rich-text cells in older
  BIFF5 files) tidyverse/readxl#611 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-08"/>
	<updated date="2021-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179532">SUSE bug 1179532</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27819/">CVE-2020-27819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624307" comment="libxls-devel-1.6.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624308" comment="libxls-tools-1.6.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624309" comment="libxlsreader8-1.6.2-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52131" version="1" class="patch">
	<metadata>
		<title>Security update for abcm2ps (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197355" ref_url="https://bugzilla.suse.com/1197355" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32434" ref_url="https://www.suse.com/security/cve/CVE-2021-32434/" source="CVE"/>
		<reference ref_id="CVE-2021-32435" ref_url="https://www.suse.com/security/cve/CVE-2021-32435/" source="CVE"/>
		<reference ref_id="CVE-2021-32436" ref_url="https://www.suse.com/security/cve/CVE-2021-32436/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ECLDK4M5WWVFFEXTUWXNEHKC3U2NNPCQ/" source="SUSE-SU"/>
		<description>
This update for abcm2ps fixes the following issues:

Update to 8.14.13:

* fix: don't start/stop slurs above/below decorations
* fix: crash when too many notes in a grace note sequence (#102)
* fix: crash when too big value in M: (#103)
* fix: loop or crash when too big width of y (space) (#104)
* fix: bad font definition with SVG output when spaces in font name
* fix: bad check of note length again (#106)
* fix: handle %%staffscale at the global level (#108)
* fix: bad vertical offset of lyrics when mysic line starts with empty staves

Update to 8.14.12:

Fixes:

* crash when '%%break 1' and no measure bar in the tune
* crash when duplicated voice ending on %%staves with repeat variant
* crash when voice duplication with symbols without width
* crash or bad output when null value in %%scale
* problem when only bars in 2 voices followed %%staves of the second voice only
* crash when tuplet error in grace note sequence
* crash when grace note with empty tuplet
* crash when many broken rhythms after a single grace note
* access outside the deco array when error in U:
* crash when !xstem! with no note in the previous voice
* crash on tuplet without any note/rest
* crash when grace notes at end of line and voice overlay
* crash when !trem2! at start of a grace note sequence
* crash when wrong duration in 2 voice overlays and bad ties
* crash when accidental without a note at start of line after K: (CVE-2021-32435)
* array overflow when wrong duration in voice overlay (CVE-2021-32434, CVE-2021-32436)
* loss of left margin after first page since previous commit
* no respect of %%leftmargin with -E or -g
* bad placement of chord symbols when in a music line with only invisible rests

Syntax:

* Accept and remove one or two '%'s at start of all %%beginxxx lines

Generation:

* Move the CSS from XHTML to SVG

Update to 8.14.11:

* fix: error ''staffwidth' too small' when generating sample3.abc

Update to 8.14.10:

* fix: bad glyph when defined by SVG containing 'v' in
* fix: bad check of note length since commit 191fa55
* fix: memory corruption when error in %%staves/%%score
* fix: crash when too big note duration
* fix: crash when staff width too small

Update to 8.14.9:

* fix: bad natural accidental when %%MIDI temperamentequal

Update to 8.14.8:

* fix: no respect the width in %%staffbreak
* fix: don't draw a staff when only %%staffbreak inside
* fix: bad repeat bracket when continued on next line, line starting by a bar
* fix: bad tuplet bracket again when at end of a voice overlay sequence
* fix: bad tuplet bracket when at end of a voice overlay sequence
* handle '%%MIDI temperamentequal '
* accept '^1' and '_1' as microtone accidentals
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197355">SUSE bug 1197355</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32434/">CVE-2021-32434</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32435/">CVE-2021-32435</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32436/">CVE-2021-32436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677850" comment="abcm2ps-8.14.13-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52132" version="1" class="patch">
	<metadata>
		<title>Security update for pcmanfm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1039140" ref_url="https://bugzilla.suse.com/1039140" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8934" ref_url="https://www.suse.com/security/cve/CVE-2017-8934/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10001-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSBBJGG6SXZDO2WPKT3GU6PVN5BSE42U/" source="SUSE-SU"/>
		<description>
This update for pcmanfm fixes the following issues:

update to 1.3.2:

* Fixed case when some keyboard shortcuts stopped working:
  Alt+Home, Alt+Up
* Fixed sytem reboot delayed for 90 seconds in some cases

new upstream release of pcmanfm 1.3.1 

* fixed crash on reload while directory changes
* changed size of large thumbnails to 512
* added application/gzip to archivers.list
* added image/x-compressed-xcf to archivers.list
* allowed bigger sizes of icons and thumbnails

new upstream release of pcmanfm 1.3.0

* Fixed potential access violation, use runtime user dir instead
  of tmp diri for single instance socket.
  boo#1039140 CVE-2017-8934
* Fixed an issue with losing icons on desktop, when file name
  has a ‘[‘ char.
* Added a missing tooltip for ‘New Window’ toolbar button.
* Fixed an issue when single instance socket directory did not
  exist
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039140">SUSE bug 1039140</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8934/">CVE-2017-8934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694941" comment="pcmanfm-1.3.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694942" comment="pcmanfm-devel-1.3.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694943" comment="pcmanfm-lang-1.3.2-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52133" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199893" ref_url="https://bugzilla.suse.com/1199893" source="BUGZILLA"/>
		<reference ref_id="1200139" ref_url="https://bugzilla.suse.com/1200139" source="BUGZILLA"/>
		<reference ref_id="1200423" ref_url="https://bugzilla.suse.com/1200423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1853" ref_url="https://www.suse.com/security/cve/CVE-2022-1853/" source="CVE"/>
		<reference ref_id="CVE-2022-1854" ref_url="https://www.suse.com/security/cve/CVE-2022-1854/" source="CVE"/>
		<reference ref_id="CVE-2022-1855" ref_url="https://www.suse.com/security/cve/CVE-2022-1855/" source="CVE"/>
		<reference ref_id="CVE-2022-1856" ref_url="https://www.suse.com/security/cve/CVE-2022-1856/" source="CVE"/>
		<reference ref_id="CVE-2022-1857" ref_url="https://www.suse.com/security/cve/CVE-2022-1857/" source="CVE"/>
		<reference ref_id="CVE-2022-1858" ref_url="https://www.suse.com/security/cve/CVE-2022-1858/" source="CVE"/>
		<reference ref_id="CVE-2022-1859" ref_url="https://www.suse.com/security/cve/CVE-2022-1859/" source="CVE"/>
		<reference ref_id="CVE-2022-1860" ref_url="https://www.suse.com/security/cve/CVE-2022-1860/" source="CVE"/>
		<reference ref_id="CVE-2022-1861" ref_url="https://www.suse.com/security/cve/CVE-2022-1861/" source="CVE"/>
		<reference ref_id="CVE-2022-1862" ref_url="https://www.suse.com/security/cve/CVE-2022-1862/" source="CVE"/>
		<reference ref_id="CVE-2022-1863" ref_url="https://www.suse.com/security/cve/CVE-2022-1863/" source="CVE"/>
		<reference ref_id="CVE-2022-1864" ref_url="https://www.suse.com/security/cve/CVE-2022-1864/" source="CVE"/>
		<reference ref_id="CVE-2022-1865" ref_url="https://www.suse.com/security/cve/CVE-2022-1865/" source="CVE"/>
		<reference ref_id="CVE-2022-1866" ref_url="https://www.suse.com/security/cve/CVE-2022-1866/" source="CVE"/>
		<reference ref_id="CVE-2022-1867" ref_url="https://www.suse.com/security/cve/CVE-2022-1867/" source="CVE"/>
		<reference ref_id="CVE-2022-1868" ref_url="https://www.suse.com/security/cve/CVE-2022-1868/" source="CVE"/>
		<reference ref_id="CVE-2022-1869" ref_url="https://www.suse.com/security/cve/CVE-2022-1869/" source="CVE"/>
		<reference ref_id="CVE-2022-1870" ref_url="https://www.suse.com/security/cve/CVE-2022-1870/" source="CVE"/>
		<reference ref_id="CVE-2022-1871" ref_url="https://www.suse.com/security/cve/CVE-2022-1871/" source="CVE"/>
		<reference ref_id="CVE-2022-1872" ref_url="https://www.suse.com/security/cve/CVE-2022-1872/" source="CVE"/>
		<reference ref_id="CVE-2022-1873" ref_url="https://www.suse.com/security/cve/CVE-2022-1873/" source="CVE"/>
		<reference ref_id="CVE-2022-1874" ref_url="https://www.suse.com/security/cve/CVE-2022-1874/" source="CVE"/>
		<reference ref_id="CVE-2022-1875" ref_url="https://www.suse.com/security/cve/CVE-2022-1875/" source="CVE"/>
		<reference ref_id="CVE-2022-1876" ref_url="https://www.suse.com/security/cve/CVE-2022-1876/" source="CVE"/>
		<reference ref_id="CVE-2022-2007" ref_url="https://www.suse.com/security/cve/CVE-2022-2007/" source="CVE"/>
		<reference ref_id="CVE-2022-2008" ref_url="https://www.suse.com/security/cve/CVE-2022-2008/" source="CVE"/>
		<reference ref_id="CVE-2022-2010" ref_url="https://www.suse.com/security/cve/CVE-2022-2010/" source="CVE"/>
		<reference ref_id="CVE-2022-2011" ref_url="https://www.suse.com/security/cve/CVE-2022-2011/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10009-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RUXRSXC3TACZ74MCVMECNI7P2X6JM2NF/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 102.0.5005.115 (boo#1200423)
  * CVE-2022-2007: Use after free in WebGPU
  * CVE-2022-2008: Out of bounds memory access in WebGL
  * CVE-2022-2010: Out of bounds read in compositing
  * CVE-2022-2011: Use after free in ANGLE

Chromium 102.0.5001.61 (boo#1199893)

* CVE-2022-1853: Use after free in Indexed DB
* CVE-2022-1854: Use after free in ANGLE
* CVE-2022-1855: Use after free in Messaging
* CVE-2022-1856: Use after free in User Education
* CVE-2022-1857: Insufficient policy enforcement in File System API
* CVE-2022-1858: Out of bounds read in DevTools
* CVE-2022-1859: Use after free in Performance Manager
* CVE-2022-1860: Use after free in UI Foundations
* CVE-2022-1861: Use after free in Sharing
* CVE-2022-1862: Inappropriate implementation in Extensions
* CVE-2022-1863: Use after free in Tab Groups
* CVE-2022-1864: Use after free in WebApp Installs
* CVE-2022-1865: Use after free in Bookmarks
* CVE-2022-1866: Use after free in Tablet Mode
* CVE-2022-1867: Insufficient validation of untrusted input in Data Transfer
* CVE-2022-1868: Inappropriate implementation in Extensions API
* CVE-2022-1869: Type Confusion in V8
* CVE-2022-1870: Use after free in App Service
* CVE-2022-1871: Insufficient policy enforcement in File System API
* CVE-2022-1872: Insufficient policy enforcement in Extensions API
* CVE-2022-1873: Insufficient policy enforcement in COOP
* CVE-2022-1874: Insufficient policy enforcement in Safe Browsing
* CVE-2022-1875: Inappropriate implementation in PDF
* CVE-2022-1876: Heap buffer overflow in DevTools
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-15"/>
	<updated date="2022-06-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1199893">SUSE bug 1199893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200139">SUSE bug 1200139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200423">SUSE bug 1200423</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1853/">CVE-2022-1853</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1854/">CVE-2022-1854</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1855/">CVE-2022-1855</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1856/">CVE-2022-1856</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1857/">CVE-2022-1857</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1858/">CVE-2022-1858</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1859/">CVE-2022-1859</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1860/">CVE-2022-1860</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1861/">CVE-2022-1861</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1862/">CVE-2022-1862</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1863/">CVE-2022-1863</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1864/">CVE-2022-1864</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1865/">CVE-2022-1865</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1866/">CVE-2022-1866</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1867/">CVE-2022-1867</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1868/">CVE-2022-1868</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1869/">CVE-2022-1869</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1870/">CVE-2022-1870</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1871/">CVE-2022-1871</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1872/">CVE-2022-1872</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1873/">CVE-2022-1873</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1874/">CVE-2022-1874</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1875/">CVE-2022-1875</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1876/">CVE-2022-1876</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2007/">CVE-2022-2007</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2008/">CVE-2022-2008</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2010/">CVE-2022-2010</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2011/">CVE-2022-2011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694944" comment="chromedriver-102.0.5005.115-bp153.2.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694945" comment="chromium-102.0.5005.115-bp153.2.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52134" version="1" class="patch">
	<metadata>
		<title>Security update for tensorflow2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1173128" ref_url="https://bugzilla.suse.com/1173128" source="BUGZILLA"/>
		<reference ref_id="1173314" ref_url="https://bugzilla.suse.com/1173314" source="BUGZILLA"/>
		<reference ref_id="1178287" ref_url="https://bugzilla.suse.com/1178287" source="BUGZILLA"/>
		<reference ref_id="1178564" ref_url="https://bugzilla.suse.com/1178564" source="BUGZILLA"/>
		<reference ref_id="1179455" ref_url="https://bugzilla.suse.com/1179455" source="BUGZILLA"/>
		<reference ref_id="1181864" ref_url="https://bugzilla.suse.com/1181864" source="BUGZILLA"/>
		<reference ref_id="1186860" ref_url="https://bugzilla.suse.com/1186860" source="BUGZILLA"/>
		<reference ref_id="1189423" ref_url="https://bugzilla.suse.com/1189423" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26266" ref_url="https://www.suse.com/security/cve/CVE-2020-26266/" source="CVE"/>
		<reference ref_id="CVE-2020-26267" ref_url="https://www.suse.com/security/cve/CVE-2020-26267/" source="CVE"/>
		<reference ref_id="CVE-2020-26268" ref_url="https://www.suse.com/security/cve/CVE-2020-26268/" source="CVE"/>
		<reference ref_id="CVE-2020-26270" ref_url="https://www.suse.com/security/cve/CVE-2020-26270/" source="CVE"/>
		<reference ref_id="CVE-2020-26271" ref_url="https://www.suse.com/security/cve/CVE-2020-26271/" source="CVE"/>
		<reference ref_id="CVE-2021-37635" ref_url="https://www.suse.com/security/cve/CVE-2021-37635/" source="CVE"/>
		<reference ref_id="CVE-2021-37636" ref_url="https://www.suse.com/security/cve/CVE-2021-37636/" source="CVE"/>
		<reference ref_id="CVE-2021-37637" ref_url="https://www.suse.com/security/cve/CVE-2021-37637/" source="CVE"/>
		<reference ref_id="CVE-2021-37638" ref_url="https://www.suse.com/security/cve/CVE-2021-37638/" source="CVE"/>
		<reference ref_id="CVE-2021-37639" ref_url="https://www.suse.com/security/cve/CVE-2021-37639/" source="CVE"/>
		<reference ref_id="CVE-2021-37640" ref_url="https://www.suse.com/security/cve/CVE-2021-37640/" source="CVE"/>
		<reference ref_id="CVE-2021-37641" ref_url="https://www.suse.com/security/cve/CVE-2021-37641/" source="CVE"/>
		<reference ref_id="CVE-2021-37642" ref_url="https://www.suse.com/security/cve/CVE-2021-37642/" source="CVE"/>
		<reference ref_id="CVE-2021-37643" ref_url="https://www.suse.com/security/cve/CVE-2021-37643/" source="CVE"/>
		<reference ref_id="CVE-2021-37644" ref_url="https://www.suse.com/security/cve/CVE-2021-37644/" source="CVE"/>
		<reference ref_id="CVE-2021-37645" ref_url="https://www.suse.com/security/cve/CVE-2021-37645/" source="CVE"/>
		<reference ref_id="CVE-2021-37646" ref_url="https://www.suse.com/security/cve/CVE-2021-37646/" source="CVE"/>
		<reference ref_id="CVE-2021-37647" ref_url="https://www.suse.com/security/cve/CVE-2021-37647/" source="CVE"/>
		<reference ref_id="CVE-2021-37648" ref_url="https://www.suse.com/security/cve/CVE-2021-37648/" source="CVE"/>
		<reference ref_id="CVE-2021-37649" ref_url="https://www.suse.com/security/cve/CVE-2021-37649/" source="CVE"/>
		<reference ref_id="CVE-2021-37650" ref_url="https://www.suse.com/security/cve/CVE-2021-37650/" source="CVE"/>
		<reference ref_id="CVE-2021-37651" ref_url="https://www.suse.com/security/cve/CVE-2021-37651/" source="CVE"/>
		<reference ref_id="CVE-2021-37652" ref_url="https://www.suse.com/security/cve/CVE-2021-37652/" source="CVE"/>
		<reference ref_id="CVE-2021-37653" ref_url="https://www.suse.com/security/cve/CVE-2021-37653/" source="CVE"/>
		<reference ref_id="CVE-2021-37654" ref_url="https://www.suse.com/security/cve/CVE-2021-37654/" source="CVE"/>
		<reference ref_id="CVE-2021-37655" ref_url="https://www.suse.com/security/cve/CVE-2021-37655/" source="CVE"/>
		<reference ref_id="CVE-2021-37656" ref_url="https://www.suse.com/security/cve/CVE-2021-37656/" source="CVE"/>
		<reference ref_id="CVE-2021-37657" ref_url="https://www.suse.com/security/cve/CVE-2021-37657/" source="CVE"/>
		<reference ref_id="CVE-2021-37658" ref_url="https://www.suse.com/security/cve/CVE-2021-37658/" source="CVE"/>
		<reference ref_id="CVE-2021-37659" ref_url="https://www.suse.com/security/cve/CVE-2021-37659/" source="CVE"/>
		<reference ref_id="CVE-2021-37660" ref_url="https://www.suse.com/security/cve/CVE-2021-37660/" source="CVE"/>
		<reference ref_id="CVE-2021-37661" ref_url="https://www.suse.com/security/cve/CVE-2021-37661/" source="CVE"/>
		<reference ref_id="CVE-2021-37662" ref_url="https://www.suse.com/security/cve/CVE-2021-37662/" source="CVE"/>
		<reference ref_id="CVE-2021-37663" ref_url="https://www.suse.com/security/cve/CVE-2021-37663/" source="CVE"/>
		<reference ref_id="CVE-2021-37664" ref_url="https://www.suse.com/security/cve/CVE-2021-37664/" source="CVE"/>
		<reference ref_id="CVE-2021-37665" ref_url="https://www.suse.com/security/cve/CVE-2021-37665/" source="CVE"/>
		<reference ref_id="CVE-2021-37666" ref_url="https://www.suse.com/security/cve/CVE-2021-37666/" source="CVE"/>
		<reference ref_id="CVE-2021-37667" ref_url="https://www.suse.com/security/cve/CVE-2021-37667/" source="CVE"/>
		<reference ref_id="CVE-2021-37668" ref_url="https://www.suse.com/security/cve/CVE-2021-37668/" source="CVE"/>
		<reference ref_id="CVE-2021-37669" ref_url="https://www.suse.com/security/cve/CVE-2021-37669/" source="CVE"/>
		<reference ref_id="CVE-2021-37670" ref_url="https://www.suse.com/security/cve/CVE-2021-37670/" source="CVE"/>
		<reference ref_id="CVE-2021-37671" ref_url="https://www.suse.com/security/cve/CVE-2021-37671/" source="CVE"/>
		<reference ref_id="CVE-2021-37672" ref_url="https://www.suse.com/security/cve/CVE-2021-37672/" source="CVE"/>
		<reference ref_id="CVE-2021-37673" ref_url="https://www.suse.com/security/cve/CVE-2021-37673/" source="CVE"/>
		<reference ref_id="CVE-2021-37674" ref_url="https://www.suse.com/security/cve/CVE-2021-37674/" source="CVE"/>
		<reference ref_id="CVE-2021-37675" ref_url="https://www.suse.com/security/cve/CVE-2021-37675/" source="CVE"/>
		<reference ref_id="CVE-2021-37676" ref_url="https://www.suse.com/security/cve/CVE-2021-37676/" source="CVE"/>
		<reference ref_id="CVE-2021-37677" ref_url="https://www.suse.com/security/cve/CVE-2021-37677/" source="CVE"/>
		<reference ref_id="CVE-2021-37678" ref_url="https://www.suse.com/security/cve/CVE-2021-37678/" source="CVE"/>
		<reference ref_id="CVE-2021-37679" ref_url="https://www.suse.com/security/cve/CVE-2021-37679/" source="CVE"/>
		<reference ref_id="CVE-2021-37680" ref_url="https://www.suse.com/security/cve/CVE-2021-37680/" source="CVE"/>
		<reference ref_id="CVE-2021-37681" ref_url="https://www.suse.com/security/cve/CVE-2021-37681/" source="CVE"/>
		<reference ref_id="CVE-2021-37682" ref_url="https://www.suse.com/security/cve/CVE-2021-37682/" source="CVE"/>
		<reference ref_id="CVE-2021-37683" ref_url="https://www.suse.com/security/cve/CVE-2021-37683/" source="CVE"/>
		<reference ref_id="CVE-2021-37684" ref_url="https://www.suse.com/security/cve/CVE-2021-37684/" source="CVE"/>
		<reference ref_id="CVE-2021-37685" ref_url="https://www.suse.com/security/cve/CVE-2021-37685/" source="CVE"/>
		<reference ref_id="CVE-2021-37686" ref_url="https://www.suse.com/security/cve/CVE-2021-37686/" source="CVE"/>
		<reference ref_id="CVE-2021-37687" ref_url="https://www.suse.com/security/cve/CVE-2021-37687/" source="CVE"/>
		<reference ref_id="CVE-2021-37688" ref_url="https://www.suse.com/security/cve/CVE-2021-37688/" source="CVE"/>
		<reference ref_id="CVE-2021-37689" ref_url="https://www.suse.com/security/cve/CVE-2021-37689/" source="CVE"/>
		<reference ref_id="CVE-2021-37690" ref_url="https://www.suse.com/security/cve/CVE-2021-37690/" source="CVE"/>
		<reference ref_id="CVE-2021-37691" ref_url="https://www.suse.com/security/cve/CVE-2021-37691/" source="CVE"/>
		<reference ref_id="CVE-2021-37692" ref_url="https://www.suse.com/security/cve/CVE-2021-37692/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U25ZU2T5T4LOLSIYIMGC5PLU4PQQMJE5/" source="SUSE-SU"/>
		<description>

This update for tensorflow fixes the following issues:


Update to TF2 2.6.0 which fixes multiple CVEs (boo#1189423).

- Introduction of bazel6.3 and basel-skylib1.0.3 as build
  dependencies.
  The latter has been adapted to all a version in its package
  name (if %set_ver_suffix is set to 1). This allows multiple
  versions to exist for one product (not installed).
  NOTE: basel-skylib1.0.3 does not exist in oS:Factory:
  basel-skylib in oS:Factory - the base version - is 1.0.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-18"/>
	<updated date="2022-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173128">SUSE bug 1173128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173314">SUSE bug 1173314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178287">SUSE bug 1178287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178564">SUSE bug 1178564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179455">SUSE bug 1179455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181864">SUSE bug 1181864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186860">SUSE bug 1186860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189423">SUSE bug 1189423</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26266/">CVE-2020-26266</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26267/">CVE-2020-26267</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26268/">CVE-2020-26268</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26270/">CVE-2020-26270</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26271/">CVE-2020-26271</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37635/">CVE-2021-37635</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37636/">CVE-2021-37636</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37637/">CVE-2021-37637</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37638/">CVE-2021-37638</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37639/">CVE-2021-37639</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37640/">CVE-2021-37640</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37641/">CVE-2021-37641</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37642/">CVE-2021-37642</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37643/">CVE-2021-37643</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37644/">CVE-2021-37644</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37645/">CVE-2021-37645</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37646/">CVE-2021-37646</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37647/">CVE-2021-37647</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37648/">CVE-2021-37648</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37649/">CVE-2021-37649</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37650/">CVE-2021-37650</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37651/">CVE-2021-37651</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37652/">CVE-2021-37652</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37653/">CVE-2021-37653</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37654/">CVE-2021-37654</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-37655/">CVE-2021-37655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37656/">CVE-2021-37656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37657/">CVE-2021-37657</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37658/">CVE-2021-37658</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37659/">CVE-2021-37659</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37660/">CVE-2021-37660</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37661/">CVE-2021-37661</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37662/">CVE-2021-37662</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37663/">CVE-2021-37663</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37664/">CVE-2021-37664</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37665/">CVE-2021-37665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37666/">CVE-2021-37666</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37667/">CVE-2021-37667</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37668/">CVE-2021-37668</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37669/">CVE-2021-37669</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37670/">CVE-2021-37670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37671/">CVE-2021-37671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37672/">CVE-2021-37672</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37673/">CVE-2021-37673</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37674/">CVE-2021-37674</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37675/">CVE-2021-37675</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37676/">CVE-2021-37676</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37677/">CVE-2021-37677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37678/">CVE-2021-37678</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37679/">CVE-2021-37679</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37680/">CVE-2021-37680</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37681/">CVE-2021-37681</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37682/">CVE-2021-37682</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37683/">CVE-2021-37683</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37684/">CVE-2021-37684</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37685/">CVE-2021-37685</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37686/">CVE-2021-37686</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37687/">CVE-2021-37687</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37688/">CVE-2021-37688</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37689/">CVE-2021-37689</cve>
	<cve impact="important" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-37690/">CVE-2021-37690</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37691/">CVE-2021-37691</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37692/">CVE-2021-37692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694946" comment="bazel-skylib1.0.3-source-1.0.3-bp153.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694947" comment="bazel3.7-3.7.2-bp153.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694948" comment="libiomp5-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694949" comment="libiomp5-gnu-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694950" comment="libiomp5-gnu-openmpi2-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694951" comment="libtensorflow2-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694952" comment="libtensorflow2-gnu-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694953" comment="libtensorflow2-gnu-openmpi2-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694954" comment="libtensorflow_cc2-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694955" comment="libtensorflow_cc2-gnu-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694956" comment="libtensorflow_cc2-gnu-openmpi2-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694957" comment="libtensorflow_framework2-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694958" comment="libtensorflow_framework2-gnu-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694959" comment="libtensorflow_framework2-gnu-openmpi2-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694960" comment="tensorflow2-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694961" comment="tensorflow2-devel-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694962" comment="tensorflow2-doc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694963" comment="tensorflow2-gnu-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694964" comment="tensorflow2-gnu-openmpi2-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694965" comment="tensorflow2-lite-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694966" comment="tensorflow2-lite-devel-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694967" comment="tensorflow2_2_6_0-gnu-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694968" comment="tensorflow2_2_6_0-gnu-hpc-devel-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694969" comment="tensorflow2_2_6_0-gnu-hpc-doc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694970" comment="tensorflow2_2_6_0-gnu-openmpi2-hpc-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694971" comment="tensorflow2_2_6_0-gnu-openmpi2-hpc-devel-2.6.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694972" comment="tensorflow2_2_6_0-gnu-openmpi2-hpc-doc-2.6.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52135" version="1" class="patch">
	<metadata>
		<title>Security update for firejail (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199148" ref_url="https://bugzilla.suse.com/1199148" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31214" ref_url="https://www.suse.com/security/cve/CVE-2022-31214/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10015-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y44WP6HYFSMERMHYQLJJNHIWG34P4MU4/" source="SUSE-SU"/>
		<description>
This update for firejail fixes the following issues:

firejail was updated to version 0.9.70:

-CVE-2022-31214: - root escalation in --join logic (boo#1199148)
 Reported by Matthias Gerstner, working exploit code was provided to our
 development team. In the same time frame, the problem was independently
 reported by Birk Blechschmidt. Full working exploit code was also provided.

- feature: enable shell tab completion with --tab (#4936)
- feature: disable user profiles at compile time (#4990)
- feature: Allow resolution of .local names with avahi-daemon in the apparmor
- profile (#5088)
- feature: always log seccomp errors (#5110)
- feature: firecfg --guide, guided user configuration (#5111)
- feature: --oom, kernel OutOfMemory-killer (#5122)
- modif: --ids feature needs to be enabled at compile time (#5155)
- modif: --nettrace only available to root user
- rework: whitelist restructuring (#4985)
- rework: firemon, speed up and lots of fixes
- bugfix: --private-cwd not expanding macros, broken hyperrogue (#4910)
- bugfix: nogroups + wrc prints confusing messages (#4930 #4933)
- bugfix: openSUSE Leap - whitelist-run-common.inc (#4954)
- bugfix: fix printing in evince (#5011)
- bugfix: gcov: fix gcov functions always declared as dummy (#5028)
- bugfix: Stop warning on safe supplementary group clean (#5114)
- build: remove ultimately unused INSTALL and RANLIB check macros (#5133)
- build: mkdeb.sh.in: pass remaining arguments to ./configure (#5154)
- ci: replace centos (EOL) with almalinux (#4912)
- ci: fix --version not printing compile-time features (#5147)
- ci: print version after install &amp; fix apparmor support on build_apparmor (#5148)
- docs: Refer to firejail.config in configuration files (#4916)
- docs: firejail.config: add warning about allow-tray (#4946)
- docs: mention that the protocol command accumulates (#5043)
- docs: mention inconsistent homedir bug involving --private=dir (#5052)
- docs: mention capabilities(7) on --caps (#5078)
- new profiles: onionshare, onionshare-cli, opera-developer, songrec
- new profiles: node-gyp, npx, semver, ping-hardened
- removed profiles: nvm
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199148">SUSE bug 1199148</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31214/">CVE-2022-31214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694973" comment="firejail-0.9.70-bp153.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52136" version="1" class="patch">
	<metadata>
		<title>Security update for atheme (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1195989" ref_url="https://bugzilla.suse.com/1195989" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24976" ref_url="https://www.suse.com/security/cve/CVE-2022-24976/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GECJKZJVJ27JRBFZBJQLJBGGU22CP24T/" source="SUSE-SU"/>
		<description>
This update for atheme fixes the following issues:

atheme was updated to release 7.2.12:

* CVE-2022-24976: Fixed General authentication bypass in Atheme IRC services with InspIRCd 3 [boo#1195989]
* Track SASL login EID

Update to release 7.2.11

* Add a preliminary Turkish translation
* Add HMAC-MD5 verify-only support to crypto/pbkdf2v2
* modules/chanserv/akick: fix unload crash with akicks that
  have timeouts
* modules/nickserv/multimark: use IRC case canonicalisation
  for restored nicks
* modules/nickserv/multimark: forbid unloading due to the
  potential for data loss
* CA_ constants: include CA_EXEMPT (+e) where appropriate

Update to new upstream release 7.2.10.r2

* Fix potential NULL dereference in modules/crypto/posix.
* Bump E-Mail address maximum length to 254 characters.
* Use flags setter information in modules/chanserv/access &amp;
  modules/chanserv/flags.
* Fix issue where modules/misc/httpd was not closing its
  listening socket on deinit.
* Fix GroupServ data loss issue when a group was the founder of
  another group.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195989">SUSE bug 1195989</bugzilla>
	<cve impact="moderate" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24976/">CVE-2022-24976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694974" comment="atheme-7.2.12-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694975" comment="atheme-devel-7.2.12-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694976" comment="libathemecore1-7.2.12-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52137" version="1" class="patch">
	<metadata>
		<title>Security update for tor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200672" ref_url="https://bugzilla.suse.com/1200672" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33903" ref_url="https://www.suse.com/security/cve/CVE-2022-33903/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NKHAXM5C4XR2I62FUPOANDEWE7DEFBS6/" source="SUSE-SU"/>
		<description>
This update for tor fixes the following issues:

tor was updated to 0.4.7.8:

* Fix a scenario where RTT estimation can become wedged, seriously
  degrading congestion control performance on all circuits. This
  impacts clients, onion services, and relays, and can be triggered
  remotely by a malicious endpoint.
  (TROVE-2022-001, CVE-2022-33903, boo#1200672)
* Regenerate fallback directories generated on June 17, 2022.
* Update the geoip files to match the IPFire Location Database, as
  retrieved on 2022/06/17.
* Allow the rseq system call in the sandbox
* logging bug fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-22"/>
	<updated date="2022-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200672">SUSE bug 1200672</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33903/">CVE-2022-33903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698164" comment="tor-0.4.7.8-bp154.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52138" version="1" class="patch">
	<metadata>
		<title>Security update for chafa (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198965" ref_url="https://bugzilla.suse.com/1198965" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1507" ref_url="https://www.suse.com/security/cve/CVE-2022-1507/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PH2INCAGK5DAOZI6JFRHALBPZL6JQ4C/" source="SUSE-SU"/>
		<description>
This update for chafa fixes the following issues:

- CVE-2022-1507: Fix NULL pointer deref in gif_internal_decode_frame (boo#1198965)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-23"/>
	<updated date="2022-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198965">SUSE bug 1198965</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1507/">CVE-2022-1507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694978" comment="chafa-1.4.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694979" comment="chafa-devel-1.4.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694980" comment="chafa-doc-1.4.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694981" comment="libchafa0-1.4.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52139" version="1" class="patch">
	<metadata>
		<title>Security update for various openSUSE kernel module packages (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:10032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZLDS3QDKWQLQJITQ24HAOX6VKUI6ZXZB/" source="SUSE-SU"/>
		<description>

This update of various openSUSE kernel module packages fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-27"/>
	<updated date="2022-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009694982" comment="bbswitch-0.8-lp153.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694983" comment="bbswitch-kmp-default-0.8_k5.3.18_150300.59.76-lp153.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694984" comment="bbswitch-kmp-preempt-0.8_k5.3.18_150300.59.76-lp153.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694985" comment="mhvtl-1.62-lp153.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694986" comment="mhvtl-kmp-64kb-1.62_k5.3.18_150300.59.76-lp153.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694987" comment="mhvtl-kmp-default-1.62_k5.3.18_150300.59.76-lp153.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694988" comment="mhvtl-kmp-preempt-1.62_k5.3.18_150300.59.76-lp153.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694989" comment="openafs-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694990" comment="openafs-authlibs-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694991" comment="openafs-authlibs-devel-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694992" comment="openafs-client-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694993" comment="openafs-devel-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694994" comment="openafs-fuse_client-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694995" comment="openafs-kernel-source-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694996" comment="openafs-kmp-64kb-1.8.7_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694997" comment="openafs-kmp-default-1.8.7_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694998" comment="openafs-kmp-preempt-1.8.7_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009694999" comment="openafs-server-1.8.7-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695000" comment="pcfclock-0.44-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695001" comment="pcfclock-kmp-64kb-0.44_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695002" comment="pcfclock-kmp-default-0.44_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695003" comment="pcfclock-kmp-preempt-0.44_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695004" comment="rtl8812au-5.9.3.2+git20210427.6ef5d8f-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695005" comment="rtl8812au-kmp-64kb-5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695006" comment="rtl8812au-kmp-default-5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695007" comment="rtl8812au-kmp-preempt-5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695008" comment="rtw89-firmware-5.16~3.g38316db-lp153.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695009" comment="rtw89-kmp-64kb-5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695010" comment="rtw89-kmp-default-5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695011" comment="rtw89-kmp-preempt-5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695012" comment="rtw89-ueficert-5.16~3.g38316db-lp153.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695013" comment="v4l2loopback-autoload-0.12.5-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695014" comment="v4l2loopback-kmp-64kb-0.12.5_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695015" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695016" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695017" comment="v4l2loopback-utils-0.12.5-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695018" comment="vhba-kmp-64kb-20200106_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695019" comment="vhba-kmp-default-20200106_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695020" comment="vhba-kmp-preempt-20200106_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695021" comment="xtables-addons-3.18-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695022" comment="xtables-addons-kmp-64kb-3.18_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695023" comment="xtables-addons-kmp-default-3.18_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695024" comment="xtables-addons-kmp-preempt-3.18_k5.3.18_150300.59.76-lp153.2.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52140" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200783" ref_url="https://bugzilla.suse.com/1200783" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2156" ref_url="https://www.suse.com/security/cve/CVE-2022-2156/" source="CVE"/>
		<reference ref_id="CVE-2022-2157" ref_url="https://www.suse.com/security/cve/CVE-2022-2157/" source="CVE"/>
		<reference ref_id="CVE-2022-2158" ref_url="https://www.suse.com/security/cve/CVE-2022-2158/" source="CVE"/>
		<reference ref_id="CVE-2022-2160" ref_url="https://www.suse.com/security/cve/CVE-2022-2160/" source="CVE"/>
		<reference ref_id="CVE-2022-2161" ref_url="https://www.suse.com/security/cve/CVE-2022-2161/" source="CVE"/>
		<reference ref_id="CVE-2022-2162" ref_url="https://www.suse.com/security/cve/CVE-2022-2162/" source="CVE"/>
		<reference ref_id="CVE-2022-2163" ref_url="https://www.suse.com/security/cve/CVE-2022-2163/" source="CVE"/>
		<reference ref_id="CVE-2022-2164" ref_url="https://www.suse.com/security/cve/CVE-2022-2164/" source="CVE"/>
		<reference ref_id="CVE-2022-2165" ref_url="https://www.suse.com/security/cve/CVE-2022-2165/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUIIAMNE5ZGO2NZSXKZINOMI3IDGX2NA/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 103.0.5060.53 (boo#1200783)

* CVE-2022-2156: Use after free in Base
* CVE-2022-2157: Use after free in Interest groups
* CVE-2022-2158: Type Confusion in V8
* CVE-2022-2160: Insufficient policy enforcement in DevTools
* CVE-2022-2161: Use after free in WebApp Provider
* CVE-2022-2162: Insufficient policy enforcement in File System API
* CVE-2022-2163: Use after free in Cast UI and Toolbar
* CVE-2022-2164: Inappropriate implementation in Extensions API
* CVE-2022-2165: Insufficient data validation in URL formatting
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-29"/>
	<updated date="2022-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200783">SUSE bug 1200783</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2156/">CVE-2022-2156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2157/">CVE-2022-2157</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2158/">CVE-2022-2158</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2160/">CVE-2022-2160</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2161/">CVE-2022-2161</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2162/">CVE-2022-2162</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2163/">CVE-2022-2163</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2164/">CVE-2022-2164</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2165/">CVE-2022-2165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695025" comment="chromedriver-103.0.5060.53-bp153.2.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695026" comment="chromium-103.0.5060.53-bp153.2.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52141" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipython (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194936" ref_url="https://bugzilla.suse.com/1194936" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21699" ref_url="https://www.suse.com/security/cve/CVE-2022-21699/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTGOGG2ZEI7KLN4MVBRDQQ4FSIXPEKNL/" source="SUSE-SU"/>
		<description>
This update for python-ipython fixes the following issues:

- CVE-2022-21699: Confining executed process to have limited privileges. (boo#1194936). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194936">SUSE bug 1194936</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21699/">CVE-2022-21699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699762" comment="python3-ipython-7.13.0-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699763" comment="python3-ipython-iptest-7.13.0-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52142" version="1" class="patch">
	<metadata>
		<title>Security update for chafa (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201211" ref_url="https://bugzilla.suse.com/1201211" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2301" ref_url="https://www.suse.com/security/cve/CVE-2022-2301/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6MJ4FKDFLGENN5FLV6DJ2YONDN6D6EAG/" source="SUSE-SU"/>
		<description>
This update for chafa fixes the following issues:

- CVE-2022-2301: Fix buffer over-read (boo#1201211)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201211">SUSE bug 1201211</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2301/">CVE-2022-2301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699764" comment="chafa-1.4.1-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699765" comment="chafa-devel-1.4.1-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699766" comment="chafa-doc-1.4.1-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699767" comment="libchafa0-1.4.1-bp153.2.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52143" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201216" ref_url="https://bugzilla.suse.com/1201216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2294" ref_url="https://www.suse.com/security/cve/CVE-2022-2294/" source="CVE"/>
		<reference ref_id="CVE-2022-2295" ref_url="https://www.suse.com/security/cve/CVE-2022-2295/" source="CVE"/>
		<reference ref_id="CVE-2022-2296" ref_url="https://www.suse.com/security/cve/CVE-2022-2296/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TJ5LTW7LEHL5JFGRUX2J7S5CEEACPAUP/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 103.0.5060.114 (boo#1201216)

* CVE-2022-2294: Heap buffer overflow in WebRTC
* CVE-2022-2295: Type Confusion in V8
* CVE-2022-2296: Use after free in Chrome OS Shell

		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-13"/>
	<updated date="2022-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201216">SUSE bug 1201216</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2294/">CVE-2022-2294</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2295/">CVE-2022-2295</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2296/">CVE-2022-2296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700699" comment="chromedriver-103.0.5060.114-bp154.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700700" comment="chromium-103.0.5060.114-bp154.2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52144" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-2007" ref_url="https://www.suse.com/security/cve/CVE-2022-2007/" source="CVE"/>
		<reference ref_id="CVE-2022-2008" ref_url="https://www.suse.com/security/cve/CVE-2022-2008/" source="CVE"/>
		<reference ref_id="CVE-2022-2010" ref_url="https://www.suse.com/security/cve/CVE-2022-2010/" source="CVE"/>
		<reference ref_id="CVE-2022-2011" ref_url="https://www.suse.com/security/cve/CVE-2022-2011/" source="CVE"/>
		<reference ref_id="CVE-2022-2294" ref_url="https://www.suse.com/security/cve/CVE-2022-2294/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJUDCH46YEJXHUW2NNEMWI2TSQIO7ON2/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

opera was updated to 88.0.4412.74:

- DNA-100645 Cherry-pick CVE-2022-2294 onto stabilization branches

Update to 88.0.4412.53

  - DNA-99108 [Lin] Options on video pop out not possible to change
  - DNA-99832 On automatic video popout, close button should not
    stop video
  - DNA-99833 Allow turning on and off of each 'BABE' section from
    gear icon
  - DNA-99852 Default browser in Mac installer
  - DNA-99993 Crashes in AudioFileReaderTest,
    FFmpegAACBitstreamConverterTest
  - DNA-100045 iFrame Exception not unblocked with Acceptable Ads
  - DNA-100291 Update snapcraft uploading/releasing in scripts to
    use craft store

Changes in 88.0.4412.40

  - CHR-8905 Update chromium on desktop-stable-102-4412 to
    102.0.5005.115
  - DNA-99713 Sizing issues with video conferencing controls in
    PiP window
  - DNA-99831 Add 'back to tab' button like on video pop-out

- The update to chromium 102.0.5005.115 fixes following issues:  
  CVE-2022-2007, CVE-2022-2008, CVE-2022-2010, CVE-2022-2011

Changes in 88.0.4412.27

  - DNA-99725 Crash at opera::ModalDialogViews::Show()
  - DNA-99752 Do not allow to uncheck all lists for adBlock
  - DNA-99918 Enable #scrollable-tab-strip on desktop-stable-102-4412
  - DNA-99969 Promote O88 to stable

- Complete Opera 88.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-88/
  
Update to 87.0.4390.45

  - DNA-99478 Top Sites don’t always has big icon
  - DNA-99702 Enable Acceptable Ads for stable stream
  - DNA-99725 Crash at opera::ModalDialogViews::Show()
  - DNA-99752 Do not allow to uncheck all lists for adBlock

- Update to 87.0.4390.36
  - CHR-8883 Update chromium on desktop-stable-101-4390 to
    101.0.4951.67
  - DNA-99190 Investigate windows installer signature errors on win7
  - DNA-99502 Sidebar – API to open panels
  - DNA-99593 Report sad tab displayed counts per kind
  - DNA-99628 Personalized Speed Dial context menu issue fix
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-13"/>
	<updated date="2022-07-13"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2007/">CVE-2022-2007</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2008/">CVE-2022-2008</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2010/">CVE-2022-2010</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2011/">CVE-2022-2011</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2294/">CVE-2022-2294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699770" comment="opera-88.0.4412.74-lp154.2.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52145" version="1" class="patch">
	<metadata>
		<title>Security update for phpPgAdmin (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1162794" ref_url="https://bugzilla.suse.com/1162794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10784" ref_url="https://www.suse.com/security/cve/CVE-2019-10784/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YEBNCIRQOKETS4R7J5GXRP3TKF2YKFJ/" source="SUSE-SU"/>
		<description>
This update for phpPgAdmin fixes the following issues:

- CVE-2019-10784: Fixed improper source validation that could lead to CSRF (boo#1162794)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-25"/>
	<updated date="2022-07-25"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1162794">SUSE bug 1162794</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10784/">CVE-2019-10784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702113" comment="phpPgAdmin-7.13.0-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702114" comment="phpPgAdmin-apache-7.13.0-bp154.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52146" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201679" ref_url="https://bugzilla.suse.com/1201679" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2163" ref_url="https://www.suse.com/security/cve/CVE-2022-2163/" source="CVE"/>
		<reference ref_id="CVE-2022-2477" ref_url="https://www.suse.com/security/cve/CVE-2022-2477/" source="CVE"/>
		<reference ref_id="CVE-2022-2478" ref_url="https://www.suse.com/security/cve/CVE-2022-2478/" source="CVE"/>
		<reference ref_id="CVE-2022-2479" ref_url="https://www.suse.com/security/cve/CVE-2022-2479/" source="CVE"/>
		<reference ref_id="CVE-2022-2480" ref_url="https://www.suse.com/security/cve/CVE-2022-2480/" source="CVE"/>
		<reference ref_id="CVE-2022-2481" ref_url="https://www.suse.com/security/cve/CVE-2022-2481/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32RZRSVM5BTCD25ZWPF7FIV6VKPYNU5E/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium was updated to 103.0.5060.134 (boo#1201679):

* CVE-2022-2477 : Use after free in Guest View
* CVE-2022-2478 : Use after free in PDF
* CVE-2022-2479 : Insufficient validation of untrusted input in File
* CVE-2022-2480 : Use after free in Service Worker API
* CVE-2022-2481: Use after free in Views
* CVE-2022-2163: Use after free in Cast UI and Toolbar
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-01"/>
	<updated date="2022-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201679">SUSE bug 1201679</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2163/">CVE-2022-2163</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2477/">CVE-2022-2477</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2478/">CVE-2022-2478</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2479/">CVE-2022-2479</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2480/">CVE-2022-2480</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2481/">CVE-2022-2481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703506" comment="chromedriver-103.0.5060.134-bp154.2.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703507" comment="chromium-103.0.5060.134-bp154.2.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52147" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2022:10077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W4BTNNYQ76OHG26V7PSUGDZ5A7XAE7HM/" source="SUSE-SU"/>
		<description>
This update for seamonkey fixes the following issues:

update to SeaMonkey 2.53.13

* Updates to devtools.
* Updates to build configuration.
* Starting the switch from Python 2 to Python 3 in the build system.
* Removal of array comprehensions, legacy iterators and generators
  bug 1414340 and bug 1098412.
* Adding initial optional chaining and Promise.allSettled() support.
* SeaMonkey 2.53.13 uses the same backend as Firefox and contains
  the relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.13 shares most parts of the mail and news code with
  Thunderbird. Please read the Thunderbird 60.8.0 release notes for
  specific security fixes in this release.
* Additional important security fixes up to Current Firefox 91.11
  and Thunderbird 91.11 ESR plus many enhancements have been
  backported. We will continue to enhance SeaMonkey security in
  subsequent 2.53.x beta and release versions as fast as we are able
  to.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704219" comment="seamonkey-2.53.13-lp153.17.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704220" comment="seamonkey-dom-inspector-2.53.13-lp153.17.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704221" comment="seamonkey-irc-2.53.13-lp153.17.11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52148" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-2163" ref_url="https://www.suse.com/security/cve/CVE-2022-2163/" source="CVE"/>
		<reference ref_id="CVE-2022-2294" ref_url="https://www.suse.com/security/cve/CVE-2022-2294/" source="CVE"/>
		<reference ref_id="CVE-2022-2295" ref_url="https://www.suse.com/security/cve/CVE-2022-2295/" source="CVE"/>
		<reference ref_id="CVE-2022-2296" ref_url="https://www.suse.com/security/cve/CVE-2022-2296/" source="CVE"/>
		<reference ref_id="CVE-2022-2477" ref_url="https://www.suse.com/security/cve/CVE-2022-2477/" source="CVE"/>
		<reference ref_id="CVE-2022-2478" ref_url="https://www.suse.com/security/cve/CVE-2022-2478/" source="CVE"/>
		<reference ref_id="CVE-2022-2479" ref_url="https://www.suse.com/security/cve/CVE-2022-2479/" source="CVE"/>
		<reference ref_id="CVE-2022-2480" ref_url="https://www.suse.com/security/cve/CVE-2022-2480/" source="CVE"/>
		<reference ref_id="CVE-2022-2481" ref_url="https://www.suse.com/security/cve/CVE-2022-2481/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SBC3VMU74SRNP6PNL6PMNTJCIFN32DXR/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

opera was updated to 89.0.4447.71

  - CHR-8957 Update chromium on desktop-stable-103-4447 to
    103.0.5060.134
  - DNA-100492 authPrivate.storeCredentials should work with
    running auth session
  - DNA-100649 “Sign out” from settings doesn’t also sign out
    from auth
  - DNA-100653 VPN Badge popup – not working well with different
    page zoom being set in browser settings
  - DNA-100712 Wrong spacing on text to reset sync passphrase
    in settings
  - DNA-100799 VPN icon is “pro” on disconnected
  - DNA-100841 Remove Get Subscription and Get button from
    VPN pro settings
  - DNA-100883 Update missing translations from chromium
  - DNA-100899 Translation error in Turkish
  - DNA-100912 Unable to select pinboards when sync everything
    is enabled
  - DNA-100959 Use after move RecentSearchProvider::ExecuteWithDB
  - DNA-100960 Use after move
    CountryBlacklistServiceImpl::DownloadCountryBlacklist
  - DNA-100961 Use after move
    CategorizationDataCollection::Iterator::Iterator
  - DNA-100989 Crash at
    opera::EasyFileButton::SetThumbnail(gfx::ImageSkia const&amp;)

- The update to chromium 103.0.5060.134 fixes following issues:
  CVE-2022-2163, CVE-2022-2477, CVE-2022-2478, CVE-2022-2479
  CVE-2022-2480, CVE-2022-2481

opera was updated to 89.0.4447.51

  - DNA-99538 Typed content of address bar shared between tabs
  - DNA-100418 Set 360 so as search engine in China
  - DNA-100629 Launch Auth login when enabling sync while logged in
  - DNA-100776 Popup is too long if there are no services available

opera was updated to 89.0.4447.48

  - CHR-8940 Update chromium on desktop-stable-103-4447 to
    103.0.5060.114
  - DNA-100247 Make it possible to display hint when tab scrolling
    gets triggered
  - DNA-100482 Shopping corner icon availability
  - DNA-100575 Add unique IDs to all web element in opera account
    popup
  - DNA-100625 Opera account popup appears too high on Linux
  - DNA-100627 Enable #snap-from-panel on all stream
  - DNA-100636 DCHECK at suggestion_item.cc(484)
  - DNA-100685 Fix crash when attaching to tab strip scroll buttons
  - DNA-100693 Enable Sticky Site sidebar item to have notification
    bubble
  - DNA-100698 [AdBlock] Unhandled Disconnect list category:
    'emailaggressive'
  - DNA-100716 Misstype Settings 'Enhanced address bar'
  - DNA-100732 Fix &amp;amp; escaping in translated strings
  - DNA-100759 Crash when loading personal news in private window

- The update to chromium 103.0.5060.114 fixes following issues:
  CVE-2022-2294, CVE-2022-2295, CVE-2022-2296

opera was updated to 89.0.4447.38

  - DNA-100283 Translations for O89

- Complete Opera 89.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-89/

opera was updated to 89.0.4447.37

  - CHR-8929 Update chromium on desktop-stable-103-4447 to
    103.0.5060.66
  - DNA-99780 Crash at zmq::zmq_abort(char const*)
  - DNA-100377 New opera account popup doesn’t open on Linux
  - DNA-100589 Crash at base::internal::Invoker&lt;T&gt;::RunOnce
    (base::internal::BindStateBase*, scoped_refptr&lt;T&gt;&amp;&amp;)
  - DNA-100607 Sync “Sign in” button doesn’t work with Opera Account
    popup
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2163/">CVE-2022-2163</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2294/">CVE-2022-2294</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2295/">CVE-2022-2295</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2296/">CVE-2022-2296</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2477/">CVE-2022-2477</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2478/">CVE-2022-2478</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2479/">CVE-2022-2479</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2480/">CVE-2022-2480</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2481/">CVE-2022-2481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706665" comment="opera-89.0.4447.71-lp153.2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52149" version="1" class="patch">
	<metadata>
		<title>Security update for canna (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199280" ref_url="https://bugzilla.suse.com/1199280" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21950" ref_url="https://www.suse.com/security/cve/CVE-2022-21950/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMED26UTKOFQLW2ZTPZMKHK6XEJRXGHC/" source="SUSE-SU"/>
		<description>
This update for canna fixes the following issues:

- CVE-2022-21950: move UNIX socket dir from /tmp to /run to avoid
  local attackers being able to place bogus directories in its stead. Use
  systemd-tmpfiles for cleaning old sockets (boo#1199280).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199280">SUSE bug 1199280</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21950/">CVE-2022-21950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706747" comment="canna-3.7p3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706748" comment="canna-devel-3.7p3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706749" comment="canna-libs-3.7p3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706750" comment="canna-libs-32bit-3.7p3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706751" comment="canna-libs-64bit-3.7p3-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52150" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202075" ref_url="https://bugzilla.suse.com/1202075" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2603" ref_url="https://www.suse.com/security/cve/CVE-2022-2603/" source="CVE"/>
		<reference ref_id="CVE-2022-2604" ref_url="https://www.suse.com/security/cve/CVE-2022-2604/" source="CVE"/>
		<reference ref_id="CVE-2022-2605" ref_url="https://www.suse.com/security/cve/CVE-2022-2605/" source="CVE"/>
		<reference ref_id="CVE-2022-2606" ref_url="https://www.suse.com/security/cve/CVE-2022-2606/" source="CVE"/>
		<reference ref_id="CVE-2022-2607" ref_url="https://www.suse.com/security/cve/CVE-2022-2607/" source="CVE"/>
		<reference ref_id="CVE-2022-2608" ref_url="https://www.suse.com/security/cve/CVE-2022-2608/" source="CVE"/>
		<reference ref_id="CVE-2022-2609" ref_url="https://www.suse.com/security/cve/CVE-2022-2609/" source="CVE"/>
		<reference ref_id="CVE-2022-2610" ref_url="https://www.suse.com/security/cve/CVE-2022-2610/" source="CVE"/>
		<reference ref_id="CVE-2022-2611" ref_url="https://www.suse.com/security/cve/CVE-2022-2611/" source="CVE"/>
		<reference ref_id="CVE-2022-2612" ref_url="https://www.suse.com/security/cve/CVE-2022-2612/" source="CVE"/>
		<reference ref_id="CVE-2022-2613" ref_url="https://www.suse.com/security/cve/CVE-2022-2613/" source="CVE"/>
		<reference ref_id="CVE-2022-2614" ref_url="https://www.suse.com/security/cve/CVE-2022-2614/" source="CVE"/>
		<reference ref_id="CVE-2022-2615" ref_url="https://www.suse.com/security/cve/CVE-2022-2615/" source="CVE"/>
		<reference ref_id="CVE-2022-2616" ref_url="https://www.suse.com/security/cve/CVE-2022-2616/" source="CVE"/>
		<reference ref_id="CVE-2022-2617" ref_url="https://www.suse.com/security/cve/CVE-2022-2617/" source="CVE"/>
		<reference ref_id="CVE-2022-2618" ref_url="https://www.suse.com/security/cve/CVE-2022-2618/" source="CVE"/>
		<reference ref_id="CVE-2022-2619" ref_url="https://www.suse.com/security/cve/CVE-2022-2619/" source="CVE"/>
		<reference ref_id="CVE-2022-2620" ref_url="https://www.suse.com/security/cve/CVE-2022-2620/" source="CVE"/>
		<reference ref_id="CVE-2022-2621" ref_url="https://www.suse.com/security/cve/CVE-2022-2621/" source="CVE"/>
		<reference ref_id="CVE-2022-2622" ref_url="https://www.suse.com/security/cve/CVE-2022-2622/" source="CVE"/>
		<reference ref_id="CVE-2022-2623" ref_url="https://www.suse.com/security/cve/CVE-2022-2623/" source="CVE"/>
		<reference ref_id="CVE-2022-2624" ref_url="https://www.suse.com/security/cve/CVE-2022-2624/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6RNQ4ONDRAPKKAAKDX4PXEI5DY7JVBX/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 104.0.5112.79 (boo#1202075)

* CVE-2022-2603: Use after free in Omnibox
* CVE-2022-2604: Use after free in Safe Browsing
* CVE-2022-2605: Out of bounds read in Dawn
* CVE-2022-2606: Use after free in Managed devices API
* CVE-2022-2607: Use after free in Tab Strip
* CVE-2022-2608: Use after free in Overview Mode
* CVE-2022-2609: Use after free in Nearby Share
* CVE-2022-2610: Insufficient policy enforcement in Background Fetch
* CVE-2022-2611: Inappropriate implementation in Fullscreen API
* CVE-2022-2612: Side-channel information leakage in Keyboard input
* CVE-2022-2613: Use after free in Input
* CVE-2022-2614: Use after free in Sign-In Flow
* CVE-2022-2615: Insufficient policy enforcement in Cookies
* CVE-2022-2616: Inappropriate implementation in Extensions API
* CVE-2022-2617: Use after free in Extensions API
* CVE-2022-2618: Insufficient validation of untrusted input in Internals
* CVE-2022-2619: Insufficient validation of untrusted input in Settings
* CVE-2022-2620: Use after free in WebUI
* CVE-2022-2621: Use after free in Extensions
* CVE-2022-2622: Insufficient validation of untrusted input in Safe Browsing
* CVE-2022-2623: Use after free in Offline
* CVE-2022-2624: Heap buffer overflow in PDF

- Switch back to Clang so that we can use BTI on aarch64
  * Gold is too old - doesn't understand BTI
  * LD crashes on aarch64
- Re-enable LTO
- Prepare move to FFmpeg 5 for new channel layout
  (requires 5.1+)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202075">SUSE bug 1202075</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2603/">CVE-2022-2603</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2604/">CVE-2022-2604</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2605/">CVE-2022-2605</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2606/">CVE-2022-2606</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2607/">CVE-2022-2607</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2608/">CVE-2022-2608</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2609/">CVE-2022-2609</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2610/">CVE-2022-2610</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2611/">CVE-2022-2611</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2612/">CVE-2022-2612</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2613/">CVE-2022-2613</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2614/">CVE-2022-2614</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2615/">CVE-2022-2615</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2616/">CVE-2022-2616</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2617/">CVE-2022-2617</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2618/">CVE-2022-2618</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2619/">CVE-2022-2619</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2620/">CVE-2022-2620</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2621/">CVE-2022-2621</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2622/">CVE-2022-2622</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2623/">CVE-2022-2623</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2624/">CVE-2022-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706752" comment="chromedriver-104.0.5112.79-bp153.2.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706753" comment="chromium-104.0.5112.79-bp153.2.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52151" version="1" class="patch">
	<metadata>
		<title>Security update for trivy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199760" ref_url="https://bugzilla.suse.com/1199760" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648/" source="CVE"/>
		<reference ref_id="CVE-2022-28946" ref_url="https://www.suse.com/security/cve/CVE-2022-28946/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFXT5GO737TPBRXIUOZS7A3WOJKWSJAX/" source="SUSE-SU"/>
		<description>
This update for trivy fixes the following issues:

Update to version 0.30.4:

* fix: remove the first arg when running as a plugin (#2595)
* fix: k8s controlplaner scanning (#2593)
* fix(vuln): GitLab report template (#2578)

Update to version 0.30.3:

* fix(server): use a new db worker for hot updates (#2581)
* docs: add trivy with download-db-only flag to Air-Gapped Environment (#2583)
* docs: split commands to download db for different versions of oras (#2582)
* feat(report): export exitcode for license checks (#2564)
* fix: cli can use lowercase for severities (#2565)
* fix: allow subcommands with TRIVY_RUN_AS_PLUGIN (#2577)
* fix: add missing types in TypeOSes and TypeLanguages in analyzer (#2569)
* fix: enable some features of the wasm runtime (#2575)
* fix(k8s): no error logged if trivy can't get docker image in kubernetes mode (#2521)
* docs(sbom): improve sbom attestation documentation (#2566)

Update to version 0.30.2:

* fix(report): show the summary without results (#2548)
* fix(cli): replace '-' to '_' for env vars (#2561)

Update to version 0.30.1:

* chore: remove a test repository (#2551)
* fix(license): lazy loading of classifiers (#2547)
* fix: CVE-2022-1996 in Trivy (#2499)
* docs(sbom): add sbom attestation (#2527)
* feat(rocky): set Rocky Linux 9 EOL (#2543)
* docs: add attributes to the video tag to autoplay demo videos (#2538)
* fix: yaml files with non-string chart name (#2534)
* fix: skip dirs (#2530)
* feat(repo): add support for branch, commit, &amp; tag (#2494)
* fix: remove auto configure environment variables via viper (#2526)

Update to version 0.30.0:

* fix: separating multiple licenses from one line in dpkg copyright files (#2508)
* fix: change a capital letter for `plugin uninstall` subcommand (#2519)
* fix: k8s hide empty report when scanning resource (#2517)
* refactor: fix comments (#2516)
* fix: scan vendor dir (#2515)
* feat: Add support for license scanning (#2418)
* chore: add owners for secret scanning (#2485)
* fix: remove dependency-tree flag for image subcommand (#2492)
* fix(k8s): add shorthand for k8s namespace flag (#2495)
* docs: add information about using multiple servers to troubleshooting (#2498)
* ci: add pushing canary build images to registries (#2428)
* feat(dotnet): add support for .Net core .deps.json files (#2487)
* feat(amazon): add support for 2022 version (#2429)
* Type correction bitnami chart (#2415)
* docs: add config file and update CLI references (#2489)
* feat: add support for flag groups (#2488)
* refactor: move from urfave/cli to spf13/cobra (#2458)
* fix: Fix secrets output not containing file/lines (#2467)
* fix: clear output with modules (#2478)
* docs(cbl): distroless 1.0 supported (#2473)
* fix: Fix example dockerfile rego policy (#2460)
* fix(config): add helm to list of config analyzers (#2457)
* feat: k8s resouces scan (#2395)
* feat(sbom): add cyclonedx sbom scan (#2203)
* docs: remove links to removed content (#2431)
* ci: added rpm build for rhel 9 (#2437)
* fix(secret): remove space from asymmetric private key (#2434)
* test(integration): fix golden files for debian 9 (#2435)
* fix(cli): fix version string in docs link when secret scanning is enabled (#2422)
* refactor: move CycloneDX marshaling (#2420)
* docs(nodejs): add docs about pnpm support (#2423)
* docs: improve k8s usage documentation (#2425)
* feat: Make secrets scanning output consistant (#2410)
* ci: create canary build after main branch changes  (#1638)
* fix(misconf): skip broken scans (#2396)
* feat(nodejs): add pnpm support (#2414)
* fix: Fix false positive for use of COS images (#2413)
* eliminate nerdctl dependency (#2412)
* Add EOL date for SUSE SLES 15.3, 15.4 and OpenSUSE 15.4 (#2403)
* fix(go): no cast to lowercase go package names (#2401)
* BREAKING(sbom): change 'trivy sbom' to scan SBOM (#2408)
* fix(server): hot update the db from custom repository (#2406)
* feat: added license parser for dpkg (#2381)
* fix(misconf): Update defsec (v0.68.5) to fix docker rego duplicate key (#2400)
* feat: extract stripe publishable and secret keys (#2392)
* feat: rbac support k8s sub-command (#2339)
* feat(ruby): drop platform strings from dependency versions bundled with bundler v2 (#2390)
* docs: Updating README with new CLI command (#2359)
* fix(misconf): Update defsec to v0.68.4 to resolve CF detection bug (#2383)
* chore: add integration label and merge security label (#2316)

Update to version 0.29.2:

* chore: skip Visual Studio Code project folder (#2379)
* fix(helm): handle charts with templated names (#2374)
* docs: redirect operator docs to trivy-operator repo (#2372)
* fix(secret): use secret result when determining Failed status (#2370)
* try removing libdb-dev
* run integration tests in fanal
* use same testing images in fanal
* feat(helm): add support for trivy dbRepository (#2345)
* fix: Fix failing test due to deref lint issue
* test: Fix broken test
* fix: Fix makefile when no previous named ref is visible in a shallow clone
* chore: Fix linting issues in fanal
* refactor: Fix fanal import paths and remove dotfiles

Update to version 0.29.1:

* fix(report): add required fields to the SARIF template (#2341)
* chore: fix spelling errors (#2352)
* Omit Remediation if PrimaryURL is empty (#2006)
* docs(repo): Link to installation documentation in readme shows 404 (#2348)
* feat(alma): support for scanning of modular packages for AlmaLinux (#2347)

Update to version 0.29.0:

* fix(lang): fix dependency graph in client server mode (#2336)
* feat: allow expiration date for .trivyignore entries (#2332)
* feat(lang): add dependency origin graph (#1970)
* docs: update nix installation info (#2331)
* feat: add rbac scanning support (#2328)
* refactor: move WordPress module to another repository (#2329)
* ci: add support for ppc64le (#2281)
* feat: add support for WASM modules (#2195)
* feat(secret): show recommendation for slow scanning (#2051)
* fix(flag): remove --clear-cache flag client mode (#2301)
* fix(java): added check for looping for variable evaluation in pom file (#2322)
* BREAKING(k8s): change CLI API (#2186)
* feat(alpine): add Alpine Linux 3.16 (#2319)
* ci: add `go mod tidy` check (#2314)
* chore: run `go mod tidy` (#2313)
* fix: do not exit if one resource is not found (#2311)
* feat(cli): use stderr for all log messages (resolve #381) (#2289)
* test: replace deprecated subcommand client in integration tests (#2308)
* feat: add support for containerd (#2305)
* fix(kubernetes): Support floats in manifest yaml (#2297)
* docs(kubernetes): dead links (#2307)
* chore: add license label (#2304)
* feat(mariner): added support for CBL-Mariner Distroless v2.0 (#2293)
* feat(helm): add pod annotations (#2272)
* refactor: do not import defsec in fanal types package (#2292)
* feat(report): Add misconfiguration support to ASFF report template (#2285)
* test: use images in GHCR (#2275)
* feat(helm): support pod annotations (#2265)
* feat(misconf): Helm chart scanning (#2269)
* docs: Update custom rego policy docs to reflect latest defsec/fanal changes (#2267)
* fix: mask redis credentials when logging (#2264)
* refactor: extract commands Runner interface (#2147)
* docs: update operator release (#2263)
* feat(redhat): added architecture check (#2172)
* docs: updating links in the docs to work again (#2256)
* docs: fix readme (#2251)
* fix: fixed incorrect CycloneDX output format (#2255)
* refactor(deps): move dependencies to package (#2189)
* fix(report): change github format version to required (#2229)
* docs: update readme (#2110)
* docs: added information about choosing advisory database (#2212)
* chore: update trivy-kubernetes (#2224)
* docs: clarifying parts of the k8s docs and updating links (#2222)
* fix(k8s): timeout error logging (#2179)
* chore(deps): updated fanal after fix AsymmetricPrivateKeys (#2214)
* feat(k8s): add --context flag (#2171)
* fix(k8s): properly instantiate TableWriter (#2175)
* test: fixed integration tests after updating testcontainers to v0.13.0 (#2208)
* chore: update labels (#2197)
* fix(report): fixed panic if all misconf reports were removed in filter (#2188)
* feat(k8s): scan secrets (#2178)
* feat(report): GitHub Dependency Snapshots support (#1522)
* feat(db): added insecure skip tls verify to download trivy db (#2140)
* fix(redhat): always use vulns with fixed version if there is one (#2165)
* chore(redhat): Add support for Red Hat UBI 9. (#2183)
* fix(k8s): update trivy-kubernetes (#2163)
*  fix misconfig start line for code quality tpl (#2181)
* fix: update docker/distribution from 2.8.0 to 2.8.1 (#2176)
* docs(vuln): Include GitLab 15.0 integration (#2153)
* docs: fix the operator version (#2167)
* fix(k8s): summary report when when only vulns exit (#2146)
* chore(deps): Update fanal to get defsec v0.58.2 (fixes false positives in ksv038) (#2156)
* perf(misconf): Improve performance when scanning very large files (#2152)
* docs(misconf): Update examples and docs to refer to builtin/defsec instead of appshield (#2150)
* chore(deps): Update fanal (for less verbose code in misconf results) (#2151)
* docs: fixed installation instruction for rhel/centos (#2143)

Update to version 0.28.0 (boo#1199760, CVE-2022-28946):

* fix: remove Highlighted from json output (#2131)
* fix: remove trivy-kubernetes replace (#2132)
* docs: Add Operator docs under Kubernetes section (#2111)
* fix(k8s): security-checks panic (#2127)
* ci: added k8s scope (#2130)
* docs: Update misconfig output in examples (#2128)
* fix(misconf): Fix coloured output in Goland terminal (#2126)
* docs(secret): Fix default value of --security-checks in docs (#2107)
* refactor(report): move colorize function from trivy-db (#2122)
* feat: k8s resource scanning (#2118)
* chore: add CODEOWNERS (#2121)
* feat(image): add `--server` option for remote scans (#1871)
* refactor: k8s (#2116)
* refactor: export useful APIs (#2108)
* docs: fix k8s doc (#2114)
* feat(kubernetes): Add report flag for summary (#2112)
* fix: Remove problematic advanced rego policies (#2113)
* feat(misconf): Add special output format for misconfigurations (#2100)
* feat:  add k8s subcommand (#2065)
* chore: fix make lint version (#2102)
* fix(java): handle relative pom modules (#2101)
* fix(misconf): Add missing links for non-rego misconfig results (#2094)
* feat(misconf): Added fs.FS based scanning via latest defsec (#2084)
* chore(os): updated fanal version and alpine distroless test (#2086)
* feat(report): add support for SPDX (#2059)
* chore: app version 0.27.0 (#2046)
* fix(misconf): added to skip conf files if their scanning is not enabled (#2066)
* docs(secret) fix rule path in docs (#2061)
* docs: change from go.sum to go.mod (#2056)

Update to version 0.27.1:

* refactor(fs): scanner options (#2050)
* feat(secret): truncate long line (#2052)
* docs: fix a broken bullets (#2042)
* feat(ubuntu): add 22.04 approx eol date (#2044)
* docs: update installation.md (#2027)
* docs: add Containerfile (#2032)

Update to version 0.27.0:

* fix(go): fixed panic to scan gomod without version (#2038)
* docs(mariner): confirm it works with Mariner 2.0 VM (#2036)
* feat(secret): support enable rules (#2035)
* chore: app version 26.0 (#2030)
* docs(secret): add a demo movie (#2031)
* feat: support cache TTL in Redis (#2021)
* fix(go): skip system installed binaries (#2028)
* fix(go): check if go.sum is nil (#2029)
* feat: add secret scanning (#1901)
* chore: gh publish only with push the tag release (#2025)
* fix(fs): ignore permission errors (#2022)
* test(mod): using correct module inside test go.mod (#2020)
* feat(server): re-add proxy support for client/server communications (#1995)
* fix(report): truncate a description before escaping in ASFF template (#2004)
* fix(cloudformation): correct margin removal for empty lines (#2002)
* fix(template): correct check of old sarif template files (#2003)

Update to version 0.26.0:

* feat(alpine): warn mixing versions (#2000)
* Update ASFF template (#1914)
* chore(deps): replace `containerd/containerd` version to fix CVE-2022-23648 (#1994)
* test(go): add integration tests for gomod (#1989)
* fix(python): fixed panic when scan .egg archive (#1992)
* fix(go): set correct go modules type (#1990)
* feat(alpine): support apk repositories (#1987)
* docs: add CBL-Mariner (#1982)
* docs(go): fix version (#1986)
* feat(go): support go.mod in Go 1.17+ (#1985)
* ci: fix URLs in the PR template (#1972)
* ci: add semantic pull requests check (#1968)
* docs(issue): added docs for wrong detection issues (#1961)

Update to version 0.25.4:

* docs: move CONTRIBUTING.md to docs (#1971)
* refactor(table): use file name instead package path (#1966)
* fix(sbom): add --db-repository (#1964)
* feat(table): add PkgPath in table result (#1960)
* fix(pom): merge multiple pom imports in a good manner (#1959)

Update to version 0.25.3:

* fix(downloadDB): add dbRepositoryFlag to repository and rootfs commands (#1956)
* fix(misconf): update BurntSushi/toml for fix runtime error (#1948)
* fix(misconf): Update fanal/defsec to resolve missing metadata issues (#1947)
* feat(jar): allow setting Maven Central URL using environment variable (#1939)
* chore(chart): update Trivy version in HelmChart to 0.25.0 (#1931)
* chore(chart): remove version comments (#1933)

Update to version 0.25.2:

* fix(downloadDB): add flag to server command (#1942)

Update to version 0.25.1:

* fix(misconf): update defsec to resolve panics (#1935)
* docs: restructure the documentation (#1887)
* Add trivy horizontal logo (#1932)
* feat(db): Add dbRepository flag to get advisory database from OCI registry (#1873)

- Buildrequire go1.18 as upstream says in go.mod

Update to version 0.25.0:

* docs(filter vulnerabilities): fix link (#1880)
* feat(template) Add misconfigurations to gitlab codequality report (#1756)
* fix(rpc): add PkgPath field to client / server mode (#1643)
* fix(vulnerabilities): fixed trivy-db vulns (#1883)
* feat(cache): remove temporary cache after filesystem scanning (#1868)
* feat(sbom): add a dedicated sbom command (#1799)
* feat(cyclonedx): add vulnerabilities (#1832)
* fix(option): hide false warning about remote options (#1865)
* feat(filesystem): scan in client/server mode (#1829)
* refactor(template): remove unused test (#1861)
* fix(cli): json format for trivy version (#1854)
* docs: change URL for tfsec-checks (#1857)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-20"/>
	<updated date="2022-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199760">SUSE bug 1199760</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28946/">CVE-2022-28946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707427" comment="trivy-0.30.4-bp153.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52152" version="1" class="patch">
	<metadata>
		<title>Security update for nim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175332" ref_url="https://bugzilla.suse.com/1175332" source="BUGZILLA"/>
		<reference ref_id="1175333" ref_url="https://bugzilla.suse.com/1175333" source="BUGZILLA"/>
		<reference ref_id="1175334" ref_url="https://bugzilla.suse.com/1175334" source="BUGZILLA"/>
		<reference ref_id="1181705" ref_url="https://bugzilla.suse.com/1181705" source="BUGZILLA"/>
		<reference ref_id="1185083" ref_url="https://bugzilla.suse.com/1185083" source="BUGZILLA"/>
		<reference ref_id="1185084" ref_url="https://bugzilla.suse.com/1185084" source="BUGZILLA"/>
		<reference ref_id="1185085" ref_url="https://bugzilla.suse.com/1185085" source="BUGZILLA"/>
		<reference ref_id="1185948" ref_url="https://bugzilla.suse.com/1185948" source="BUGZILLA"/>
		<reference ref_id="1192712" ref_url="https://bugzilla.suse.com/1192712" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15690" ref_url="https://www.suse.com/security/cve/CVE-2020-15690/" source="CVE"/>
		<reference ref_id="CVE-2020-15692" ref_url="https://www.suse.com/security/cve/CVE-2020-15692/" source="CVE"/>
		<reference ref_id="CVE-2020-15693" ref_url="https://www.suse.com/security/cve/CVE-2020-15693/" source="CVE"/>
		<reference ref_id="CVE-2020-15694" ref_url="https://www.suse.com/security/cve/CVE-2020-15694/" source="CVE"/>
		<reference ref_id="CVE-2021-21372" ref_url="https://www.suse.com/security/cve/CVE-2021-21372/" source="CVE"/>
		<reference ref_id="CVE-2021-21373" ref_url="https://www.suse.com/security/cve/CVE-2021-21373/" source="CVE"/>
		<reference ref_id="CVE-2021-21374" ref_url="https://www.suse.com/security/cve/CVE-2021-21374/" source="CVE"/>
		<reference ref_id="CVE-2021-29495" ref_url="https://www.suse.com/security/cve/CVE-2021-29495/" source="CVE"/>
		<reference ref_id="CVE-2021-41259" ref_url="https://www.suse.com/security/cve/CVE-2021-41259/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM5F2H5AWO4WRQSTOWMODGKMXAHHBVRH/" source="SUSE-SU"/>
		<description>
This update for nim fixes the following issues:

Includes upstream security fixes for:

* (boo#1175333, CVE-2020-15693) httpClient is vulnerable to a 
  CR-LF injection
* (boo#1175334, CVE-2020-15692) mishandle of argument to 
  browsers.openDefaultBrowser
* (boo#1175332, CVE-2020-15694) httpClient.get().contentLength()
  fails to properly validate the server response
* (boo#1192712, CVE-2021-41259) null byte accepted in getContent
  function, leading to URI validation bypass
* (boo#1185948, CVE-2021-29495) stdlib httpClient does not
  validate peer certificates by default
* (boo#1185085, CVE-2021-21374) Improper verification of the 
  SSL/TLS certificate
* (boo#1185084, CVE-2021-21373) 'nimble refresh' falls back to a 
  non-TLS URL in case of error
* (boo#1185083, CVE-2021-21372) doCmd can be leveraged to execute
  arbitrary commands
* (boo#1181705, CVE-2020-15690) Standard library asyncftpclient 
  lacks a check for newline character

Following nim tools now work as expected:

* nim_dbg is now installed.
* nim-gdb can be successfully launched as it finds and loads
  nim-gdb.py correctly under gdb.
* nimble package manager stores package information per user.
* compiler package can be found and used, as it may be required
  by other packages.
  
Update to 1.6.6

* standard library use consistent styles for variable names so it
  can be used in projects which force a consistent style with 
  --styleCheck:usages option. 
* ARC/ORC are now considerably faster at method dispatching, 
  bringing its performance back on the level of the refc memory 
  management.
* Full changelog:
  https://nim-lang.org/blog/2022/05/05/version-166-released.html
- Previous updates and changelogs:
* 1.6.4: 
  https://nim-lang.org/blog/2022/02/08/version-164-released.html
* 1.6.2: 
  https://nim-lang.org/blog/2021/12/17/version-162-released.html
* 1.6.0: 
  https://nim-lang.org/blog/2021/10/19/version-160-released.html
* 1.4.8: 
  https://nim-lang.org/blog/2021/05/25/version-148-released.html
* 1.4.6: 
  https://nim-lang.org/blog/2021/04/15/versions-146-and-1212-released.html
* 1.4.4: 
  https://nim-lang.org/blog/2021/02/23/versions-144-and-1210-released.html
* 1.4.2: 
  https://nim-lang.org/blog/2020/12/01/version-142-released.html
* 1.4.0: 
  https://nim-lang.org/blog/2020/10/16/version-140-released.html

Update to 1.2.16

* oids: switch from PRNG to random module
* nimc.rst: fix table markup
* nimRawSetjmp: support Windows
* correctly enable chronos
* bigints are not supposed to work on 1.2.x
* disable nimpy
* misc bugfixes
* fixes a 'mixin' statement handling regression [backport:1.2 

Update to version 1.2.12  

* Fixed GC crash resulting from inlining of the memory
  allocation procs
* Fixed “incorrect raises effect for $(NimNode)” (#17454)
- from version 1.2.10
* Fixed “JS backend doesn’t handle float-&gt;int type conversion “ (#8404)
* Fixed “The “try except” not work when the “OSError:
  Too many open files” error occurs!” (#15925)
* Fixed “Nim emits #line 0 C preprocessor directives with
  –debugger:native, with ICE in gcc-10” (#15942)
* Fixed “tfuturevar fails when activated” (#9695)
* Fixed “nre.escapeRe is not gcsafe” (#16103)
* Fixed ““Error: internal error: genRecordFieldAux” - in
  the “version-1-4” branch” (#16069)
* Fixed “-d:fulldebug switch does not compile with gc:arc” (#16214)
* Fixed “osLastError may randomly raise defect and crash” (#16359)
* Fixed “generic importc proc’s don’t work (breaking lots
  of vmops procs for js)” (#16428)
* Fixed “Concept: codegen ignores parameter passing” (#16897)
* Fixed “{.push exportc.} interacts with anonymous functions” (#16967)
* Fixed “memory allocation during {.global.} init breaks GC” (#17085)
* Fixed 'Nimble arbitrary code execution for specially crafted package metadata'
  + https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p
  + (boo#1185083, CVE-2021-21372)
* Fixed 'Nimble falls back to insecure http url when fetching packages'
  + https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8
  + (boo#1185084, CVE-2021-21373)
* Fixed 'Nimble fails to validate certificates due to insecure httpClient defaults'
  + https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx
  + (boo#1185085, CVE-2021-21374)
- from version 1.2.8
* Fixed “Defer and –gc:arc” (#15071)
* Fixed “Issue with –gc:arc at compile time” (#15129)
* Fixed “Nil check on each field fails in generic function” (#15101)
* Fixed “[strscans] scanf doesn’t match a single character with
  $+ if it’s the end of the string” (#15064)
* Fixed “Crash and incorrect return values when using
  readPasswordFromStdin on Windows.” (#15207)
* Fixed “Inconsistent unsigned -&gt; signed RangeDefect usage
  across integer sizes” (#15210)
* Fixed “toHex results in RangeDefect exception when
  used with large uint64” (#15257)
* Fixed “Mixing ‘return’ with expressions is allowed in 1.2” (#15280)
* Fixed “proc execCmdEx doesn’t work with -d:useWinAnsi” (#14203)
* Fixed “memory corruption in tmarshall.nim” (#9754)
* Fixed “Wrong number of variables” (#15360)
* Fixed “defer doesnt work with block, break and await” (#15243)
* Fixed “Sizeof of case object is incorrect. Showstopper” (#15516)
* Fixed “Mixing ‘return’ with expressions is allowed in 1.2” (#15280)
* Fixed “regression(1.0.2 =&gt; 1.0.4) VM register messed up
  depending on unrelated context” (#15704)
- from version 1.2.6
* Fixed “The pegs module doesn’t work with generics!” (#14718)
* Fixed “[goto exceptions] {.noReturn.} pragma is not detected
  in a case expression” (#14458)
* Fixed “[exceptions:goto] C compiler error with dynlib pragma
  calling a proc” (#14240)
* Fixed “Nim source archive install: ‘install.sh’ fails with error:
  cp: cannot stat ‘bin/nim-gdb’: No such file or directory” (#14748)
* Fixed “Stropped identifiers don’t work as field names in
  tuple literals” (#14911)
* Fixed “uri.decodeUrl crashes on incorrectly formatted input” (#14082)
* Fixed “odbcsql module has some wrong integer types” (#9771)
* Fixed “[ARC] Compiler crash declaring a finalizer proc
  directly in ‘new’” (#15044)
* Fixed “code with named arguments in proc of winim/com can
  not been compiled” (#15056)
* Fixed “javascript backend produces javascript code with syntax
  error in object syntax” (#14534)
* Fixed “[ARC] SIGSEGV when calling a closure as a tuple
  field in a seq” (#15038)
* Fixed “Compiler crashes when using string as object variant
  selector with else branch” (#14189)
* Fixed “Constructing a uint64 range on a 32-bit machine leads
  to incorrect codegen” (#14616)

Update to version 1.2.2:

* See https://nim-lang.org/blog.html for details
- Enable the full testsuite in the %check section
* Add build dependencies to run the testsuite
* Whitelists a few tests that are not passing yet

Update to version 1.0.2:

* See https://nim-lang.org/blog.html for details
- Update dependencies (based on changes by Federico Ceratto

		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175332">SUSE bug 1175332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175333">SUSE bug 1175333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175334">SUSE bug 1175334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181705">SUSE bug 1181705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185083">SUSE bug 1185083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185084">SUSE bug 1185084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185085">SUSE bug 1185085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185948">SUSE bug 1185948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192712">SUSE bug 1192712</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15690/">CVE-2020-15690</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15692/">CVE-2020-15692</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15693/">CVE-2020-15693</cve>
	<cve impact="critical" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15694/">CVE-2020-15694</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21372/">CVE-2021-21372</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21373/">CVE-2021-21373</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21374/">CVE-2021-21374</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29495/">CVE-2021-29495</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41259/">CVE-2021-41259</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707627" comment="nim-1.6.6-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52153" version="1" class="patch">
	<metadata>
		<title>Security update for freeciv (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202548" ref_url="https://bugzilla.suse.com/1202548" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-6083" ref_url="https://www.suse.com/security/cve/CVE-2022-6083/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGIIGXHCBJ6BXOPVIKR6NCU4TUBJIYLP/" source="SUSE-SU"/>
		<description>
This update for freeciv fixes the following issues:

- update to 3.0.3 (boo#1202548, CVE-2022-6083):

  * 3.0.3 is a bugfix release
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.3 

- update to 3.0.2:

  * 3.0.2 is a generic bugfix release
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.2 

- update to 3.0.1:

  * 3.0.1 is a generic bugfix release
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.1 

- update to 3.0.0:

  * This release is a major upgrade which with some changes that
    can support backward compatible rulesets
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.0#WHAT.27S_CHANGED_SINCE_2.6

- update to 2.6.6:

  * https://freeciv.fandom.com/wiki/NEWS-2.6.5
  * 2.6.6 is a bugfix release.

- update to 2.6.5:

  * https://freeciv.fandom.com/wiki/NEWS-2.6.5
  * 2.6.5 is a bugfix release. Notably it fixes regression in 2.6.4 gtk3-client
    that present units in city dialog had no overlays drawn at all. 

- Update to 2.6.4:

  * Bugfix release, see https://freeciv.fandom.com/wiki/NEWS-2.6.4

- update to 2.6.3:

  * see http://www.freeciv.org/wiki/NEWS-2.6.3
  * Fixed trouble when a new city is founded to the ruins of a former city,
    and that new city establish a trade route with a player who had seen
    former city, and is unaware that it had been destroyed HRM#871606
  * Fixed a case where shared vision did not completely update
    recipient's map HRM#846106
  * Fixed a bug where one could paradrop to peaceful nation's territory
    after continuing game from an old savegame HRM#879084
  * Fixed a bug causing game sometimes to tell wrong reason of why an
    action failed HRM#879880
  * Cease fire no longer runs out with an already dead player, making his
    former allies to hate the alive party of the treaty HRM#879055
  * Made server not to end in a infinite loop after loading savegame with
    too high phase number. Such a savegame was reported to be created
    after spaceship was launched but game was still continued HRM#815196
  * Unified writing of the city name Washington-on-the-Brazos
    between rulesets, so it doesn't appear multiple times in the same
    game in a bit different form HRM#867817
  * Stealth units are no longer erroneously hidden even from allies
    HRM#764976
  * Placing initial units is now done in shuffled player order HRM#850656
  * Corrupt worker tasks are cleared. Those can originate, e.g.,
    from buggy pre-2.6.2.1 Qt-client, and live in old savegames HRM#901938
  * In a ruleset, such as civ2civ3, where caravans can help building wonder
    in a foreign city, refresh city info of the city owner when one does
    HRM#907977
  * Display of success probabilities for diplomats was off when targeting
    stack of units instead of individual unit HRM#859761
  * Fixed pillaging of extras that are caused by something else than
    player actions. For the fix to work, both server and client must be
    at least version 2.6.3 HRM#861508
  * Civilian unit trying to paradrop to an enemy city dies HRM#870004
  * Prevented dead player from getting techs via Tech_Parasite effect.
    This caused trouble in alien ruleset where Tech_Parasite is granted
     by a tech HRM#873692
  * Improved support of CityTile requirement type HRM#877780
  * Fixed trouble preventing Small Wonders from working as impr_reqs
    for units HRM#884993
  * Corrected success probability shown by action dialog when it depends
    on a special kind of road HRM#897490
  * The included Lua engine has been upgraded from 5.3.5 to 5.3.6. HRM#889425

- update to 2.6.2.1:

  * Fixed server crash when unit with zero move_rate is transformed
  * Fixed crashes when using Direction objects in lua scripts 
  * Fixed crash when chatline text had opening tag without closing tag
  * Fixes to the Qt client
  * Updated translations
  * Fixed Qt-client build against Qt-5.15 (removes freeciv-qt-5.15.patch )
  * Documentation updates 

		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202548">SUSE bug 1202548</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2022-6083/">CVE-2022-6083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707628" comment="freeciv-3.0.3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707629" comment="freeciv-gtk3-3.0.3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707630" comment="freeciv-lang-3.0.3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707631" comment="freeciv-qt-3.0.3-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52154" version="1" class="patch">
	<metadata>
		<title>Security update for python-treq (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195432" ref_url="https://bugzilla.suse.com/1195432" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23607" ref_url="https://www.suse.com/security/cve/CVE-2022-23607/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTECPNLPX6QR5JLJ2KQYTBYWNU6ZRUSG/" source="SUSE-SU"/>
		<description>
This update for python-treq fixes the following issues:

- Fixed CVE-2022-23607 (boo#1195432) binding cookies to the domain.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195432">SUSE bug 1195432</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23607/">CVE-2022-23607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707766" comment="python2-treq-20.3.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707767" comment="python3-treq-20.3.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52155" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202509" ref_url="https://bugzilla.suse.com/1202509" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2852" ref_url="https://www.suse.com/security/cve/CVE-2022-2852/" source="CVE"/>
		<reference ref_id="CVE-2022-2853" ref_url="https://www.suse.com/security/cve/CVE-2022-2853/" source="CVE"/>
		<reference ref_id="CVE-2022-2854" ref_url="https://www.suse.com/security/cve/CVE-2022-2854/" source="CVE"/>
		<reference ref_id="CVE-2022-2855" ref_url="https://www.suse.com/security/cve/CVE-2022-2855/" source="CVE"/>
		<reference ref_id="CVE-2022-2856" ref_url="https://www.suse.com/security/cve/CVE-2022-2856/" source="CVE"/>
		<reference ref_id="CVE-2022-2857" ref_url="https://www.suse.com/security/cve/CVE-2022-2857/" source="CVE"/>
		<reference ref_id="CVE-2022-2858" ref_url="https://www.suse.com/security/cve/CVE-2022-2858/" source="CVE"/>
		<reference ref_id="CVE-2022-2859" ref_url="https://www.suse.com/security/cve/CVE-2022-2859/" source="CVE"/>
		<reference ref_id="CVE-2022-2860" ref_url="https://www.suse.com/security/cve/CVE-2022-2860/" source="CVE"/>
		<reference ref_id="CVE-2022-2861" ref_url="https://www.suse.com/security/cve/CVE-2022-2861/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KPLXDXLKSIMQN4L3UUXMVBTXFIP5Y7BC/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 104.0.5112.101 (boo#1202509):

* CVE-2022-2852: Use after free in FedCM
* CVE-2022-2854: Use after free in SwiftShader
* CVE-2022-2855: Use after free in ANGLE
* CVE-2022-2857: Use after free in Blink
* CVE-2022-2858: Use after free in Sign-In Flow
* CVE-2022-2853: Heap buffer overflow in Downloads
* CVE-2022-2856: Insufficient validation of untrusted input in Intents
* CVE-2022-2859: Use after free in Chrome OS Shell
* CVE-2022-2860: Insufficient policy enforcement in Cookies
* CVE-2022-2861: Inappropriate implementation in Extensions API

- Re-enable our version of chrome-wrapper
- Set no sandbox if root is being used (https://crbug.com/638180)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202509">SUSE bug 1202509</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2852/">CVE-2022-2852</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2853/">CVE-2022-2853</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2854/">CVE-2022-2854</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2855/">CVE-2022-2855</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2856/">CVE-2022-2856</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2857/">CVE-2022-2857</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2858/">CVE-2022-2858</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2859/">CVE-2022-2859</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2860/">CVE-2022-2860</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2861/">CVE-2022-2861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707832" comment="chromedriver-104.0.5112.101-bp154.2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707833" comment="chromium-104.0.5112.101-bp154.2.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52156" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-2852" ref_url="https://www.suse.com/security/cve/CVE-2022-2852/" source="CVE"/>
		<reference ref_id="CVE-2022-2853" ref_url="https://www.suse.com/security/cve/CVE-2022-2853/" source="CVE"/>
		<reference ref_id="CVE-2022-2854" ref_url="https://www.suse.com/security/cve/CVE-2022-2854/" source="CVE"/>
		<reference ref_id="CVE-2022-2855" ref_url="https://www.suse.com/security/cve/CVE-2022-2855/" source="CVE"/>
		<reference ref_id="CVE-2022-2856" ref_url="https://www.suse.com/security/cve/CVE-2022-2856/" source="CVE"/>
		<reference ref_id="CVE-2022-2857" ref_url="https://www.suse.com/security/cve/CVE-2022-2857/" source="CVE"/>
		<reference ref_id="CVE-2022-2858" ref_url="https://www.suse.com/security/cve/CVE-2022-2858/" source="CVE"/>
		<reference ref_id="CVE-2022-2859" ref_url="https://www.suse.com/security/cve/CVE-2022-2859/" source="CVE"/>
		<reference ref_id="CVE-2022-2860" ref_url="https://www.suse.com/security/cve/CVE-2022-2860/" source="CVE"/>
		<reference ref_id="CVE-2022-2861" ref_url="https://www.suse.com/security/cve/CVE-2022-2861/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6KDCQD4E63345G3YSFH4BWJAAKYYIHCJ/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 90.0.4480.54
  - CHR-8981 Update chromium on desktop-stable-104-4480 to
    104.0.5112.102
  - DNA-98165 [buildsign] Whitelist Silent.nib when creating
    universal NI package on Mac
  - DNA-101309 Use base filename in PUT request when uploading
    files to buildbot
- The update to chromium 104.0.5112.102 fixes following issues:
  CVE-2022-2852, CVE-2022-2854, CVE-2022-2855, CVE-2022-2857,
  CVE-2022-2858, CVE-2022-2853, CVE-2022-2856, CVE-2022-2859,
  CVE-2022-2860, CVE-2022-2861

- Update to 90.0.4480.48
  - DNA-100835 AddressBarModelTestWithCategories.RefreshUnfiltered
    SuggestionsWhenPrefsChanged fails on beta stream
  - DNA-101171 Translations for O90
  - DNA-101216 Remove empty string from flow client_capabilities
  - DNA-101357 Promote O90 to Stable
  - DNA-101383 Revert DNA-101033
- Complete Opera 90.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-90/
  

- Update to 89.0.4447.91
  - DNA-100673 Crash at void 
    opera::ModalDialogBaseView::OnExtraButtonPressed
    (const class ui::Event&amp; const)
  - DNA-100915 [Sync Settings] Confirm your identity to enable
    encryption message flickers
  - DNA-100937 Missing links to ToS and Privacy Statement in
    launcher dialog when running installer with –show-eula-window-on-start
  - DNA-101002 Make errors from webpack compilation appear in the log
  - DNA-101045 Popup contents are pushed outside of popup in
    'Unprotected' VPN state
  - DNA-101076 Disabled Pinboards should have another color in
    Account popup
  - DNA-101086 Sync – Clicking Next on
    auth.opera.com/account/v3/desktop/login/confirm-password
    does not redirect anywhere

- Update to 89.0.4447.83
  - DNA-99507 Badge deactivates on a basket page of the shop
  - DNA-99840 Add speed dials to start page
  - DNA-100127 Enable #enable-force-dark-from-settings on all
    streams
  - DNA-100233 [Settings] 'Sync everything' and 'Do not sync'
    unselects itself
  - DNA-100560 Add 'suggested speed dials' in the Google search box
    on the start page
  - DNA-100568 Fix icon in suggestions and update layout
  - DNA-100646 Add synchronization states to Opera account popup
  - DNA-100665 Create private API to open Account popup + allow
    rich hints
  - DNA-100668 Use a category based suggestion list to sort search
    box suggestions
  - DNA-100701 'Force dark page' shortcut don’t work
  - DNA-100711 Unable to click suggestions on start page search box
  - DNA-100725 [WinLin] Opera account logo is offcenter
  - DNA-100762 Suggestions from networks get favicon from network
  - DNA-100764 Fix 'Confirm Identity' URL
  - DNA-100905 Request to update event_sd_tile_used.type
  - DNA-100921 Add accessibility info about sync state to opera
    account button
  - DNA-100943 VPN pro popup can be zoomed
  - DNA-100945 Disable Context Menu for VPN and VPN Pro popups
  - DNA-100958 Opera account popup should display actual state of
    synchronization instead of selected option
  - DNA-100994 'Secure More devices' is pushed outside of popup
  - DNA-101009 Free VPN – 'Try for free' disappear after clicked
  - DNA-101012 Remove VPN Pro service available from VPN pro
    settings when logged in without subscription
  - DNA-101094 Unable to close a window from JavaScript
  - DNA-101121 chrome.operaAccountPrivate is undefined
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-29"/>
	<updated date="2022-08-29"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2852/">CVE-2022-2852</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2853/">CVE-2022-2853</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2854/">CVE-2022-2854</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2855/">CVE-2022-2855</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2856/">CVE-2022-2856</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2857/">CVE-2022-2857</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2858/">CVE-2022-2858</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2859/">CVE-2022-2859</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2860/">CVE-2022-2860</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2861/">CVE-2022-2861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708080" comment="opera-90.0.4480.54-lp153.2.57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52157" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-3075" ref_url="https://www.suse.com/security/cve/CVE-2022-3075/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBGINNIWBONVAY4XS5FGSQDKRADTHUQI/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 90.0.4480.84

- DNA-101690 Cherry-pick fix for CVE-2022-3075 from chromium

Update to 90.0.4480.80

- DNA-99188 Tab Tooltip doesn't disappear
- DNA-100664 Shopping corner widget
- DNA-100843 Options to install and update VPN Pro app, when
  it's not installed
- DNA-100901 Disappearing 'X' when closing tabs.
- DNA-101093 Changing News section is not working
- DNA-101246 Use long tail list for suggesting instead of
  current Speed Dial Suggestions
- DNA-101278 PDF don't work on Opera with CN location
- DNA-101312 Allow changing logged in user with BrowserAPI
- DNA-101315 Can not connect to free VPN in private window
- DNA-101411 [Linux] Clicking VpnPopup Settings to
  'vpnWithDisclaimer' leads to black popup
- DNA-101422 Crash at void content::NavigationControllerImpl::
  NavigateToExistingPendingEntry(content::ReloadType, int, bool)
- DNA-101429 News loads for Global-EN language by default
- DNA-101482 Crash at ProfileKey::GetProtoDatabaseProvider()
- DNA-101485 Crash at base::SequencedTaskRunnerHandle::Get()
  via extensions::OperaTouchPrivateGetImageFunction::PerformGetImage
- DNA-101524 [Mac] Tab should be highlighted again after
  dismissing context menu
- DNA-101549 Crash at views::View::IsMouseHovered()
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3075/">CVE-2022-3075</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710587" comment="opera-90.0.4480.84-lp153.2.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52158" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202403" ref_url="https://bugzilla.suse.com/1202403" source="BUGZILLA"/>
		<reference ref_id="1202964" ref_url="https://bugzilla.suse.com/1202964" source="BUGZILLA"/>
		<reference ref_id="1203102" ref_url="https://bugzilla.suse.com/1203102" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3038" ref_url="https://www.suse.com/security/cve/CVE-2022-3038/" source="CVE"/>
		<reference ref_id="CVE-2022-3039" ref_url="https://www.suse.com/security/cve/CVE-2022-3039/" source="CVE"/>
		<reference ref_id="CVE-2022-3040" ref_url="https://www.suse.com/security/cve/CVE-2022-3040/" source="CVE"/>
		<reference ref_id="CVE-2022-3041" ref_url="https://www.suse.com/security/cve/CVE-2022-3041/" source="CVE"/>
		<reference ref_id="CVE-2022-3042" ref_url="https://www.suse.com/security/cve/CVE-2022-3042/" source="CVE"/>
		<reference ref_id="CVE-2022-3043" ref_url="https://www.suse.com/security/cve/CVE-2022-3043/" source="CVE"/>
		<reference ref_id="CVE-2022-3044" ref_url="https://www.suse.com/security/cve/CVE-2022-3044/" source="CVE"/>
		<reference ref_id="CVE-2022-3045" ref_url="https://www.suse.com/security/cve/CVE-2022-3045/" source="CVE"/>
		<reference ref_id="CVE-2022-3046" ref_url="https://www.suse.com/security/cve/CVE-2022-3046/" source="CVE"/>
		<reference ref_id="CVE-2022-3047" ref_url="https://www.suse.com/security/cve/CVE-2022-3047/" source="CVE"/>
		<reference ref_id="CVE-2022-3048" ref_url="https://www.suse.com/security/cve/CVE-2022-3048/" source="CVE"/>
		<reference ref_id="CVE-2022-3049" ref_url="https://www.suse.com/security/cve/CVE-2022-3049/" source="CVE"/>
		<reference ref_id="CVE-2022-3050" ref_url="https://www.suse.com/security/cve/CVE-2022-3050/" source="CVE"/>
		<reference ref_id="CVE-2022-3051" ref_url="https://www.suse.com/security/cve/CVE-2022-3051/" source="CVE"/>
		<reference ref_id="CVE-2022-3052" ref_url="https://www.suse.com/security/cve/CVE-2022-3052/" source="CVE"/>
		<reference ref_id="CVE-2022-3053" ref_url="https://www.suse.com/security/cve/CVE-2022-3053/" source="CVE"/>
		<reference ref_id="CVE-2022-3054" ref_url="https://www.suse.com/security/cve/CVE-2022-3054/" source="CVE"/>
		<reference ref_id="CVE-2022-3055" ref_url="https://www.suse.com/security/cve/CVE-2022-3055/" source="CVE"/>
		<reference ref_id="CVE-2022-3056" ref_url="https://www.suse.com/security/cve/CVE-2022-3056/" source="CVE"/>
		<reference ref_id="CVE-2022-3057" ref_url="https://www.suse.com/security/cve/CVE-2022-3057/" source="CVE"/>
		<reference ref_id="CVE-2022-3058" ref_url="https://www.suse.com/security/cve/CVE-2022-3058/" source="CVE"/>
		<reference ref_id="CVE-2022-3071" ref_url="https://www.suse.com/security/cve/CVE-2022-3071/" source="CVE"/>
		<reference ref_id="CVE-2022-3075" ref_url="https://www.suse.com/security/cve/CVE-2022-3075/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10120-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EVLCBABO7RGGUVQCAZPA7MNGKWHWCJN/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 105.0.5195.102 (boo#1203102):

* CVE-2022-3075: Insufficient data validation in Mojo

Chromium 105.0.5195.52 (boo#1202964):

* CVE-2022-3038: Use after free in Network Service
* CVE-2022-3039: Use after free in WebSQL
* CVE-2022-3040: Use after free in Layout
* CVE-2022-3041: Use after free in WebSQL
* CVE-2022-3042: Use after free in PhoneHub
* CVE-2022-3043: Heap buffer overflow in Screen Capture
* CVE-2022-3044: Inappropriate implementation in Site Isolation
* CVE-2022-3045: Insufficient validation of untrusted input in V8
* CVE-2022-3046: Use after free in Browser Tag
* CVE-2022-3071: Use after free in Tab Strip
* CVE-2022-3047: Insufficient policy enforcement in Extensions API
* CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen
* CVE-2022-3049: Use after free in SplitScreen
* CVE-2022-3050: Heap buffer overflow in WebUI
* CVE-2022-3051: Heap buffer overflow in Exosphere
* CVE-2022-3052: Heap buffer overflow in Window Manager
* CVE-2022-3053: Inappropriate implementation in Pointer Lock
* CVE-2022-3054: Insufficient policy enforcement in DevTools
* CVE-2022-3055: Use after free in Passwords
* CVE-2022-3056: Insufficient policy enforcement in Content Security Policy
* CVE-2022-3057: Inappropriate implementation in iframe Sandbox
* CVE-2022-3058: Use after free in Sign-In Flow

- Update chromium-symbolic.svg: this fixes boo#1202403.
- Fix quoting in chrome-wrapper, don't put cwd on LD_LIBRARY_PATH
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202403">SUSE bug 1202403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202964">SUSE bug 1202964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203102">SUSE bug 1203102</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3038/">CVE-2022-3038</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3039/">CVE-2022-3039</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3040/">CVE-2022-3040</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3041/">CVE-2022-3041</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3042/">CVE-2022-3042</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3043/">CVE-2022-3043</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3044/">CVE-2022-3044</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3045/">CVE-2022-3045</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3046/">CVE-2022-3046</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3047/">CVE-2022-3047</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3048/">CVE-2022-3048</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3049/">CVE-2022-3049</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3050/">CVE-2022-3050</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3051/">CVE-2022-3051</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3052/">CVE-2022-3052</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3053/">CVE-2022-3053</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3054/">CVE-2022-3054</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3055/">CVE-2022-3055</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3056/">CVE-2022-3056</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3057/">CVE-2022-3057</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3058/">CVE-2022-3058</cve>
	<cve impact="low" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3071/">CVE-2022-3071</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3075/">CVE-2022-3075</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710588" comment="chromedriver-105.0.5195.102-bp153.2.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710589" comment="chromium-105.0.5195.102-bp153.2.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52159" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194126" ref_url="https://bugzilla.suse.com/1194126" source="BUGZILLA"/>
		<reference ref_id="1201720" ref_url="https://bugzilla.suse.com/1201720" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21554" ref_url="https://www.suse.com/security/cve/CVE-2022-21554/" source="CVE"/>
		<reference ref_id="CVE-2022-21571" ref_url="https://www.suse.com/security/cve/CVE-2022-21571/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IW7PPIWGXC43ULEMZIOEZJIZ4XLRO2X4/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

- Remove package virtualbox-guest-x11, which is no longer needed. 

- Fix screen resizing under Wayland (boo#1194126 and boo#1194126)

Version bump to 6.1.36 released by Oracle July 19 2022

This is a maintenance release. The following items were fixed and/or added:

- VMM: Fixed possible Linux guest kernel crash when configuring Speculative Store Bypass for a single vCPU VM
- GUI: In the storage page of the virtual machine settings dialog, fixed a bug which disrupted mouse interaction with the native file selector on KDE
- NAT: Prevent issue when host resolver incorrectly returned NXDOMAIN for unsupported queries (bug #20977)
- Audio: General improvements in saved state area
- Recording: Various fixes for settings handling
- VGA: Performance improvements for screen updates when VBE banking is used
- USB: Fixed rare crashes when detaching a USB device
- ATA: Fixed NT4 guests taking a minute to eject CDs
- vboximg-mount: Fixed broken write support (bug #20896)
- SDK: Fixed Python bindings incorrectly trying to convert arbitrary byte data into unicode objects with Python 3, causing exceptions (bug #19740)
- API: Fixed an issue when virtual USB mass storage devices or virtual USB DVD drives are added while the VM is not running are by default not marked as hot-pluggable
- API: Initial support for Python 3.10
- API: Solaris OS types cleanup
- Linux and Solaris hosts: Allow to mount shared folder if it is represented as a symlink on a host side (bug #17491)
- Linux Host and Guest drivers: Introduced initial support for kernels 5.18, 5.19 and RHEL 9.1 (bugs #20914, #20941)
- Linux Host and Guest drivers: Better support for kernels built with clang compiler (bugs #20425 and #20998)
- Solaris Guest Additions: General improvements in installer area
- Solaris Guest Additions: Fixed guest screen resize in VMSVGA graphics configuration
- Linux and Solaris Guest Additions: Fixed multi-screen handling in VBoxVGA and VBoxSVGA graphics configuration
- Linux and Solaris Guest Additions: Added support for setting primary screen via VBoxManage
- Linux and Solaris Guest Additions: Fixed X11 resources leak when resizing guest screens
- Linux and Solaris Guest Additions: Fixed file descriptor leak when starting a process using guest control (bug #20902)
- Linux and Solaris Guest Additions: Fixed guest control executing processes as root
- Linux Guest Additions: Improved guests booting time by preventing kernel modules from being rebuilt when it is not necessary (bug #20502)
- Windows Guest Additions: Fixed VBoxTray crash on startup in NT4 guests on rare circumstances
- Fixes CVE-2022-21571) VUL-0: CVE-2022-21571,CVE-2022-21554 - boo#1201720
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2022-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194126">SUSE bug 1194126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201720">SUSE bug 1201720</bugzilla>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21554/">CVE-2022-21554</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21571/">CVE-2022-21571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713866" comment="python3-virtualbox-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713867" comment="virtualbox-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713868" comment="virtualbox-devel-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713869" comment="virtualbox-guest-desktop-icons-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713870" comment="virtualbox-guest-source-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713871" comment="virtualbox-guest-tools-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713872" comment="virtualbox-host-source-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713873" comment="virtualbox-kmp-default-6.1.36_k5.3.18_150300.59.90-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713874" comment="virtualbox-kmp-preempt-6.1.36_k5.3.18_150300.59.90-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713875" comment="virtualbox-qt-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713876" comment="virtualbox-vnc-6.1.36-lp153.2.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713877" comment="virtualbox-websrv-6.1.36-lp153.2.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52160" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203419" ref_url="https://bugzilla.suse.com/1203419" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3195" ref_url="https://www.suse.com/security/cve/CVE-2022-3195/" source="CVE"/>
		<reference ref_id="CVE-2022-3196" ref_url="https://www.suse.com/security/cve/CVE-2022-3196/" source="CVE"/>
		<reference ref_id="CVE-2022-3197" ref_url="https://www.suse.com/security/cve/CVE-2022-3197/" source="CVE"/>
		<reference ref_id="CVE-2022-3198" ref_url="https://www.suse.com/security/cve/CVE-2022-3198/" source="CVE"/>
		<reference ref_id="CVE-2022-3199" ref_url="https://www.suse.com/security/cve/CVE-2022-3199/" source="CVE"/>
		<reference ref_id="CVE-2022-3200" ref_url="https://www.suse.com/security/cve/CVE-2022-3200/" source="CVE"/>
		<reference ref_id="CVE-2022-3201" ref_url="https://www.suse.com/security/cve/CVE-2022-3201/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2I7OF5TIFM7EAD27EFGQPLCZSCREBGJ/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 105.0.5195.127 (boo#1203419):

* CVE-2022-3195: Out of bounds write in Storage
* CVE-2022-3196: Use after free in PDF
* CVE-2022-3197: Use after free in PDF
* CVE-2022-3198: Use after free in PDF
* CVE-2022-3199: Use after free in Frames
* CVE-2022-3200: Heap buffer overflow in Internals
* CVE-2022-3201: Insufficient validation of untrusted input in DevTools
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-17"/>
	<updated date="2022-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203419">SUSE bug 1203419</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3195/">CVE-2022-3195</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3196/">CVE-2022-3196</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3197/">CVE-2022-3197</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3198/">CVE-2022-3198</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3199/">CVE-2022-3199</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3200/">CVE-2022-3200</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3201/">CVE-2022-3201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713919" comment="chromedriver-105.0.5195.127-bp154.2.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713920" comment="chromium-105.0.5195.127-bp154.2.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52161" version="1" class="patch">
	<metadata>
		<title>Security update for mupdf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202858" ref_url="https://bugzilla.suse.com/1202858" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4216" ref_url="https://www.suse.com/security/cve/CVE-2021-4216/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HOB6LS4J7NNBI7QSCZO47TN6B7O6WKCI/" source="SUSE-SU"/>
		<description>
This update for mupdf fixes the following issues:

- CVE-2021-4216: Fixed division by zero for zero width pages in muraster (boo#1202858) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-17"/>
	<updated date="2022-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202858">SUSE bug 1202858</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4216/">CVE-2021-4216</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713978" comment="mupdf-1.12.0-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713979" comment="mupdf-devel-static-1.12.0-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52162" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203018" ref_url="https://bugzilla.suse.com/1203018" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NO6AGAAYGBGTUQMTU4PWGSPL2DHABXTM/" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Update to version 20200127:

* chkstat: also consider group controlled paths (boo#1203018, CVE-2022-31252)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-20"/>
	<updated date="2022-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203018">SUSE bug 1203018</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714099" comment="permissions-20200127-lp153.24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714100" comment="permissions-zypp-plugin-20200127-lp153.24.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52163" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201720" ref_url="https://bugzilla.suse.com/1201720" source="BUGZILLA"/>
		<reference ref_id="1203086" ref_url="https://bugzilla.suse.com/1203086" source="BUGZILLA"/>
		<reference ref_id="1203306" ref_url="https://bugzilla.suse.com/1203306" source="BUGZILLA"/>
		<reference ref_id="1203370" ref_url="https://bugzilla.suse.com/1203370" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21554" ref_url="https://www.suse.com/security/cve/CVE-2022-21554/" source="CVE"/>
		<reference ref_id="CVE-2022-21571" ref_url="https://www.suse.com/security/cve/CVE-2022-21571/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6DCXVW5U2QDOK7LVHVOQRHUB7Y45YQ3J/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

Version bump to 6.1.38r86 released by Oracle September 02 2022

This is a maintenance release. The following items were fixed and/or added:

- GUI: Improvements in Native Language Support area
- Main: OVF Export: Added support for exporting VMs containing Virtio-SCSI controllers
- Recording settings: Fixed a regression which could cause not starting the COM server (VBoxSVC) under certain circumstances (bug #21034)
- Recording: More deterministic naming for recorded files (will now overwrite old .webm files if present)
- Linux Host and Guest Additions installer: Improved check for systemd presence in the system (bug #19033)
- Linux Guest Additions: Introduced initial support for kernel 6.0
- Linux Guest Additions: Additional fixes for kernel RHEL 9.1 (bug #21065)
- Windows Guest Additions: Improvements in Drag and Drop area
  
- Fixes permission problem with /dev/vboxuser (boo#1203370)
- Fixes missing firewall opening (boo#1203086)
- Fixes boo#1201720 CVE items for CVE-2022-21571, CVE-2022-21554
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-23"/>
	<updated date="2022-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201720">SUSE bug 1201720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203086">SUSE bug 1203086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203306">SUSE bug 1203306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203370">SUSE bug 1203370</bugzilla>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21554/">CVE-2022-21554</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21571/">CVE-2022-21571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714708" comment="python3-virtualbox-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714709" comment="virtualbox-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714710" comment="virtualbox-devel-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714711" comment="virtualbox-guest-desktop-icons-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714712" comment="virtualbox-guest-source-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714713" comment="virtualbox-guest-tools-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714714" comment="virtualbox-host-source-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714715" comment="virtualbox-kmp-default-6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714716" comment="virtualbox-kmp-preempt-6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714717" comment="virtualbox-qt-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714718" comment="virtualbox-vnc-6.1.38-lp153.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714719" comment="virtualbox-websrv-6.1.38-lp153.2.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52164" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-3196" ref_url="https://www.suse.com/security/cve/CVE-2022-3196/" source="CVE"/>
		<reference ref_id="CVE-2022-3197" ref_url="https://www.suse.com/security/cve/CVE-2022-3197/" source="CVE"/>
		<reference ref_id="CVE-2022-3198" ref_url="https://www.suse.com/security/cve/CVE-2022-3198/" source="CVE"/>
		<reference ref_id="CVE-2022-3199" ref_url="https://www.suse.com/security/cve/CVE-2022-3199/" source="CVE"/>
		<reference ref_id="CVE-2022-3200" ref_url="https://www.suse.com/security/cve/CVE-2022-3200/" source="CVE"/>
		<reference ref_id="CVE-2022-3201" ref_url="https://www.suse.com/security/cve/CVE-2022-3201/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KUZNZHWADYF3EJBJQAVXRVSPIDAPGDJ7/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 91.0.4516.20

- CHR-9019 Update chromium on desktop-stable-105-4516 to
  105.0.5195.127
- DNA-101312 Allow changing logged in user with BrowserAPI

- The update to chromium 105.0.5195.127 fixes following issues:  
  CVE-2022-3196, CVE-2022-3197, CVE-2022-3198, CVE-2022-3199,
  CVE-2022-3200, CVE-2022-3201
  
Update to 91.0.4516.16

- CHR-9010 Update chromium on desktop-stable-105-4516 to
  105.0.5195.102
- DNA-101447 Incorrect translation in Russian
- DNA-101482 Crash at ProfileKey::GetProtoDatabaseProvider()
- DNA-101495 Performance Stint 2022
- DNA-101551 Add version number info to browser API
- DNA-101662 Suppress 'Allowing special test code paths'
  warning on buildbot
- DNA-101753 News don't show after close browser
- DNA-101760 Translations for O91
- DNA-101799 Crash at opera::SuggestionList::SortAndCull
- DNA-101812 Sponsored site gets chosen as default entry
  when typing part of top-level domain
- DNA-101876 Promote 91 to stable

- Complete Opera 91.0 changelog at: https://blogs.opera.com/desktop/changelog-for-91/

Update to 90.0.4480.107

- DNA-100664 Shopping corner widget
- DNA-101495 Performance Stint 2022
- DNA-101753 News don’t show after close browser
- DNA-101799 Crash at opera::SuggestionList::SortAndCull
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3196/">CVE-2022-3196</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3197/">CVE-2022-3197</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3198/">CVE-2022-3198</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3199/">CVE-2022-3199</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3200/">CVE-2022-3200</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3201/">CVE-2022-3201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715790" comment="opera-91.0.4516.20-lp153.2.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52165" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203358" ref_url="https://bugzilla.suse.com/1203358" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37797" ref_url="https://www.suse.com/security/cve/CVE-2022-37797/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATUOJQDWIRALBMVI5GOSOGPZP5AWVAZF/" source="SUSE-SU"/>
		<description>
This update for lighttpd fixes the following issues:

lighttpd was updated to 1.4.66:

* a number of bug fixes
* Fix HTTP/2 downloads &gt;= 4GiB
* Fix SIGUSR1 graceful restart with TLS
* futher bug fixes
* CVE-2022-37797: null pointer dereference in mod_wstunnel,
  possibly a remotely triggerable crash (boo#1203358)
* In an upcoming release the TLS modules will default to using
  stronger, modern chiphers and will default to allow client
  preference in selecting ciphers.
  “CipherString” =&gt; “EECDH+AESGCM:AES256+EECDH:CHACHA20:SHA256:!SHA384”,
  “Options” =&gt; “-ServerPreference”
  old defaults:
  “CipherString” =&gt; “HIGH”,
  “Options” =&gt; “ServerPreference”
* A number of TLS options are how deprecated and will be removed
  in a future release:
  – ssl.honor-cipher-order
  – ssl.dh-file
  – ssl.ec-curve
  – ssl.disable-client-renegotiation
  – ssl.use-sslv2
  – ssl.use-sslv3
  The replacement option is ssl.openssl.ssl-conf-cmd, but lighttpd
  defaults should be prefered
* A number of modules are now deprecated and will be removed in a
  future release: mod_evasive, mod_secdownload, mod_uploadprogress,
  mod_usertrack can be replaced by mod_magnet and a few lines of lua.

update to 1.4.65:

* WebSockets over HTTP/2
* RFC 8441 Bootstrapping WebSockets with HTTP/2
* HTTP/2 PRIORITY_UPDATE
* RFC 9218 Extensible Prioritization Scheme for HTTP
* prefix/suffix conditions in lighttpd.conf
* mod_webdav safe partial-PUT
* webdav.opts += (“partial-put-copy-modify” =&gt; “enable”)
* mod_accesslog option: accesslog.escaping = “json”
* mod_deflate libdeflate build option
* speed up request body uploads via HTTP/2
* Behavior Changes
* change default server.max-keep-alive-requests = 1000 to adjust
* to increasing HTTP/2 usage and to web2/web3 application usage
* (prior default was 100)
* mod_status HTML now includes HTTP/2 control stream id 0 in the output
* which contains aggregate counts for the HTTP/2 connection
* (These lines can be identified with URL ‘*’, part of “PRI *” preface)
* alternative: https://wiki.lighttpd.net/ModMagnetExamples#lua-mod_status
* MIME type application/javascript is translated to text/javascript (RFC 9239)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203358">SUSE bug 1203358</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37797/">CVE-2022-37797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716174" comment="lighttpd-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716175" comment="lighttpd-mod_authn_gssapi-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716176" comment="lighttpd-mod_authn_ldap-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716177" comment="lighttpd-mod_authn_pam-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716178" comment="lighttpd-mod_authn_sasl-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716179" comment="lighttpd-mod_magnet-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716180" comment="lighttpd-mod_maxminddb-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716181" comment="lighttpd-mod_rrdtool-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716182" comment="lighttpd-mod_vhostdb_dbi-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716183" comment="lighttpd-mod_vhostdb_ldap-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716184" comment="lighttpd-mod_vhostdb_mysql-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716185" comment="lighttpd-mod_vhostdb_pgsql-1.4.66-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716186" comment="lighttpd-mod_webdav-1.4.66-bp154.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52166" version="1" class="patch">
	<metadata>
		<title>Security update for connman (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200189" ref_url="https://bugzilla.suse.com/1200189" source="BUGZILLA"/>
		<reference ref_id="1200190" ref_url="https://bugzilla.suse.com/1200190" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32292" ref_url="https://www.suse.com/security/cve/CVE-2022-32292/" source="CVE"/>
		<reference ref_id="CVE-2022-32293" ref_url="https://www.suse.com/security/cve/CVE-2022-32293/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4BBTRFMU2YGB6OYSRTK6AGKO32CD5I3/" source="SUSE-SU"/>
		<description>
This update for connman fixes the following issues:

- CVE-2022-32292: Add refcounting to wispr portal detection to avoid heap overflow (boo#1200190)
- CVE-2022-32292: Fix OOB write in received_data (boo#1200189)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-30"/>
	<updated date="2022-09-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1200189">SUSE bug 1200189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200190">SUSE bug 1200190</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32292/">CVE-2022-32292</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32293/">CVE-2022-32293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716300" comment="connman-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716301" comment="connman-client-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716302" comment="connman-devel-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716303" comment="connman-doc-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716304" comment="connman-nmcompat-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716305" comment="connman-plugin-hh2serial-gps-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716306" comment="connman-plugin-iospm-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716307" comment="connman-plugin-l2tp-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716308" comment="connman-plugin-openvpn-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716309" comment="connman-plugin-polkit-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716310" comment="connman-plugin-pptp-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716311" comment="connman-plugin-tist-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716312" comment="connman-plugin-vpnc-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716313" comment="connman-plugin-wireguard-1.41-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716314" comment="connman-test-1.41-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52167" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203808" ref_url="https://bugzilla.suse.com/1203808" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3201" ref_url="https://www.suse.com/security/cve/CVE-2022-3201/" source="CVE"/>
		<reference ref_id="CVE-2022-3304" ref_url="https://www.suse.com/security/cve/CVE-2022-3304/" source="CVE"/>
		<reference ref_id="CVE-2022-3305" ref_url="https://www.suse.com/security/cve/CVE-2022-3305/" source="CVE"/>
		<reference ref_id="CVE-2022-3306" ref_url="https://www.suse.com/security/cve/CVE-2022-3306/" source="CVE"/>
		<reference ref_id="CVE-2022-3307" ref_url="https://www.suse.com/security/cve/CVE-2022-3307/" source="CVE"/>
		<reference ref_id="CVE-2022-3308" ref_url="https://www.suse.com/security/cve/CVE-2022-3308/" source="CVE"/>
		<reference ref_id="CVE-2022-3309" ref_url="https://www.suse.com/security/cve/CVE-2022-3309/" source="CVE"/>
		<reference ref_id="CVE-2022-3310" ref_url="https://www.suse.com/security/cve/CVE-2022-3310/" source="CVE"/>
		<reference ref_id="CVE-2022-3311" ref_url="https://www.suse.com/security/cve/CVE-2022-3311/" source="CVE"/>
		<reference ref_id="CVE-2022-3312" ref_url="https://www.suse.com/security/cve/CVE-2022-3312/" source="CVE"/>
		<reference ref_id="CVE-2022-3313" ref_url="https://www.suse.com/security/cve/CVE-2022-3313/" source="CVE"/>
		<reference ref_id="CVE-2022-3314" ref_url="https://www.suse.com/security/cve/CVE-2022-3314/" source="CVE"/>
		<reference ref_id="CVE-2022-3315" ref_url="https://www.suse.com/security/cve/CVE-2022-3315/" source="CVE"/>
		<reference ref_id="CVE-2022-3316" ref_url="https://www.suse.com/security/cve/CVE-2022-3316/" source="CVE"/>
		<reference ref_id="CVE-2022-3317" ref_url="https://www.suse.com/security/cve/CVE-2022-3317/" source="CVE"/>
		<reference ref_id="CVE-2022-3318" ref_url="https://www.suse.com/security/cve/CVE-2022-3318/" source="CVE"/>
		<reference ref_id="CVE-2022-3370" ref_url="https://www.suse.com/security/cve/CVE-2022-3370/" source="CVE"/>
		<reference ref_id="CVE-2022-3373" ref_url="https://www.suse.com/security/cve/CVE-2022-3373/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVCRR5JKWC4AEVTDL4IYBETTO2CE74I6/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 106.0.5249.91 (boo#1203808):

* CVE-2022-3370: Use after free in Custom Elements
* CVE-2022-3373: Out of bounds write in V8

Uncludes changes from 106.0.5249.61:

* CVE-2022-3304: Use after free in CSS
* CVE-2022-3201: Insufficient validation of untrusted input in Developer Tools
* CVE-2022-3305: Use after free in Survey
* CVE-2022-3306: Use after free in Survey
* CVE-2022-3307: Use after free in Media
* CVE-2022-3308: Insufficient policy enforcement in Developer Tools
* CVE-2022-3309: Use after free in Assistant
* CVE-2022-3310: Insufficient policy enforcement in Custom Tabs
* CVE-2022-3311: Use after free in Import
* CVE-2022-3312: Insufficient validation of untrusted input in VPN
* CVE-2022-3313: Incorrect security UI in Full Screen
* CVE-2022-3314: Use after free in Logging
* CVE-2022-3315: Type confusion in Blink
* CVE-2022-3316: Insufficient validation of untrusted input in Safe Browsing
* CVE-2022-3317: Insufficient validation of untrusted input in Intents
* CVE-2022-3318: Use after free in ChromeOS Notifications
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-03"/>
	<updated date="2022-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203808">SUSE bug 1203808</bugzilla>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3201/">CVE-2022-3201</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3304/">CVE-2022-3304</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3305/">CVE-2022-3305</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3306/">CVE-2022-3306</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3307/">CVE-2022-3307</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3308/">CVE-2022-3308</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3309/">CVE-2022-3309</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3310/">CVE-2022-3310</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3311/">CVE-2022-3311</cve>
	<cve impact="important" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3312/">CVE-2022-3312</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3313/">CVE-2022-3313</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-3314/">CVE-2022-3314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3315/">CVE-2022-3315</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3316/">CVE-2022-3316</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3317/">CVE-2022-3317</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3318/">CVE-2022-3318</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3370/">CVE-2022-3370</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3373/">CVE-2022-3373</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717254" comment="chromedriver-106.0.5249.91-bp153.2.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717255" comment="chromium-106.0.5249.91-bp153.2.125.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52168" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203872" ref_url="https://bugzilla.suse.com/1203872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41556" ref_url="https://www.suse.com/security/cve/CVE-2022-41556/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6C6UOQL3XPIYN6MAYXR6H6PCUA7Q4N4/" source="SUSE-SU"/>
		<description>
This update for lighttpd fixes the following issues:

lighttpd was updated to 1.4.67:

* Update comment about TCP_INFO on OpenBSD
* [mod_ajp13] fix crash with bad response headers (fixes #3170)
* [core] handle RDHUP when collecting chunked body CVE-2022-41556 (boo#1203872)
* [core] tweak streaming request body to backends
* [core] handle ENOSPC with pwritev() (#3171)
* [core] manually calculate off_t max (fixes #3171)
* [autoconf] force large file support (#3171)
* [multiple] quiet coverity warnings using casts
* [meson] add license keyword to project declaration
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-03"/>
	<updated date="2022-10-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203872">SUSE bug 1203872</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41556/">CVE-2022-41556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717256" comment="lighttpd-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717257" comment="lighttpd-mod_authn_gssapi-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717258" comment="lighttpd-mod_authn_ldap-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717259" comment="lighttpd-mod_authn_pam-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717260" comment="lighttpd-mod_authn_sasl-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717261" comment="lighttpd-mod_magnet-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717262" comment="lighttpd-mod_maxminddb-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717263" comment="lighttpd-mod_rrdtool-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717264" comment="lighttpd-mod_vhostdb_dbi-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717265" comment="lighttpd-mod_vhostdb_ldap-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717266" comment="lighttpd-mod_vhostdb_mysql-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717267" comment="lighttpd-mod_vhostdb_pgsql-1.4.67-bp154.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717268" comment="lighttpd-mod_webdav-1.4.67-bp154.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52169" version="1" class="patch">
	<metadata>
		<title>Security update for pngcheck (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202662" ref_url="https://bugzilla.suse.com/1202662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35511" ref_url="https://www.suse.com/security/cve/CVE-2020-35511/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HVZNA3VAYHKC5NXBYOOMUZSZNOXRCF7/" source="SUSE-SU"/>
		<description>
This update for pngcheck fixes the following issues:

version update to 3.0.3 [boo#1202662]

* fixed a crash bug (and probable vulnerability) in large (MNG) LOOP chunks
* fixed a divide-by-zero crash bug (and probable vulnerability)
  in interlaced images with extra compressed data beyond the
  nominal end of the image data (found by 'chiba of topsec alpha
  lab')

version update to 3.0.0

  * tweaked color definitions slightly to work better on terminals with white/light backgrounds
  * fixed DHDR (pre-MNG-1.0) bug identified by Winfried &lt;szukw000@arcor.de&gt;
  * added eXIf support (GRR: added check for II/MM/unknown format)
  * converted static const help/usage-related strings to macros so -Werror=format-security doesn't trigger (Ben Beasley)
  * added (help2man-generated) man pages for all three utils added top-level LICENSE file; fixed various compiler warnings
  * fixed buffer-overflow vulnerability discovered by 'giantbranch of NSFOCUS Security Team' *               https://bugzilla.redhat.com/show_bug.cgi?id=1897485
  * found and fixed four additional vulnerabilities (null-pointer dereference and three buffer overruns)
  * an off-by-one bug in check_magic() (Lucy Phipps)
  * converted two zlib-version warnings/errors to go to stderr (Lemures Lemniscati, actually from 20180318; forwarded by LP)
  * fixed another buffer-overflow vulnerability discovered by 'giantbranch of NSFOCUS Security Team' https://bugzilla.redhat.com/show_bug.cgi?id=1905775
  * removed -f ('force') option due to multiple security issues
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202662">SUSE bug 1202662</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35511/">CVE-2020-35511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717269" comment="pngcheck-3.0.3-bp153.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52170" version="1" class="patch">
	<metadata>
		<title>Security update for gdcm, orthanc, orthanc-gdcm, orthanc-webviewer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2119" ref_url="https://www.suse.com/security/cve/CVE-2022-2119/" source="CVE"/>
		<reference ref_id="CVE-2022-2120" ref_url="https://www.suse.com/security/cve/CVE-2022-2120/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K67WDY4JVASQKGAJHGMCE45SJSPPFKPM/" source="SUSE-SU"/>
		<description>
This update for gdcm, orthanc, orthanc-gdcm, orthanc-webviewer fixes the following issues:

Changes in gdcm:

- Provides/obsoletes moved to lbgdcm-package (Thx DimStar)
- rename of gdcm-libgdcm3_0 to libgdcm3_0 (proposal S. Br?ns)

- version 3.0.18

  no changelog

- version 3.0.12

  * support for poppler 22.03 added

- version 3.0.11

  * Fix for a significant issue with JPEG-LS and RGB color space
  * tons of small bug fixes

- version 3.0.10 (no changelog)

Changes in orthanc-gdcm:

- changed dependency gdcm-libgdcm3_0 -&gt; libgdcm3_0

- Version 1.5 

* Take the configuration option 'RestrictTransferSyntaxes' into
  account not only for decoding, but also for transcoding
* Upgrade to GDCM 3.0.10 for static builds- 

Changes in orthanc:

- version 1.11.2
  * Added support for RGBA64 images in tools/create-dicom and /preview
  * New configuration 'MaximumStorageMode' to choose between recyling of
    old patients (default behavior) and rejection of new incoming data when
    the MaximumStorageSize has been reached.
  * New sample plugin: 'DelayedDeletion' that will delete files from disk
    asynchronously to speed up deletion of large studies.
  * Lua: new 'SetHttpTimeout' function
  * Lua: new 'OnHeartBeat' callback called at regular interval provided that
       you have configured 'LuaHeartBeatPeriod' &gt; 0.
  * 'ExtraMainDicomTags' configuration now accepts Dicom Sequences.  Sequences are
    stored in a dedicated new metadata 'MainDicomSequences'.  This should improve
    DicomWeb QIDO-RS and avoid warnings like 'Accessing Dicom tags from storage when 
    accessing series : 0040,0275'.
    Main dicom sequences can now be returned in 'MainDicomTags' and in 'RequestedTags'.
  * Fix the 'Never' option of the 'StorageAccessOnFind' that was sill accessing
    files (bug introduced in 1.11.0).
  * Fix the Storage Cache for compressed files (bug introduced in 1.11.1).
  * Fix the storage cache that was not used by the Plugin SDK.  This fixes the 
    DicomWeb plugin '/rendered' route performance issues.
  * DelayedDeletion plugin: Fix leaking of symbols
  * SQLite now closes and deletes WAL and SHM files on exit.  This should improve
    handling of SQLite DB over network drives.
  * Fix static compilation of boost 1.69 on Ubuntu 22.04
  * Upgraded dependencies for static builds:
    - boost 1.80.0
    - dcmtk 3.6.7  (fixes CVE-2022-2119 and CVE-2022-2120)
    - openssl 3.0.5
  * Housekeeper plugin: Fix resume of previous processing
  * Added missing MOVEPatientRootQueryRetrieveInformationModel in 
    DicomControlUserConnection::SetupPresentationContexts()
  * Improved HttpClient error logging (add method + url)
  * API version upgraded to 18
  * /system is now reporting 'DatabaseServerIdentifier'
  * Added an Asynchronous mode to /modalities/../move.
  * 'RequestedTags' option can now include DICOM sequences.
  * New function in the SDK: 'OrthancPluginGetDatabaseServerIdentifier'
  * DicomMap::ParseMainDicomTags has been deprecated -&gt; retrieve 'full' tags
    and use DicomMap::FromDicomAsJson instead

- version 1.11.0

* new API version 1.7
* new configuration parameter
* for detailed changelog see NEWS

- version 1.10.1

* for detailed changelog see NEWS

- Version 1.9.7

* New configuration option 'DicomAlwaysAllowMove' to disable verification of
  the remote modality in C-MOVE SCP
* API version upgraded to 15
* Added 'Level' option to POST /tools/bulk-modify
* Added missing OpenAPI documentation of 'KeepSource' in '.../modify' and '.../anonymize'
* Added file CITATION.cff
* Linux Standard Base (LSB) builds of Orthanc can load non-LSB builds of plugins
* Fix upload of ZIP archives containing a DICOMDIR file
* Fix computation of the estimated time of arrival in jobs
* Support detection of windowing and rescale in Philips multiframe images 

Changes in orthanc-webviewer:

- version 2.8
  * Fix XSS inside DICOM in Orthanc Web Viewer (as reported by Stuart
    Kurutac, NCC Group)
  * framework190.diff removed (covered in actual version)  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-12"/>
	<updated date="2022-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2119/">CVE-2022-2119</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2120/">CVE-2022-2120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717611" comment="gdcm-3.0.19-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717612" comment="gdcm-applications-3.0.19-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717613" comment="gdcm-devel-3.0.19-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717614" comment="gdcm-examples-3.0.19-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717615" comment="libgdcm3_0-3.0.19-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717616" comment="libsocketxx1_2-3.0.19-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717617" comment="orthanc-1.11.2-bp153.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717618" comment="orthanc-devel-1.11.2-bp153.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717619" comment="orthanc-doc-1.11.2-bp153.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717620" comment="orthanc-gdcm-1.5-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717621" comment="orthanc-source-1.11.2-bp153.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717622" comment="orthanc-webviewer-2.8-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717623" comment="python3-gdcm-3.0.19-bp153.2.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52171" version="1" class="patch">
	<metadata>
		<title>Security update for roundcubemail (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180132" ref_url="https://bugzilla.suse.com/1180132" source="BUGZILLA"/>
		<reference ref_id="1180399" ref_url="https://bugzilla.suse.com/1180399" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10740" ref_url="https://www.suse.com/security/cve/CVE-2019-10740/" source="CVE"/>
		<reference ref_id="CVE-2020-12641" ref_url="https://www.suse.com/security/cve/CVE-2020-12641/" source="CVE"/>
		<reference ref_id="CVE-2020-16145" ref_url="https://www.suse.com/security/cve/CVE-2020-16145/" source="CVE"/>
		<reference ref_id="CVE-2020-35730" ref_url="https://www.suse.com/security/cve/CVE-2020-35730/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WUL4HE7A5MLE433XPBQYBUU6265EYNA/" source="SUSE-SU"/>
		<description>
This update for roundcubemail fixes the following issues:

roundcubemail was updated to 1.5.3

* Enigma: Fix initial synchronization of private keys
* Enigma: Fix double quoted-printable encoding of pgp-signed messages with no attachments (#8413)
* Fix various PHP8 warnings (#8392)
* Fix mail headers injection via the subject field on mail compose (#8404)
* Fix bug where small message/rfc822 parts could not be decoded (#8408)
* Fix setting HTML mode on reply/forward of a signed message (#8405)
* Fix handling of RFC2231-encoded attachment names inside of a message/rfc822 part (#8418)
* Fix bug where some mail parts (images) could have not be listed as attachments (#8425)
* Fix bug where attachment icons were stuck at the top of the messages list in Safari (#8433)
* Fix handling of message/rfc822 parts that are small and are multipart structures with a single part (#8458)
* Fix bug where session could time out if DB and PHP timezone were different (#8303)
* Fix bug where DSN flag state wasn't stored with a draft (#8371)
* Fix broken encoding of HTML content encapsulated in a RTF attachment (#8444)
* Fix problem with aria-hidden=true on toolbar menus in the Elastic skin (#8517)
* Fix bug where title tag content was displayed in the body if it contained HTML tags (#8540)
* Fix support for DSN specification without host e.g. pgsql:///dbname (#8558)

update to 1.5.2

* OAuth: pass 'id_token' to 'oauth_login' plugin hook (#8214)
* OAuth: fix expiration of short-lived oauth tokens (#8147)
* OAuth: fix relative path to assets if /index.php/foo/bar url is used (#8144)
* OAuth: no auto-redirect on imap login failures (#8370)
* OAuth: refresh access token in 'refresh' plugin hook (#8224)
* Fix so folder search parameters are honored by subscriptions_option plugin (#8312)
* Fix password change with Directadmin driver (#8322, #8329)
* Fix so css files in plugins/jqueryui/themes will be minified too (#8337)
* Fix handling of unicode/special characters in custom From input (#8357)
* Fix some PHP8 compatibility issues (#8363)
* Fix chpass-wrapper.py helper compatibility with Python 3 (#8324)
* Fix scrolling and missing Close button in the Select image dialog in Elastic/mobile (#8367)
* Security: fix cross-site scripting (XSS) via HTML messages with malicious CSS content

- added Suggests: php-sqlite

- use the virtual provides from each PHP module, to allow the installation
  of roundcubemail with various PHP versions. 
  The only problem, we are currently facing is the automatic 
  enablement of the PHP apache module during post-installation: 
  Trying to evaluate the correct PHP module now during post as well, 
  which should eleminate the pre-definition of the required 
  PHP-Version during build completely.
  See https://build.opensuse.org/request/show/940859 for the initial
  discussion.

update to 1.5.1

* Fix importing contacts with no email address (#8227)
* Fix so session's search scope is not used if search is not active (#8199)
* Fix some PHP8 warnings (#8239)
* Fix so dark mode state is retained after closing the browser (#8237)
* Fix bug where new messages were not added to the list on refresh if skip_deleted=true (#8234)
* Fix colors on 'Show source' page in dark mode (#8246)
* Fix handling of dark_mode_support:false setting in skins meta.json - also when devel_mode=false (#8249)
* Fix database initialization if db_prefix is a schema prefix (#8221)
* Fix undefined constant error in Installer on Windows (#8258)
* Fix installation/upgrade on MySQL 5.5 - Index column size too large (#8231)
* Fix regression in setting of contact listing name (#8260)
* Fix bug in Larry skin where headers toggle state was reset on full page preview (#8203)
* Fix bug where \u200b characters were added into the recipient input preventing mail delivery (#8269)
* Fix charset conversion errors on PHP &lt; 8 for charsets not supported by mbstring (#8252)
* Fix bug where adding a contact to trusted senders via 'Always allow from...' button didn't work (#8264, #8268)
* Fix bug with show_images setting where option 1 and 3 were swapped (#8268)
* Fix PHP fatal error on an undefined constant in contacts import action (#8277)
* Fix fetching headers of multiple message parts at once in rcube_imap_generic::fetchMIMEHeaders() (#8282)
* Fix bug where attachment download could sometimes fail with a CSRF check error (#8283)
* Fix an infinite loop when parsing environment variables with float/integer values (#8293)
* Fix so 'small-dark' logo has more priority than the 'small' logo (#8298)

update to 1.5.0

+ full PHP8 support
+ Dark mode for Elastic skin
+ OAuth2/XOauth support (with plugin hooks)
+ Collected recipients and trusted senders
+ Moving recipients between inputs with drag &amp; drop
+ Full unicode support with MySQL database
+ Support of IMAP LITERAL- extension RFC 7888 &lt;https://datatracker.ietf.org/doc/html/rfc7888&gt;
+ Support of RFC 2231 &lt;https://datatracker.ietf.org/doc/html/rfc2231&gt; encoded names
+ Cache refactoring More at https://github.com/roundcube/roundcubemail/releases/tag/1.5.0
+ added SECURITY.md to documentation
+ mark the whole documentation directory as documentation instead of listing some files and others not (avoid duplicate entries in RPM-DB)
+ adjust requirements: php-intl is now required

update to 1.4.11 with security fix:

- Fix cross-site scripting (XSS) via HTML messages with malicious CSS content

- add PHP version to Requires: and Recommends: to make sure the same
  version is installed as used during packaging
- drop Requires: http_daemon (fixes boo#1180132) and Suggests: apache2
  (which is already required though mod_php_any)

update to 1.4.10:

* Stored cross-site scripting (XSS) via HTML or plain text messages 
  with malicious content ( CVE-2020-35730 boo#1180399 )
* Fix extra angle brackets in In-Reply-To header derived from mailto: params (#7655)
* Fix folder list issue when special folder is a subfolder (#7647)
* Fix Elastic's folder subscription toggle in search result (#7653)
* Fix state of subscription toggle on folders list after changing 
  folder state from the search result (#7653)
* Security: Fix cross-site scripting (XSS) via HTML or plain text 
  messages with malicious content

update to 1.4.9:

* Fix HTML editor in latest Chrome 85.0.4183.102, update to TinyMCE 4.9.11 (#7615)
* Add missing localization for some label/legend elements in userinfo plugin (#7478)
* Fix importing birthday dates from Gmail vCards (BDAY:YYYYMMDD)
* Fix restoring Cc/Bcc fields from local storage (#7554)
* Fix jstz.min.js installation, bump version to 1.0.7
* Fix incorrect PDO::lastInsertId() use in sqlsrv driver (#7564)
* Fix link to closure compiler in bin/jsshrink.sh script (#7567)
* Fix bug where some parts of a message could have been missing in a reply/forward body (#7568)
* Fix empty space on mail printouts in Chrome (#7604)
* Fix empty output from HTML5 parser when content contains XML tag (#7624)
* Fix scroll jump on key press in plain text mode of the HTML editor (#7622)
* Fix so autocompletion list does not hide on scroll inside it (#7592)

update to 1.4.8 with security fixes:

* Fix cross-site scripting (XSS) via HTML messages with malicious svg content (CVE-2020-16145)
* Fix cross-site scripting (XSS) via HTML messages with malicious math content

update to 1.4.7 with security fix:

* Fix bug where subfolders of special folders could have been duplicated on folder list
* Increase maximum size of contact jobtitle and department fields to 128 characters
* Fix missing newline after the logged line when writing to stdout (#7418)
* Elastic: Fix context menu (paste) on the recipient input (#7431)
* Fix problem with forwarding inline images attached to messages with no HTML part (#7414)
* Fix problem with handling attached images with same name when using
  database_attachments/redundant_attachments (#7455)

- add http.inc file

  * include one file for php5/php7 admin flags/values

update to 1.4.5

Security fixes
* Fix XSS issue in template object 'username' (#7406)
* Fix cross-site scripting (XSS) via malicious XML attachment
* Fix a couple of XSS issues in Installer (#7406)
* Better fix for CVE-2020-12641

Other changes

* Fix bug in extracting required plugins from composer.json that led 
  to spurious error in log (#7364)
* Fix so the database setup description is compatible with MySQL 8 (#7340)
* Markasjunk: Fix regression in jsevent driver (#7361)
* Fix missing flag indication on collapsed thread in Larry and Elastic (#7366)
* Fix default keyservers (use keys.openpgp.org), add note about CORS (#7373, #7367)
* Password: Fix issue with Modoboa driver (#7372)
* Mailvelope: Use sender's address to find pubkeys to check signatures (#7348)
* Mailvelope: Fix Encrypt button hidden in Elastic (#7353)
* Fix PHP warning: count(): Parameter must be an array or an object... 
  in ID command handler (#7392)
* Fix error when user-configured skin does not exist anymore (#7271)
* Elastic: Fix aspect ratio of a contact photo in mail preview (#7339)
* Fix bug where PDF attachments marked as inline could have not been 
  attached on mail forward (#7382)
* Security: Fix a couple of XSS issues in Installer (#7406)
* Security: Better fix for CVE-2020-12641

update to 1.4.4

* Fix bug where attachments with Content-Id were attached to the message on reply (#7122)
* Fix identity selection on reply when both sender and recipient addresses are included in identities (#7211)
* Elastic: Fix text selection with Shift+PageUp and Shift+PageDown in plain text editor when using Chrome (#7230)
* Elastic: Fix recipient input bug when using click to select a contact from autocomplete list (#7231)
* Elastic: Fix color of a folder with recent messages (#7281)
* Elastic: Restrict logo size in print view (#7275)
* Fix invalid Content-Type for messages with only html part and inline images   * Mail_Mime-1.10.7 (#7261)
* Fix missing contact display name in QR Code data (#7257)
* Fix so button label in Select image/media dialogs is 'Close' not 'Cancel' (#7246)
* Fix regression in testing database schema on MSSQL (#7227)
* Fix cursor position after inserting a group to a recipient input using autocompletion (#7267)
* Fix string literals handling in IMAP STATUS (and various other) responses (#7290)
* Fix bug where multiple images in a message were replaced by the first one on forward/reply/edit (#7293)
* Fix handling keyservers configured with protocol prefix (#7295)
* Markasjunk: Fix marking as spam/ham on moving messages with Move menu (#7189)
* Markasjunk: Fix bug where moving to Junk was failing on messages selected with Select &gt; All (#7206)
* Fix so imap error message is displayed to the user on folder create/update (#7245)
* Fix bug where a special folder couldn't be created if a special-use flag is not supported (#7147)
* Mailvelope: Fix bug where recipients with name were not handled properly in mail compose (#7312)
* Fix characters encoding in group rename input after group creation/rename (#7330)
* Fix bug where some message/rfc822 parts could not be attached on forward (#7323)
* Make install-jsdeps.sh script working without the 'file' program installed (#7325)
* Fix performance issue of parsing big HTML messages by disabling HTML5 parser for these (#7331)
* Fix so Print button for PDF attachments works on Firefox &gt;= 75 (#5125)

update to 1.4.3

* Enigma: Fix so key list selection is reset when opening key creation form (#7154)
* Enigma: Fix so using list checkbox selection does not load the key preview frame
* Enigma: Fix generation of key pairs for identities with IDN domains (#7181)
* Enigma: Display IDN domains of key users and identities in UTF8
* Enigma: Fix bug where 'Send unencrypted' button didn't work in Elastic skin (#7205)
* Managesieve: Fix bug where it wasn't possible to save flag actions (#7188)
* Markasjunk: Fix bug where marking as spam/ham didn't work on moving messages with drag-and-drop (#7137)
* Password: Make chpass-wrapper.py Python 3 compatible (#7135)
* Elastic: Fix disappearing sidebar in mail compose after clicking Mail button
* Elastic: Fix incorrect aria-disabled attribute on Mail taskmenu button in mail compose
* Elastic: Fix bug where it was possible to switch editor mode when 'htmleditor' was in 'dont_override' (#7143)
* Elastic: Fix text selection in recipient inputs (#7129)
* Elastic: Fix missing Close button in 'more recipients' dialog
* Elastic: Fix non-working folder subscription checkbox for newly added folders (#7174)
* Fix regression where 'Open in new window' action didn't work (#7155)
* Fix PHP Warning: array_filter() expects parameter 1 to be array, null given in subscriptions_option plugin (#7165)
* Fix unexpected error message when mail refresh involves folder auto-unsubscribe (#6923)
* Fix recipient duplicates in print-view when the recipient list has been expanded (#7169)
* Fix bug where files in skins/ directory were listed on skins list (#7180)
* Fix bug where message parts with no Content-Disposition header and no name were not listed on attachments list (#7117)
* Fix display issues with mail subject that contains line-breaks (#7191)
* Fix invalid Content-Transfer-Encoding on multipart messages - Mail_Mime fix (#7170)
* Fix regression where using an absolute path to SQLite database file on Windows didn't work (#7196)
* Fix using unix:///path/to/socket.file in memcached driver (#7210)

- prefer brotli over gzip if brotli is available:
  + enable mod_brotli in roundcubemail-httpd.conf (after deflate)
  + enable brotli via a2enmod for new installations

update to 1.4.2:

* Plugin API: Make actionbefore, before, actionafter and after 
	      events working with plugin actions (#7106)
* Managesieve: Replace 'Filter disabled' with 'Filter enabled' (#7028)
* Managesieve: Fix so modifier type select wasn't hidden after hiding 
	       modifier select on header change
* Managesieve: Fix filter selection after removing a first filter (#7079)
* Markasjunk: Fix marking more than one message as spam/ham with 
	      email_learn driver (#7121)
* Password: Fix kpasswd and smb drivers' double-escaping bug (#7092)
* Enigma: Add script to import keys from filesystem to the db 
	  storage (for multihost)
* Installer: Fix DB Write test on SQLite database
	     ('database is locked' error) (#7064)
* Installer: Fix so SQLite DSN with a relative path to the database
	     file works in Installer
* Elastic: Fix contrast of warning toasts (#7058)
* Elastic: Simple search in pretty selects (#7072)
* Elastic: Fix hidden list widget on mobile/tablet when selecting 
	   folder while search menu is open (#7120)
* Fix so type attribute on script tags is not used on HTML5 pages (#6975)
* Fix unread count after purge on a folder that is not currently selected (#7051)
* Fix bug where Enter key didn't work on messages list in 'List' layout (#7052)
* Fix bug where deleting a saved search in addressbook caused 
  display issue on sources/groups list (#7061)
* Fix bug where a new saved search added after removing all searches
  wasn't added to the list (#7061)
* Fix bug where a new contact group added after removing all groups
  from addressbook wasn't added to the list
* Fix so install-jsdeps.sh removes Bootstrap's sourceMappingURL (#7035)
* Fix so use of Ctrl+A does not scroll the list (#7020)
* Fix/remove useless keyup event handler on username input in logon form (#6970)
* Fix bug where cancelling switching from HTML to plain text didn't
  set the flag properly (#7077)
* Fix bug where HTML reply could add an empty line with extra indentation
  above the original message (#7088)
* Fix matching multiple X-Forwarded-For addresses with 'proxy_whitelist' (#7107)
* Fix so displayed maximum attachment size depends also on 'max_message_size' (#7105)
* Fix bug where 'skins_allowed' option didn't enforce user skin 
  preference (#7080)
* Fix so contact's organization field accepts up to 128 characters
  (it was 50)
* Fix bug where listing tables in PostgreSQL database with db_prefix 
  didn't work (#7093)
* Fix bug where 'text' attribute on body tag was ignored when 
  displaying HTML message (#7109)
* Fix bug where next message wasn't displayed after delete in List mode (#7096)
* Fix so number of contacts in a group is not limited to 200 when
  redirecting to mail composer from Contacts (#6972)
* Fix malformed characters in HTML message with charset meta tag 
 not in head (#7116)

- php documentor is not needed on a productive system -&gt; remove
- also fix /usr/bin/env calls for two vendor scripts
- skins now have some configurable files in their directories: 
  move those files over to /etc/roundcubemail/skins/
- move other text files (incl. vendor ones) out of the root 
  directory (and handle the LICENSE file a bit different)
- enable mod_filter and add AddOutputFilterByType for common media
  types like html, javascript or xml
- enable php7 on newer openSUSE versions
- enable deflate, expires, filter, headers and setenvif on a new 
  installation - do not enable any module in case of an update
- recommend php-imagick for additional features

- fixed most of the shell scripts to contain /usr/bin/php

Upgrade to version 1.4.1:

* new defaults for smtp_* config options
* changed default password_charset to UTF-8
* login page returning 401 Unauthorized status

Upgrade to version 1.4.0:

* Update to jQuery 3.4.1
* Update to TinyMCE 4.8.2
* Update to jQuery-MiniColors 2.3.4
* Clarified 'address_book_type' option behavior (#6680)
* Added cookie mismatch detection, display an error message informing the user to clear cookies
* Renamed 'log_session' option to 'session_debug'
* Removed 'delete_always' option (#6782)
* Don't log full session identifiers in userlogins log (#6625)
* Support $HasAttachment/$HasNoAttachment keywords (#6201)
* Support PECL memcached extension as a session and cache storage driver (experimental)
* Switch to IDNA2008 variant (#6806)
* installto.sh: Add possibility to run the update even on the up-to-date installation (#6533)
* Plugin API: Add 'render_folder_selector' hook
* Added 'keyservers' option to define list of HKP servers for Enigma/Mailvelope (#6326)
* Added flag to disable server certificate validation via Mysql DSN argument (#6848)
* Select all records on the current list page with CTRL + A (#6813)
* Use Left/Right Arrow keys to faster move over threaded messages list (#6399)
* Changes in display_next setting (#6795):
*   * Move it to Preferences &gt; User Interface &gt; Main Options
*   * Make it apply to Contacts interface too
*   * Make it apply only if deleting/moving a previewed message/contact
* Redis: Support connection to unix socket
* Put charset meta specification before a title tag, add page title automatically (#6811)
* Elastic: Various internal refactorings
* Elastic: Add Prev/Next buttons on message page toolbar (#6648)
* Elastic: Close search options on Enter key press in quick-search input (#6660)
* Elastic: Changed some icons (#6852)
* Elastic: Changed read/unread icons (#6636)
* Elastic: Changed 'Move to...' icon (#6637)
* Elastic: Add hide/show for advanced preferences (#6632)
* Elastic: Add default icon on Settings/Preferences lists for external plugins (#6814)
* Elastic: Add indicator for popover menu items that open a submenu (#6868)
* Elastic: Move compose attachments/options to the right side (#6839)
* Elastic: Add border/background to attachments list widget (#6842)
* Elastic: Add 'Show unread messages' button to the search bar (#6587)
* Elastic: Fix bug where toolbar disappears on attachment menu use in Chrome (#6677)
* Elastic: Fix folders list scrolling on touch devices (#6706)
* Elastic: Fix non-working pretty selects in Chrome browser (#6705)
* Elastic: Fix issue with absolute positioned mail content (#6739)
* Elastic: Fix bug where some menu actions could cause a browser popup warning
* Elastic: Fix handling mailto: URL parameters in contact menu (#6751)
* Elastic: Fix keyboard navigation in some menus, e.g. the contact menu
* Elastic: Fix visual issue with long buttons in .boxwarning (#6797)
* Elastic: Fix handling new-line in text pasted to a recipient input
* Elastic: Fix so search is not reset when returning from the message preview page (#6847)
* Larry: Fix regression where menu actions didn't work with keyboard (#6740)
* ACL: Display user/group names (from ldap) instead of acl identifier
* Password: Added ldap_exop driver (#4992)
* Password: Added support for SSHA512 password algorithm (#6805)
* Managesieve: Fix bug where global includes were requested for vacation (#6716)
* Managesieve: Use RFC-compliant line endings, CRLF instead of LF (#6686)
* Managesieve: Fix so 'Create filter' option does not show up when Filters menu is disabled (#6723)
* Enigma: For verified signatures, display the user id associated with the sender address (#5958)
* Enigma: Fix bug where revoked users/keys were not greyed out in key info
* Enigma: Fix error message when trying to encrypt with a revoked key (#6607)
* Enigma: Fix 'decryption oracle' bug [CVE-2019-10740] (#6638)
* Enigma: Fix bug where signature verification could have been skipped for some message structures (#6838)
* Fix language selection for spellchecker in html mode (#6915)
* Fix css styles leak from replied/forwarded message to the rest of the composed text (#6831)
* Fix invalid path to 'add contact' icon when using assets_path setting
* Fix invalid path to blocked.gif when using assets_path setting (#6752)
* Fix so advanced search dialog is not automatically displayed on searchonly addressbooks (#6679)
* Fix so an error is logged when more than one attachment plugin has been enabled, initialize the first one (#6735)
* Fix bug where flag change could have been passed to a preview frame when not expected
* Fix bug in HTML parser that could cause missing text fragments when there was no head/body tag (#6713)
* Fix bug where HTML messages with a xml:namespace tag were not rendered (#6697)
* Fix TinyMCE download location (#6694)
* Fix so 'Open in new window' consistently displays 'external window' interface (#6659)
* Fix bug where next row wasn't selected after deleting a collapsed thread (#6655)
* Fix bug where external content (e.g. mail body) was passed to templates parsing code (#6640)
* Fix bug where attachment preview didn't work with x_frame_options=deny (#6688)
* Fix so bin/install-jsdeps.sh returns error code on error (#6704)
* Fix bug where bmp images couldn't be displayed on some systems (#6728)
* Fix bug in parsing vCard data using PHP 7.3 due to an invalid regexp (#6744)
* Fix bug where bold/strong text was converted to upper-case on html-to-text conversion (6758)
* Fix bug in rcube_utils::parse_hosts() where %t, %d, %z could return only tld (#6746)
* Fix bug where Next/Prev button in mail view didn't work with multi-folder search result (#6793)
* Fix bug where selection of columns on messages list wasn't working
* Fix bug in converting multi-page Tiff images to Jpeg (#6824)
* Fix bug where handling multiple messages from multi-folder search result could not work (#6845)
* Fix bug where unread count wasn't updated after moving multi-folder result (#6846)
* Fix wrong messages order after returning to a multi-folder search result (#6836)
* Fix some PHP 7.4 compat. issues (#6884, #6866)
* Fix bug where it was possible to bypass the position:fixed CSS check in received messages (#6898)
* Fix bug where some strict remote URIs in url() style were unintentionally blocked (#6899)
* Fix bug where it was possible to bypass the CSS jail in HTML messages using :root pseudo-class (#6897)
* Fix bug where it was possible to bypass href URI check with data:application/xhtml+xml URIs (#6896)
* Changed 'password_charset' default to 'UTF-8' (#6522)
* Add skins_allowed option (#6483)
* SMTP GSSAPI support via krb_authentication plugin (#6417)
* Avoid Referer leaking by using Referrer-Policy:same-origin header (#6385)
* Removed 'referer_check' option (#6440)
* Use constant prefix for temp file names, don't remove temp files from other apps (#6511)
* Ignore 'Sender' header on Reply-All action (#6506)
* deluser.sh: Add option to delete users who have not logged in for more than X days (#6340)
* HTML5 Upload Progress - as a replacement for the old server-side solution (#6177)
* Prevent from using deprecated timezone names from jsTimezoneDetect
* Force session.gc_probability=1 when using custom session handlers (#6560)
* Support simple field labels (e.g. LetterHub examples) in csv imports (#6541)
* Add cache busters also to images used by templates (#6610)
* Plugin API: Added 'raise_error' hook (#6199)
* Plugin API: Added 'common_headers' hook (#6385)
* Plugin API: Added 'ldap_connected' hook
* Enigma: Update to OpenPGPjs 4.2.1 - fixes user name encoding issues in key generation (#6524)
* Enigma: Fixed multi-host synchronization of private and deleted keys and pubring.kbx file
* Managesieve: Added support for 'editheader' extension - RFC5293 (#5954)
* Managesieve: Fix bug where custom header or variable could be lost on form submission (#6594)
* Markasjunk: Integrate markasjunk2 features into markasjunk - marking as non-junk + learning engine (#6504)
* Password: Added 'modoboa' driver (#6361)
* Password: Fix bug where password_dovecotpw_with_method setting could be ignored (#6436)
* Password: Fix bug where new users could skip forced password change (#6434)
* Password: Allow drivers to override default password comparisons (eg new is not same as current) (#6473)
* Password: Allow drivers to override default strength checks (eg allow for 'not the same as last x passwords') (#246)
* Passowrd: Allow drivers to define password strength rules displayed to the user
* Password: Allow separate password saving and strength drivers for use of strength checking services (#5040)
* Password: Add zxcvbn driver for checking password strength (#6479)
* Password: Disallow control characters in passwords
* Password: Add support for Plesk &gt;= 17.8 (#6526)
* Elastic: Improved datepicker displayed always in parent window
* Elastic: On touch devices display attachment icons on messages list (#6296)
* Elastic: Make menu button inactive if all subactions are inactive (#6444)
* Elastic: On mobile/tablet jump to the list on folder selection (#6415)
* Elastic: Various improvements on mail compose screen (#6413)
* Elastic: Support new-line char as a separator for pasted recipients (#6460)
* Elastic: Improved UX of search dialogs (#6416)
* Elastic: Fix unwanted thread expanding when selecting a collapsed thread in non-mobile mode (#6445)
* Elastic: Fix too small height of mailvelope mail preview frame (#6600)
* Elastic: Add 'status bar' for mobile in mail composer
* Elastic: Add selection options on contacts list (#6595)
* Elastic: Fix unintentional layout preference overwrite (#6613)
* Elastic: Fix bug where Enigma options in mail compose could sometimes be ignored (#6515)
* Log errors caused by low pcre.backtrack_limit when sending a mail message (#6433)
* Fix regression where drafts were not deleted after sending the message (#6756)
* Fix so max_message_size limit is checked also when forwarding messages as attachments (#6580)
* Fix so performance stats are logged to the main console log also when per_user_logging=true
* Fix malformed message saved into Sent folder when using big attachments and low memory limit (#6498)
* Fix incorrect IMAP SASL GSSAPI negotiation (#6308)
* Fix so unicode in local part of the email address is also supported in recipient inputs (#6490)
* Fix bug where autocomplete list could be displayed out of screen (#6469)
* Fix style/navigation on error page depending on authentication state (#6362)
* Fix so invalid smtp_helo_host is never used, fallback to localhost (#6408)
* Fix custom logo size in Elastic (#6424)
* Fix listing the same attachment multiple times on forwarded messages
* Fix bug where a message/rfc822 part without a filename wasn't listed on the attachments list (#6494)
* Fix inconsistent offset for various time zones - always display Standard Time offset (#6531)
* Fix dummy Message-Id when resuming a draft without Message-Id header (#6548)
* Fix handling of empty entries in vCard import (#6564)
* Fix bug in parsing some IMAP command responses that include unsolicited replies (#6577)
* Fix PHP 7.2 compatibility in debug_logger plugin (#6586)
* Fix so ANY record is not used for email domain validation, use A, MX, CNAME, AAAA instead (#6581)
* Fix so mime_content_type check in Installer uses files that should always be available (i.e. from program/resources) (#6599)
* Fix missing CSRF token on a link to download too-big message part (#6621)
* Fix bug when aborting dragging with ESC key didn't stop the move action (#6623)
* Improved Mailvelope integration
*   * Added private key listing and generating to identity settings
*   * Enable encrypt &amp; sign option if Mailvelope supports it
* Allow contacts without an email address (#5079)
* Support SMTPUTF8 and relax email address validation to support unicode in local part (#5120)
* Support for IMAP folders that cannot contain both folders and messages (#5057)
* Remove sample PHP configuration from .htaccess and .user.ini files (#5850)
* Extend skin_logo setting to allow per skin logos (#6272)
* Use Masterminds/HTML5 parser for better HTML5 support (#5761)
* Add More actions button in Contacts toolbar with Copy/Move actions (#6081)
* Display an error when clicking disabled link to register protocol handler (#6079)
* Add option trusted_host_patterns (#6009, #5752)
* Support additional connect parameters in PostgreSQL database wrapper
* Use UI dialogs instead of confirm() and alert() where possible
* Display value of the SMTP message size limit in the error message (#6032)
* Show message flagged status in message view (#5080)
* Skip redundant INSERT query on successful logon when using PHP7
* Replace display_version with display_product_version (#5904)
* Extend disabled_actions config so it accepts also button names (#5903)
* Handle remote stylesheets the same as remote images, ask the user to allow them (#5994)
* Add Message-ID to the sendmail log (#5871)
* Add option to hide folders in share/other-user namespace or outside of the personal namespace root (#5073)
* Archive: Fix archiving by sender address on cyrus-imap
* Archive: Style Archive folder also on folder selector and folder manager lists
* Archive: Add Thunderbird compatible Month option (#5623)
* Archive: Create archive folder automatically if it's configured, but does not exist (#6076)
* Enigma: Add button to send mail unencrypted if no key was found (#5913)
* Enigma: Add options to set PGP cipher/digest algorithms (#5645)
* Enigma: Multi-host support
* Managesieve: Add ability to disable filter sets and other actions (#5496, #5898)
* Managesieve: Add option managesieve_forward to enable settings dialog for simple forwarding (#6021)
* Managesieve: Support filter action with custom IMAP flags (#6011)
* Managesieve: Support 'mime' extension tests - RFC5703 (#5832)
* Managesieve: Support GSSAPI authentication with krb_authentication plugin (#5779)
* Managesieve: Support enabling the plugin for specified hosts only (#6292)
* Password: Support host variables in password_db_dsn option (#5955)
* Password: Automatic virtualmin domain setting, removed password_virtualmin_format option (#5759)
* Password: Added password_username_format option (#5766)
* subscriptions_option: show \Noselect folders greyed out (#5621)
* zipdownload: Added option to define size limit for multiple messages download (#5696)
* vcard_attachments: Add possibility to send contact vCard from Contacts toolbar (#6080)
* Changed defaults for smtp_user (%u), smtp_pass (%p) and smtp_port (587)
* Composer: Fix certificate validation errors by using packagist only (#5148)
* Add --get and --extract arguments and CACHEDIR env-variable support to install-jsdeps.sh (#5882)
* Support _filter and _scope as GET arguments for opening mail UI (#5825)
* Various improvements for templating engine and skin behaviours
*   * Support conditional include
*   * Support for 'link' objects
*   * Support including files with path relative to templates directory
*   * Use instead of for submit button on logon screen
* Support skin localization (#5853)
* Reset onerror on images if placeholder does not exist to prevent from requests storm
* Unified and simplified code for loading content frame for responses and identities
* Display contact import and advanced search in popup dialogs
* Display a dialog for mail import with supported format description and upload size hint
* Make possible to set (some) config options from a skin
* Added optional checkbox selection for the list widget
* Make 'compose' command always enabled
* Add .log suffix to all log file names, add option log_file_ext to control this (#313)
* Return '401 Unauthorized' status when login fails (#5663)
* Support both comma and semicolon as recipient separator, drop recipients_separator option (#5092)
* Plugin API: Added 'show_bytes' hook (#5001)
* Add option to not indent quoted text on top-posting reply (#5105)
* Removed global $CONFIG variable
* Removed debug_level setting
* Support AUTHENTICATE LOGIN for IMAP connections (#5563)
* Support LDAP GSSAPI authentication (#5703)
* Localized timezone selector (#4983)
* Use 7bit encoding for ISO-2022-* charsets in sent mail (#5640)
* Handle inline images also inside multipart/mixed messages (#5905)
* Allow style tags in HTML editor on composed/reply messages (#5751)
* Use Github API as a fallback to fetch js dependencies to workaround throttling issues (#6248)
* Show confirm dialog when moving folders using drag and drop (#6119)
* Fix bug where new_user_dialog email check could have been circumvented by deleting / abandoning session (#5929)
* Fix skin extending for assets (#5115)
* Fix handling of forwarded messages inside of a TNEF message (#5632)
* Fix bug where attachment size wasn't visible when the filename was too long (#6033)
* Fix checking table columns when there's more schemas/databases in postgres/mysql (#6047)
* Fix css conflicts in user interface and e-mail content (#5891)
* Fix duplicated signature when using Back button in Chrome (#5809)
* Fix touch event issue on messages list in IE/Edge (#5781)
* Fix so links over images are not removed in plain text signatures converted from HTML (#4473)
* Fix various issues when downloading files with names containing non-ascii chars, use RFC 2231 (#5772)

Upgrade to version 1.3.10:

* Enigma: Fix 'decryption oracle' bug [CVE-2019-10740] (#6638)

Upgrade to version 1.3.9:

* Fix TinyMCE download location(s) (#6694)
* Fix so mime_content_type check in Installer uses files that should always be available (i.e. from program/resources) (#6599)

Upgrade to version 1.3.8:

* Fix support for 'allow-from ' in x_frame_options config option (#6449)

- add files with .log entry to logrotate config

enhance apache configuration by:

+ disable mbstring function overload (http://bugs.php.net/bug.php?id=30766)
+ do not allow to see README*, INSTALL, LICENSE or CHANGELOG files
+ set additional headers:

  + Content-Security-Policy: ask browsers to not set the referrer
  + Cache-Control: ask not to cache the content
  + Strict-Transport-Security: set HSTS rules for SSL traffic
  + X-XSS-Protection: configure built in reflective XSS protection

adjust README.openSUSE: 

+ db.inc.php is not used any longer
+ flush privileges after creating/changing users in mysql

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-16"/>
	<updated date="2022-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180132">SUSE bug 1180132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180399">SUSE bug 1180399</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10740/">CVE-2019-10740</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12641/">CVE-2020-12641</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-16145/">CVE-2020-16145</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-35730/">CVE-2020-35730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718205" comment="roundcubemail-1.5.3-bp154.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52172" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203916" ref_url="https://bugzilla.suse.com/1203916" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:10150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVTL2KV3JG27JUMNWMUX7I7ZIHH5XZFU/" source="SUSE-SU"/>
		<description>
This update for seamonkey fixes the following issues:

Update to SeaMonkey 2.53.14

* Updates to the following DOM HTML element interfaces: Embed,
  Object, Anchor, Area, Button, Frame, Canvas, IFrame, Link, Image,
  MenuItem, TextArea, Source, Select, Option, Script and
  Html. Please test add-ons.
* Continue the switch from Python 2 to Python 3 in the build system.
* Add ESR 102 links to debugQA bug 1779028.
* Remove about plugins from help menu bug 1779031.
* Dead links in cs_nav_prefs_advanced.xhtml [en-US] bug 1783558.
* Dead links in cs_nav_prefs_advanced.xhtml bug 1786030.
* Remove obsolete chat services from SeaMonkey address book bug
  1779034.
* Address Book: 'Get Map' button is not shown for home addresses bug
  1779319.
* Added compatibility for rust 1.63
* SeaMonkey 2.53.14 uses the same backend as Firefox and contains
  the relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.14 shares most parts of the mail and news code with
  Thunderbird. Please read the Thunderbird 60.8.0 release notes for
  specific security fixes in this release.
* Additional important security fixes up to Current Firefox 91.11
  and Thunderbird 91.11 ESR plus many enhancements have been
  backported. We will continue to enhance SeaMonkey security in
  subsequent 2.53.x beta and release versions as fast as we are able
  to.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-16"/>
	<updated date="2022-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203916">SUSE bug 1203916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718209" comment="seamonkey-2.53.14-lp153.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718210" comment="seamonkey-dom-inspector-2.53.14-lp153.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718211" comment="seamonkey-irc-2.53.14-lp153.17.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52173" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204223" ref_url="https://bugzilla.suse.com/1204223" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3445" ref_url="https://www.suse.com/security/cve/CVE-2022-3445/" source="CVE"/>
		<reference ref_id="CVE-2022-3446" ref_url="https://www.suse.com/security/cve/CVE-2022-3446/" source="CVE"/>
		<reference ref_id="CVE-2022-3447" ref_url="https://www.suse.com/security/cve/CVE-2022-3447/" source="CVE"/>
		<reference ref_id="CVE-2022-3448" ref_url="https://www.suse.com/security/cve/CVE-2022-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-3449" ref_url="https://www.suse.com/security/cve/CVE-2022-3449/" source="CVE"/>
		<reference ref_id="CVE-2022-3450" ref_url="https://www.suse.com/security/cve/CVE-2022-3450/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QUDBY5HPZNDIBXMYYE7FBKSD75FNNRG2/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 106.0.5249.119 (boo#1204223):

* CVE-2022-3445: Use after free in Skia
* CVE-2022-3446: Heap buffer overflow in WebSQL
* CVE-2022-3447: Inappropriate implementation in Custom Tabs
* CVE-2022-3448: Use after free in Permissions API
* CVE-2022-3449: Use after free in Safe Browsing
* CVE-2022-3450: Use after free in Peer Connection
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204223">SUSE bug 1204223</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3445/">CVE-2022-3445</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3446/">CVE-2022-3446</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3447/">CVE-2022-3447</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3448/">CVE-2022-3448</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3449/">CVE-2022-3449</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3450/">CVE-2022-3450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718657" comment="chromedriver-106.0.5249.119-bp153.2.128.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718658" comment="chromium-106.0.5249.119-bp153.2.128.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52174" version="1" class="patch">
	<metadata>
		<title>Security update for v4l2loopback (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202156" ref_url="https://bugzilla.suse.com/1202156" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2652" ref_url="https://www.suse.com/security/cve/CVE-2022-2652/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7TOUD7WBZ7HIZPTAF5TWVMSY3TRYEZ7/" source="SUSE-SU"/>
		<description>
This update for v4l2loopback fixes the following issues:

- Fix string format vulnerability (boo#1202156, CVE-2022-2652)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202156">SUSE bug 1202156</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2652/">CVE-2022-2652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719728" comment="v4l2loopback-autoload-0.12.5-lp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719729" comment="v4l2loopback-kmp-64kb-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719730" comment="v4l2loopback-kmp-default-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719731" comment="v4l2loopback-kmp-preempt-0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719732" comment="v4l2loopback-utils-0.12.5-lp153.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52175" version="1" class="patch">
	<metadata>
		<title>Security update for cacti, cacti-spine (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203952" ref_url="https://bugzilla.suse.com/1203952" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:10170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4N2IME3ZV66JFS7PNXIVHLTVG4ZWSVC/" source="SUSE-SU"/>
		<description>
This update for cacti, cacti-spine fixes the following issues:

cacti-spine 1.2.22, delivering a number of bug fixes:

* When polling time is exceed, spine does not always exit as expected
* Spine logging at `-V 5` includes an extra line feed
* Incorrect SNMP responses can cause spine to crash
* Properly handle devices that timeout responding to the Extended Uptime
* MariaDB can cause spine to abort prematurely despite error handling
* Spine should log the error time when exiting via signal

cacti-spine 1.2.21:

* Disable DES if Net-SNMP doesn't have it

cacti 1.2.22, providing one security fix, a number of bug fixes and a collection of improvements:

* When creating new graphs, cross site injection is possible
  (boo#1203952)
* When creating user from template, multiple Domain FullName and
  Mail are not propagated
* Nectar Aggregate 95th emailed report broken
* Boost may not find archive tables correctly
* Users may be unable to change their password when forced during
  a login
* Net-SNMP Memory Graph Template has Wrong GPRINT
* Search in tree view unusable on larger installations
* Increased bulk insert size to avoid partial inserts and potential
  data loss.
* Call to undefined function boost_debug in Cacti log
* When no guest template is set, login cookies are not properly set
* Later RRDtool releases do not need to check last_update time
* Regex filters are not always long enough
* Domains based LDAP and AD Fullname and Email not auto-populated
* Cacti polling and boost report the wrong number of Data Sources
  when Devices are disabled
* When editing Graph Template Items there are cases where VDEF's
  are hidden when they should be shown
* Database SSL setting lacks default value
* Update default path cacti under *BSD by xmacan
* Web Basic authentication not creating template user
* Unable to change the Heartbeat of a Data Source Profile
* Tree Search Does Not Properly Search All Trees
* When structured paths are setup, RRDfiles may not always be
  created when possible
* When parsing the logs, caching would help speed up processing
* Deprecation warnings when attempting real-time Graphs with PHP8.1
* Custom Timespan is lost when clicking other tree branches
* Non device based Data Sources not being polled
* When Resource XML file inproperly formatted, graph creation can
  fail with errors
* Update code style to support PHP 8 requirements
* None' shows all graphs
* Realtime popup window experiences issues on some browsers
* Auth settings do not always properly reflect the options selected
  by ddb4github
* MySQL can cause cacti to become stalled due to locking issues
* Boost process can get hung under rare conditions until the poller
  times out
* Exporting graphs under PHP 8 can cause errors
* Host table has wrong default for disabled and deleted columns
* RRD storage paths do not scale properly
* When importing, make it possible to only import certain
  components
* Update change_device script to include new features by
  bmfmancini
* Make help pages use latest online version wherever possible
* Cacti should show PHP INI locations during install
* Detect PHP INI values that are different in the INI vs running
  config
* Added Gradient Color support for AREA charts by thurban
* Update CDEF functions for RRDtool
* When boost is running, it's not clear which processes are
  running and how long they have to complete

cacti 1.2.21:

* Add a CLI script to install/enable/disable/uninstall plugins
* Add log message when purging DS stats and poller repopulate
* A collection of bug fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-30"/>
	<updated date="2022-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203952">SUSE bug 1203952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722248" comment="cacti-1.2.22-bp154.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722249" comment="cacti-spine-1.2.22-bp154.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52176" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204732" ref_url="https://bugzilla.suse.com/1204732" source="BUGZILLA"/>
		<reference ref_id="1204819" ref_url="https://bugzilla.suse.com/1204819" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3652" ref_url="https://www.suse.com/security/cve/CVE-2022-3652/" source="CVE"/>
		<reference ref_id="CVE-2022-3653" ref_url="https://www.suse.com/security/cve/CVE-2022-3653/" source="CVE"/>
		<reference ref_id="CVE-2022-3654" ref_url="https://www.suse.com/security/cve/CVE-2022-3654/" source="CVE"/>
		<reference ref_id="CVE-2022-3655" ref_url="https://www.suse.com/security/cve/CVE-2022-3655/" source="CVE"/>
		<reference ref_id="CVE-2022-3656" ref_url="https://www.suse.com/security/cve/CVE-2022-3656/" source="CVE"/>
		<reference ref_id="CVE-2022-3657" ref_url="https://www.suse.com/security/cve/CVE-2022-3657/" source="CVE"/>
		<reference ref_id="CVE-2022-3658" ref_url="https://www.suse.com/security/cve/CVE-2022-3658/" source="CVE"/>
		<reference ref_id="CVE-2022-3659" ref_url="https://www.suse.com/security/cve/CVE-2022-3659/" source="CVE"/>
		<reference ref_id="CVE-2022-3660" ref_url="https://www.suse.com/security/cve/CVE-2022-3660/" source="CVE"/>
		<reference ref_id="CVE-2022-3661" ref_url="https://www.suse.com/security/cve/CVE-2022-3661/" source="CVE"/>
		<reference ref_id="CVE-2022-3723" ref_url="https://www.suse.com/security/cve/CVE-2022-3723/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZTHS4CVKMHGRNVO5FNFQEVHUH3FEZU/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 107.0.5304.87 (boo#1204819)

* CVE-2022-3723: Type Confusion in V8

Chromium 107.0.5304.68 (boo#1204732)

* CVE-2022-3652: Type Confusion in V8
* CVE-2022-3653: Heap buffer overflow in Vulkan
* CVE-2022-3654: Use after free in Layout
* CVE-2022-3655: Heap buffer overflow in Media Galleries
* CVE-2022-3656: Insufficient data validation in File System
* CVE-2022-3657: Use after free in Extensions
* CVE-2022-3658: Use after free in Feedback service on Chrome OS
* CVE-2022-3659: Use after free in Accessibility
* CVE-2022-3660: Inappropriate implementation in Full screen mode
* CVE-2022-3661: Insufficient data validation in Extensions
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-31"/>
	<updated date="2022-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204732">SUSE bug 1204732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204819">SUSE bug 1204819</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3652/">CVE-2022-3652</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3653/">CVE-2022-3653</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3654/">CVE-2022-3654</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3655/">CVE-2022-3655</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3656/">CVE-2022-3656</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3657/">CVE-2022-3657</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3658/">CVE-2022-3658</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3659/">CVE-2022-3659</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3660/">CVE-2022-3660</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3661/">CVE-2022-3661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3723/">CVE-2022-3723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722304" comment="chromedriver-107.0.5304.87-bp153.2.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722305" comment="chromium-107.0.5304.87-bp153.2.133.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52177" version="1" class="patch">
	<metadata>
		<title>Security update for jhead (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204409" ref_url="https://bugzilla.suse.com/1204409" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41751" ref_url="https://www.suse.com/security/cve/CVE-2022-41751/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFMTRO5RSDHT5PY4FQHOWNZRZQHNYXPB/" source="SUSE-SU"/>
		<description>
This update for jhead fixes the following issues:

- CVE-2022-41751: Fixed shell injection via filenames (boo#1204409)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-31"/>
	<updated date="2022-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204409">SUSE bug 1204409</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41751/">CVE-2022-41751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722306" comment="jhead-3.00-bp153.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52178" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-3445" ref_url="https://www.suse.com/security/cve/CVE-2022-3445/" source="CVE"/>
		<reference ref_id="CVE-2022-3446" ref_url="https://www.suse.com/security/cve/CVE-2022-3446/" source="CVE"/>
		<reference ref_id="CVE-2022-3447" ref_url="https://www.suse.com/security/cve/CVE-2022-3447/" source="CVE"/>
		<reference ref_id="CVE-2022-3448" ref_url="https://www.suse.com/security/cve/CVE-2022-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-3449" ref_url="https://www.suse.com/security/cve/CVE-2022-3449/" source="CVE"/>
		<reference ref_id="CVE-2022-3450" ref_url="https://www.suse.com/security/cve/CVE-2022-3450/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SHXWIROKV3SIJKHPXP6R4LWJZZG2XC77/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 92.0.4561.21

- CHR-9037 Update chromium on desktop-stable-106-4561 to
  106.0.5249.119
- DNA-102295 Missing GX.games section in settings
- DNA-102308 Presubmit errors
- DNA-102329 [Consent flow] clicking on 'Customize settings'
  doesn't resize the popup
- DNA-102340 Sidebar control panel doesn't hide
- DNA-102348 Replace old Dify url with a new one
- DNA-102430 Translations for O92
- DNA-102534 Allow staging RH Agent extension to use VPN Pro API
- DNA-102548 Rich hints extension crashes on Linux
- DNA-102551 Promote O92 to stable
- Complete Opera 92.0 changelog at: https://blogs.opera.com/desktop/changelog-for-92/
- The update to chromium 106.0.5249.119 fixes following issues:  
  CVE-2022-3445, CVE-2022-3446, CVE-2022-3447, CVE-2022-3448,
  CVE-2022-3449, CVE-2022-3450

Update to 91.0.4516.77

- DNA-101988 Implement dark mode for consent flow popups
- DNA-102348 Replace old Dify url with a new one

Update to 91.0.4516.65

- DNA-101240 Save “remind in 3 days” setting
- DNA-101622 Add a way to check if browser is connected to webenv
- DNA-101838 Unfiltered dropdown disabled by default on stable
- DNA-101990 Boost sites into top sites
- DNA-101998 flag tiktok-panel doesn’t work
- DNA-102075 Crash at extensions::ExtensionApiFrameIdMap::
  OnRenderFrameDeleted(content::RenderFrameHost*)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-31"/>
	<updated date="2022-10-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3445/">CVE-2022-3445</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3446/">CVE-2022-3446</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3447/">CVE-2022-3447</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3448/">CVE-2022-3448</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3449/">CVE-2022-3449</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3450/">CVE-2022-3450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722307" comment="opera-92.0.4561.21-lp153.2.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52179" version="1" class="patch">
	<metadata>
		<title>Security update for EternalTerminal (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202432" ref_url="https://bugzilla.suse.com/1202432" source="BUGZILLA"/>
		<reference ref_id="1202433" ref_url="https://bugzilla.suse.com/1202433" source="BUGZILLA"/>
		<reference ref_id="1202434" ref_url="https://bugzilla.suse.com/1202434" source="BUGZILLA"/>
		<reference ref_id="1202435" ref_url="https://bugzilla.suse.com/1202435" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24949" ref_url="https://www.suse.com/security/cve/CVE-2022-24949/" source="CVE"/>
		<reference ref_id="CVE-2022-24950" ref_url="https://www.suse.com/security/cve/CVE-2022-24950/" source="CVE"/>
		<reference ref_id="CVE-2022-24951" ref_url="https://www.suse.com/security/cve/CVE-2022-24951/" source="CVE"/>
		<reference ref_id="CVE-2022-24952" ref_url="https://www.suse.com/security/cve/CVE-2022-24952/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH3ZAC25EJQ7SSVMLKBZFLS6IEAXTLZ2/" source="SUSE-SU"/>
		<description>
This update for EternalTerminal fixes the following issues:

Update to 6.2.1:

* CVE-2022-24949: Fixed race condition allows local attacker to hijack IPC socket (boo#1202435)
* CVE-2022-24950: Fixed privilege escalation to root (boo#1202434)
* CVE-2022-24951: Fixed DoS triggered remotely by invalid sequence numbers (boo#1202433)
* CVE-2022-24952: Fixed race condition allows authenticated attacker to hijack other users' SSH authorization socket (boo#1202432)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-02"/>
	<updated date="2022-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202432">SUSE bug 1202432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202433">SUSE bug 1202433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202434">SUSE bug 1202434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202435">SUSE bug 1202435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24949/">CVE-2022-24949</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24950/">CVE-2022-24950</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24951/">CVE-2022-24951</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24952/">CVE-2022-24952</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722726" comment="EternalTerminal-6.2.1-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52180" version="1" class="patch">
	<metadata>
		<title>Security update for deluge (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203162" ref_url="https://bugzilla.suse.com/1203162" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3427" ref_url="https://www.suse.com/security/cve/CVE-2021-3427/" source="CVE"/>
		<description>
This update for deluge fixes the following issues:

Update to version 2.1.1:

- CVE-2021-3427: Fixed a XSS in webui via crafted torrent file (boo#1203162).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-06"/>
	<updated date="2022-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203162">SUSE bug 1203162</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3427/">CVE-2021-3427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724320" comment="deluge-2.1.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724321" comment="deluge-lang-2.1.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52181" version="1" class="patch">
	<metadata>
		<title>Security update for exim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204427" ref_url="https://bugzilla.suse.com/1204427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3559" ref_url="https://www.suse.com/security/cve/CVE-2022-3559/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHI2HMP6DAOZTDSD24DOTAX6F7CVWV26/" source="SUSE-SU"/>
		<description>
This update for exim fixes the following issues:

- CVE-2022-3559: Fixed use after free in processing of the component Regex Handler (boo#1204427, Bug 2915)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204427">SUSE bug 1204427</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3559/">CVE-2022-3559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724455" comment="exim-4.94.2-bp153.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724456" comment="eximon-4.94.2-bp153.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724457" comment="eximstats-html-4.94.2-bp153.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52182" version="1" class="patch">
	<metadata>
		<title>Security update for autotrace (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201529" ref_url="https://bugzilla.suse.com/1201529" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32323" ref_url="https://www.suse.com/security/cve/CVE-2022-32323/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUMZT6BYF7XO3BJFTLFUUIIAHPDB3QMW/" source="SUSE-SU"/>
		<description>
This update for autotrace fixes the following issues:

- CVE-2022-32323: Fixed Heap overflow in ReadImage() (boo#1201529).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201529">SUSE bug 1201529</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-32323/">CVE-2022-32323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725107" comment="autotrace-0.31.1-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725108" comment="autotrace-devel-0.31.1-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725109" comment="libautotrace3-0.31.1-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52183" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205221" ref_url="https://bugzilla.suse.com/1205221" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3885" ref_url="https://www.suse.com/security/cve/CVE-2022-3885/" source="CVE"/>
		<reference ref_id="CVE-2022-3886" ref_url="https://www.suse.com/security/cve/CVE-2022-3886/" source="CVE"/>
		<reference ref_id="CVE-2022-3887" ref_url="https://www.suse.com/security/cve/CVE-2022-3887/" source="CVE"/>
		<reference ref_id="CVE-2022-3888" ref_url="https://www.suse.com/security/cve/CVE-2022-3888/" source="CVE"/>
		<reference ref_id="CVE-2022-3889" ref_url="https://www.suse.com/security/cve/CVE-2022-3889/" source="CVE"/>
		<reference ref_id="CVE-2022-3890" ref_url="https://www.suse.com/security/cve/CVE-2022-3890/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I5LZV23MCEBLZDJFZZRGXQBMWN5B4RO/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 107.0.5304.110 (boo#1205221)
  * CVE-2022-3885: Use after free in V8
  * CVE-2022-3886: Use after free in Speech Recognition
  * CVE-2022-3887: Use after free in Web Workers
  * CVE-2022-3888: Use after free in WebCodecs
  * CVE-2022-3889: Type Confusion in V8
  * CVE-2022-3890: Heap buffer overflow in Crashpad
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-14"/>
	<updated date="2022-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205221">SUSE bug 1205221</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3885/">CVE-2022-3885</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3886/">CVE-2022-3886</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3887/">CVE-2022-3887</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3888/">CVE-2022-3888</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3889/">CVE-2022-3889</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3890/">CVE-2022-3890</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725179" comment="chromedriver-107.0.5304.110-bp154.2.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725180" comment="chromium-107.0.5304.110-bp154.2.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52184" version="1" class="patch">
	<metadata>
		<title>Security update for jhead (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205167" ref_url="https://bugzilla.suse.com/1205167" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34055" ref_url="https://www.suse.com/security/cve/CVE-2021-34055/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GQXG7P6ITEZEB7XWYDWI6NI2XSYXGLMF/" source="SUSE-SU"/>
		<description>
This update for jhead fixes the following issues:

* CVE-2021-34055: Fix out of bounds write in ClearOrientation() due to unchecked error (boo#1205167)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-14"/>
	<updated date="2022-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205167">SUSE bug 1205167</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34055/">CVE-2021-34055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725326" comment="jhead-3.00-bp153.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52185" version="1" class="patch">
	<metadata>
		<title>Security update for tumbler (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203644" ref_url="https://bugzilla.suse.com/1203644" source="BUGZILLA"/>
		<reference ref_id="1205210" ref_url="https://bugzilla.suse.com/1205210" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:10206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3YPFIEQX2OGYOJXJYYKMLAQCOUQF6NT/" source="SUSE-SU"/>
		<description>
This update for tumbler fixes the following issues:

tumbler was updated to version 4.16.1 (boo#1205210)

  * gst-thumbnailer: Add mime type check (gxo#xfce/tumbler#65)
  * desktop-thumbnailer: Guard against null path
  * Fix typo in gthread version (gxo#xfce/tumbler!14)

- Add Recommends: ffmpegthumbnailer
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-20"/>
	<updated date="2022-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203644">SUSE bug 1203644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205210">SUSE bug 1205210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726160" comment="libtumbler-1-0-4.16.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726161" comment="tumbler-4.16.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726162" comment="tumbler-devel-4.16.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726163" comment="tumbler-doc-4.16.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726164" comment="tumbler-folder-thumbnailer-4.16.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726165" comment="tumbler-lang-4.16.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726166" comment="tumbler-webp-thumbnailer-4.16.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52186" version="1" class="patch">
	<metadata>
		<title>Security update for libpano (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197011" ref_url="https://bugzilla.suse.com/1197011" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33293" ref_url="https://www.suse.com/security/cve/CVE-2021-33293/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKS4BDKAZVWWWVVTSL7CTX5D5EDDL5TV/" source="SUSE-SU"/>
		<description>
This update for libpano fixes the following issues:

- CVE-2021-33293: Fixes out-of-bounds read in the function panoParserFindOLine() in parser.c. (boo#1197011)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-20"/>
	<updated date="2022-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197011">SUSE bug 1197011</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33293/">CVE-2021-33293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726167" comment="libpano-devel-2.9.19-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726168" comment="libpano-utils-2.9.19-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726169" comment="libpano13-3-2.9.19-bp153.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52187" version="1" class="patch">
	<metadata>
		<title>Security update for tor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205307" ref_url="https://bugzilla.suse.com/1205307" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:10209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMI2QZMW7Z7265ZD4MJX4P6F34NIF2HZ/" source="SUSE-SU"/>
		<description>
This update for tor fixes the following issues:

tor 0.4.7.11:

  * Improve security of DNS cache by randomly clipping the TTL
    value (boo#1205307, TROVE-2021-009)
  * Improved defenses against network-wide DoS, multiple counters
    and metrics added to MetricsPorts
  * Apply circuit creation anti-DoS defenses if the outbound
    circuit max cell queue size is reached too many times. This
    introduces two new consensus parameters to control the queue
    size limit and number of times allowed to go over that limit.
  * Directory authority updates
  * IPFire database and geoip updates
  * Bump the maximum amount of CPU that can be used from 16 to 128.
    The NumCPUs torrc option overrides this hardcoded maximum.
  * onion service: set a higher circuit build timeout for opened
    client rendezvous circuit to avoid timeouts and retry load
  * Make the service retry a rendezvous if the circuit is being
    repurposed for measurements
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-20"/>
	<updated date="2022-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205307">SUSE bug 1205307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726159" comment="tor-0.4.7.11-bp154.2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52188" version="1" class="patch">
	<metadata>
		<title>Security update for Botan (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205509" ref_url="https://bugzilla.suse.com/1205509" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43705" ref_url="https://www.suse.com/security/cve/CVE-2022-43705/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK2O4INVIIS67Y5GFNHP5FVF7LRHAETD/" source="SUSE-SU"/>
		<description>
This update for Botan fixes the following issues:

- CVE-2022-43705: Fixed validation of embedded certificates was when checking OCSP responses (boo#1205509).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205509">SUSE bug 1205509</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43705/">CVE-2022-43705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726740" comment="Botan-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726741" comment="Botan-doc-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726742" comment="libbotan-2-10-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726743" comment="libbotan-2-10-32bit-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726744" comment="libbotan-2-10-64bit-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726745" comment="libbotan-devel-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726746" comment="libbotan-devel-32bit-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726747" comment="libbotan-devel-64bit-2.10.0-bp153.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726748" comment="python3-botan-2.10.0-bp153.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52189" version="1" class="patch">
	<metadata>
		<title>Security update for python-joblib (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204232" ref_url="https://bugzilla.suse.com/1204232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21797" ref_url="https://www.suse.com/security/cve/CVE-2022-21797/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K246HPHCUXNTJI75JUOCJN7GHNKHN5EC/" source="SUSE-SU"/>
		<description>
This update for python-joblib fixes the following issues:

- CVE-2022-21797: Fixed arbitrary code execution in joblib (boo#1204232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204232">SUSE bug 1204232</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21797/">CVE-2022-21797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726749" comment="python3-joblib-0.16.0-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52190" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-3723" ref_url="https://www.suse.com/security/cve/CVE-2022-3723/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10218-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUXLEW4XOFSF5F25BFYCIF4VH46PGPXO/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 93.0.4585.11:

- CHR-9051 Update chromium on desktop-stable-107-4585 to 107.0.5304.88
- DNA-95965 Add support for more UD TLDs
- DNA-102960 Replace messengers icons
- DNA-102964 Crash at -[FramedBrowserWindow sendEvent:]
- DNA-103125 Translations for O93
- DNA-103287 Bump O93 to stable
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-26"/>
	<updated date="2022-11-26"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3723/">CVE-2022-3723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727168" comment="opera-93.0.4585.11-lp153.2.69.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52191" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205736" ref_url="https://bugzilla.suse.com/1205736" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4135" ref_url="https://www.suse.com/security/cve/CVE-2022-4135/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I37Q3H73QY7ILHFMPWD4NEERBM5GWYLD/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 107.0.5304.121 (boo#1205736)

* CVE-2022-4135: Heap buffer overflow in GPU

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205736">SUSE bug 1205736</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4135/">CVE-2022-4135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727175" comment="chromedriver-107.0.5304.121-bp154.2.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727176" comment="chromium-107.0.5304.121-bp154.2.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52192" version="1" class="patch">
	<metadata>
		<title>Security update for rxvt-unicode (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186174" ref_url="https://bugzilla.suse.com/1186174" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1142" ref_url="https://www.suse.com/security/cve/CVE-2008-1142/" source="CVE"/>
		<reference ref_id="CVE-2021-33477" ref_url="https://www.suse.com/security/cve/CVE-2021-33477/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YIRRHCE53YNBLDGNULGNED3XGUMUZDMO/" source="SUSE-SU"/>
		<description>
This update for rxvt-unicode fixes the following issues:

Update to 9.26

- ev_iouring.c was wrongly required during compilation, and wrongly
  not packaged.

Update to 9.25 (boo#1186174 CVE-2021-33477)

- for the 17.5th anniversary, and because many distributions seem to
  remove rxvt in favour of urxvt, this release resurrects rclock as
  urclock.
- add support for systemd socket-based activation - debian bug #917105,
  freebsd bug #234276.
- do not destruct perl on exit anymore: this might fail for a variety of
  reasons, and takes unneccessary time.
- remove any macros from urxvtperl manpage(s), should fix debian
  bug 858385.
- the old bg image resources are now provided by the background
  extension, and perl is thus required for bg image support. No
  configuration change is needed: urxvt autoloads the background
  ext if any bg image resource/option is present (for OSC sequences to
  work you need to enable it explicity). The old bg image
  resources are also now deprecated; users are encouraged to
  switch to the new bg image interface (see man urxvt-background).
- confirm-paste now checks for any ctlchars, not just newlines.
- searchable scrollback will now ignore bracketed paste mode sequences
  (prompted by Daniel Gr?ber's patch).
- drop ISO 2022 locale support. ISO 2022 encodings are not supported in
  POSIX locales and clash with vt100 charset emulation (the luit
  program can be used as a substitute).
- perl didn't parse rgba colours specified as an array correctly,
  only allowing 0 and 100% intensity for each component (this affected
  fill and tint).
- when iterating over resources, urxvt will now try to properly handle
  multipart resources (such as '*background.expr'), for the benefit
  of autoloading perl extensions.
- ESC G (query rxvt graphics mode) has been disabled due to security
  implications. The rxvt graphics mode was removed in rxvt-unicode 1.5,
  and no programs relying on being able to query the mode are known.
- work around API change breakage in perl 5.28, based on a patch by
  Roman Bogorodskiy.
- improved security: rob nation's (obsolete) graphics mode queries
  no longer reply with linefeed in secure/default mode.
- ISO 8613-3 direct colour SGR sequences (patch by Fengguang Wu).
- xterm focus reporting mode (patch by Daniel Hahler).
- xterm SGR mouse mode.
- implement DECRQM. Patch by Přemysl Eric Janouch.
- add missing color index parameter to OSC 4 response. Patch
  by Přemysl Eric Janouch.
- in some window managers, if smart resize was enabled, urxvt
  erroneously moved the window on font change - awesome bug
  #532, arch linux bug ##34807 (patch by Uli Schlachter).
- fix urxvtd crash when using a background expression.
- properly restore colors when using fading and reverse video
  is enabled while urxvt is focused and then disabled while it
  is not focused, or vice versa (patch by Daniel Hahler).
- fix high memory usage when an extension repeatedly hides and
  shows an overlay (reported by Marcel Lautenbach).
- expose priv_modes member and constants to perl extensions
  (patch by Rastislav Barlik).
- fix a whole slew of const sillyness, unfortunately forced upon
  us by ISO C++.
- update to libecb 0x00010006.
- disable all thread support in ecb.h as we presumably don't need it.
- slightly improve Makefile source dependencies.
- work around bugs in newer Pod::Xhtml versions (flags incorrect formatting codes
  in xhtml/html sections but does not interpret correct ones).
- New file: /usr/bin/urclock
- restore the -256color binaries
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-30"/>
	<updated date="2022-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186174">SUSE bug 1186174</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1142/">CVE-2008-1142</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33477/">CVE-2021-33477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727334" comment="rxvt-unicode-9.26-bp154.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52193" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205871" ref_url="https://bugzilla.suse.com/1205871" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4174" ref_url="https://www.suse.com/security/cve/CVE-2022-4174/" source="CVE"/>
		<reference ref_id="CVE-2022-4175" ref_url="https://www.suse.com/security/cve/CVE-2022-4175/" source="CVE"/>
		<reference ref_id="CVE-2022-4176" ref_url="https://www.suse.com/security/cve/CVE-2022-4176/" source="CVE"/>
		<reference ref_id="CVE-2022-4177" ref_url="https://www.suse.com/security/cve/CVE-2022-4177/" source="CVE"/>
		<reference ref_id="CVE-2022-4178" ref_url="https://www.suse.com/security/cve/CVE-2022-4178/" source="CVE"/>
		<reference ref_id="CVE-2022-4179" ref_url="https://www.suse.com/security/cve/CVE-2022-4179/" source="CVE"/>
		<reference ref_id="CVE-2022-4180" ref_url="https://www.suse.com/security/cve/CVE-2022-4180/" source="CVE"/>
		<reference ref_id="CVE-2022-4181" ref_url="https://www.suse.com/security/cve/CVE-2022-4181/" source="CVE"/>
		<reference ref_id="CVE-2022-4182" ref_url="https://www.suse.com/security/cve/CVE-2022-4182/" source="CVE"/>
		<reference ref_id="CVE-2022-4183" ref_url="https://www.suse.com/security/cve/CVE-2022-4183/" source="CVE"/>
		<reference ref_id="CVE-2022-4184" ref_url="https://www.suse.com/security/cve/CVE-2022-4184/" source="CVE"/>
		<reference ref_id="CVE-2022-4185" ref_url="https://www.suse.com/security/cve/CVE-2022-4185/" source="CVE"/>
		<reference ref_id="CVE-2022-4186" ref_url="https://www.suse.com/security/cve/CVE-2022-4186/" source="CVE"/>
		<reference ref_id="CVE-2022-4187" ref_url="https://www.suse.com/security/cve/CVE-2022-4187/" source="CVE"/>
		<reference ref_id="CVE-2022-4188" ref_url="https://www.suse.com/security/cve/CVE-2022-4188/" source="CVE"/>
		<reference ref_id="CVE-2022-4189" ref_url="https://www.suse.com/security/cve/CVE-2022-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-4190" ref_url="https://www.suse.com/security/cve/CVE-2022-4190/" source="CVE"/>
		<reference ref_id="CVE-2022-4191" ref_url="https://www.suse.com/security/cve/CVE-2022-4191/" source="CVE"/>
		<reference ref_id="CVE-2022-4192" ref_url="https://www.suse.com/security/cve/CVE-2022-4192/" source="CVE"/>
		<reference ref_id="CVE-2022-4193" ref_url="https://www.suse.com/security/cve/CVE-2022-4193/" source="CVE"/>
		<reference ref_id="CVE-2022-4194" ref_url="https://www.suse.com/security/cve/CVE-2022-4194/" source="CVE"/>
		<reference ref_id="CVE-2022-4195" ref_url="https://www.suse.com/security/cve/CVE-2022-4195/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVDEECENZOGKBOMLYJ7KJTUJJSDCRO4I/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 108.0.5359.71 (boo#1205871)

- CVE-2022-4174: Type Confusion in V8.
- CVE-2022-4175: Use after free in Camera Capture.
- CVE-2022-4176: Out of bounds write in Lacros Graphics.
- CVE-2022-4177: Use after free in Extensions.
- CVE-2022-4178: Use after free in Mojo.
- CVE-2022-4179: Use after free in Audio.
- CVE-2022-4180: Use after free in Mojo.
- CVE-2022-4181: Use after free in Forms.
- CVE-2022-4182: Inappropriate implementation in Fenced Frames.
- CVE-2022-4183: Insufficient policy enforcement in Popup Blocker.
- CVE-2022-4184: Insufficient policy enforcement in Autofill.
- CVE-2022-4185: Inappropriate implementation in Navigation.
- CVE-2022-4186: Insufficient validation of untrusted input in Downloads.
- CVE-2022-4187: Insufficient policy enforcement in DevTools.
- CVE-2022-4188: Insufficient validation of untrusted input in CORS.
- CVE-2022-4189: Insufficient policy enforcement in DevTools.
- CVE-2022-4190: Insufficient data validation in Directory.
- CVE-2022-4191: Use after free in Sign-In.
- CVE-2022-4192: Use after free in Live Caption.
- CVE-2022-4193: Insufficient policy enforcement in File System API.
- CVE-2022-4194: Use after free in Accessibility.
- CVE-2022-4195: Insufficient policy enforcement in Safe Browsing.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-04"/>
	<updated date="2022-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205871">SUSE bug 1205871</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4174/">CVE-2022-4174</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4175/">CVE-2022-4175</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4176/">CVE-2022-4176</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4177/">CVE-2022-4177</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4178/">CVE-2022-4178</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4179/">CVE-2022-4179</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4180/">CVE-2022-4180</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4181/">CVE-2022-4181</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4182/">CVE-2022-4182</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4183/">CVE-2022-4183</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4184/">CVE-2022-4184</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4185/">CVE-2022-4185</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4186/">CVE-2022-4186</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-4187/">CVE-2022-4187</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4188/">CVE-2022-4188</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4189/">CVE-2022-4189</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4190/">CVE-2022-4190</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4191/">CVE-2022-4191</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4192/">CVE-2022-4192</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4193/">CVE-2022-4193</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4194/">CVE-2022-4194</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-4195/">CVE-2022-4195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727571" comment="chromedriver-108.0.5359.71-bp154.2.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727572" comment="chromium-108.0.5359.71-bp154.2.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52194" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205999" ref_url="https://bugzilla.suse.com/1205999" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4262" ref_url="https://www.suse.com/security/cve/CVE-2022-4262/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HYWSKXQCLKUA2XSRYX5WQISODN4DQ3PR/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 108.0.5359.94 (boo#1205999)

- CVE-2022-4262: Type Confusion in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-08"/>
	<updated date="2022-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205999">SUSE bug 1205999</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4262/">CVE-2022-4262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727807" comment="chromedriver-108.0.5359.94-bp154.2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727808" comment="chromium-108.0.5359.94-bp154.2.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52195" version="1" class="patch">
	<metadata>
		<title>Security update for python-slixmpp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205433" ref_url="https://bugzilla.suse.com/1205433" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45197" ref_url="https://www.suse.com/security/cve/CVE-2022-45197/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTWQRGQUNC6IRUHCNF7HC3ZV3BQUI2TJ/" source="SUSE-SU"/>
		<description>
This update for python-slixmpp fixes the following issues:

- CVE-2022-45197: Fixed certificate hostname validation (boo#1205433)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-10"/>
	<updated date="2022-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205433">SUSE bug 1205433</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45197/">CVE-2022-45197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728235" comment="python3-slixmpp-1.4.2-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52196" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205433" ref_url="https://bugzilla.suse.com/1205433" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4436" ref_url="https://www.suse.com/security/cve/CVE-2022-4436/" source="CVE"/>
		<reference ref_id="CVE-2022-4437" ref_url="https://www.suse.com/security/cve/CVE-2022-4437/" source="CVE"/>
		<reference ref_id="CVE-2022-4438" ref_url="https://www.suse.com/security/cve/CVE-2022-4438/" source="CVE"/>
		<reference ref_id="CVE-2022-4439" ref_url="https://www.suse.com/security/cve/CVE-2022-4439/" source="CVE"/>
		<reference ref_id="CVE-2022-4440" ref_url="https://www.suse.com/security/cve/CVE-2022-4440/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GZONV2X67CIWI27PEH2RZABQNIN6PYU/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to version 108.0.5359.124 (boo#1206403):

- CVE-2022-4436: Use after free in Blink Media
- CVE-2022-4437: Use after free in Mojo IPC
- CVE-2022-4438: Use after free in Blink Frames
- CVE-2022-4439: Use after free in Aura
- CVE-2022-4440: Use after free in Profiles
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-16"/>
	<updated date="2022-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205433">SUSE bug 1205433</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4436/">CVE-2022-4436</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4437/">CVE-2022-4437</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4438/">CVE-2022-4438</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4439/">CVE-2022-4439</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4440/">CVE-2022-4440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729348" comment="chromedriver-108.0.5359.124-bp153.2.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729349" comment="chromium-108.0.5359.124-bp153.2.148.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52197" version="1" class="patch">
	<metadata>
		<title>Security update for mbedtls (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201581" ref_url="https://bugzilla.suse.com/1201581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35409" ref_url="https://www.suse.com/security/cve/CVE-2021-35409/" source="CVE"/>
		<reference ref_id="CVE-2022-35409" ref_url="https://www.suse.com/security/cve/CVE-2022-35409/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10247-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3NAO4EU3XHQJB2IY7LNSERGELWFEJAUJ/" source="SUSE-SU"/>
		<description>
This update for mbedtls fixes the following issues:

- CVE-2022-35409: Fixed buffer overread in DTLS ClientHello parsing (boo#1201581).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-22"/>
	<updated date="2022-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201581">SUSE bug 1201581</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35409/">CVE-2021-35409</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35409/">CVE-2022-35409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730028" comment="libmbedcrypto3-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730029" comment="libmbedcrypto3-32bit-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730030" comment="libmbedcrypto3-64bit-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730031" comment="libmbedtls12-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730032" comment="libmbedtls12-32bit-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730033" comment="libmbedtls12-64bit-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730034" comment="libmbedx509-0-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730035" comment="libmbedx509-0-32bit-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730036" comment="libmbedx509-0-64bit-2.16.9-bp153.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730037" comment="mbedtls-devel-2.16.9-bp153.2.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52198" version="1" class="patch">
	<metadata>
		<title>Security update for vlc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200944" ref_url="https://bugzilla.suse.com/1200944" source="BUGZILLA"/>
		<reference ref_id="1206142" ref_url="https://bugzilla.suse.com/1206142" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-41325" ref_url="https://www.suse.com/security/cve/CVE-2022-41325/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI4EVQJJHK52U3OVX236TQ775IVEFDQS/" source="SUSE-SU"/>
		<description>
This update for vlc fixes the following issues:

- Update to version 3.0.18 (CVE-2022-41325, boo#1206142):
  + macOS: Fix audio device listing with non-latin names.
  + Misc: Fix rendering and performance issue with older GPUs.
  + Updated translations.
- Changes from version 3.0.18-rc2:
  + Codec/Demux:
    - Add support for Y16 chroma.
    - Fix build of gme plugin.
  + Lua:
    - Fix script for vocaroo.
    - Fix script for youtube to allow throttled playback.
  + Service Discovery: Fix UPnP regression on Windows.
  + Video Output: Fix video placement with caopengllayer.
  + Misc: Fix password search in kwallet module.
- Changes from version 3.0.18-rc:
  + Demux:
    - Major adaptive streaming update, notably for multiple
      timelies and webvtt.
    - Fix seeking with some fragmented MP4 files.
    - Add support for DVBSub inside MKV.
    - Fix some Flac files that could not be played.
    - Improve seeking in Ogg files.
  + Decoders:
    - Fix DxVA/D3D11 crashes on HEVC files with bogus references.
    - Fix libass storage size and crash.
    - Fix decoding errors on macOS hw decoding on some HEVC files.
  + Video Output:
    - Fix color regression with VAAPI/iOS and OpenGL output.
    - Fix some resizing issues with OpenGL on GLX/EGL/X11/XV.
    - Fix Direct3d9 texture stretching.
    - Fix 10-bit accelerated video filters on macOS.
  + Playlist: Avoid playlist liveloop on failed/tiny items
    (temporize EOS bursts).
  + Misc:
    - Misc fixes for the extension UI on macOS.
    - Improve SMBv1 and SMBv2 behaviours.
    - Improve FTP compatibility.
    - Support RISC-V.
    - Fix AVI muxing for Windows Media Player compatibility.
    - Fix seeking speed on macOS.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-27"/>
	<updated date="2022-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200944">SUSE bug 1200944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206142">SUSE bug 1206142</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41325/">CVE-2022-41325</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730671" comment="libvlc5-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730672" comment="libvlccore9-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730673" comment="vlc-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730674" comment="vlc-codec-gstreamer-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730675" comment="vlc-devel-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730676" comment="vlc-jack-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730677" comment="vlc-lang-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730678" comment="vlc-noX-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730679" comment="vlc-opencv-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730680" comment="vlc-qt-3.0.18-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730681" comment="vlc-vdpau-3.0.18-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52199" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-0789" ref_url="https://www.suse.com/security/cve/CVE-2022-0789/" source="CVE"/>
		<reference ref_id="CVE-2022-0790" ref_url="https://www.suse.com/security/cve/CVE-2022-0790/" source="CVE"/>
		<reference ref_id="CVE-2022-0791" ref_url="https://www.suse.com/security/cve/CVE-2022-0791/" source="CVE"/>
		<reference ref_id="CVE-2022-0792" ref_url="https://www.suse.com/security/cve/CVE-2022-0792/" source="CVE"/>
		<reference ref_id="CVE-2022-0793" ref_url="https://www.suse.com/security/cve/CVE-2022-0793/" source="CVE"/>
		<reference ref_id="CVE-2022-0794" ref_url="https://www.suse.com/security/cve/CVE-2022-0794/" source="CVE"/>
		<reference ref_id="CVE-2022-0795" ref_url="https://www.suse.com/security/cve/CVE-2022-0795/" source="CVE"/>
		<reference ref_id="CVE-2022-0796" ref_url="https://www.suse.com/security/cve/CVE-2022-0796/" source="CVE"/>
		<reference ref_id="CVE-2022-0797" ref_url="https://www.suse.com/security/cve/CVE-2022-0797/" source="CVE"/>
		<reference ref_id="CVE-2022-0798" ref_url="https://www.suse.com/security/cve/CVE-2022-0798/" source="CVE"/>
		<reference ref_id="CVE-2022-0799" ref_url="https://www.suse.com/security/cve/CVE-2022-0799/" source="CVE"/>
		<reference ref_id="CVE-2022-0800" ref_url="https://www.suse.com/security/cve/CVE-2022-0800/" source="CVE"/>
		<reference ref_id="CVE-2022-0801" ref_url="https://www.suse.com/security/cve/CVE-2022-0801/" source="CVE"/>
		<reference ref_id="CVE-2022-0802" ref_url="https://www.suse.com/security/cve/CVE-2022-0802/" source="CVE"/>
		<reference ref_id="CVE-2022-0803" ref_url="https://www.suse.com/security/cve/CVE-2022-0803/" source="CVE"/>
		<reference ref_id="CVE-2022-0804" ref_url="https://www.suse.com/security/cve/CVE-2022-0804/" source="CVE"/>
		<reference ref_id="CVE-2022-0805" ref_url="https://www.suse.com/security/cve/CVE-2022-0805/" source="CVE"/>
		<reference ref_id="CVE-2022-0806" ref_url="https://www.suse.com/security/cve/CVE-2022-0806/" source="CVE"/>
		<reference ref_id="CVE-2022-0807" ref_url="https://www.suse.com/security/cve/CVE-2022-0807/" source="CVE"/>
		<reference ref_id="CVE-2022-0808" ref_url="https://www.suse.com/security/cve/CVE-2022-0808/" source="CVE"/>
		<reference ref_id="CVE-2022-0809" ref_url="https://www.suse.com/security/cve/CVE-2022-0809/" source="CVE"/>
		<reference ref_id="CVE-2022-1096" ref_url="https://www.suse.com/security/cve/CVE-2022-1096/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ITLKQDHCBVY73BXRDDHU7JJZJG7TVNG/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Opera was updated to 85.0.4341.28

  - CHR-8816 Update chromium on desktop-stable-99-4341
    to 99.0.4844.84
  - DNA-98092 Crash at views::MenuItemView::GetMenuController()
  - DNA-98278 Translations for O85
  - DNA-98320 [Mac] Unable to delete recent search entries
  - DNA-98614 Show recent searches for non-BABE users
  - DNA-98615 Allow removal of recent searches
  - DNA-98616 Add recent searches to ‘old’ BABE
  - DNA-98617 Make it possible to disable ad-blocker per-country
  - DNA-98651 Remove Instagram and Facebook Messenger in Russia
  - DNA-98653 Add flag #recent-searches
  - DNA-98696 smoketest 
    PageInfoHistoryDataSourceTest.FormatTimestampString failing
  - DNA-98703 Port Chromium issue 1309225 to Opera Stable

- The update to chromium 99.0.4844.84 fixes following issues:  
  CVE-2022-1096

- Changes in 85.0.4341.18

  - CHR-8789 Update chromium on desktop-stable-99-4341 to
    99.0.4844.51
  - DNA-98059 [Linux] Crash at
    opera::FreedomSettingsImpl::IsBypassForDotlessDomainsEnabled
  - DNA-98349 [Linux] Crash at bluez::BluezDBusManager::Get()
  - DNA-98126 System crash dialog shown on macOS &lt;= 10.15
  - DNA-98331 [Snap] Meme generator cropping / resizing broken
  - DNA-98394 Audio tab indicator set to 'muted' on
    videoconferencing sites
  - DNA-98481 Report errors in opauto_collector

- The update to chromium 99.0.4844.51 fixes following issues:
  CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792,
  CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2022-0796,
  CVE-2022-0797, CVE-2022-0798, CVE-2022-0799, CVE-2022-0800,
  CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-2022-0804,
  CVE-2022-0805, CVE-2022-0806, CVE-2022-0807, CVE-2022-0808,
  CVE-2022-0809

- Changes in 85.0.4341.13

  - DNA-94119 Upgrade curl to 7.81.0
  - DNA-97849 [Mac monterey] System shortcut interfere with
    Opera’s `ToggleSearchInOpenTabs` shortcut
  - DNA-98204 Automatic popout happens when video is paused
  - DNA-98231 Shortcuts are blocked by displayed tab tooltip
    when triggered quickly after tooltip appears
  - DNA-98321 Add thinlto-cache warnings to suppression list
  - DNA-98395 Promote O85 to stable

- Complete Opera 85.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-85/

- Update to 84.0.4316.42

  - DNA-94119 Upgrade curl to 7.81.0
  - DNA-98092 Crash at views::MenuItemView::GetMenuController()
  - DNA-98204 Automatic popout happens when video is paused
  - DNA-98231 Shortcuts are blocked by displayed tab tooltip when
    triggered quickly after tooltip appears

- Update to 84.0.4316.31

  - CHR-8772 Update chromium on desktop-stable-98-4316 to
    98.0.4758.109
  - DNA-97573 [Win][Lin]”Close tab” button is not displayed on tabs
    playing media when many tabs are open
  - DNA-97729 cancelling the process uploading custom Wallpaper
    crashes the browser
  - DNA-97871 Google meet tab’s icons don’t fit on pinned tab
  - DNA-97872 Tab is being unpinned when video conferencing
    button is clicked
  - DNA-98039 Dark theme top sites have black background
  - DNA-98117 Clicking current tab information should hide tooltip
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0789/">CVE-2022-0789</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0790/">CVE-2022-0790</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0791/">CVE-2022-0791</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0792/">CVE-2022-0792</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0793/">CVE-2022-0793</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0794/">CVE-2022-0794</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0795/">CVE-2022-0795</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0796/">CVE-2022-0796</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0797/">CVE-2022-0797</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0798/">CVE-2022-0798</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0799/">CVE-2022-0799</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0800/">CVE-2022-0800</cve>
	<cve impact="critical" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0801/">CVE-2022-0801</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0802/">CVE-2022-0802</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0803/">CVE-2022-0803</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0804/">CVE-2022-0804</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0805/">CVE-2022-0805</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0806/">CVE-2022-0806</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0807/">CVE-2022-0807</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0808/">CVE-2022-0808</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0809/">CVE-2022-0809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1096/">CVE-2022-1096</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695027" comment="opera-85.0.4341.28-lp153.2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52200" version="1" class="patch">
	<metadata>
		<title>Security update for pdns (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197525" ref_url="https://bugzilla.suse.com/1197525" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27227" ref_url="https://www.suse.com/security/cve/CVE-2022-27227/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCAJV7QU7NXYUTY7OMBOV6LAES2X326R/" source="SUSE-SU"/>
		<description>
This update for pdns fixes the following issues:

- CVE-2022-27227: Fixes incomplete validation of incoming IXFR transfer (boo#1197525)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197525">SUSE bug 1197525</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27227/">CVE-2022-27227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678926" comment="pdns-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678927" comment="pdns-backend-geoip-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678928" comment="pdns-backend-godbc-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678929" comment="pdns-backend-ldap-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678930" comment="pdns-backend-lua-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678931" comment="pdns-backend-mysql-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678932" comment="pdns-backend-postgresql-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678933" comment="pdns-backend-remote-4.3.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678934" comment="pdns-backend-sqlite3-4.3.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52201" version="1" class="patch">
	<metadata>
		<title>Security update for pdns-recursor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197525" ref_url="https://bugzilla.suse.com/1197525" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27227" ref_url="https://www.suse.com/security/cve/CVE-2022-27227/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0105-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42XLX5GUN36HINIJX75C5RSFWMGRN4OW/" source="SUSE-SU"/>
		<description>
This update for pdns-recursor fixes the following issues:

- CVE-2022-27227: Fixed incomplete validation of  incoming IXFR
  transfers. It applies to setups retrieving one or more RPZ zones from
  a remote server if the network path to the server  is not
  trusted. (boo#1197525)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197525">SUSE bug 1197525</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27227/">CVE-2022-27227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678935" comment="pdns-recursor-4.3.5-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52202" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197518" ref_url="https://bugzilla.suse.com/1197518" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
		<description>

SeaMonkey was updated to 2.53.11.1:

Update to SeaMonkey 2.53.11.1

* Fix edge case when setting IntersectionObserver threshold bug
  1758291.
* OAuth2 prefs should use realuserName instead of username bug
  1518126.
* SeaMonkey 2.53.11.1 uses the same backend as Firefox and contains
  the relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.11.1 shares most parts of the mail and news code
  with Thunderbird. Please read the Thunderbird 60.8.0 release notes
  for specific security fixes in this release.
* Additional important security fixes up to Current Firefox 91.7 and
  Thunderbird 91.7 ESR plus many enhancements have been
  backported. We will continue to enhance SeaMonkey security in
  subsequent 2.53.x beta and release versions as fast as we are able
  to.

* Remove obsolete MOZ_EXTENSIONS check in suite
* Add connect button to cZ Networks Editor
* Remove freenode remnants from ChatZilla in SeaMonkey
* Prefer secure over insecure protocol in network list in ChatZilla
* Composer - Change tag textbox is not removed after use
* Clean up repo links in debugQA
* Fix misspelled references to macOS in suite
* Remove obsolete references to Java and Flash
* Help button not working in delete cert dialog
* Rearrange Message Filter Dialog to make room for new features
* Use Insert key as shortcut to create new message filters
* Rename some variables used in SeaMonkey's FilterListDialog to
  match Thunderbird's
* Implement Copy to New message filter functionality
* Add move to top / bottom buttons to message filters
* Add preference to not prompt for message filter deletion
* Clean up folder handling in FilterListDialog
* Add refresh function to Filter list dialog so that it can be
  updated when already open and new filters are added externally
* Use listbox rather than tree in FilterListDialog
* MsgFilterList(args) should take targetFilter and pass it to
  FilterListDialog
* Mail&amp;News' start.xhtml: 'We' link broken
* Add search functionality to filter dialog		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-08"/>
	<updated date="2022-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197518">SUSE bug 1197518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678936" comment="seamonkey-2.53.11.1-lp153.17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678937" comment="seamonkey-dom-inspector-2.53.11.1-lp153.17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678938" comment="seamonkey-irc-2.53.11.1-lp153.17.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52203" version="1" class="patch">
	<metadata>
		<title>Security update for jawn (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194358" ref_url="https://bugzilla.suse.com/1194358" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21653" ref_url="https://www.suse.com/security/cve/CVE-2022-21653/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LN5Z3Y5OA2VGDDD23VAZE2P4IULBASWF/" source="SUSE-SU"/>
		<description>
This update for jawn fixes the following issues:

* CVE-2022-21653: DoS caused by a hash collision in SimpleFacade and MutableFacade (boo#1194358)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194358">SUSE bug 1194358</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21653/">CVE-2022-21653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663047" comment="jawn-ast-0.14.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663048" comment="jawn-json4s-0.14.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663049" comment="jawn-parser-0.14.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663050" comment="jawn-util-0.14.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52204" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197680" ref_url="https://bugzilla.suse.com/1197680" source="BUGZILLA"/>
		<reference ref_id="1198053" ref_url="https://bugzilla.suse.com/1198053" source="BUGZILLA"/>
		<reference ref_id="1198361" ref_url="https://bugzilla.suse.com/1198361" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1125" ref_url="https://www.suse.com/security/cve/CVE-2022-1125/" source="CVE"/>
		<reference ref_id="CVE-2022-1127" ref_url="https://www.suse.com/security/cve/CVE-2022-1127/" source="CVE"/>
		<reference ref_id="CVE-2022-1128" ref_url="https://www.suse.com/security/cve/CVE-2022-1128/" source="CVE"/>
		<reference ref_id="CVE-2022-1129" ref_url="https://www.suse.com/security/cve/CVE-2022-1129/" source="CVE"/>
		<reference ref_id="CVE-2022-1130" ref_url="https://www.suse.com/security/cve/CVE-2022-1130/" source="CVE"/>
		<reference ref_id="CVE-2022-1131" ref_url="https://www.suse.com/security/cve/CVE-2022-1131/" source="CVE"/>
		<reference ref_id="CVE-2022-1132" ref_url="https://www.suse.com/security/cve/CVE-2022-1132/" source="CVE"/>
		<reference ref_id="CVE-2022-1133" ref_url="https://www.suse.com/security/cve/CVE-2022-1133/" source="CVE"/>
		<reference ref_id="CVE-2022-1134" ref_url="https://www.suse.com/security/cve/CVE-2022-1134/" source="CVE"/>
		<reference ref_id="CVE-2022-1135" ref_url="https://www.suse.com/security/cve/CVE-2022-1135/" source="CVE"/>
		<reference ref_id="CVE-2022-1136" ref_url="https://www.suse.com/security/cve/CVE-2022-1136/" source="CVE"/>
		<reference ref_id="CVE-2022-1137" ref_url="https://www.suse.com/security/cve/CVE-2022-1137/" source="CVE"/>
		<reference ref_id="CVE-2022-1138" ref_url="https://www.suse.com/security/cve/CVE-2022-1138/" source="CVE"/>
		<reference ref_id="CVE-2022-1139" ref_url="https://www.suse.com/security/cve/CVE-2022-1139/" source="CVE"/>
		<reference ref_id="CVE-2022-1141" ref_url="https://www.suse.com/security/cve/CVE-2022-1141/" source="CVE"/>
		<reference ref_id="CVE-2022-1142" ref_url="https://www.suse.com/security/cve/CVE-2022-1142/" source="CVE"/>
		<reference ref_id="CVE-2022-1143" ref_url="https://www.suse.com/security/cve/CVE-2022-1143/" source="CVE"/>
		<reference ref_id="CVE-2022-1144" ref_url="https://www.suse.com/security/cve/CVE-2022-1144/" source="CVE"/>
		<reference ref_id="CVE-2022-1145" ref_url="https://www.suse.com/security/cve/CVE-2022-1145/" source="CVE"/>
		<reference ref_id="CVE-2022-1146" ref_url="https://www.suse.com/security/cve/CVE-2022-1146/" source="CVE"/>
		<reference ref_id="CVE-2022-1232" ref_url="https://www.suse.com/security/cve/CVE-2022-1232/" source="CVE"/>
		<reference ref_id="CVE-2022-1305" ref_url="https://www.suse.com/security/cve/CVE-2022-1305/" source="CVE"/>
		<reference ref_id="CVE-2022-1306" ref_url="https://www.suse.com/security/cve/CVE-2022-1306/" source="CVE"/>
		<reference ref_id="CVE-2022-1307" ref_url="https://www.suse.com/security/cve/CVE-2022-1307/" source="CVE"/>
		<reference ref_id="CVE-2022-1308" ref_url="https://www.suse.com/security/cve/CVE-2022-1308/" source="CVE"/>
		<reference ref_id="CVE-2022-1309" ref_url="https://www.suse.com/security/cve/CVE-2022-1309/" source="CVE"/>
		<reference ref_id="CVE-2022-1310" ref_url="https://www.suse.com/security/cve/CVE-2022-1310/" source="CVE"/>
		<reference ref_id="CVE-2022-1311" ref_url="https://www.suse.com/security/cve/CVE-2022-1311/" source="CVE"/>
		<reference ref_id="CVE-2022-1312" ref_url="https://www.suse.com/security/cve/CVE-2022-1312/" source="CVE"/>
		<reference ref_id="CVE-2022-1313" ref_url="https://www.suse.com/security/cve/CVE-2022-1313/" source="CVE"/>
		<reference ref_id="CVE-2022-1314" ref_url="https://www.suse.com/security/cve/CVE-2022-1314/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C3FMQXDJQJ2FMNZQPTMFMJPRBWP3GY2L/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Updated to Chromium 100.0.4896.88 (boo#1198361)

- CVE-2022-1305: Use after free in storage
- CVE-2022-1306: Inappropriate implementation in compositing
- CVE-2022-1307: Inappropriate implementation in full screen
- CVE-2022-1308: Use after free in BFCache
- CVE-2022-1309: Insufficient policy enforcement in developer tools
- CVE-2022-1310: Use after free in regular expressions
- CVE-2022-1311: Use after free in Chrome OS shell
- CVE-2022-1312: Use after free in storage
- CVE-2022-1313: Use after free in tab groups
- CVE-2022-1314: Type Confusion in V8
- Various fixes from internal audits, fuzzing and other initiatives

Updated to version 100.0.4896.75:

- CVE-2022-1232: Type Confusion in V8 (boo#1198053)

Update to version 100.0.4896.60 (boo#1197680):

- CVE-2022-1125: Use after free in Portals
- CVE-2022-1127: Use after free in QR Code Generator
- CVE-2022-1128: Inappropriate implementation in Web Share API
- CVE-2022-1129: Inappropriate implementation in Full Screen Mode
- CVE-2022-1130: Insufficient validation of untrusted input in WebOTP
- CVE-2022-1131: Use after free in Cast UI
- CVE-2022-1132: Inappropriate implementation in Virtual Keyboard
- CVE-2022-1133: Use after free in WebRTC
- CVE-2022-1134: Type Confusion in V8
- CVE-2022-1135: Use after free in Shopping Cart
- CVE-2022-1136: Use after free in Tab Strip
- CVE-2022-1137: Inappropriate implementation in Extensions
- CVE-2022-1138: Inappropriate implementation in Web Cursor
- CVE-2022-1139: Inappropriate implementation in Background Fetch API
- CVE-2022-1141: Use after free in File Manager
- CVE-2022-1142: Heap buffer overflow in WebUI
- CVE-2022-1143: Heap buffer overflow in WebUI
- CVE-2022-1144: Use after free in WebUI
- CVE-2022-1145: Use after free in Extensions
- CVE-2022-1146: Inappropriate implementation in Resource Timing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197680">SUSE bug 1197680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198053">SUSE bug 1198053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198361">SUSE bug 1198361</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1125/">CVE-2022-1125</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1127/">CVE-2022-1127</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1128/">CVE-2022-1128</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1129/">CVE-2022-1129</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1130/">CVE-2022-1130</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1131/">CVE-2022-1131</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1132/">CVE-2022-1132</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1133/">CVE-2022-1133</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1134/">CVE-2022-1134</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1135/">CVE-2022-1135</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1136/">CVE-2022-1136</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1137/">CVE-2022-1137</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1138/">CVE-2022-1138</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1139/">CVE-2022-1139</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1141/">CVE-2022-1141</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1142/">CVE-2022-1142</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1143/">CVE-2022-1143</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1144/">CVE-2022-1144</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1145/">CVE-2022-1145</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1146/">CVE-2022-1146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1232/">CVE-2022-1232</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1305/">CVE-2022-1305</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1306/">CVE-2022-1306</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1307/">CVE-2022-1307</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1308/">CVE-2022-1308</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1309/">CVE-2022-1309</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1310/">CVE-2022-1310</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1311/">CVE-2022-1311</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1312/">CVE-2022-1312</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1313/">CVE-2022-1313</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1314/">CVE-2022-1314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679573" comment="chromedriver-100.0.4896.88-bp153.2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679574" comment="chromium-100.0.4896.88-bp153.2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52205" version="1" class="patch">
	<metadata>
		<title>Security update for htmldoc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198204" ref_url="https://bugzilla.suse.com/1198204" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24191" ref_url="https://www.suse.com/security/cve/CVE-2022-24191/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IPUTP7LOLL5OLSQNM5GFCXGYDJHU7FP/" source="SUSE-SU"/>
		<description>
This update for htmldoc fixes the following issues:

- CVE-2022-24191: Fix a potential stack overflow bug with GIF images (boo#1198204).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-17"/>
	<updated date="2022-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198204">SUSE bug 1198204</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24191/">CVE-2022-24191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679758" comment="htmldoc-1.9.12-bp153.2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52206" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198509" ref_url="https://bugzilla.suse.com/1198509" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1364" ref_url="https://www.suse.com/security/cve/CVE-2022-1364/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G5YYTVAL4HMIDBKVGBDTZND7UELHVRC2/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:
    
Updated Chromium to 100.0.4896.127 (boo#1198509)
    
- CVE-2022-1364: Type Confusion in V8
- Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198509">SUSE bug 1198509</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1364/">CVE-2022-1364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680129" comment="chromedriver-100.0.4896.127-bp153.2.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680130" comment="chromium-100.0.4896.127-bp153.2.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52207" version="1" class="patch">
	<metadata>
		<title>Security update for prosody (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194596" ref_url="https://bugzilla.suse.com/1194596" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0217" ref_url="https://www.suse.com/security/cve/CVE-2022-0217/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4AYNB4WRJM6UGUGE4MCR3AAVYPLM2PP/" source="SUSE-SU"/>
		<description>
This update for prosody fixes the following issues:

Update to 0.11.12:

* CVE-2022-0217: util.xml: Do not allow doctypes, comments or processing instructions (bsc#1194596)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-14"/>
	<updated date="2022-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194596">SUSE bug 1194596</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0217/">CVE-2022-0217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663526" comment="prosody-0.11.12-bp153.2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52208" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-1364" ref_url="https://www.suse.com/security/cve/CVE-2022-1364/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQIZDBENBA7SYCDEBOVU4TMJLSK3IIRM/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 86.0.4363.23:

  - CHR-8843 Update chromium on desktop-stable-100-4363 to
    100.0.4896.127
  - DNA-98236 Turn on #snap-text-selection on all streams
  - DNA-98507 DCHECK at address_bar_controller.cc(547)
  - DNA-98528 Suggestions for internal pages disappear when typing
    their full name
  - DNA-98538 Change name of 'Opera Crypto Wallet' to
    'Crypto Wallet'
  - DNA-98540 Booking.com used instead of custom search engine
  - DNA-98587 Favicon of booking suggestion in the city category
    is unexpectedly changing
  - DNA-98605 City suggestions should show URL in address field
    when selected
  - DNA-98608 #address-bar-dropdown-categories expired
  - DNA-98616 Add recent searches to 'old' BABE
  - DNA-98668 Switch to tab button leads to wrong tab
  - DNA-98673 Improve suggestion removal handling in suggestion
    providers
  - DNA-98681 Remove unused suggestion consumers
  - DNA-98684 Have a dedicated SuggestionList for the new address
    bar dropdown
  - DNA-98685 Enable #native-crypto-wallet on developer
  - DNA-98688 'Disable this feature' mini-menu settings is
    non-intuitive
  - DNA-98690 Autocompleted text stayed in address field after
    removing suggestion
  - DNA-98738 Inline autocomplete suggestion for SD disappears
    after typing 3rd letter of SD name
  - DNA-98743 Blank dropdown after pressing space key
  - DNA-98783 Improve showing suggestions with long URLs or page
    titles
  - DNA-98785 'Switch to tab' button not shown for suggestions with
    www subdomain when typing domain text
  - DNA-98879 'Disable suggestions before typing' mini-menu option
    should change to 'Enable suggestions before typing' when being
    selected
  - DNA-98917 Translations for O86
  - DNA-98975 Turn on #snap-crop-tool on all channels
  - DNA-98980 Enable #native-crypto-wallet on all streams
  - DNA-99005 The sidebar item is not visible for already active
    crypto wallet users when #native-crypto-wallet flag is enabled.
  - DNA-99007 Crash at
    TemplateURLRef::ParseIfNecessary(SearchTermsData const&amp;) const
  - DNA-99047 Promote O86 to stable

- The update to chromium 100.0.4896.127 fixes following issues:
  CVE-2022-1364

- Complete Opera 86.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-86/

Update to 85.0.4341.60:

  - DNA-98666 Set baidu as default search engine in China
  - DNA-98707 Hint is not displayed for new crypto wallet
    sidebar icon
  - DNA-98775 RichHintsSearchEngineCondition.testSogouSearchEngine
    errors

Update to 85.0.4341.47:

  - DNA-98249 Add feature flag #native-crypto-wallet
  - DNA-98250 Install extension on startup
  - DNA-98251 Make Crypto Wallet setting enable / disable extension
  - DNA-98252 Deactivate old desktop crypto wallet
  - DNA-98253 Always show “Crypto Wallet” in Sidebar Setup
  - DNA-98497 Crash when installing extension
  - DNA-98506 Enable opera_feature_crypto_wallet_encryption
    on desktop
  - DNA-98510 Blank icon in sidebar setup
  - DNA-98538 Change name of 'Opera Crypto Wallet' to
    'Crypto Wallet'
  - DNA-98685 Enable #native-crypto-wallet on developer
  - DNA-98766 Crash at
    opera::AddressBarControllerImpl::OpenNativeDropdown()
  - DNA-98768 Crash at
    extensions::ContentFilterPrivateIsWhitelistedFunction::Run()
  - DNA-98770 Recent searches stay in address field after selecting
    entry from dropdown
  - DNA-98772 Screen sharing broken
  - DNA-98803 Autofilled part appended after selecting address
    bar using shortcut
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-01"/>
	<updated date="2022-05-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1364/">CVE-2022-1364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695028" comment="opera-86.0.4363.23-lp153.2.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52209" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198917" ref_url="https://bugzilla.suse.com/1198917" source="BUGZILLA"/>
		<reference ref_id="1199118" ref_url="https://bugzilla.suse.com/1199118" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1477" ref_url="https://www.suse.com/security/cve/CVE-2022-1477/" source="CVE"/>
		<reference ref_id="CVE-2022-1478" ref_url="https://www.suse.com/security/cve/CVE-2022-1478/" source="CVE"/>
		<reference ref_id="CVE-2022-1479" ref_url="https://www.suse.com/security/cve/CVE-2022-1479/" source="CVE"/>
		<reference ref_id="CVE-2022-1480" ref_url="https://www.suse.com/security/cve/CVE-2022-1480/" source="CVE"/>
		<reference ref_id="CVE-2022-1481" ref_url="https://www.suse.com/security/cve/CVE-2022-1481/" source="CVE"/>
		<reference ref_id="CVE-2022-1482" ref_url="https://www.suse.com/security/cve/CVE-2022-1482/" source="CVE"/>
		<reference ref_id="CVE-2022-1483" ref_url="https://www.suse.com/security/cve/CVE-2022-1483/" source="CVE"/>
		<reference ref_id="CVE-2022-1484" ref_url="https://www.suse.com/security/cve/CVE-2022-1484/" source="CVE"/>
		<reference ref_id="CVE-2022-1485" ref_url="https://www.suse.com/security/cve/CVE-2022-1485/" source="CVE"/>
		<reference ref_id="CVE-2022-1486" ref_url="https://www.suse.com/security/cve/CVE-2022-1486/" source="CVE"/>
		<reference ref_id="CVE-2022-1487" ref_url="https://www.suse.com/security/cve/CVE-2022-1487/" source="CVE"/>
		<reference ref_id="CVE-2022-1488" ref_url="https://www.suse.com/security/cve/CVE-2022-1488/" source="CVE"/>
		<reference ref_id="CVE-2022-1489" ref_url="https://www.suse.com/security/cve/CVE-2022-1489/" source="CVE"/>
		<reference ref_id="CVE-2022-1490" ref_url="https://www.suse.com/security/cve/CVE-2022-1490/" source="CVE"/>
		<reference ref_id="CVE-2022-1491" ref_url="https://www.suse.com/security/cve/CVE-2022-1491/" source="CVE"/>
		<reference ref_id="CVE-2022-1492" ref_url="https://www.suse.com/security/cve/CVE-2022-1492/" source="CVE"/>
		<reference ref_id="CVE-2022-1493" ref_url="https://www.suse.com/security/cve/CVE-2022-1493/" source="CVE"/>
		<reference ref_id="CVE-2022-1494" ref_url="https://www.suse.com/security/cve/CVE-2022-1494/" source="CVE"/>
		<reference ref_id="CVE-2022-1495" ref_url="https://www.suse.com/security/cve/CVE-2022-1495/" source="CVE"/>
		<reference ref_id="CVE-2022-1496" ref_url="https://www.suse.com/security/cve/CVE-2022-1496/" source="CVE"/>
		<reference ref_id="CVE-2022-1497" ref_url="https://www.suse.com/security/cve/CVE-2022-1497/" source="CVE"/>
		<reference ref_id="CVE-2022-1498" ref_url="https://www.suse.com/security/cve/CVE-2022-1498/" source="CVE"/>
		<reference ref_id="CVE-2022-1499" ref_url="https://www.suse.com/security/cve/CVE-2022-1499/" source="CVE"/>
		<reference ref_id="CVE-2022-1500" ref_url="https://www.suse.com/security/cve/CVE-2022-1500/" source="CVE"/>
		<reference ref_id="CVE-2022-1501" ref_url="https://www.suse.com/security/cve/CVE-2022-1501/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHFVFF55YYOTI45WJ3YWL3TU4PVSG5ZU/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 101.0.4951.54 (boo#1199118)

Chromium 101.0.4951.41 (boo#1198917):

* CVE-2022-1477: Use after free in Vulkan
* CVE-2022-1478: Use after free in SwiftShader
* CVE-2022-1479: Use after free in ANGLE
* CVE-2022-1480: Use after free in Device API
* CVE-2022-1481: Use after free in Sharing
* CVE-2022-1482: Inappropriate implementation in WebGL
* CVE-2022-1483: Heap buffer overflow in WebGPU
* CVE-2022-1484: Heap buffer overflow in Web UI Settings
* CVE-2022-1485: Use after free in File System API
* CVE-2022-1486: Type Confusion in V8
* CVE-2022-1487: Use after free in Ozone
* CVE-2022-1488: Inappropriate implementation in Extensions API
* CVE-2022-1489: Out of bounds memory access in UI Shelf
* CVE-2022-1490: Use after free in Browser Switcher
* CVE-2022-1491: Use after free in Bookmarks
* CVE-2022-1492: Insufficient data validation in Blink Editing
* CVE-2022-1493: Use after free in Dev Tools
* CVE-2022-1494: Insufficient data validation in Trusted Types
* CVE-2022-1495: Incorrect security UI in Downloads
* CVE-2022-1496: Use after free in File Manager
* CVE-2022-1497: Inappropriate implementation in Input
* CVE-2022-1498: Inappropriate implementation in HTML Parser
* CVE-2022-1499: Inappropriate implementation in WebAuthentication
* CVE-2022-1500: Insufficient data validation in Dev Tools
* CVE-2022-1501: Inappropriate implementation in iframe
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-06"/>
	<updated date="2022-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198917">SUSE bug 1198917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199118">SUSE bug 1199118</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1477/">CVE-2022-1477</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1478/">CVE-2022-1478</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1479/">CVE-2022-1479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-1480/">CVE-2022-1480</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1481/">CVE-2022-1481</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1482/">CVE-2022-1482</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1483/">CVE-2022-1483</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1484/">CVE-2022-1484</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1485/">CVE-2022-1485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1486/">CVE-2022-1486</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1487/">CVE-2022-1487</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1488/">CVE-2022-1488</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1489/">CVE-2022-1489</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1490/">CVE-2022-1490</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1491/">CVE-2022-1491</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1492/">CVE-2022-1492</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1493/">CVE-2022-1493</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1494/">CVE-2022-1494</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1495/">CVE-2022-1495</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1496/">CVE-2022-1496</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1497/">CVE-2022-1497</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1498/">CVE-2022-1498</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1499/">CVE-2022-1499</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1500/">CVE-2022-1500</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1501/">CVE-2022-1501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682741" comment="chromedriver-101.0.4951.54-bp153.2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682742" comment="chromium-101.0.4951.54-bp153.2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52210" version="1" class="patch">
	<metadata>
		<title>Security update for php-composer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198494" ref_url="https://bugzilla.suse.com/1198494" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41116" ref_url="https://www.suse.com/security/cve/CVE-2021-41116/" source="CVE"/>
		<reference ref_id="CVE-2022-24828" ref_url="https://www.suse.com/security/cve/CVE-2022-24828/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK3MSPNLXNEQ4P7QF5ZJB6IK4W6YAUKM/" source="SUSE-SU"/>
		<description>
This update for php-composer fixes the following issues:

php-composer was updated to version 1.10.26:

* Security: Fixed command injection vulnerability in
  HgDriver/GitDriver: CVE-2022-24828 boo#1198494

Update to version 1.10.25

* Fix regression with PHP 8.1.0 and 8.1.1

Update to version 1.10.24

* Fixed PHP 8.1 compatibility

Update to version 1.10.23

* Security: Fixed command injection vulnerability CVE-2021-41116
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-10"/>
	<updated date="2022-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198494">SUSE bug 1198494</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41116/">CVE-2021-41116</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24828/">CVE-2022-24828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682743" comment="php-composer-1.10.26-bp153.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52211" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199409" ref_url="https://bugzilla.suse.com/1199409" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1633" ref_url="https://www.suse.com/security/cve/CVE-2022-1633/" source="CVE"/>
		<reference ref_id="CVE-2022-1634" ref_url="https://www.suse.com/security/cve/CVE-2022-1634/" source="CVE"/>
		<reference ref_id="CVE-2022-1635" ref_url="https://www.suse.com/security/cve/CVE-2022-1635/" source="CVE"/>
		<reference ref_id="CVE-2022-1636" ref_url="https://www.suse.com/security/cve/CVE-2022-1636/" source="CVE"/>
		<reference ref_id="CVE-2022-1637" ref_url="https://www.suse.com/security/cve/CVE-2022-1637/" source="CVE"/>
		<reference ref_id="CVE-2022-1638" ref_url="https://www.suse.com/security/cve/CVE-2022-1638/" source="CVE"/>
		<reference ref_id="CVE-2022-1639" ref_url="https://www.suse.com/security/cve/CVE-2022-1639/" source="CVE"/>
		<reference ref_id="CVE-2022-1640" ref_url="https://www.suse.com/security/cve/CVE-2022-1640/" source="CVE"/>
		<reference ref_id="CVE-2022-1641" ref_url="https://www.suse.com/security/cve/CVE-2022-1641/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZUMF5ZF6ZMVTBWA23ERPOPX2IWSXJYS/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium was updated to 101.0.4951.64 (boo#1199409)

* CVE-2022-1633: Use after free in Sharesheet
* CVE-2022-1634: Use after free in Browser UI
* CVE-2022-1635: Use after free in Permission Prompts
* CVE-2022-1636: Use after free in Performance APIs
* CVE-2022-1637: Inappropriate implementation in Web Contents
* CVE-2022-1638: Heap buffer overflow in V8 Internationalization
* CVE-2022-1639: Use after free in ANGLE
* CVE-2022-1640: Use after free in Sharing
* CVE-2022-1641: Use after free in Web UI Diagnostics
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199409">SUSE bug 1199409</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1633/">CVE-2022-1633</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1634/">CVE-2022-1634</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1635/">CVE-2022-1635</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1636/">CVE-2022-1636</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1637/">CVE-2022-1637</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1638/">CVE-2022-1638</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1639/">CVE-2022-1639</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1640/">CVE-2022-1640</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1641/">CVE-2022-1641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683850" comment="chromedriver-101.0.4951.64-bp153.2.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683851" comment="chromium-101.0.4951.64-bp153.2.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52212" version="1" class="patch">
	<metadata>
		<title>Recommended update for dxflib (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190345" ref_url="https://bugzilla.suse.com/1190345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21897" ref_url="https://www.suse.com/security/cve/CVE-2021-21897/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQS3J3J4254A7C3LD55D7A432FZ2RFFI/" source="SUSE-SU"/>
		<description>
This update for dxflib fixes the following issues:

- CVE-2021-21897: Fixed a heap-based buffer overflow in the DL_Dxf:handleLWPolylineData function (boo#1190345)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190345">SUSE bug 1190345</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21897/">CVE-2021-21897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684113" comment="dxflib-devel-3.17.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684114" comment="libdxflib-3_17_0-1-3.17.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52213" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198676" ref_url="https://bugzilla.suse.com/1198676" source="BUGZILLA"/>
		<reference ref_id="1198677" ref_url="https://bugzilla.suse.com/1198677" source="BUGZILLA"/>
		<reference ref_id="1198678" ref_url="https://bugzilla.suse.com/1198678" source="BUGZILLA"/>
		<reference ref_id="1198679" ref_url="https://bugzilla.suse.com/1198679" source="BUGZILLA"/>
		<reference ref_id="1198680" ref_url="https://bugzilla.suse.com/1198680" source="BUGZILLA"/>
		<reference ref_id="1198703" ref_url="https://bugzilla.suse.com/1198703" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21465" ref_url="https://www.suse.com/security/cve/CVE-2022-21465/" source="CVE"/>
		<reference ref_id="CVE-2022-21471" ref_url="https://www.suse.com/security/cve/CVE-2022-21471/" source="CVE"/>
		<reference ref_id="CVE-2022-21487" ref_url="https://www.suse.com/security/cve/CVE-2022-21487/" source="CVE"/>
		<reference ref_id="CVE-2022-21488" ref_url="https://www.suse.com/security/cve/CVE-2022-21488/" source="CVE"/>
		<reference ref_id="CVE-2022-21491" ref_url="https://www.suse.com/security/cve/CVE-2022-21491/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

- Version bump to 6.1.34 (released March 22 2022) by Oracle

  This is a maintenance release. The following items were fixed and/or added:

- VMM: Fix instruction emulation for 'cmpxchg16b'
- GUI: Improved GUI behavior on macOS Big Sur and later when kernel extensions are not loaded
- EHCI: Addressed an issue with handling short packets (bug #20726)
- Storage: Fixed a potential hang during disk I/O when the host I/O cache is disabled (bug #20875)
- NVMe: Fixed loading saved state when nothing is attached to it (bug #20791)
- DevPcBios: Addressed an issue which resulted in rejecting the detected LCHS geometry when the head count was above 16
- virtio-scsi: Improvements
- E1000: Improve descriptor handling
- VBoxManage: Fixed handling of command line arguments with incomplete quotes (bug #20740)
- VBoxManage: Improved 'natnetwork list' output
- VBoxManage: NATNetwork: Provide an option (--ipv6-prefix) to set IPv6 prefix
- VBoxManage: NATNetwork: Provide an option (--ipv6-default) to advertise default IPv6 route (bug #20714)
- VBoxManage: Fix documentation of 'usbdevsource add' (bug #20849)
- Networking: General improvements in IPv4 and IPv6 area (bug #20714)
- OVF Import: Allow users to specify a different storage controller and/or controller port for hard disks when importing a VM
- Unattended install: Improvements
- Shared Clipboard: Improved HTML clipboard handling for Windows host
- Linux host and guest: Introduced initial support for kernel 5.17
- Solaris package: Fixes for API access from Python
- Solaris IPS package: Suppress dependency on libpython2.7.so.*
- Linux host and guest: Fixes for Linux kernel 5.14
- Linux Guest Additions: Fixed guest screen resize for older guests which are running libXrandr older than version 1.4
- Linux Guest Additions: Introduced initial support for RHEL 8.6 kernels (bug #20877)
- Windows guest: Make driver install smarter
- Solaris guest: Addressed an issue which prevented VBox GAs 6.1.30 or 6.1.32 from being removed in Solaris 10 guests (bug #20780)
- EFI: Fixed booting from FreeBSD ISO images (bug #19910)
- Fixes CVE-2022-21465 (boo#1198676), CVE-2022-21471 (boo#1198677), CVE-2022-21491 (boo#1198680), CVE-2022-21487 (boo#1198678), and CVE-2022-21488 (boo#1198679).
- Fixed boo#1198703 - package virtualbox-websrv needs sysvinit-tools
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198676">SUSE bug 1198676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198677">SUSE bug 1198677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198678">SUSE bug 1198678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198679">SUSE bug 1198679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198680">SUSE bug 1198680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198703">SUSE bug 1198703</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-21465/">CVE-2022-21465</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21471/">CVE-2022-21471</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21487/">CVE-2022-21487</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21488/">CVE-2022-21488</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21491/">CVE-2022-21491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684115" comment="python3-virtualbox-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684116" comment="virtualbox-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684117" comment="virtualbox-devel-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684118" comment="virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684119" comment="virtualbox-guest-source-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684120" comment="virtualbox-guest-tools-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684121" comment="virtualbox-guest-x11-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684122" comment="virtualbox-host-source-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684123" comment="virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684124" comment="virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684125" comment="virtualbox-qt-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684126" comment="virtualbox-vnc-6.1.34-lp153.2.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684127" comment="virtualbox-websrv-6.1.34-lp153.2.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52214" version="1" class="patch">
	<metadata>
		<title>Security update for civetweb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191938" ref_url="https://bugzilla.suse.com/1191938" source="BUGZILLA"/>
		<reference ref_id="1199047" ref_url="https://bugzilla.suse.com/1199047" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27304" ref_url="https://www.suse.com/security/cve/CVE-2020-27304/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<description>

civetweb was updated to:

- do not load libcrypto/libssl dynamically, just link against them (bsc#1199047)

Version 1.15

* New configuration for URL decoding
* CVE-2020-27304: Sanitize filenames in handle form (bsc#1191938)
* Example “embedded_c.c”: Do not overwrite files (possible security issue)
* Remove obsolete examples
* Remove “experimental” label for some features
* Remove MG_LEGACY_INTERFACE that have been declared obsolete in 2017 or earlier
* Modifications to build scripts, required due to changes in the test environment
* Unix domain socket support fixed
* Fixes for NO_SSL_DL
* Fixes for some warnings / static code analysis
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191938">SUSE bug 1191938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199047">SUSE bug 1199047</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27304/">CVE-2020-27304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684128" comment="civetweb-1.15-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684129" comment="civetweb-devel-1.15-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684130" comment="libcivetweb-cpp1_15_0-1.15-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684131" comment="libcivetweb1_15_0-1.15-lp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52215" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194055" ref_url="https://bugzilla.suse.com/1194055" source="BUGZILLA"/>
		<reference ref_id="1194182" ref_url="https://bugzilla.suse.com/1194182" source="BUGZILLA"/>
		<reference ref_id="1194331" ref_url="https://bugzilla.suse.com/1194331" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0096" ref_url="https://www.suse.com/security/cve/CVE-2022-0096/" source="CVE"/>
		<reference ref_id="CVE-2022-0097" ref_url="https://www.suse.com/security/cve/CVE-2022-0097/" source="CVE"/>
		<reference ref_id="CVE-2022-0098" ref_url="https://www.suse.com/security/cve/CVE-2022-0098/" source="CVE"/>
		<reference ref_id="CVE-2022-0099" ref_url="https://www.suse.com/security/cve/CVE-2022-0099/" source="CVE"/>
		<reference ref_id="CVE-2022-0100" ref_url="https://www.suse.com/security/cve/CVE-2022-0100/" source="CVE"/>
		<reference ref_id="CVE-2022-0101" ref_url="https://www.suse.com/security/cve/CVE-2022-0101/" source="CVE"/>
		<reference ref_id="CVE-2022-0102" ref_url="https://www.suse.com/security/cve/CVE-2022-0102/" source="CVE"/>
		<reference ref_id="CVE-2022-0103" ref_url="https://www.suse.com/security/cve/CVE-2022-0103/" source="CVE"/>
		<reference ref_id="CVE-2022-0104" ref_url="https://www.suse.com/security/cve/CVE-2022-0104/" source="CVE"/>
		<reference ref_id="CVE-2022-0105" ref_url="https://www.suse.com/security/cve/CVE-2022-0105/" source="CVE"/>
		<reference ref_id="CVE-2022-0106" ref_url="https://www.suse.com/security/cve/CVE-2022-0106/" source="CVE"/>
		<reference ref_id="CVE-2022-0107" ref_url="https://www.suse.com/security/cve/CVE-2022-0107/" source="CVE"/>
		<reference ref_id="CVE-2022-0108" ref_url="https://www.suse.com/security/cve/CVE-2022-0108/" source="CVE"/>
		<reference ref_id="CVE-2022-0109" ref_url="https://www.suse.com/security/cve/CVE-2022-0109/" source="CVE"/>
		<reference ref_id="CVE-2022-0110" ref_url="https://www.suse.com/security/cve/CVE-2022-0110/" source="CVE"/>
		<reference ref_id="CVE-2022-0111" ref_url="https://www.suse.com/security/cve/CVE-2022-0111/" source="CVE"/>
		<reference ref_id="CVE-2022-0112" ref_url="https://www.suse.com/security/cve/CVE-2022-0112/" source="CVE"/>
		<reference ref_id="CVE-2022-0113" ref_url="https://www.suse.com/security/cve/CVE-2022-0113/" source="CVE"/>
		<reference ref_id="CVE-2022-0114" ref_url="https://www.suse.com/security/cve/CVE-2022-0114/" source="CVE"/>
		<reference ref_id="CVE-2022-0115" ref_url="https://www.suse.com/security/cve/CVE-2022-0115/" source="CVE"/>
		<reference ref_id="CVE-2022-0116" ref_url="https://www.suse.com/security/cve/CVE-2022-0116/" source="CVE"/>
		<reference ref_id="CVE-2022-0117" ref_url="https://www.suse.com/security/cve/CVE-2022-0117/" source="CVE"/>
		<reference ref_id="CVE-2022-0118" ref_url="https://www.suse.com/security/cve/CVE-2022-0118/" source="CVE"/>
		<reference ref_id="CVE-2022-0120" ref_url="https://www.suse.com/security/cve/CVE-2022-0120/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XW7HD7EA7DNOWMGKDOA6BCE6FBFET4WB/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 97.0.4692.71 (boo#1194331):

* CVE-2022-0096: Use after free in Storage
* CVE-2022-0097: Inappropriate implementation in DevTools
* CVE-2022-0098: Use after free in Screen Capture
* CVE-2022-0099: Use after free in Sign-in
* CVE-2022-0100: Heap buffer overflow in Media streams API
* CVE-2022-0101: Heap buffer overflow in Bookmarks
* CVE-2022-0102: Type Confusion in V8
* CVE-2022-0103: Use after free in SwiftShader
* CVE-2022-0104: Heap buffer overflow in ANGLE
* CVE-2022-0105: Use after free in PDF
* CVE-2022-0106: Use after free in Autofill
* CVE-2022-0107: Use after free in File Manager API
* CVE-2022-0108: Inappropriate implementation in Navigation
* CVE-2022-0109: Inappropriate implementation in Autofill
* CVE-2022-0110: Incorrect security UI in Autofill
* CVE-2022-0111: Inappropriate implementation in Navigation
* CVE-2022-0112: Incorrect security UI in Browser UI
* CVE-2022-0113: Inappropriate implementation in Blink
* CVE-2022-0114: Out of bounds memory access in Web Serial
* CVE-2022-0115: Uninitialized Use in File API
* CVE-2022-0116: Inappropriate implementation in Compositing
* CVE-2022-0117: Policy bypass in Service Workers
* CVE-2022-0118: Inappropriate implementation in WebShare
* CVE-2022-0120: Inappropriate implementation in Passwords

- Revert wayland fixes because it doesn't handle GPU correctly
  (boo#1194182)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-17"/>
	<updated date="2022-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194055">SUSE bug 1194055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194182">SUSE bug 1194182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194331">SUSE bug 1194331</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0096/">CVE-2022-0096</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0097/">CVE-2022-0097</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0098/">CVE-2022-0098</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0099/">CVE-2022-0099</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0100/">CVE-2022-0100</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0101/">CVE-2022-0101</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0102/">CVE-2022-0102</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0103/">CVE-2022-0103</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0104/">CVE-2022-0104</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0105/">CVE-2022-0105</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0106/">CVE-2022-0106</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0107/">CVE-2022-0107</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0108/">CVE-2022-0108</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0109/">CVE-2022-0109</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0110/">CVE-2022-0110</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0111/">CVE-2022-0111</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0112/">CVE-2022-0112</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0113/">CVE-2022-0113</cve>
	<cve impact="critical" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0114/">CVE-2022-0114</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0115/">CVE-2022-0115</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0116/">CVE-2022-0116</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0117/">CVE-2022-0117</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0118/">CVE-2022-0118</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0120/">CVE-2022-0120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663788" comment="chromedriver-97.0.4692.71-bp153.2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663789" comment="chromium-97.0.4692.71-bp153.2.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52216" version="1" class="patch">
	<metadata>
		<title>Security update for autotrace (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182158" ref_url="https://bugzilla.suse.com/1182158" source="BUGZILLA"/>
		<reference ref_id="1182159" ref_url="https://bugzilla.suse.com/1182159" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9182" ref_url="https://www.suse.com/security/cve/CVE-2017-9182/" source="CVE"/>
		<reference ref_id="CVE-2017-9190" ref_url="https://www.suse.com/security/cve/CVE-2017-9190/" source="CVE"/>
		<reference ref_id="CVE-2019-19004" ref_url="https://www.suse.com/security/cve/CVE-2019-19004/" source="CVE"/>
		<reference ref_id="CVE-2019-19005" ref_url="https://www.suse.com/security/cve/CVE-2019-19005/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLYT44LA5ZMWEXSKKLL4QK25G4FZSHQA/" source="SUSE-SU"/>
		<description>
This update for autotrace fixes the following issues:

- CVE-2019-19004: Fixed a biWidth*biBitCnt integer overflow fix (boo#1182158)
- CVE-2019-19005, CVE-2017-9182, CVE-2017-9190: Bitmap double free fix (boo#1182159)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182158">SUSE bug 1182158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182159">SUSE bug 1182159</bugzilla>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9182/">CVE-2017-9182</cve>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9190/">CVE-2017-9190</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19004/">CVE-2019-19004</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19005/">CVE-2019-19005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684132" comment="autotrace-0.31.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684133" comment="autotrace-devel-0.31.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684134" comment="libautotrace3-0.31.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52217" version="1" class="patch">
	<metadata>
		<title>Security update for libxls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192323" ref_url="https://bugzilla.suse.com/1192323" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27836" ref_url="https://www.suse.com/security/cve/CVE-2021-27836/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TECGPMBMRF6XCLE3FXG3LMK4ZGTK275U/" source="SUSE-SU"/>
		<description>
This update for libxls fixes the following issues:

- CVE-2021-27836: Fixed possible NULL pointer dereference via crafted XLS (boo#1192323)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-21"/>
	<updated date="2022-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192323">SUSE bug 1192323</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27836/">CVE-2021-27836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695029" comment="libxls-devel-1.6.2-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695030" comment="libxls-tools-1.6.2-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695031" comment="libxlsreader8-1.6.2-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52218" version="1" class="patch">
	<metadata>
		<title>Security update for librecad (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195105" ref_url="https://bugzilla.suse.com/1195105" source="BUGZILLA"/>
		<reference ref_id="1195122" ref_url="https://bugzilla.suse.com/1195122" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45341" ref_url="https://www.suse.com/security/cve/CVE-2021-45341/" source="CVE"/>
		<reference ref_id="CVE-2021-45342" ref_url="https://www.suse.com/security/cve/CVE-2021-45342/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H67WLPQ3LF4GRKIXDOTJFA2DT732SNIG/" source="SUSE-SU"/>
		<description>
This update for librecad fixes the following issues:

- CVE-2021-45341: Fixed a buffer overflow vulnerability in LibreCAD that allowed an attacker to achieve remote code execution via a crafted JWW document [boo#1195105] 
- CVE-2021-45342: Fixed a buffer overflow vulnerability in jwwlib in LibreCAD allows an attacker to achieve remote code execution via a crafted JWW document [boo#1195122] 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1195105">SUSE bug 1195105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195122">SUSE bug 1195122</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45341/">CVE-2021-45341</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45342/">CVE-2021-45342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695032" comment="librecad-2.2.0~rc3-bp153.2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695033" comment="librecad-parts-2.2.0~rc3-bp153.2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52219" version="1" class="patch">
	<metadata>
		<title>Security update for cacti, cacti-spine (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192408" ref_url="https://bugzilla.suse.com/1192408" source="BUGZILLA"/>
		<reference ref_id="1196692" ref_url="https://bugzilla.suse.com/1196692" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0730" ref_url="https://www.suse.com/security/cve/CVE-2022-0730/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZEKTX6LOHELIEEVJYSONO5MX6DZOZIA/" source="SUSE-SU"/>
		<description>
This update for cacti, cacti-spine fixes the following issues:

cacti-spine was updated to 1.2.20:

  * Add support for newer versions of MySQL/MariaDB
  * When checking for uptime of device, don't assume a non-response
    is always fatal
  * Fix description and command trunctation issues
  * Improve spine performance when only one snmp agent port is in
    use

cacti-spine 1.2.19:

  * Fix 1ssues with polling loop may skip some datasources
  * Fix ping no longer works due to hostname changes
  * Fix RRD steps are not always calculated correctly
  * Fix unable to build when DES no longer supported
  * Fix IPv6 devices are not properly parsed
  * Reduce a number of compiler warnings
  * Fix compiler warnings due to lack of return in thread_mutex_trylock
  * Fix Spine will not look at non-timetics uptime when sysUpTimeInstance overflows
  * Improve performance of Cacti poller on heavily loaded systems

cacti-spine 1.2.20:

  * Add support for newer versions of MySQL/MariaDB
  * When checking for uptime of device, don't assume a non-response
    is always fatal
  * Fix description and command trunctation issues
  * Improve spine performance when only one snmp agent port is in
    use

cacti was updated to 1.2.20:

  * Security fix for CVE-2022-0730, boo#1196692
    Under certain ldap conditions, Cacti authentication can be
    bypassed with certain credential types.
  * Security fix: Device, Graph, Graph Template,
    and Graph Items may be vulnerable to XSS issues
  * Security fix: Lockout policies are not properly applied to LDAP
    and Domain Users
  * Security fix: When using 'remember me' option, incorrect realm
    may be selected
  * Security fix: User and Group maintenance are vulnerable to SQL attacks
  * Security fix: Color Templates are vulnerable to XSS attack
  * Features:
    * When creating a Data Source Profile, allow additional choices for Heartbeat
    * Change select all options to use Font Awesome icons
    * Improve spine performance by storing the total number of system snmp_ports in use
    * Prevent Template User Accounts from being Removed
    * When managing by users, allow filtering by Realm
    * Allow plugins to supply template account names
    * When viewing logs, additional message types should be filterable
    * When creating a Graph Template Item, allow filtering by Data Template
    * Allow language handler to be selected via UI
    * Updated Device packages for Synology, Citrix NetScaler, Cisco ASA/Cisco
    * Add Advanced Ping Graph Template to initial Installable templates
    * Add LDAP Debug Mode option
    * Allow Reports to include devices not on a Tree
    * Allow Basic Authentication to display custom failure message
  * Fix: When replicating data during installation/upgrade,
    system may appear to hang
  * Fix: Graph Template Items may have duplicated entries
  * Fix: Unable to Save Graph Settings
  * Fix: Script Server may crash if an OID is missing or unavailable
  * Fix: When system-wide polling is disabled,
    remote pollers may fail to sync changed settings
  * Fix: When updating poller name, duplicate name protection may be over zealous
  * Fix: Titles may show 'Missing Datasource' incorectly
  * Fix: Checking for MIB Cache can cause crashes
  * Fix: Polling cycles may not always complete as expected
  * Fix: When viewing graph data, non-numeric values may appear
  * Fix: Utilities view has calculation errors when there are no data sources
  * Fix: When editing Reports, drag and drop may not function as intended
  * Fix: When data drive is full, viewing a Graph can result in errors
  * Various other bug fixes

cacti 1.2.19:

  * Further fixes for grave character security protection (boo#1192408)
  * Fix Over aggressive escaping causing menu visibility issues on Create Device page
  * Add SHA256 and AES256 security levels for SNMP polling
  * Import graph template(Preview Only) show color_id new value as a blank area
  * Fix Editing graphs errors due to missing sequence
  * Fix 2hen hovering over a Tree Graph, row shows same highlighting as Graph Edit screen
  * Fix 2hen RealTime is not active, console errors may appear
  * Fix race conditions may occur when multiple RRDtool processes are running
  * Fix errors creating graphs from templates
  * Fix errors when duplicating reports
  * Fix Boost may be blocked by overflowing poller_output table
  * Fix Template import may be blocked due to unmet dependency warnings with snmp ports
  * Fix Newer MySQL versions may error if committing a transaction when not in one
  * Fix SNMP Agent may not find a cache item
  * Fix Correct issues running under PHP 8.x
  * Fix When polling is disabled, boost may crash and creates many arch tables
  * Fix When poller runs, memory tables may not always be present
  * Fix Timezones may sometimes be incorrectly calculated
  * Fix Allow monitoring IPv6 with interface graphs
  * Fix When a data source uses a Data Input Method, those without a mapping should be flagged
  * Fix When RRDfile is not yet created, errors may appear when displaying the graph
  * Fix Cacti missing key indexes that result in Preset pages slowdowns
  * Fix Data Sources page shows no name when Data Source has no name cache
  * Fix db_update_table function can not alter table from signed to unsigned
  * Fix data remains in poller_output table even if it's flushed to rrd files
  * Fix Parameter list for lib/database.php:db_connect_real() is not correct in 3 places
  * Fix Offset is a reserved word in MariaDB 10.6 affecting Report
  * Fix Rendering large trees slowed due to lack of permission caching
  * Fix Error on interpretation of snmpUtime, when to big
  * Fix Applying right axis formatting creates an error-image
  * Fix Unable to Save Graph Settings from the Graphs pages
  * Fix Graph Template Cache is nullified too often when Graph Automation is running
  * Fix When Adding a Data Query to a Device, no Progress Spinner is shown
  * Fix New Browser Breaks Plugins that depend on non UTC date time data
  * Fix errors when testing remote poller connectivity
  * Fix errors when renaming poller
  * Fix Removing spikes by Variance does not appear to be working beyond the first RRA
  * Fix LDAP API lacks timeout options leading to bad login experiences
  * Add a normal/wrap class for general use
  * Limit File Types available for Template Import operations
  * Fix Cacti does not provide an option of providing a client side certificate for LDAP/AD authentication
  * Support Stronger Encryption Available Starting in Net-SNMP v5.8
  * Allow Cacti to use multiple possible LDAP servers
  * Add a 15 minute polling/sampling interval
  * Provide additional admin email notifications
  * Add warnings for undesired changes to plugin hook return values
  * When creating a Graph, make testing the Data Sources optional by Template
  * Update phpseclib to 2.0.33
  * Update jstree.js to 3.3.12
  * Improve performance of Cacti poller on heavily loaded systems
  * MariaDB recommendations need some tuning for recent updates

		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192408">SUSE bug 1192408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196692">SUSE bug 1196692</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0730/">CVE-2022-0730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695034" comment="cacti-1.2.20-bp153.2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695035" comment="cacti-spine-1.2.20-bp153.2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52220" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-1633" ref_url="https://www.suse.com/security/cve/CVE-2022-1633/" source="CVE"/>
		<reference ref_id="CVE-2022-1634" ref_url="https://www.suse.com/security/cve/CVE-2022-1634/" source="CVE"/>
		<reference ref_id="CVE-2022-1635" ref_url="https://www.suse.com/security/cve/CVE-2022-1635/" source="CVE"/>
		<reference ref_id="CVE-2022-1636" ref_url="https://www.suse.com/security/cve/CVE-2022-1636/" source="CVE"/>
		<reference ref_id="CVE-2022-1637" ref_url="https://www.suse.com/security/cve/CVE-2022-1637/" source="CVE"/>
		<reference ref_id="CVE-2022-1638" ref_url="https://www.suse.com/security/cve/CVE-2022-1638/" source="CVE"/>
		<reference ref_id="CVE-2022-1639" ref_url="https://www.suse.com/security/cve/CVE-2022-1639/" source="CVE"/>
		<reference ref_id="CVE-2022-1640" ref_url="https://www.suse.com/security/cve/CVE-2022-1640/" source="CVE"/>
		<reference ref_id="CVE-2022-1641" ref_url="https://www.suse.com/security/cve/CVE-2022-1641/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEVUIGDCWRXB5ZFSV2K4UGVJCEMNQQ2X/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 87.0.4390.25:

  - CHR-8870 Update chromium on desktop-stable-101-4390 to
    101.0.4951.64
  - DNA-99209 Enable #easy-files-multiupload on all streams
  - DNA-99325 Use a preference to set number of recent searches and
    recently closed in unfiltered dropdown
  - DNA-99353 Translations for O87
  - DNA-99365 Adding title to the first category duplicates
    categories titles in the dropdown
  - DNA-99385 Feedback button in filtered dropdown can overlap with
    other web buttons for highlighted suggestion
  - DNA-99391 Add bookmarks at the bottom of a bookmarks bar folder
  - DNA-99491 Suggestion is not immediately removed form recent
    searches view in dropdown.
  - DNA-99501 Promote O87 to stable
  - DNA-99504 “Switch to tab” button is not aligned to the right
    for some categories in dropdown

- The update to chromium 101.0.4951.64 fixes following issues:
  CVE-2022-1633, CVE-2022-1634, CVE-2022-1635, CVE-2022-1636,
  CVE-2022-1637, CVE-2022-1638, CVE-2022-1639, CVE-2022-1640,
  CVE-2022-1641

- Complete Opera 87.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-87/

- Update to 86.0.4363.59

  - DNA-99021 Crash in sidebar when extension of sidebar item was
    uninstalled
  - DNA-99359 Crash at opera::
    ContinueShoppingExpiredProductRemoverImpl::RemoveExpiredProducts()
  

- Update to 86.0.4363.50

  - DNA-68493 Opera doesn’t close address field drop-down when
    dragging text from the address field
  - DNA-99003 Crash at views::Widget::GetNativeView() const
  - DNA-99133 BrowserSidebarWithProxyAuthTest.PreloadWithWebModalDialog
    fails
  - DNA-99230 Switching search engine with shortcut stopped working
    after DNA-99178
  - DNA-99317 Make history match appear on top

- Update to 86.0.4363.32

  - DNA-98510 Blank icon in sidebar setup
  - DNA-98525 Unable to drag tab to far right
  - DNA-98893 Sound indicator is too precise in Google Meet
  - DNA-98919 Shopping corner internal API access update
  - DNA-98924 Tab tooltip gets stuck on screen
  - DNA-98981 Enable easy-files-multiupload on developer stream
  - DNA-99041 Move Shopping Corner to sidebar entry
  - DNA-99061 Enable #address-bar-dropdown-categories on all streams
  - DNA-99062 Create flag to show top sites and recently closed in
    unfiltered suggestions
  - DNA-99064 Hard to drag &amp; drop current URL to a specific folder
    on bookmarks bar when unfiltered dropdown is displayed
  - DNA-99070 Make scroll button in Continue On scroll multiple
    items
  - DNA-99089 Shopping corner tab is not preserved after restart
  - DNA-99115 Request updating the Avro schema for sidebar event
  - DNA-99117 Make sure shopping corner is enabled by default
  - DNA-99178 Left/right not working in address bar dropdown
  - DNA-99204 Hide Shopping Corner by default
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1633/">CVE-2022-1633</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1634/">CVE-2022-1634</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1635/">CVE-2022-1635</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1636/">CVE-2022-1636</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1637/">CVE-2022-1637</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1638/">CVE-2022-1638</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1639/">CVE-2022-1639</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1640/">CVE-2022-1640</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1641/">CVE-2022-1641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695036" comment="opera-87.0.4390.25-lp153.2.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52221" version="1" class="patch">
	<metadata>
		<title>Security update for varnish (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1188470" ref_url="https://bugzilla.suse.com/1188470" source="BUGZILLA"/>
		<reference ref_id="1195188" ref_url="https://bugzilla.suse.com/1195188" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36740" ref_url="https://www.suse.com/security/cve/CVE-2021-36740/" source="CVE"/>
		<reference ref_id="CVE-2022-23959" ref_url="https://www.suse.com/security/cve/CVE-2022-23959/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTY3FIXDKQEQLMHOF4U46AQ47W524UIM/" source="SUSE-SU"/>
		<description>
This update for varnish fixes the following issues:

varnish was updated to release 7.1.0 [boo#1195188] [CVE-2022-23959]

* VCL: It is now possible to assign a BLOB value to a BODY
  variable, in addition to STRING as before.
* VMOD: New STRING strftime(TIME time, STRING format) function
  for UTC formatting.

Update to release 6.6.1

* CVE-2021-36740: Fix an HTTP/2.0 request smuggling vulnerability. [boo#1188470]

Update to release 6.6.0:

* The ban_cutoff parameter now refers to the overall length of
  the ban list, including completed bans, where before only
  non-completed (“active”) bans were counted towards ban_cutoff.
* Body bytes accounting has been fixed to always represent the
  number of body bytes moved on the wire, exclusive of
  protocol-specific overhead like HTTP/1 chunked encoding or
  HTTP/2 framing.
* The connection close reason has been fixed to properly report
  SC_RESP_CLOSE where previously only SC_REQ_CLOSE was reported.
* Unless the new validate_headers feature is disabled, all newly
  set headers are now validated to contain only characters
  allowed by RFC7230.
* The filter_re, keep_re and get_re functions from the bundled
  cookie vmod have been changed to take the VCL_REGEX type. This
  implies that their regular expression arguments now need to be
  literal, not e.g. string.
* The interface for private pointers in VMODs has been changed,
  the VRT backend interface has been changed, many filter
  (VDP/VFP) related signatures have been changed, and the
  stevedore API has been changed. (Details thereto, see online
  changelog.)

Update to release 6.5.1

* Bump the VRT_MAJOR_VERSION number defined in the vrt.h

Update to release 6.5.0

* `PRIV_TOP` is now thread-safe to support parallel ESI
  implementations.
* varnishstat's JSON output format (-j option) has been changed.
* Behavior for 304-type responses was changed not to update the
  Content-Encoding response header of the stored object.

- Update Git-Web repository link

Update to release 6.4.0

* The MAIN.sess_drop counter is gone.
* backend 'none' was added for 'no backend'.
* The hash algorithm of the hash director was changed, so
  backend selection will change once only when upgrading.
* It is now possible for VMOD authors to customize the
  connection pooling of a dynamic backend.
* For more, see changes.rst.

Update to release 6.3.2

* Fix a denial of service vulnerability when using the proxy
  protocol version 2.

Update to release 6.3.0

* The Host: header is folded to lower-case in the builtin_vcl.
* Improved performance of shared memory statistics counters.
* Synthetic objects created from vcl_backend_error {} now
  replace existing stale objects as ordinary backend fetches
  would (for details see changes.rst)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188470">SUSE bug 1188470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195188">SUSE bug 1195188</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-36740/">CVE-2021-36740</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23959/">CVE-2022-23959</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695037" comment="libvarnishapi3-7.1.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695038" comment="varnish-7.1.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695039" comment="varnish-devel-7.1.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52222" version="1" class="patch">
	<metadata>
		<title>Security update for libredwg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193372" ref_url="https://bugzilla.suse.com/1193372" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28237" ref_url="https://www.suse.com/security/cve/CVE-2021-28237/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWT2GLRS2EG6EW7X57X2RMJHMFK6GEWU/" source="SUSE-SU"/>
		<description>
This update for libredwg fixes the following issues:

Update to release 0.12.5 [boo#1193372] [CVE-2021-28237]

* Restricted accepted DXF objects to all stable and unstable
  classes, minus MATERIAL, ARC_DIMENSION, SUN, PROXY*. I.e.
  most unstable objects do not allow unknown DXF codes anymore.
  This fixed most oss-fuzz errors.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193372">SUSE bug 1193372</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28237/">CVE-2021-28237</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695040" comment="libredwg-devel-0.12.5-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695041" comment="libredwg-tools-0.12.5-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695042" comment="libredwg0-0.12.5-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52223" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2022:0150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEHXIWSI3LT73BE7YAXGYKT4HEXYVR3X/" source="SUSE-SU"/>
		<description>
This update for seamonkey fixes the following issues:

Update to SeaMonkey 2.53.12

* Format Toolbar forgets its hidden status when switching to other
  view modes bug 1719020.
* Remove obsolete plugin code from SeaMonkey bug 1762733.
* Fix a few strict warnings in SeaMonkey bug 1755553.
* Remove Run Flash from Site permissions and page info bug 1758289.
* Use fixIterator and replace use of removeItemAt in
  FilterListDialog bug 1756359.
* Remove RDF usage in tabmail.js bug 1758282.
* Implement 'Edit Template' and 'New Message From Template' commands
  and UI bug 1759376.
* [SM] Implement 'Edit Draft' command and hide it when not in a
  draft folder (port Thunderbird bug 1106412) bug 1256716.
* Messages in Template folder need 'Edit Template' button in header
  (like for Drafts) bug 80280.
* Refactor and simplify the feed Subscribe dialog options updates
  bug 1420473.
* Add system memory and disk size and placeDB page limit to
  about:support bug 1753729.
* Remove warning about missing plugins in SeaMonkey 2.53 and 2.57
  bug 1755558.
* SeaMonkey 2.53.12 uses the same backend as Firefox and contains
  the relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.12 shares most parts of the mail and news code with
  Thunderbird. Please read the Thunderbird 60.8.0 release notes for
  specific security fixes in this release.
* Additional important security fixes up to Current Firefox 91.9 and
  Thunderbird 91.9 ESR plus many enhancements have been
  backported. We will continue to enhance SeaMonkey security in
  subsequent 2.53.x beta and release versions as fast as we are able
  to.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695043" comment="seamonkey-2.53.12-lp153.17.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695044" comment="seamonkey-dom-inspector-2.53.12-lp153.17.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695045" comment="seamonkey-irc-2.53.12-lp153.17.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52224" version="1" class="patch">
	<metadata>
		<title>Security update for htmldoc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199370" ref_url="https://bugzilla.suse.com/1199370" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27114" ref_url="https://www.suse.com/security/cve/CVE-2022-27114/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJ7DM7F3IHCRMEZDBDGMA5O6A5EWNQKE/" source="SUSE-SU"/>
		<description>
This update for htmldoc fixes the following issues:

- CVE-2022-27114: Fixed an integer overflow in image_load_jpeg (boo#1199370)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199370">SUSE bug 1199370</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27114/">CVE-2022-27114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695046" comment="htmldoc-1.9.12-bp153.2.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52225" version="1" class="patch">
	<metadata>
		<title>Security update for watchman (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1194470" ref_url="https://bugzilla.suse.com/1194470" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21944" ref_url="https://www.suse.com/security/cve/CVE-2022-21944/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNMY24O54KQLQYLHBRWLMCEO42RIRELW/" source="SUSE-SU"/>
		<description>
This update for watchman fixes the following issues:

- ship README.suse that explains how to use the template systemd units
- add user writable bit for systemd service and socket files
- properly handle state directory creation in /run/watchman/$USER-state. The
  former approach was susceptible to a local privilege escalation using
  symlinks (CVE-2022-21944, boo#1194470).

- Added hardening to systemd service(s) (boo#1181400). Modified:
  * watchman@.service

- removed python2 bindings
- enabled python3 bindings as python3-watchman

- Changes in 4.8.0:

    * New command `flush-subscriptions` to synchronize subscriptions associated
      with the current session.
    * Enforce socket Unix groups more strongly — Watchman will now refuse to start
      if it couldn't gain the right group memberships, as can happen for sites that
      are experiencing intermittent LDAP connectivity problems.
    * pywatchman now officially supports Python 3. pywatchman will return Unicode
      strings (possibly with surrogate escapes) by default, but can optionally return
      bytestrings. Note that on Python 3, pywatchman requires Watchman 4.8 and above.
      The Python 2 interface and requirements remain unchanged.
    * Prior to 4.8, methods on the Java WatchmanClient that returned
    	ListenableFutures would swallow exceptions and hang in an unfinished state
    	under situations like socket closure or thread death.  This has been fixed, and
    	now ListenableFutures propagate exception conditions immediately.  (Note that
    	this is typically unrecoverable, and users should create a new WatchmanClient
    	to re-establish communication with Watchman.)  See #412.
    * The minimum Java version for the Watchman Java client has always been 1.7,
    	but it was incorrectly described to be 1.6.  The Java client's build file has
    	been fixed accordingly.
    * Watchman was converted from C to C++.  The conversion exposed several
    	concurrency bugs, all of which have now been fixed.
    * Subscription queries are now executed in the context of the client thread,
    	which means that subscriptions are dispatched in parallel.  Previously,
    	subscriptions would be serially dispatched and block the disk IO thread.
    * Triggers are now dispatched in parallel and waits are managed in their own
    	threads (one thread per trigger).  This improves concurrency and resolves a
    	couple of waitpid related issues where watchman may not reap spawned children
    	in a timely fashion, or may spin on CPU until another child is spawned.
    * Fixed an object lifecycle management issue that could cause a crash when
      aging out old/transient files.
    * Implement an upgraded wire protocol, BSERv2, on the server and in pywatchman.
    	BSERv2 can carry information about string encoding over the wire. This lets
    	pywatchman convert to Unicode strings on Python 3. Clients and servers know how
    	to  transparently fall back to BSERv1.
  - Changes in 4.9.0:
    * New field: `content.sha1hex`.  This field expands to the SHA1 hash of
      the file contents, expressed in hex digits (40 character hex string).
      Watchman maintains a cache of the content hashes and can compute the
      hash on demand and also heuristically as files are changed.  This is
      useful for tooling that wants to perform more intelligent cache invalidation
      or build artifact fetching from content addressed storage.
    * Fixed an issue that resulted in the perf logging thread deadlocking when
      `perf_logger_command` is enabled in the global configuration
    * Fixed an issue where queries larger than 1MB would likely result in
      a PDU error response.
    * Reduced lock contention for subscriptions that do no use the advanced
      settling (`drop`, `defer`) options.
    * Fixed `since` generator behavior when using unix timestamps rather than
      the preferred clock string syntax
    * Improved the reporting of 'new' files in watchman results
    * Improved performance of handling changes on case insensitive filesystems
    * pywatchman: the python wheel format is used for publishing watchman pypi package
    * pywatchman: now watchman path is configurable in python client
    * pywatchman: now python client can be used as a context manager
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-17"/>
	<updated date="2022-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194470">SUSE bug 1194470</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21944/">CVE-2022-21944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663790" comment="python3-watchman-1.4.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663791" comment="watchman-4.9.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52226" version="1" class="patch">
	<metadata>
		<title>Security update for stb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191743" ref_url="https://bugzilla.suse.com/1191743" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42716" ref_url="https://www.suse.com/security/cve/CVE-2021-42716/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G7QRUVRJT5W72APQEDYOZEMCHXZ5CMDO/" source="SUSE-SU"/>
		<description>
This update for stb fixes the following issues:

- CVE-2021-42716: fixed buffer overflow in stb_image PNM loader (boo#1191743)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191743">SUSE bug 1191743</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42716/">CVE-2021-42716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664354" comment="stb-devel-2.32.1549563867.59e9702-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52227" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194919" ref_url="https://bugzilla.suse.com/1194919" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0289" ref_url="https://www.suse.com/security/cve/CVE-2022-0289/" source="CVE"/>
		<reference ref_id="CVE-2022-0290" ref_url="https://www.suse.com/security/cve/CVE-2022-0290/" source="CVE"/>
		<reference ref_id="CVE-2022-0291" ref_url="https://www.suse.com/security/cve/CVE-2022-0291/" source="CVE"/>
		<reference ref_id="CVE-2022-0292" ref_url="https://www.suse.com/security/cve/CVE-2022-0292/" source="CVE"/>
		<reference ref_id="CVE-2022-0293" ref_url="https://www.suse.com/security/cve/CVE-2022-0293/" source="CVE"/>
		<reference ref_id="CVE-2022-0294" ref_url="https://www.suse.com/security/cve/CVE-2022-0294/" source="CVE"/>
		<reference ref_id="CVE-2022-0295" ref_url="https://www.suse.com/security/cve/CVE-2022-0295/" source="CVE"/>
		<reference ref_id="CVE-2022-0296" ref_url="https://www.suse.com/security/cve/CVE-2022-0296/" source="CVE"/>
		<reference ref_id="CVE-2022-0297" ref_url="https://www.suse.com/security/cve/CVE-2022-0297/" source="CVE"/>
		<reference ref_id="CVE-2022-0298" ref_url="https://www.suse.com/security/cve/CVE-2022-0298/" source="CVE"/>
		<reference ref_id="CVE-2022-0300" ref_url="https://www.suse.com/security/cve/CVE-2022-0300/" source="CVE"/>
		<reference ref_id="CVE-2022-0301" ref_url="https://www.suse.com/security/cve/CVE-2022-0301/" source="CVE"/>
		<reference ref_id="CVE-2022-0302" ref_url="https://www.suse.com/security/cve/CVE-2022-0302/" source="CVE"/>
		<reference ref_id="CVE-2022-0303" ref_url="https://www.suse.com/security/cve/CVE-2022-0303/" source="CVE"/>
		<reference ref_id="CVE-2022-0304" ref_url="https://www.suse.com/security/cve/CVE-2022-0304/" source="CVE"/>
		<reference ref_id="CVE-2022-0305" ref_url="https://www.suse.com/security/cve/CVE-2022-0305/" source="CVE"/>
		<reference ref_id="CVE-2022-0306" ref_url="https://www.suse.com/security/cve/CVE-2022-0306/" source="CVE"/>
		<reference ref_id="CVE-2022-0307" ref_url="https://www.suse.com/security/cve/CVE-2022-0307/" source="CVE"/>
		<reference ref_id="CVE-2022-0308" ref_url="https://www.suse.com/security/cve/CVE-2022-0308/" source="CVE"/>
		<reference ref_id="CVE-2022-0309" ref_url="https://www.suse.com/security/cve/CVE-2022-0309/" source="CVE"/>
		<reference ref_id="CVE-2022-0310" ref_url="https://www.suse.com/security/cve/CVE-2022-0310/" source="CVE"/>
		<reference ref_id="CVE-2022-0311" ref_url="https://www.suse.com/security/cve/CVE-2022-0311/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WXZCTLOB2POU23DZG3IW6R4QQB3Q2FON/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 97.0.4692.99 (boo#1194919):

* CVE-2022-0289: Use after free in Safe browsing
* CVE-2022-0290: Use after free in Site isolation
* CVE-2022-0291: Inappropriate implementation in Storage
* CVE-2022-0292: Inappropriate implementation in Fenced Frames
* CVE-2022-0293: Use after free in Web packaging
* CVE-2022-0294: Inappropriate implementation in Push messaging
* CVE-2022-0295: Use after free in Omnibox
* CVE-2022-0296: Use after free in Printing
* CVE-2022-0297: Use after free in Vulkan
* CVE-2022-0298: Use after free in Scheduling
* CVE-2022-0300: Use after free in Text Input Method Editor
* CVE-2022-0301: Heap buffer overflow in DevTools
* CVE-2022-0302: Use after free in Omnibox
* CVE-2022-0303: Race in GPU Watchdog
* CVE-2022-0304: Use after free in Bookmarks
* CVE-2022-0305: Inappropriate implementation in Service Worker API
* CVE-2022-0306: Heap buffer overflow in PDFium
* CVE-2022-0307: Use after free in Optimization Guide
* CVE-2022-0308: Use after free in Data Transfer
* CVE-2022-0309: Inappropriate implementation in Autofill
* CVE-2022-0310: Heap buffer overflow in Task Manager
* CVE-2022-0311: Heap buffer overflow in Task Manager
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194919">SUSE bug 1194919</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0289/">CVE-2022-0289</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0290/">CVE-2022-0290</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0291/">CVE-2022-0291</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0292/">CVE-2022-0292</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0293/">CVE-2022-0293</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0294/">CVE-2022-0294</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0295/">CVE-2022-0295</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0296/">CVE-2022-0296</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0297/">CVE-2022-0297</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0298/">CVE-2022-0298</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0300/">CVE-2022-0300</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0301/">CVE-2022-0301</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0302/">CVE-2022-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-0303/">CVE-2022-0303</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0304/">CVE-2022-0304</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0305/">CVE-2022-0305</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0306/">CVE-2022-0306</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0307/">CVE-2022-0307</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0308/">CVE-2022-0308</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0309/">CVE-2022-0309</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0310/">CVE-2022-0310</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0311/">CVE-2022-0311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664666" comment="chromedriver-97.0.4692.99-bp153.2.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664667" comment="chromium-97.0.4692.99-bp153.2.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52228" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194065" ref_url="https://bugzilla.suse.com/1194065" source="BUGZILLA"/>
		<reference ref_id="1194126" ref_url="https://bugzilla.suse.com/1194126" source="BUGZILLA"/>
		<reference ref_id="1194128" ref_url="https://bugzilla.suse.com/1194128" source="BUGZILLA"/>
		<reference ref_id="1194924" ref_url="https://bugzilla.suse.com/1194924" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21394" ref_url="https://www.suse.com/security/cve/CVE-2022-21394/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVT7FRNNNK2PC4PFXSGAPUIG3HECY4P5/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

- CVE-2022-21394: Fixed vulnerability where low privileged attacker could compromise Oracle VM VirtualBox. (boo#1194924)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194065">SUSE bug 1194065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194126">SUSE bug 1194126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194128">SUSE bug 1194128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194924">SUSE bug 1194924</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21394/">CVE-2022-21394</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664760" comment="python3-virtualbox-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664761" comment="virtualbox-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664762" comment="virtualbox-devel-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664763" comment="virtualbox-guest-desktop-icons-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664764" comment="virtualbox-guest-source-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664765" comment="virtualbox-guest-tools-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664766" comment="virtualbox-guest-x11-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664767" comment="virtualbox-host-source-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664768" comment="virtualbox-kmp-default-6.1.32_k5.3.18_59.40-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664769" comment="virtualbox-kmp-preempt-6.1.32_k5.3.18_59.40-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664770" comment="virtualbox-qt-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664771" comment="virtualbox-vnc-6.1.32-lp153.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664772" comment="virtualbox-websrv-6.1.32-lp153.2.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52229" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1146452" ref_url="https://bugzilla.suse.com/1146452" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1194376" ref_url="https://bugzilla.suse.com/1194376" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22707" ref_url="https://www.suse.com/security/cve/CVE-2022-22707/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P5G6MJW4Q5RKKPO7TS5CLAAEQ2QUYBE/" source="SUSE-SU"/>
		<description>
This update for lighttpd fixes the following issues:

lighttpd was updated to 1.4.64:

* CVE-2022-22707: off-by-one stack overflow in the mod_extforward
  plugin (boo#1194376)
* graceful restart/shutdown timeout changed from 0 (disabled) to
  8 seconds. configure an alternative with:
  server.feature-flags += (“server.graceful-shutdown-timeout” =&gt; 8)
* deprecated modules (previously announced) have been removed:
  mod_authn_mysql, mod_mysql_vhost, mod_cml, mod_flv_streaming,
  mod_geoip, mod_trigger_b4_dl

update to 1.4.63:

* import xxHash v0.8.1
* fix reqpool mem corruption in 1.4.62

includes changes in 1.4.62:

* [mod_alias] fix use-after-free bug
* many developer visible bug fixes

update to 1.4.61:

* mod_dirlisting: sort '../' to top
* fix HTTP/2 upload &gt; 64k w/ max-request-size
* code level and developer visible bug fixes

update to 1.4.60:

* HTTP/2 smoother and lower memory use (in general)
* HTTP/2 tuning to better handle aggressive client initial
  requests
* reduce memory footprint; workaround poor glibc behavior;
  jemalloc is better
* mod_magnet lua performance improvements
* mod_dirlisting performance improvements and new caching option
* memory constraints for extreme edge cases in mod_dirlisting,
  mod_ssi, mod_webdav
* connect(), write(), read() time limits on backends (separate
  from client timeouts)
* lighttpd restarts if large discontinuity in time occurs
  (embedded systems)
* RFC7233 Range support for all non-streaming responses, not
  only static files
* connect() to backend now has default 8 second timeout
  (configurable)

- Added hardening to systemd service(s) (boo#1181400).

update to 1.4.59:

* HTTP/2 enabled by default
* mod_deflate zstd suppport
* new mod_ajp13

Update to 1.4.58: 

* [mod_wolfssl] use wolfSSL TLS version defines
* [mod_wolfssl] compile with earlier wolfSSL vers
* [core] prefer IPv6+IPv4 func vs IPv4-specific func
* [core] reuse large mem chunks (fix mem usage) (fixes #3033)
* [core] add comment for FastCGI mem use in hctx-&gt;rb (#3033)
* [mod_proxy] fix sending of initial reqbody chunked
* [multiple] fdevent_waitpid() wrapper
* [core] sys-time.h - localtime_r,gmtime_r macros
* [core] http_date.[ch] encapsulate HTTP-date parse
* [core] specialized strptime() for HTTP date fmts
* [multiple] employ http_date.h, sys-time.h
* [core] http_date_timegm() (portable timegm())
* buffer_append_path_len() to join paths
* [core] inet_ntop_cache -&gt; sock_addr_cache
* [multiple] etag.[ch] -&gt; http_etag.[ch]; better imp
* [core] fix crash after specific err in config file
* [core] fix bug in FastCGI uploads (#3033)
* [core] http_response_match_if_range()
* [mod_webdav] typedef off_t loff_t for FreeBSD
* [multiple] chunkqueue_write_chunk()
* [build] add GNUMAKEFLAGS=--no-print-directory
* [core] fix bug in read retry found by coverity
* [core] attempt to quiet some coverity warnings
* [mod_webdav] compile fix for Mac OSX/11
* [core] handle U+00A0 in config parser
* [core] fix lighttpd -1 one-shot with pipes
* [core] quiet start/shutdown trace in one-shot mode
* [core] allow keep-alives in one-shot mode (#3042)
* [mod_webdav] define _ATFILE_SOURCE if AT_FDCWD
* [core] setsockopt IPV6_V6ONLY if server.v4mapped
* [core] prefer inet_aton() over inet_addr()
* [core] add missing mod_wolfssl to ssl compat list
* [mod_openssl] remove ancient preprocessor logic
* [core] SHA512_Init, SHA512_Update, SHA512_Final
* [mod_wolfssl] add complex preproc logic for SNI
* [core] wrap a macro value with parens
* [core] fix handling chunked response from backend (fixes #3044)
* [core] always set file.fd = -1 on FILE_CHUNK reset (fixes #3044)
* [core] skip some trace if backend Upgrade (#3044)
* [TLS] cert-staple.sh POSIX sh compat (fixes #3043)
* [core] portability fix if st_mtime not defined
* [mod_nss] portability fix
* [core] warn if mod_authn_file needed in conf
* [core] fix chunked decoding from backend (fixes #3044)
* [core] reject excess data after chunked encoding (#3046)
* [core] track chunked encoding state from backend (fixes #3046)
* [core] li_restricted_strtoint64()
* [core] track Content-Length from backend (fixes #3046)
* [core] enhance config parsing debugging (#3047)
* [core] reorder srv-&gt;config_context to match ndx (fixes #3047)
* [mod_proxy] proxy.header = ('force-http10' =&gt; ...)
* [mod_authn_ldap] fix crash (fixes #3048)
* [mod_authn_ldap, mod_vhostdb_ldap] default cafile
* [core] fix array_copy_array() sorted[]
* [multiple] replace fall through comment with attr
* [core] fix crash printing trace if backend is down
* [core] fix decoding chunked from backend (fixes #3049)
* [core] attempt to quiet some coverity warnings
* [core] perf: request processing
* [core] http_header_str_contains_token()
* [mod_flv_streaming] parse query string w/o copying
* [mod_evhost] use local array to split values
* [core] remove srv-&gt;split_vals
* [core] add User-Agent to http_header_e enum
* [core] store struct server * in struct connection
* [core] use func rc to indicate done reading header
* [core] replace connection_set_state w/ assignment
* [core] do not pass srv to http header parsing func
* [core] cold buffer_string_prepare_append_resize()
* [core] chunkqueue_compact_mem()
* [core] connection_chunkqueue_compact()
* [core] pass con around request, not srv and con
* [core] reduce use of struct parse_header_state
* [core] perf: HTTP header parsing using \n offsets
* [core] no need to pass srv to connection_set_state
* [core] perf: connection_read_header_more()
* [core] perf: connection_read_header_hoff() hot
* [core] inline connection_read_header()
* [core] pass ptr to http_request_parse()
* [core] more 'const' in request.c prototypes
* [core] handle common case of alnum or - field-name
* [mod_extforward] simplify code: use light_isxdigit
* [core] perf: array.c performance enhancements
* [core] mark some data_* funcs cold
* [core] http_header.c internal inline funcs
* [core] remove unused array_reset()
* [core] prefer uint32_t to size_t in base.h
* [core] uint32_t for struct buffer sizes
* [core] remove unused members of struct server
* [core] short-circuit path to clear request.headers
* [core] array keys are non-empty in key-value list
* [core] keep a-&gt;data[] sorted; remove a-&gt;sorted[]
* [core] __attribute_returns_nonnull__
* [core] differentiate array_get_* for ro and rw
* [core] (const buffer *) in (struct burl_parts_t)
* [core] (const buffer *) for con-&gt;server_name
* [core] perf: initialize con-&gt;conf using memcpy()
* [core] run config_setup_connection() fewer times
* [core] isolate data_config.c, vector.c
* [core] treat con-&gt;conditional_is_valid as bitfield
* [core] http_header_hkey_get() over const array
* [core] inline buffer as part of DATA_UNSET key
* [core] inline buffer key for *_patch_connection()
* [core] (data_unset *) from array_get_element_klen
* [core] inline buffer as part of data_string value
* [core] add const to callers of http_header_*_get()
* [core] inline array as part of data_array value
* [core] const char *op in data_config
* [core] buffer string in data_config
* [core] streamline config_check_cond()
* [core] keep a-&gt;data[] sorted (REVERT)
* [core] array a-&gt;sorted[] as ptrs rather than pos
* [core] inline header and env arrays into con
* [mod_accesslog] avoid alloc for parsing cookie val
* [core] simpler config_check_cond()
* [mod_redirect,mod_rewrite] store context_ndx
* [core] const char *name in struct plugin
* [core] srv-&gt;plugin_slots as compact list
* [core] rearrange server_config, server members
* [core] macros CONST_LEN_STR and CONST_STR_LEN
* [core] struct plugin_data_base
* [core] improve condition caching perf
* [core] config_plugin_values_init() new interface
* [mod_access] use config_plugin_values_init()
* [core] (const buffer *) from strftime_cache_get()
* [core] mv config_setup_connection to connections.c
* [core] use (const char *) in config file parsing
* [mod_staticfile] use config_plugin_values_init()
* [mod_skeleton] use config_plugin_values_init()
* [mod_setenv] use config_plugin_values_init()
* [mod_alias] use config_plugin_values_init()
* [mod_indexfile] use config_plugin_values_init()
* [mod_expire] use config_plugin_values_init()
* [mod_flv_streaming] use config_plugin_values_init()
* [mod_magnet] use config_plugin_values_init()
* [mod_usertrack] use config_plugin_values_init()
* [mod_userdir] split policy from userdir path build
* [mod_userdir] use config_plugin_values_init()
* [mod_ssi] use config_plugin_values_init()
* [mod_uploadprogress] use config_plugin_values_init()
* [mod_status] use config_plugin_values_init()
* [mod_cml] use config_plugin_values_init()
* [mod_secdownload] use config_plugin_values_init()
* [mod_geoip] use config_plugin_values_init()
* [mod_evasive] use config_plugin_values_init()
* [mod_trigger_b4_dl] use config_plugin_values_init()
* [mod_accesslog] use config_plugin_values_init()
* [mod_simple_vhost] use config_plugin_values_init()
* [mod_evhost] use config_plugin_values_init()
* [mod_vhostdb*] use config_plugin_values_init()
* [mod_mysql_vhost] use config_plugin_values_init()
* [mod_maxminddb] use config_plugin_values_init()
* [mod_auth*] use config_plugin_values_init()
* [mod_deflate] use config_plugin_values_init()
* [mod_compress] use config_plugin_values_init()
* [core] add xsendfile* check if xdocroot is NULL
* [mod_cgi] use config_plugin_values_init()
* [mod_dirlisting] use config_plugin_values_init()
* [mod_extforward] use config_plugin_values_init()
* [mod_webdav] use config_plugin_values_init()
* [core] store addtl data in pcre_keyvalue_buffer
* [mod_redirect] use config_plugin_values_init()
* [mod_rewrite] use config_plugin_values_init()
* [mod_rrdtool] use config_plugin_values_init()
* [multiple] gw_backends config_plugin_values_init()
* [core] config_get_config_cond_info()
* [mod_openssl] use config_plugin_values_init()
* [core] use config_plugin_values_init()
* [core] collect more config logic into configfile.c
* [core] config_plugin_values_init_block()
* [core] gw_backend config_plugin_values_init_block
* [core] remove old config_insert_values_*() funcs
* [multiple] plugin.c handles common FREE_FUNC code
* [core] run all trigger and sighup handlers
* [mod_wstunnel] change DEBUG_LOG to use log_error()
* [core] stat_cache_path_contains_symlink use errh
* [core] isolate use of data_config, configfile.h
* [core] split cond cache from cond matches
* [mod_auth] inline arrays in http_auth_require_t
* [core] array_init() arg for initial size
* [core] gw_exts_clear_check_local()
* [core] gw_backend less pointer chasing
* [core] connection_handle_errdoc() separate func
* [multiple] prefer (connection *) to (srv *)
* [core] create http chunk header on the stack
* [multiple] connection hooks no longer get (srv *)
* [multiple] plugin_stats array
* [core] read up-to fixed size chunk before fionread
* [core] default chunk size 8k (was 4k)
* [core] pass con around gw_backend instead of srv
* [core] log_error_multiline_buffer()
* [multiple] reduce direct use of srv-&gt;cur_ts
* [multiple] extern log_epoch_secs
* [multiple] reduce direct use of srv-&gt;errh
* [multiple] stat_cache singleton
* [mod_expire] parse config into structured data
* [multiple] generic config array type checking
* [multiple] rename r to rc rv rd wr to be different
* [core] (minor) config_plugin_keys_t data packing
* [core] inline buffer in log_error_st errh
* [multiple] store srv-&gt;tmp_buf in tb var
* [multiple] quiet clang compiler warnings
* [core] http_status_set_error_close()
* [core] http_request_host_policy w/ http_parseopts
* [multiple] con-&gt;proto_default_port
* [core] store log filename in (log_error_st *)
* [core] separate log_error_open* funcs
* [core] fdevent uses uint32_t instead of size_t
* [mod_webdav] large buffer reuse
* [mod_accesslog] flush file log buffer at 8k size
* [core] include settings.h where used
* [core] static buffers for mtime_cache
* [core] convenience macros to check req methods
* [core] support multiple error logs
* [multiple] omit passing srv to fdevent_handler
* [core] remove unused arg to fdevent_fcntl_set_nb*
* [core] slightly simpify server_(over)load_check()
* [core] isolate fdevent subsystem
* [core] isolate stat_cache subsystem
* [core] remove include base.h where unused
* [core] restart dead piped loggers every 64 sec
* [mod_webdav] use copy_file_range() if available
* [core] perf: buffer copy and append
* [core] copy some srv-&gt;srvconf into con-&gt;conf
* [core] move keep_alive flag into request_st
* [core] pass scheme port to http_request_parse()
* [core] pass http_parseopts around request.c
* [core] rename specific_config to request_config
* [core] move request_st,request_config to request.h
* [core] pass (request_st *) to request.c funcs
* [core] remove unused request_st member 'request'
* [core] rename content_length to reqbody_length
* [core] t/test_request.c using (request_st *)
* [core] (const connection *) in http_header_*_get()
* [mod_accesslog] log_access_record() fmt log record
* [core] move request start ts into (request_st *)
* [core] move addtl request-specific struct members
* [core] move addtl request-specific struct members
* [core] move plugin_ctx into (request_st *)
* [core] move addtl request-specific struct members
* [core] move request state into (request_st *)
* [core] store (plugin *) in p-&gt;data
* [core] store subrequest_handler instead of mode
* [multiple] copy small struct instead of memcpy()
* [multiple] split con, request (very large change)
* [core] r-&gt;uri.path always set, though might be ''
* [core] C99 restrict on some base funcs
* [core] dispatch handler in handle_request func
* [core] http_request_parse_target()
* [mod_magnet] modify r-&gt;target with 'uri.path-raw'
* [core] remove r-&gt;uri.path_raw; generate as needed
* [core] http_response_comeback()
* [core] http_response_config()
* [tests] use buffer_eq_slen() for str comparison
* [core] http_status_append() short-circuit 200 OK
* [core] mark some chunk.c funcs as pure
* [core] use uint32_t in http_header.[ch]
* [core] perf: tighten some code in some hot paths
* [core] parse header label before end of line
* [mod_auth] 'nonce_secret' option to validate nonce (fixes #2976)
* [build] fix build on MacOS X Tiger
* [doc] lighttpd.conf: lighttpd choose event-handler
* [config] blank server.tag if whitespace-only
* [mod_proxy] stream request using HTTP/1.1 chunked (fixes #3006)
* [multiple] correct misspellings in comments
* [multiple] fix some cc warnings in 32-bit, powerpc
* [tests] fix skip count in mod-fastcgi w/o php-cgi
* [multiple] ./configure --with-nettle to use Nettle
* [core] skip excess close() when FD_CLOEXEC defined
* [mod_cgi] remove redundant calls to set FD_CLOEXEC
* [core] return EINVAL if stat_cache_get_entry w/o /
* [mod_webdav] define PATH_MAX if not defined
* [mod_accesslog] process backslash-escapes in fmt
* [mod_openssl] disable cert vrfy if ALPN acme-tls/1
* [core] add seed before openssl RAND_pseudo_bytes()
* [mod_mbedtls] mbedTLS option for TLS
* [core] prefer getxattr() instead of get_attr()
* [multiple] use *(unsigned char *) with ctypes
* [mod_openssl] do not log ECONNRESET unless debug
* [mod_openssl] SSL_R_UNEXPECTED_EOF_WHILE_READING
* [mod_gnutls] GnuTLS option for TLS (fixes #109)
* [mod_openssl] rotate session ticket encryption key
* [mod_openssl] set cert from callback in 1.0.2+ (fixes #2842)
* [mod_openssl] set chains from callback in 1.0.2+ (#2842)
* [core] RFC-strict parse of Content-Length
* [build] point ./configure --help to support forum
* [core] stricter parse of numerical digits
* [multiple] add summaries to top of some modules
* [core] sys-crypto-md.h w/ inline message digest fn
* [mod_openssl] enable read-ahead, if set, after SNI
* [mod_openssl] issue warning for deprecated options
* [mod_openssl] use SSL_OP_NO_RENEGOTIATION if avail
* [mod_openssl] use openssl feature define for ALPN
* [mod_openssl] update default DH params
* [core] SecureZeroMemory() on _WIN32
* [core] safe memset calls memset() through volatile
* [doc] update comments in doc/config/modules.conf
* [core] more precise check for request stream flags
* [mod_openssl] rotate session ticket encryption key
* [mod_openssl] ssl.stek-file to specify encrypt key
* [mod_mbedtls] ssl.stek-file to specify encrypt key
* [mod_gnutls] ssl.stek-file to specify encrypt key
* [mod_openssl] disable session cache; prefer ticket
* [mod_openssl] compat with LibreSSL
* [mod_openssl] compat with WolfSSL
* [mod_openssl] set SSL_OP_PRIORITIZE_CHACHA
* [mod_openssl] move SSL_CTX curve conf to new func
* [mod_openssl] basic SSL_CONF_cmd for alt TLS libs
* [mod_openssl] OCSP stapling (fixes #2469)
* [TLS] cert-staple.sh - refresh OCSP responses (#2469)
* [mod_openssl] compat with BoringSSL
* [mod_gnutls] option to override GnuTLS priority
* [mod_gnutls] OCSP stapling (#2469)
* [mod_extforward] config warning for module order
* [mod_webdav] store webdav.opts as bitflags
* [mod_webdav] limit webdav_propfind_dir() recursion
* [mod_webdav] unsafe-propfind-follow-symlink option
* [mod_webdav] webdav.opts 'propfind-depth-infinity'
* [mod_openssl] detect certs marked OCSP Must-Staple
* [mod_gnutls] detect certs marked OCSP Must-Staple
* [mod_openssl] default to set MinProtocol TLSv1.2
* [mod_nss] NSS option for TLS (fixes #1218)
* [core] fdevent_load_file() shared code
* [mod_openssl,mbedtls,gnutls,nss] fdevent_load_file
* [core] error if s-&gt;socket_perms chmod() fails
* [mod_openssl] prefer some WolfSSL native APIs
* quiet clang analyzer scan-build warnings
* [core] uint32_t is plenty large for path names
* [mod_mysql_vhost] deprecated; use mod_vhostdb_mysql
* [core] splaytree_djbhash() in splaytree.h (reuse)
* [cmake] update deps for src/t/test_*
* [cmake] update deps for src/t/test_*
* [build] remove tests/mod-userdir.t from builds
* [build] fix typo in src/Makefile.am EXTRA_DIST
* [core] remove unused mbedtls_enabled flag
* [core] store fd in srv-&gt;stdin_fd during setup
* [multiple] address coverity warnings
* [mod_webdav] fix theoretical NULL dereference
* [mod_webdav] update rc for PROPFIND allprop
* [mod_webdav] build fix: ifdef live_properties
* [multiple] address coverity warnings
* [meson] fix libmariadb dependency
* [meson] add missing libmaxminddb section
* [mod_auth,mod_vhostdb] add caching option (fixes #2805)
* [mod_authn_ldap,mod_vhostdb_ldap] add timeout opt (#2805)
* [mod_auth] accept 'nonce-secret' &amp; 'nonce_secret'
* [mod_openssl] fix build warnings on MacOS X
* [core] Nettle assert()s if buffer len &gt; digest sz
* [mod_authn_dbi] authn backend employing DBI
* [mod_authn_mysql,file] use crypt() to save stack
* [mod_vhostdb_dbi] allow strings and ints in config
* add ci-build.sh
* move ci-build.sh to scripts
* [build] build fixes for AIX
* [mod_deflate] Brotli support
* [build] bzip2 default to not-enabled in build
* [mod_deflate] fix typo in config option
* [mod_deflate] propagate errs from internal funcs
* [mod_deflate] deflate.cache-dir compressed cache
* [mod_deflate] mod_deflate subsumes mod_compress
* [doc] mod_compress -&gt; mod_deflate
* [tests] mod_compress -&gt; mod_deflate
* [mod_compress] remove mod_compress
* [build] add --with-brotli to CI build
* [core] server.feature-flags extensible config
* [core] con layer plugin_ctx separate from request
* [multiple] con hooks store ctx in con-&gt;plugin_ctx
* [core] separate funcs to reset (request_st *)
* [multiple] rename connection_reset hook to request
* [mod_nss] func renames for consistency
* [core] detect and reject TLS connect to cleartext
* [mod_deflate] quicker check for Content-Encoding
* [mod_openssl] read secret data w/ BIO_new_mem_buf
* [core] decode Transfer-Encoding: chunked from gw
* [mod_fastcgi] decode Transfer-Encoding: chunked
* [core] stricter parsing of POST chunked block hdr
* [mod_proxy] send HTTP/1.1 requests to backends
* [tests] test_base64.c clear buf vs reset
* [core] http_header_remove_token()
* [mod_webdav] fix inadvertent string truncation
* [core] add some missing standard includes
* [mod_extforward] attempt to quiet Coverity warning
* [mod_authn_dbi,mod_authn_mysql] fix coverity issue
* scons: fix check environment
* Add avahi service file under doc/avahi/
* [mod_webdav] fix fallback if linkat() fails
* [mod_proxy] do not forward Expect: 100-continue
* [core] chunkqueue_compact_mem() must upd cq-&gt;last
* [core] dlsym for FAMNoExists() for compat w/ fam
* [core] disperse settings.h to appropriate headers
* [core] inline buffer_reset()
* [mod_extforward] save proto per connection
* [mod_extforward] skip after HANDLER_COMEBACK
* [core] server.feature-flags to enable h2
* [core] HTTP_VERSION_2
* [multiple] allow TLS ALPN 'h2' if 'server.h2proto'
* [mod_extforward] preserve changed addr for h2 con
* [core] do not send Connection: close if h2
* [core] lowercase response hdr field names for h2
* [core] recognize status: 421 Misdirected Request
* [core] parse h2 pseudo-headers
* [core] request_headers_process()
* [core] connection_state_machine_loop()
* [core] reset connection counters per connection
* [mod_accesslog,mod_rrdtool] HTTP/2 basic accounting
* [core] connection_set_fdevent_interest()
* [core] HTTP2-Settings
* [core] adjust http_request_headers_process()
* [core] http_header_parse_hoff()
* [core] move http_request_headers_process()
* [core] reqpool.[ch] for (request_st *)
* [multiple] modules read reqbody via fn ptr
* [multiple] isolate more con code in connections.c
* [core] isolate more resp code in response.c
* [core] h2.[ch] with stub funcs (incomplete)
* [core] alternate between two joblists
* [core] connection transition to HTTP/2; incomplete
* [core] mark some error paths with attribute cold
* [core] discard 100 102 103 responses from backend
* [core] skip write throttle for 100 Continue
* [core] adjust (disabled) debug code
* [core] update comment
* [core] link in ls-hpack (EXPERIMENTAL)
* [core] HTTP/2 HPACK using LiteSpeed ls-hpack
* [core] h2_send_headers() specialized for resp hdrs
* [core] http_request_parse_header() specialized
* [core] comment possible future ls-hpack optimize
* [mod_status] separate funcs to print request table
* [mod_status] adjust to print HTTP/2 requests
* [core] redirect to dir using relative-path
* [core] ignore empty field-name from backends
* [mod_auth] fix crash if auth.require misconfigured (fixes #3023)
* [core] fix 1-char trunc of default server.tag
* [core] request_acquire(), request_release()
* [core] keep pool of (request_st *) for HTTP/2
* [mod_status] dedicated funcs for r-&gt;state labels
* [core] move connections_get_state to connections.c
* [core] fix crash on master after graceful restart
* [core] defer optimization to read small files
* [core] do not require '\0' term for k,v hdr parse
* [scripts] cert-staple.sh enhancements
* [core] document algorithm used in lighttpd etag
* [core] ls-hpack optimizations
* [core] fix crash on master if blank line request
* [core] use djbhash in gw_backend to choose host
* [core] rename md5.[ch] to algo_md5.[ch]
* [core] move djbhash(), dekhash() to algo_md.h
* [core] rename splaytree.[ch] to algo_splaytree.[ch]
* [core] import xxHash v0.8.0
* [build] modify build, includes for xxHash v0.8.0
* [build] remove ls-hpack/deps
* [core] xxhash no inline hints; let compiler choose
* [mod_dirlisting] fix config parsing crash
* [mod_openssl] clarify trace w/ deprecated options
* [doc] refresh doc/config/*/*
* [core] code size: disable XXH64(), XXH3()
* [doc] update README and INSTALL
* [core] combine Cookie request headers with ';'
* [core] log stream id with debug.log-state-handling
* [core] set r-&gt;state in h2.c
* [mod_ssi] update chunk after shell output redirect
* [mod_webdav] preserve bytes_out when chunks merged
* [multiple] inline chunkqueue_length()
* [core] cold h2_log_response_header*() funcs
* [core] update HTTP status codes list from IANA
* [mod_wolfssl] standalone module
* [core] Content-Length in http_response_send_file()
* [core] adjust response header prep for common case
* [core] light_isupper(), light_islower()
* [core] tst,set,clr macros for r-&gt;{rqst,resp}_htags
* [core] separate http_header_e from _htags bitmask
* [core] http_header_hkey_get_lc() for HTTP/2
* [core] array.[ch] using uint32_t instead of size_t
* [core] extend (data_string *) to store header id
* [multiple] extend enum http_header_e list
* [core] http_header_e &lt;=&gt; lshpack_static_hdr_idx
* [core] skip ls-hpack decode work unused by lighttpd
* [TLS] error if inherit empty TLS cfg from globals
* [core] connection_check_expect_100()
* [core] support multiple 1xx responses from backend
* [core] reload c after chunkqueue_compact_mem()
* [core] relay 1xx from backend over HTTP/2
* [core] relay 1xx from backend over HTTP/1.1
* [core] chunkqueue_{peek,read}_data(), squash
* [multiple] TLS modules use chunkqueue_peek_data()
* [mod_magnet] magnet.attract-response-start-to
* [multiple] code reuse chunkqueue_peek_data()
* [core] reuse r-&gt;start_hp.tv_sec for r-&gt;start_ts
* [core] config_plugin_value_tobool() accept '0','1'
* [core] graceful and immediate restart option
* [mod_ssi] init status var before waitpid()
* [core] graceful shutdown timeout option
* [core] lighttpd -1 supports pipes (e.g. netcat)
* [core] perf adjustments to avoid load miss
* [multiple] use sock_addr_get_family in more places
* [multiple] inline chunkqueue where always alloc'd
* [core] propagate state after writing
* [core] server_run_con_queue()
* [core] defer handling FDEVENT_HUP and FDEVENT_ERR
* [core] handle unexpected EOF reading FILE_CHUNK
* [core] short-circuit connection_write_throttle()
* [core] walk queue in connection_write_chunkqueue()
* [core] connection_joblist global
* [core] be more precise checking streaming flags
* [core] fdevent_load_file_bytes()
* [TLS] use fdevent_load_file_bytes() for STEK file
* [core] allow symlinks under /dev for rand devices
* [multiple] use light_btst() for hdr existence chk
* [mod_deflate] fix potential NULL deref in err case
* [core] save errno around close() if fstat() fails
* [mod_ssi] use stat_cache_open_rdonly_fstat()
* [core] fdevent_dup_cloexec()
* [core] dup FILE_CHUNK fd when splitting FILE_CHUNK
* [core] stat_cache_path_isdir()
* [multiple] use stat_cache_path_isdir()
* [mod_mbedtls] quiet CLOSE_NOTIFY after conn reset
* [mod_gnutls] quiet CLOSE_NOTIFY after conn reset
* [core] limit num ranges in Range requests
* [core] remove unused r-&gt;content_length
* [core] http_response_parse_range() const file sz
* [core] pass open fd to http_response_parse_range
* [core] stat_cache_get_entry_open()
* [core,mod_deflate] leverage cache of open fd
* [doc] comment out config disabling Range for .pdf
* [core] coalesce nearby ranges in Range requests
* [mod_fastcgi] decode chunked is cold code path
* [core] fix chunkqueue_compact_mem w/ partial chunk
* [core] alloc optim reading file, sending chunked
* [core] reuse chunkqueue_compact_mem*()
* [mod_cgi] use splice() to send input to CGI
* [multiple] ignore openssl 3.0.0 deprecation warns
* [mod_openssl] migrate ticket cb to openssl 3.0.0
* [mod_openssl] construct OSSL_PARAM on stack
* [mod_openssl] merge ssl_tlsext_ticket_key_cb impls
* [multiple] openssl 3.0.0 digest interface migrate
* [tests] detect multiple SSL/TLS/crypto providers
* [core] sys-crypto-md.h consistent interfaces
* [wolfssl] wolfSSL_CTX_set_mode differs from others
* [multiple] use NSS crypto if no other crypto avail
* [multiple] stat_cache_path_stat() for struct st
* [TLS] ignore empty 'CipherString' in ssl-conf-cmd
* [multiple] remove chunk file.start member
* [core] modify use of getrlimit() to not be fatal
* [mod_webdav] add missing update to cq accounting
* [mod_webdav] update defaults after worker_init
* [mod_openssl] use newer openssl 3.0.0 func
* [core] config_plugin_value_to_int32()
* [core] minimize pause during graceful restart
* [mod_deflate] use large mmap chunks to compress
* [core] stat_cache_entry reference counting
* [core] FILE_CHUNK can hold stat_cache_entry ref
* [core] http_chunk_append_file_ref_range()
* [multiple] use http_chunk_append_file_ref()
* [core] always lseek() with shared fd
* [core] silence coverity warnings (false positives)
* [core] silence coverity warnings in ls-hpack
* [core] silence coverity warnings (another try)
* [core] fix fd sharing when splitting file chunk
* [mod_mbedtls] quiet unused variable warning
* [core] use inline funcs in sys-crypto-md.h
* [core] add missing declaration for NSS rand
* [core] init NSS lib for basic crypto algorithms
* [doc] change mod_compress refs to mod_deflate
* [doc] replace bzip2 refs with brotli
* [build] remove svnversion from versionstamp rule
* [doc] /var/run -&gt; /run
* [multiple] test for nss includes
* [mod_nss] more nss includes fixes
* [mod_webdav] define _NETBSD_SOURCE on NetBSD
* [core] silence coverity warnings (another try)
* [mod_mbedtls] newer mbedTLS vers support TLSv1.3
* [mod_accesslog] update defaults after cycling log
* [multiple] add some missing config cleanup
* [core] fix (startup) mem leaks in configparser.y
* [core] STAILQ_* -&gt; SIMPLEQ_* on OpenBSD
* [mod_wolfssl] use more wolfssl/options.h defines
* [mod_wolfssl] cripple SNI if not built OPENSSL_ALL
* [mod_wolfssl] need to build --enable-alpn for ALPN
* [mod_secdownload] fix compile w/ NSS on FreeBSD
* [mod_mbedtls] wrap addtl code in preproc defines
* [TLS] server.feature-flags 'ssl.session-cache'
* [core] workaround fragile code in wolfssl types.h
* [core] move misplaced error trace to match option
* [core] adjust wolfssl workaround for another case
* [multiple] consistent order for crypto lib select
* [multiple] include mbedtls/config.h after select
* [multiple] include wolfssl/options.h after select
* [core] set NSS_VER_INCLUDE after crypto lib select
* [core] use system xxhash lib if available
* [doc] refresh doc/config/conf.d/mime.conf
* [meson] add matching -I for lua lib version
* [build] prepend search for lua version 5.4
* [core] use inotify in stat_cache.[ch] on Linux
* [build] detect inotify header &lt;sys/inotify.h&gt;
* [mod_nss] update session ticket NSS devel comment
* [core] set last_used on rd/wr from backend (fixes #3029)
* [core] cold func for gw_recv_response error case
* [core] use kqueue() instead of FAM/gamin on *BSD
* [core] no graceful-restart-bg on OpenBSD, NetBSD
* [mod_openssl] add LIBRESSL_VERSION_NUMBER checks
* [core] use struct kevent on stack in stat_cache
* [core] stat_cache preprocessor paranoia
* [mod_openssl] adjust LIBRESSL_VERSION_NUMBER check
* [mod_maxminddb] fix config validation typo
* [tests] allow LIGHTTPD_EXE_PATH override
* [multiple] handle NULL val as empty in *_env_add (fixes #3030)
* [core] accept 'HTTP/2.0', 'HTTP/3.0' from backends (fixes #3031)
* [build] check for xxhash in more ways
* [core] accept 'HTTP/2.0', 'HTTP/3.0' from backends (#3031)
* [core] http_response_buffer_append_authority()
* [core] define SHA*_DIGEST_LENGTH macros if missing
* [doc] update optional pkg dependencies in INSTALL
* [mod_alias] validate given order, not sorted order
* [core] filter out duplicate modules
* [mod_cgi] fix crash if initial write to CGI fails
* [mod_cgi] ensure tmp file open() before splice()
* [multiple] add back-pressure gw data pump (fixes #3033)
* [core] fix bug when HTTP/2 frames span chunks
* [multiple] more forgiving config str to boolean (fixes #3036)
* [core] check for __builtin_expect() availability
* [core] quiet more request parse errs unless debug
* [core] consolidate chunk size checks
* [mod_flv_streaming] use stat_cache_get_entry_open
* [mod_webdav] pass full path to webdav_unlinkat()
* [mod_webdav] fallbacks if _ATFILE_SOURCE not avail
* [mod_fastcgi] move src/fastcgi.h into src/compat/
* [mod_status] add additional HTML-encoding
* [core] server.v4mapped option
* [mod_webdav] workaround for gvfs dir redir bug

- Remove SuSEfirewall2 service files, SuSEfirewall2 does not exist
  anymore

- Changed /etc/logrotate.d/lighttpd from init.d to systemd
  fix boo#1146452. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-02"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146452">SUSE bug 1146452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194376">SUSE bug 1194376</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22707/">CVE-2022-22707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666873" comment="lighttpd-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666874" comment="lighttpd-mod_authn_gssapi-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666875" comment="lighttpd-mod_authn_ldap-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666876" comment="lighttpd-mod_authn_pam-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666877" comment="lighttpd-mod_authn_sasl-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666878" comment="lighttpd-mod_magnet-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666879" comment="lighttpd-mod_maxminddb-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666880" comment="lighttpd-mod_rrdtool-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666881" comment="lighttpd-mod_vhostdb_dbi-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666882" comment="lighttpd-mod_vhostdb_ldap-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666883" comment="lighttpd-mod_vhostdb_mysql-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666884" comment="lighttpd-mod_vhostdb_pgsql-1.4.64-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666885" comment="lighttpd-mod_webdav-1.4.64-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52230" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195420" ref_url="https://bugzilla.suse.com/1195420" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0452" ref_url="https://www.suse.com/security/cve/CVE-2022-0452/" source="CVE"/>
		<reference ref_id="CVE-2022-0453" ref_url="https://www.suse.com/security/cve/CVE-2022-0453/" source="CVE"/>
		<reference ref_id="CVE-2022-0454" ref_url="https://www.suse.com/security/cve/CVE-2022-0454/" source="CVE"/>
		<reference ref_id="CVE-2022-0455" ref_url="https://www.suse.com/security/cve/CVE-2022-0455/" source="CVE"/>
		<reference ref_id="CVE-2022-0456" ref_url="https://www.suse.com/security/cve/CVE-2022-0456/" source="CVE"/>
		<reference ref_id="CVE-2022-0457" ref_url="https://www.suse.com/security/cve/CVE-2022-0457/" source="CVE"/>
		<reference ref_id="CVE-2022-0459" ref_url="https://www.suse.com/security/cve/CVE-2022-0459/" source="CVE"/>
		<reference ref_id="CVE-2022-0460" ref_url="https://www.suse.com/security/cve/CVE-2022-0460/" source="CVE"/>
		<reference ref_id="CVE-2022-0461" ref_url="https://www.suse.com/security/cve/CVE-2022-0461/" source="CVE"/>
		<reference ref_id="CVE-2022-0462" ref_url="https://www.suse.com/security/cve/CVE-2022-0462/" source="CVE"/>
		<reference ref_id="CVE-2022-0463" ref_url="https://www.suse.com/security/cve/CVE-2022-0463/" source="CVE"/>
		<reference ref_id="CVE-2022-0464" ref_url="https://www.suse.com/security/cve/CVE-2022-0464/" source="CVE"/>
		<reference ref_id="CVE-2022-0465" ref_url="https://www.suse.com/security/cve/CVE-2022-0465/" source="CVE"/>
		<reference ref_id="CVE-2022-0466" ref_url="https://www.suse.com/security/cve/CVE-2022-0466/" source="CVE"/>
		<reference ref_id="CVE-2022-0467" ref_url="https://www.suse.com/security/cve/CVE-2022-0467/" source="CVE"/>
		<reference ref_id="CVE-2022-0468" ref_url="https://www.suse.com/security/cve/CVE-2022-0468/" source="CVE"/>
		<reference ref_id="CVE-2022-0469" ref_url="https://www.suse.com/security/cve/CVE-2022-0469/" source="CVE"/>
		<reference ref_id="CVE-2022-0470" ref_url="https://www.suse.com/security/cve/CVE-2022-0470/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6WMUXRUC6NZA77FM7TELOXJIMWMOJRMA/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 98.0.4758.80 (boo#1195420)

* CVE-2022-0452: Use after free in Safe Browsing
* CVE-2022-0453: Use after free in Reader Mode
* CVE-2022-0454: Heap buffer overflow in ANGLE
* CVE-2022-0455: Inappropriate implementation in Full Screen Mode
* CVE-2022-0456: Use after free in Web Search
* CVE-2022-0457: Type Confusion in V8
* CVE-2022-0459: Use after free in Screen Capture
* CVE-2022-0460: Use after free in Window Dialog
* CVE-2022-0461: Policy bypass in COOP
* CVE-2022-0462: Inappropriate implementation in Scroll
* CVE-2022-0463: Use after free in Accessibility
* CVE-2022-0464: Use after free in Accessibility
* CVE-2022-0465: Use after free in Extensions
* CVE-2022-0466: Inappropriate implementation in Extensions Platform
* CVE-2022-0467: Inappropriate implementation in Pointer Lock
* CVE-2022-0468: Use after free in Payments
* CVE-2022-0469: Use after free in Cast
* CVE-2022-0470: Out of bounds memory access in V8
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-07"/>
	<updated date="2022-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195420">SUSE bug 1195420</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0452/">CVE-2022-0452</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0453/">CVE-2022-0453</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0454/">CVE-2022-0454</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0455/">CVE-2022-0455</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0456/">CVE-2022-0456</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0457/">CVE-2022-0457</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0459/">CVE-2022-0459</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0460/">CVE-2022-0460</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0461/">CVE-2022-0461</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0462/">CVE-2022-0462</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0463/">CVE-2022-0463</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0464/">CVE-2022-0464</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0465/">CVE-2022-0465</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0466/">CVE-2022-0466</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0467/">CVE-2022-0467</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0468/">CVE-2022-0468</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0469/">CVE-2022-0469</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0470/">CVE-2022-0470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667222" comment="chromedriver-98.0.4758.80-bp153.2.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667223" comment="chromium-98.0.4758.80-bp153.2.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52231" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1144018" ref_url="https://bugzilla.suse.com/1144018" source="BUGZILLA"/>
		<reference ref_id="1174253" ref_url="https://bugzilla.suse.com/1174253" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1183014" ref_url="https://bugzilla.suse.com/1183014" source="BUGZILLA"/>
		<reference ref_id="1194681" ref_url="https://bugzilla.suse.com/1194681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15803" ref_url="https://www.suse.com/security/cve/CVE-2020-15803/" source="CVE"/>
		<reference ref_id="CVE-2021-27927" ref_url="https://www.suse.com/security/cve/CVE-2021-27927/" source="CVE"/>
		<reference ref_id="CVE-2022-23134" ref_url="https://www.suse.com/security/cve/CVE-2022-23134/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDFZEEJCPRPPDEWV6JULRJZVSQCMYOEY/" source="SUSE-SU"/>
		<description>
This update for zabbix fixes the following issues:

- Updated to latest realease 4.0.37.

Security issues fixed:

- CVE-2022-23134: Fixed possible view of the setup pages by unauthenticated users if config file already exists (boo#1194681).
- CVE-2021-27927: Fixed CSRF protection mechanism inside CControllerAuthenticationUpdate controller (boo#1183014).
- CVE-2020-15803: Fixed stored XSS in the URL Widget (boo#1174253).

Bugfixes:

- boo#1181400: Added hardening to systemd service(s)
- boo#1144018: Restructured for easier maintenance because FATE#324346
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144018">SUSE bug 1144018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174253">SUSE bug 1174253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183014">SUSE bug 1183014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194681">SUSE bug 1194681</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15803/">CVE-2020-15803</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27927/">CVE-2021-27927</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23134/">CVE-2022-23134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668181" comment="zabbix-agent-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668182" comment="zabbix-java-gateway-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668183" comment="zabbix-phpfrontend-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668184" comment="zabbix-proxy-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668185" comment="zabbix-proxy-mysql-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668186" comment="zabbix-proxy-postgresql-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668187" comment="zabbix-proxy-sqlite-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668188" comment="zabbix-server-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668189" comment="zabbix-server-mysql-4.0.37-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668190" comment="zabbix-server-postgresql-4.0.37-lp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52232" version="1" class="patch">
	<metadata>
		<title>Security update for firejail (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195880" ref_url="https://bugzilla.suse.com/1195880" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWYUOU25A4H7UO242AHCSAQPLQYRMJ6T/" source="SUSE-SU"/>
		<description>
This update for firejail fixes the following issues:

- Update Leap 15.3 package to 0.9.68 (boo#1195880)

update to firejail 0.9.68:

- security: on Ubuntu, the PPA is now recommended over the distro package
- (see README.md) (#4748)
- security: bugfix: private-cwd leaks access to the entire filesystem
- (#4780); reported by Hugo Osvaldo Barrera
- feature: remove (some) environment variables with auth-tokens (#4157)
- feature: ALLOW_TRAY condition (#4510 #4599)
- feature: add basic Firejail support to AppArmor base abstraction (#3226
- #4628)
- feature: intrusion detection system (--ids-init, --ids-check)
- feature: deterministic shutdown command (--deterministic-exit-code,
- --deterministic-shutdown) (#928 #3042 #4635)
- feature: noprinters command (#4607 #4827)
- feature: network monitor (--nettrace)
- feature: network locker (--netlock) (#4848)
- feature: whitelist-ro profile command (#4740)
- feature: disable pipewire with --nosound (#4855)
- feature: Unset TMP if it doesn't exist inside of sandbox (#4151)
- feature: Allow apostrophe in whitelist and blacklist (#4614)
- feature: AppImage support in --build command (#4878)
- modifs: exit code: distinguish fatal signals by adding 128 (#4533)
- modifs: firecfg.config is now installed to /etc/firejail/ (#408 #4669)
- modifs: close file descriptors greater than 2 (--keep-fd) (#4845)
- modifs: nogroups now stopped causing certain system groups to be dropped,
- which are now controlled by the relevant 'no' options instead (such as
- nosound -&gt; drop audio group), which fixes device access issues on systems
- not using (e)logind (such as with seatd) (#4632 #4725 #4732 #4851)
- removal: --disable-whitelist at compile time
- removal: whitelist=yes/no in /etc/firejail/firejail.config
- bugfix: Fix sndio support (#4362 #4365)
- bugfix: Error mounting tmpfs (MS_REMOUNT flag not being cleared) (#4387)
- bugfix: --build clears the environment (#4460 #4467)
- bugfix: firejail hangs with net parameter (#3958 #4476)
- bugfix: Firejail does not work with a custom hosts file (#2758 #4560)
- bugfix: --tracelog and --trace override /etc/ld.so.preload (#4558 #4586)
- bugfix: PATH_MAX is undeclared on musl libc (#4578 #4579 #4583 #4606)
- bugfix: firejail symlinks are not skipped with private-bin + globs (#4626)
- bugfix: Firejail rejects empty arguments (#4395)
- bugfix: firecfg does not work with symlinks (discord.desktop) (#4235)
- bugfix: Seccomp list output goes to stdout instead of stderr (#4328)
- bugfix: private-etc does not work with symlinks (#4887)
- bugfix: Hardware key not detected on keepassxc (#4883)
- build: allow building with address sanitizer (#4594)
- build: Stop linking pthread (#4695)
- build: Configure cleanup and improvements (#4712)
- ci: add profile checks for sorting disable-programs.inc and
- firecfg.config and for the required arguments in private-etc (#2739 #4643)
- ci: pin GitHub actions to SHAs and use Dependabot to update them (#4774)
- docs: Add new command checklist to CONTRIBUTING.md (#4413)
- docs: Rework bug report issue template and add both a question and a
- feature request template (#4479 #4515 #4561)
- docs: fix contradictory descriptions of machine-id ('preserves' vs
- 'spoofs') (#4689)
- docs: Document that private-bin and private-etc always accumulate (#4078)
- new includes: whitelist-run-common.inc (#4288), disable-X11.inc (#4462)
- new includes: disable-proc.inc (#4521)
- removed includes: disable-passwordmgr.inc (#4454 #4461)
- new profiles: microsoft-edge-beta, clion-eap, lifeograph, zim
- new profiles: io.github.lainsce.Notejot, rednotebook, gallery-dl
- new profiles: yt-dlp, goldendict, goldendict, bundle, cmake
- new profiles: make, meson, pip, codium, telnet, ftp, OpenStego
- new profiles: imv, retroarch, torbrowser, CachyBrowser,
- new profiles: notable, RPCS3, wget2, raincat, conitop, 1passwd,
- new profiles: Seafile, neovim, com.github.tchx84.Flatseal

firejail 0.9.66:

* deprecated --audit options, relpaced by jailcheck utility
* deprecated follow-symlink-as-user from firejail.config
* new firejail.config settings: private-bin, private-etc
* new firejail.config settings: private-opt, private-srv
* new firejail.config settings: whitelist-disable-topdir
* new firejail.config settings: seccomp-filter-add
* removed kcmp syscall from seccomp default filter
* rename --noautopulse to keep-config-pulse
* filtering environment variables
* zsh completion
* command line: --mkdir, --mkfile
* --protocol now accumulates
* jailtest utility for testing running sandboxes
* faccessat2 syscall support
* --private-dev keeps /dev/input
* added --noinput to disable /dev/input
* add support for subdirs in --private-etc
* subdirs support in private-etc
* input devices support in private-dev, --no-input
* support trailing comments on profile lines
* many new profiles
- split shell completion into standard subpackages
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195880">SUSE bug 1195880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668008" comment="firejail-0.9.68-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52233" version="1" class="patch">
	<metadata>
		<title>Security update for kafka (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LX6N6XLYOR6GINGSRITWVKJ743FCLHXK/" source="SUSE-SU"/>
		<description>

This update for kafka, kafka-kit fixes following issues:


- Remove JDBCAppender, JMSSink, chainsaw from log4j jars during build to
  prevent bsc#1194842, CVE-2022-23302, bsc#1194843, CVE-2022-23305,
  bsc#1194844, CVE-2022-23307

- Rebuild with kafka-kit change to
  Remove JMSAppender from log4j jars during build to
  prevent bsc#1193662, CVE-2021-4104
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668009" comment="kafka-kit-2.1.0-bp153.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668010" comment="kafka-source-2.1.0-bp153.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52234" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195986" ref_url="https://bugzilla.suse.com/1195986" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0603" ref_url="https://www.suse.com/security/cve/CVE-2022-0603/" source="CVE"/>
		<reference ref_id="CVE-2022-0604" ref_url="https://www.suse.com/security/cve/CVE-2022-0604/" source="CVE"/>
		<reference ref_id="CVE-2022-0605" ref_url="https://www.suse.com/security/cve/CVE-2022-0605/" source="CVE"/>
		<reference ref_id="CVE-2022-0606" ref_url="https://www.suse.com/security/cve/CVE-2022-0606/" source="CVE"/>
		<reference ref_id="CVE-2022-0607" ref_url="https://www.suse.com/security/cve/CVE-2022-0607/" source="CVE"/>
		<reference ref_id="CVE-2022-0608" ref_url="https://www.suse.com/security/cve/CVE-2022-0608/" source="CVE"/>
		<reference ref_id="CVE-2022-0609" ref_url="https://www.suse.com/security/cve/CVE-2022-0609/" source="CVE"/>
		<reference ref_id="CVE-2022-0610" ref_url="https://www.suse.com/security/cve/CVE-2022-0610/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAORTPDMHKSRQIYVJOF76VFIUP5OMBJA/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 98.0.4758.102 (boo#1195986)
  * CVE-2022-0603: Use after free in File Manager
  * CVE-2022-0604: Heap buffer overflow in Tab Groups
  * CVE-2022-0605: Use after free in Webstore API
  * CVE-2022-0606: Use after free in ANGLE
  * CVE-2022-0607: Use after free in GPU
  * CVE-2022-0608: Integer overflow in Mojo
  * CVE-2022-0609: Use after free in Animation
  * CVE-2022-0610: Inappropriate implementation in Gamepad API
  * Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195986">SUSE bug 1195986</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0603/">CVE-2022-0603</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0604/">CVE-2022-0604</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0605/">CVE-2022-0605</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0606/">CVE-2022-0606</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0607/">CVE-2022-0607</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0608/">CVE-2022-0608</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0609/">CVE-2022-0609</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0610/">CVE-2022-0610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668218" comment="chromedriver-98.0.4758.102-bp153.2.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668219" comment="chromium-98.0.4758.102-bp153.2.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52235" version="1" class="patch">
	<metadata>
		<title>Security update for htmldoc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192357" ref_url="https://bugzilla.suse.com/1192357" source="BUGZILLA"/>
		<reference ref_id="1194487" ref_url="https://bugzilla.suse.com/1194487" source="BUGZILLA"/>
		<reference ref_id="1195758" ref_url="https://bugzilla.suse.com/1195758" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40985" ref_url="https://www.suse.com/security/cve/CVE-2021-40985/" source="CVE"/>
		<reference ref_id="CVE-2021-43579" ref_url="https://www.suse.com/security/cve/CVE-2021-43579/" source="CVE"/>
		<reference ref_id="CVE-2022-0534" ref_url="https://www.suse.com/security/cve/CVE-2022-0534/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BMN5QRPEKDGOKDHBMC6SXHPA733I43MV/" source="SUSE-SU"/>
		<description>

htmldoc was updated to fix issues:

- CVE-2021-40985: Fixed buffer overflow may lead to DoS via a crafted BMP image (bsc#1192357)
- CVE-2021-43579: Fixed stack-based buffer overflow in image_load_bmp() results in remote code execution if the victim converts an HTML document linking to a crafted BMP file (bsc#1194487)
- CVE-2022-0534: Fixed stack out-of-bounds read in gif_get_code() when opening a malicious GIF file results in a segmentation fault (bsc#1195758)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192357">SUSE bug 1192357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194487">SUSE bug 1194487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195758">SUSE bug 1195758</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-40985/">CVE-2021-40985</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43579/">CVE-2021-43579</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0534/">CVE-2022-0534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668220" comment="htmldoc-1.9.12-bp153.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52236" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2021-37980" ref_url="https://www.suse.com/security/cve/CVE-2021-37980/" source="CVE"/>
		<reference ref_id="CVE-2021-37997" ref_url="https://www.suse.com/security/cve/CVE-2021-37997/" source="CVE"/>
		<reference ref_id="CVE-2021-37998" ref_url="https://www.suse.com/security/cve/CVE-2021-37998/" source="CVE"/>
		<reference ref_id="CVE-2021-37999" ref_url="https://www.suse.com/security/cve/CVE-2021-37999/" source="CVE"/>
		<reference ref_id="CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001/" source="CVE"/>
		<reference ref_id="CVE-2021-38002" ref_url="https://www.suse.com/security/cve/CVE-2021-38002/" source="CVE"/>
		<reference ref_id="CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003/" source="CVE"/>
		<reference ref_id="CVE-2021-38004" ref_url="https://www.suse.com/security/cve/CVE-2021-38004/" source="CVE"/>
		<reference ref_id="CVE-2021-38005" ref_url="https://www.suse.com/security/cve/CVE-2021-38005/" source="CVE"/>
		<reference ref_id="CVE-2021-38006" ref_url="https://www.suse.com/security/cve/CVE-2021-38006/" source="CVE"/>
		<reference ref_id="CVE-2021-38007" ref_url="https://www.suse.com/security/cve/CVE-2021-38007/" source="CVE"/>
		<reference ref_id="CVE-2021-38008" ref_url="https://www.suse.com/security/cve/CVE-2021-38008/" source="CVE"/>
		<reference ref_id="CVE-2021-38009" ref_url="https://www.suse.com/security/cve/CVE-2021-38009/" source="CVE"/>
		<reference ref_id="CVE-2021-38010" ref_url="https://www.suse.com/security/cve/CVE-2021-38010/" source="CVE"/>
		<reference ref_id="CVE-2021-38011" ref_url="https://www.suse.com/security/cve/CVE-2021-38011/" source="CVE"/>
		<reference ref_id="CVE-2021-38012" ref_url="https://www.suse.com/security/cve/CVE-2021-38012/" source="CVE"/>
		<reference ref_id="CVE-2021-38013" ref_url="https://www.suse.com/security/cve/CVE-2021-38013/" source="CVE"/>
		<reference ref_id="CVE-2021-38014" ref_url="https://www.suse.com/security/cve/CVE-2021-38014/" source="CVE"/>
		<reference ref_id="CVE-2021-38015" ref_url="https://www.suse.com/security/cve/CVE-2021-38015/" source="CVE"/>
		<reference ref_id="CVE-2021-38016" ref_url="https://www.suse.com/security/cve/CVE-2021-38016/" source="CVE"/>
		<reference ref_id="CVE-2021-38017" ref_url="https://www.suse.com/security/cve/CVE-2021-38017/" source="CVE"/>
		<reference ref_id="CVE-2021-38019" ref_url="https://www.suse.com/security/cve/CVE-2021-38019/" source="CVE"/>
		<reference ref_id="CVE-2021-38020" ref_url="https://www.suse.com/security/cve/CVE-2021-38020/" source="CVE"/>
		<reference ref_id="CVE-2021-38021" ref_url="https://www.suse.com/security/cve/CVE-2021-38021/" source="CVE"/>
		<reference ref_id="CVE-2021-38022" ref_url="https://www.suse.com/security/cve/CVE-2021-38022/" source="CVE"/>
		<reference ref_id="CVE-2021-4052" ref_url="https://www.suse.com/security/cve/CVE-2021-4052/" source="CVE"/>
		<reference ref_id="CVE-2021-4053" ref_url="https://www.suse.com/security/cve/CVE-2021-4053/" source="CVE"/>
		<reference ref_id="CVE-2021-4054" ref_url="https://www.suse.com/security/cve/CVE-2021-4054/" source="CVE"/>
		<reference ref_id="CVE-2021-4055" ref_url="https://www.suse.com/security/cve/CVE-2021-4055/" source="CVE"/>
		<reference ref_id="CVE-2021-4056" ref_url="https://www.suse.com/security/cve/CVE-2021-4056/" source="CVE"/>
		<reference ref_id="CVE-2021-4057" ref_url="https://www.suse.com/security/cve/CVE-2021-4057/" source="CVE"/>
		<reference ref_id="CVE-2021-4058" ref_url="https://www.suse.com/security/cve/CVE-2021-4058/" source="CVE"/>
		<reference ref_id="CVE-2021-4059" ref_url="https://www.suse.com/security/cve/CVE-2021-4059/" source="CVE"/>
		<reference ref_id="CVE-2021-4061" ref_url="https://www.suse.com/security/cve/CVE-2021-4061/" source="CVE"/>
		<reference ref_id="CVE-2021-4062" ref_url="https://www.suse.com/security/cve/CVE-2021-4062/" source="CVE"/>
		<reference ref_id="CVE-2021-4063" ref_url="https://www.suse.com/security/cve/CVE-2021-4063/" source="CVE"/>
		<reference ref_id="CVE-2021-4064" ref_url="https://www.suse.com/security/cve/CVE-2021-4064/" source="CVE"/>
		<reference ref_id="CVE-2021-4065" ref_url="https://www.suse.com/security/cve/CVE-2021-4065/" source="CVE"/>
		<reference ref_id="CVE-2021-4066" ref_url="https://www.suse.com/security/cve/CVE-2021-4066/" source="CVE"/>
		<reference ref_id="CVE-2021-4067" ref_url="https://www.suse.com/security/cve/CVE-2021-4067/" source="CVE"/>
		<reference ref_id="CVE-2021-4068" ref_url="https://www.suse.com/security/cve/CVE-2021-4068/" source="CVE"/>
		<reference ref_id="CVE-2021-4078" ref_url="https://www.suse.com/security/cve/CVE-2021-4078/" source="CVE"/>
		<reference ref_id="CVE-2021-4079" ref_url="https://www.suse.com/security/cve/CVE-2021-4079/" source="CVE"/>
		<reference ref_id="CVE-2021-4098" ref_url="https://www.suse.com/security/cve/CVE-2021-4098/" source="CVE"/>
		<reference ref_id="CVE-2021-4099" ref_url="https://www.suse.com/security/cve/CVE-2021-4099/" source="CVE"/>
		<reference ref_id="CVE-2021-4100" ref_url="https://www.suse.com/security/cve/CVE-2021-4100/" source="CVE"/>
		<reference ref_id="CVE-2021-4101" ref_url="https://www.suse.com/security/cve/CVE-2021-4101/" source="CVE"/>
		<reference ref_id="CVE-2021-4102" ref_url="https://www.suse.com/security/cve/CVE-2021-4102/" source="CVE"/>
		<reference ref_id="CVE-2022-0096" ref_url="https://www.suse.com/security/cve/CVE-2022-0096/" source="CVE"/>
		<reference ref_id="CVE-2022-0097" ref_url="https://www.suse.com/security/cve/CVE-2022-0097/" source="CVE"/>
		<reference ref_id="CVE-2022-0098" ref_url="https://www.suse.com/security/cve/CVE-2022-0098/" source="CVE"/>
		<reference ref_id="CVE-2022-0099" ref_url="https://www.suse.com/security/cve/CVE-2022-0099/" source="CVE"/>
		<reference ref_id="CVE-2022-0100" ref_url="https://www.suse.com/security/cve/CVE-2022-0100/" source="CVE"/>
		<reference ref_id="CVE-2022-0101" ref_url="https://www.suse.com/security/cve/CVE-2022-0101/" source="CVE"/>
		<reference ref_id="CVE-2022-0102" ref_url="https://www.suse.com/security/cve/CVE-2022-0102/" source="CVE"/>
		<reference ref_id="CVE-2022-0103" ref_url="https://www.suse.com/security/cve/CVE-2022-0103/" source="CVE"/>
		<reference ref_id="CVE-2022-0104" ref_url="https://www.suse.com/security/cve/CVE-2022-0104/" source="CVE"/>
		<reference ref_id="CVE-2022-0105" ref_url="https://www.suse.com/security/cve/CVE-2022-0105/" source="CVE"/>
		<reference ref_id="CVE-2022-0106" ref_url="https://www.suse.com/security/cve/CVE-2022-0106/" source="CVE"/>
		<reference ref_id="CVE-2022-0107" ref_url="https://www.suse.com/security/cve/CVE-2022-0107/" source="CVE"/>
		<reference ref_id="CVE-2022-0108" ref_url="https://www.suse.com/security/cve/CVE-2022-0108/" source="CVE"/>
		<reference ref_id="CVE-2022-0109" ref_url="https://www.suse.com/security/cve/CVE-2022-0109/" source="CVE"/>
		<reference ref_id="CVE-2022-0110" ref_url="https://www.suse.com/security/cve/CVE-2022-0110/" source="CVE"/>
		<reference ref_id="CVE-2022-0111" ref_url="https://www.suse.com/security/cve/CVE-2022-0111/" source="CVE"/>
		<reference ref_id="CVE-2022-0112" ref_url="https://www.suse.com/security/cve/CVE-2022-0112/" source="CVE"/>
		<reference ref_id="CVE-2022-0113" ref_url="https://www.suse.com/security/cve/CVE-2022-0113/" source="CVE"/>
		<reference ref_id="CVE-2022-0114" ref_url="https://www.suse.com/security/cve/CVE-2022-0114/" source="CVE"/>
		<reference ref_id="CVE-2022-0115" ref_url="https://www.suse.com/security/cve/CVE-2022-0115/" source="CVE"/>
		<reference ref_id="CVE-2022-0116" ref_url="https://www.suse.com/security/cve/CVE-2022-0116/" source="CVE"/>
		<reference ref_id="CVE-2022-0117" ref_url="https://www.suse.com/security/cve/CVE-2022-0117/" source="CVE"/>
		<reference ref_id="CVE-2022-0118" ref_url="https://www.suse.com/security/cve/CVE-2022-0118/" source="CVE"/>
		<reference ref_id="CVE-2022-0120" ref_url="https://www.suse.com/security/cve/CVE-2022-0120/" source="CVE"/>
		<reference ref_id="CVE-2022-0289" ref_url="https://www.suse.com/security/cve/CVE-2022-0289/" source="CVE"/>
		<reference ref_id="CVE-2022-0290" ref_url="https://www.suse.com/security/cve/CVE-2022-0290/" source="CVE"/>
		<reference ref_id="CVE-2022-0291" ref_url="https://www.suse.com/security/cve/CVE-2022-0291/" source="CVE"/>
		<reference ref_id="CVE-2022-0292" ref_url="https://www.suse.com/security/cve/CVE-2022-0292/" source="CVE"/>
		<reference ref_id="CVE-2022-0293" ref_url="https://www.suse.com/security/cve/CVE-2022-0293/" source="CVE"/>
		<reference ref_id="CVE-2022-0294" ref_url="https://www.suse.com/security/cve/CVE-2022-0294/" source="CVE"/>
		<reference ref_id="CVE-2022-0295" ref_url="https://www.suse.com/security/cve/CVE-2022-0295/" source="CVE"/>
		<reference ref_id="CVE-2022-0296" ref_url="https://www.suse.com/security/cve/CVE-2022-0296/" source="CVE"/>
		<reference ref_id="CVE-2022-0297" ref_url="https://www.suse.com/security/cve/CVE-2022-0297/" source="CVE"/>
		<reference ref_id="CVE-2022-0298" ref_url="https://www.suse.com/security/cve/CVE-2022-0298/" source="CVE"/>
		<reference ref_id="CVE-2022-0300" ref_url="https://www.suse.com/security/cve/CVE-2022-0300/" source="CVE"/>
		<reference ref_id="CVE-2022-0301" ref_url="https://www.suse.com/security/cve/CVE-2022-0301/" source="CVE"/>
		<reference ref_id="CVE-2022-0302" ref_url="https://www.suse.com/security/cve/CVE-2022-0302/" source="CVE"/>
		<reference ref_id="CVE-2022-0304" ref_url="https://www.suse.com/security/cve/CVE-2022-0304/" source="CVE"/>
		<reference ref_id="CVE-2022-0305" ref_url="https://www.suse.com/security/cve/CVE-2022-0305/" source="CVE"/>
		<reference ref_id="CVE-2022-0306" ref_url="https://www.suse.com/security/cve/CVE-2022-0306/" source="CVE"/>
		<reference ref_id="CVE-2022-0307" ref_url="https://www.suse.com/security/cve/CVE-2022-0307/" source="CVE"/>
		<reference ref_id="CVE-2022-0308" ref_url="https://www.suse.com/security/cve/CVE-2022-0308/" source="CVE"/>
		<reference ref_id="CVE-2022-0309" ref_url="https://www.suse.com/security/cve/CVE-2022-0309/" source="CVE"/>
		<reference ref_id="CVE-2022-0310" ref_url="https://www.suse.com/security/cve/CVE-2022-0310/" source="CVE"/>
		<reference ref_id="CVE-2022-0311" ref_url="https://www.suse.com/security/cve/CVE-2022-0311/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVEGWNKSSGZPVVLVJKNT5ZEY54Z5RLV4/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 83.0.4254.27

  - CHR-8737 Update chromium on desktop-stable-97-4254 to
    97.0.4692.99
  - DNA-96336 [Mac] Translate new network installer slogan
  - DNA-96678 Add battery level monitoring capability to
    powerSavePrivate
  - DNA-96939 Crash at 
    opera::ExternalVideoService::MarkAsManuallyClosed()
  - DNA-97276 Enable #static-tab-audio-indicator on all streams

- The update to chromium 97.0.4692.99 fixes following issues:
  CVE-2022-0289, CVE-2022-0290, CVE-2022-0291, CVE-2022-0292,
  CVE-2022-0293, CVE-2022-0294, CVE-2022-0295, CVE-2022-0296,
  CVE-2022-0297, CVE-2022-0298, CVE-2022-0300, CVE-2022-0301,
  CVE-2022-0302, CVE-2022-0304, CVE-2022-0305, CVE-2022-0306,
  CVE-2022-0307, CVE-2022-0308, CVE-2022-0309, CVE-2022-0310,
  CVE-2022-0311

Update to 83.0.4254.19

  - DNA-96079 Turn on #automatic-video-popout on developer
  - DNA-97070 Opera 83 translations
  - DNA-97119 [LastCard] Stop showing used burner cards
  - DNA-97131 Enable automatic-video-popout on all streams from
    O84 on
  - DNA-97257 Crash at 
    views::ImageButton::SetMinimumImageSize(gfx::Size const&amp;)
  - DNA-97259 Promote O83 to stable

- Complete Opera 83.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-83/

- Update to 83.0.4254.16

  - DNA-96968 Fix alignment of the 'Advanced' button in Settings

- Update to 83.0.4254.14

  - CHR-8701 Update chromium on desktop-stable-97-4254 to
    97.0.4692.45
  - CHR-8713 Update chromium on desktop-stable-97-4254 to
    97.0.4692.56
  - CHR-8723 Update chromium on desktop-stable-97-4254 to
    97.0.4692.71
  - DNA-96780 Crash at
    ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
  - DNA-96822 Tab close resize behavior change
  - DNA-96861 Create Loomi Options menu
  - DNA-96904 Support Win11 snap layout popup
  - DNA-96951 Tab close animation broken
  - DNA-96991 Tab X button doesn’t work correctly
  - DNA-97027 Incorrect tab size after tab close
- The update to chromium 97.0.4692.71 fixes following issues:
  CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099,
  CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103,
  CVE-2022-0104, CVE-2022-0105, CVE-2022-0105, CVE-2022-0106,
  CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110,
  CVE-2022-0111, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113,
  CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117,
  CVE-2022-0118, CVE-2022-0120

- Update to version 82.0.4227.58

  - DNA-96780 Crash at
    ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
  - DNA-96890 Settings default browser not working for current
    user on Windows 7

- Update to version 82.0.4227.43

  - CHR-8705 Update chromium on desktop-stable-96-4227 to
    96.0.4664.110
  - DNA-93284 Unstable
    obj/opera/desktop/common/installer_rc_generated/installer.res
  - DNA-95908 Interstitial/internal pages shown as NOT SECURE
    after visiting http site
  - DNA-96404 Opera doesn’t show on main screen when second screen
    is abruptly disconnected

- The update to chromium 96.0.4664.110 fixes following issues:
  CVE-2021-4098, CVE-2021-4099, CVE-2021-4100, CVE-2021-4101,
  CVE-2021-4102

- Update to version 82.0.4227.33

  - CHR-8689 Update chromium on desktop-stable-96-4227 to
    96.0.4664.93
  - DNA-96559 Tooltip popup looks bad in dark theme
  - DNA-96570 [Player] Tidal logging in via PLAY doesn’t work
  - DNA-96594 Unnecessary extra space in fullscreen mode on M1 Pro MacBooks
  - DNA-96649 Update Meme button
  - DNA-96676 Add Icon in the Sidebar Setup
  - DNA-96677 Add default URL
- The update to chromium 96.0.4664.93 fixes following issues:
  CVE-2021-4052, CVE-2021-4053, CVE-2021-4079, CVE-2021-4054,
  CVE-2021-4078, CVE-2021-4055, CVE-2021-4056, CVE-2021-4057,
  CVE-2021-4058, CVE-2021-4059, CVE-2021-4061, CVE-2021-4062,
  CVE-2021-4063, CVE-2021-4064, CVE-2021-4065, CVE-2021-4066,
  CVE-2021-4067, CVE-2021-4068

- Update to version 82.0.4227.23

  - DNA-95632 With new au-logic UUID is set with delay and may be
    not set for pb-builds (when closing fast)
  - DNA-96349 Laggy tooltip animation
  - DNA-96483 [Snap][Linux] Video not working / wrong ffmpeg snap
    version for Opera 82
  - DNA-96493 Create 'small' enticement in credit card autofill
  - DNA-96533 Opera 82 translations
  - DNA-96535 Make the URL configurable
  - DNA-96553 Add switch to whitelist test pages
  - DNA-96557 Links not opened from panel
  - DNA-96558 AdBlock bloks some trackers inside the panel
  - DNA-96568 [Player] Tidal in sidebar Player opens wrong site
    when logging in
  - DNA-96659 Siteprefs not applied after network service crash
  - DNA-96593 Promote O82 to stable

- Complete Opera 82.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-82/

- Update to version 82.0.4227.13

  - CHR-8668 Update chromium on desktop-stable-96-4227 to
    96.0.4664.45
  - DNA-76987 [Mac] Update desktop EULA with geolocation split
  - DNA-93388 Problem with symlinks on windows when creating
    file list
  - DNA-95734 Discarded Recently Closed items get revived
    after restart
  - DNA-96134 'Your profile has been updated' does not disappear
  - DNA-96190 Opera freezes when trying to drag expanded
    bookmark folder with nested subfolders
  - DNA-96223 Easy Files not working in Full Screen
  - DNA-96274 Checkout autofill shouldn't show used burner card
  - DNA-96275 Change the notification message for pausing
    multi-use cards
  - DNA-96295 'Video pop out' setting doesn't sync
  - DNA-96316 Highlight text wrong colour on dark mode
  - DNA-96326 Wrong translation Private Mode &gt; Turkish
  - DNA-96351 macOS window controls are missing in full screen
  - DNA-96440 Update video URL
  - DNA-96448 add option to pin extension via rich hints
  - DNA-96453 Register user-chosen option on client-side, read on
    hint side
  - DNA-96454 Choosing an option from the settings menu should
    close the popup
  - DNA-96484 Enable AB test for a new autoupdater logic (for 50%)
  - DNA-96500 Add 'don't show me again' prefs to allowed whitelist
  - DNA-96538 Inline audiocomplete for www.mediaexpert.pl
    incorrectly suggested
- The update to chromium 96.0.4664.45 fixes following issues:
  CVE-2021-38005, CVE-2021-38006, CVE-2021-38007, CVE-2021-38008,
  CVE-2021-38009, CVE-2021-38010, CVE-2021-38011, CVE-2021-38012,
  CVE-2021-38013, CVE-2021-38014, CVE-2021-38015, CVE-2021-38016,
  CVE-2021-38017, CVE-2021-38019, CVE-2021-38020, CVE-2021-38021,
  CVE-2021-38022
 

- Update to version 81.0.4196.54

  - CHR-8644 Update chromium on desktop-stable-95-4196 to
    95.0.4638.69
  - DNA-95773 ExtensionWebRequestApiTest crashes on mac
  - DNA-96062 Opera 81 translations
  - DNA-96134 “Your profile has been updated’ does not disappear
  - DNA-96274 Checkout autofill shouldn’t show used burner card
  - DNA-96275 Change the notification message for pausing
    multi-use cards
  - DNA-96440 Update video URL

- The update to chromium 95.0.4638.69 fixes following issues:
  CVE-2021-37997, CVE-2021-37998, CVE-2021-37999, CVE-2021-37980,
  CVE-2021-38001, CVE-2021-38002, CVE-2021-38003, CVE-2021-38004 

- Update to version 81.0.4196.37

  - DNA-96008 Crash at
    content::WebContentsImpl::OpenURL(content::OpenURLParams const&amp;)
  - DNA-96032 Closing the videoconference pop-up force leaving
    the meeting
  - DNA-96092 Crash at void
    opera::ModalDialogViews::OnWidgetClosing(opera::ModalDialog::Result)
  - DNA-96142 [Yat] Emoji icon cut off in URL for Yat
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-20"/>
	<updated date="2022-02-20"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-37980/">CVE-2021-37980</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37997/">CVE-2021-37997</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37998/">CVE-2021-37998</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-37999/">CVE-2021-37999</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38002/">CVE-2021-38002</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38004/">CVE-2021-38004</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38005/">CVE-2021-38005</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38006/">CVE-2021-38006</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38007/">CVE-2021-38007</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38008/">CVE-2021-38008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38009/">CVE-2021-38009</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38010/">CVE-2021-38010</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38011/">CVE-2021-38011</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38012/">CVE-2021-38012</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38013/">CVE-2021-38013</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38014/">CVE-2021-38014</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38015/">CVE-2021-38015</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38016/">CVE-2021-38016</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38017/">CVE-2021-38017</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38019/">CVE-2021-38019</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38020/">CVE-2021-38020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38021/">CVE-2021-38021</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38022/">CVE-2021-38022</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4052/">CVE-2021-4052</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4053/">CVE-2021-4053</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4054/">CVE-2021-4054</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4055/">CVE-2021-4055</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4056/">CVE-2021-4056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4057/">CVE-2021-4057</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4058/">CVE-2021-4058</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4059/">CVE-2021-4059</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4061/">CVE-2021-4061</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4062/">CVE-2021-4062</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4063/">CVE-2021-4063</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4064/">CVE-2021-4064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4065/">CVE-2021-4065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4066/">CVE-2021-4066</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4067/">CVE-2021-4067</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4068/">CVE-2021-4068</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4078/">CVE-2021-4078</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4079/">CVE-2021-4079</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4098/">CVE-2021-4098</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4099/">CVE-2021-4099</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4100/">CVE-2021-4100</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4101/">CVE-2021-4101</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4102/">CVE-2021-4102</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0096/">CVE-2022-0096</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0097/">CVE-2022-0097</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0098/">CVE-2022-0098</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0099/">CVE-2022-0099</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0100/">CVE-2022-0100</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0101/">CVE-2022-0101</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0102/">CVE-2022-0102</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0103/">CVE-2022-0103</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0104/">CVE-2022-0104</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0105/">CVE-2022-0105</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0106/">CVE-2022-0106</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0107/">CVE-2022-0107</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0108/">CVE-2022-0108</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0109/">CVE-2022-0109</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0110/">CVE-2022-0110</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0111/">CVE-2022-0111</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0112/">CVE-2022-0112</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0113/">CVE-2022-0113</cve>
	<cve impact="critical" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0114/">CVE-2022-0114</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0115/">CVE-2022-0115</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0116/">CVE-2022-0116</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0117/">CVE-2022-0117</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0118/">CVE-2022-0118</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0120/">CVE-2022-0120</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0289/">CVE-2022-0289</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0290/">CVE-2022-0290</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0291/">CVE-2022-0291</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0292/">CVE-2022-0292</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0293/">CVE-2022-0293</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0294/">CVE-2022-0294</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0295/">CVE-2022-0295</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0296/">CVE-2022-0296</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0297/">CVE-2022-0297</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0298/">CVE-2022-0298</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0300/">CVE-2022-0300</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0301/">CVE-2022-0301</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0302/">CVE-2022-0302</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0304/">CVE-2022-0304</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0305/">CVE-2022-0305</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0306/">CVE-2022-0306</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0307/">CVE-2022-0307</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0308/">CVE-2022-0308</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0309/">CVE-2022-0309</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0310/">CVE-2022-0310</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0311/">CVE-2022-0311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695047" comment="opera-83.0.4254.27-lp153.2.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52237" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-0452" ref_url="https://www.suse.com/security/cve/CVE-2022-0452/" source="CVE"/>
		<reference ref_id="CVE-2022-0453" ref_url="https://www.suse.com/security/cve/CVE-2022-0453/" source="CVE"/>
		<reference ref_id="CVE-2022-0454" ref_url="https://www.suse.com/security/cve/CVE-2022-0454/" source="CVE"/>
		<reference ref_id="CVE-2022-0455" ref_url="https://www.suse.com/security/cve/CVE-2022-0455/" source="CVE"/>
		<reference ref_id="CVE-2022-0456" ref_url="https://www.suse.com/security/cve/CVE-2022-0456/" source="CVE"/>
		<reference ref_id="CVE-2022-0457" ref_url="https://www.suse.com/security/cve/CVE-2022-0457/" source="CVE"/>
		<reference ref_id="CVE-2022-0458" ref_url="https://www.suse.com/security/cve/CVE-2022-0458/" source="CVE"/>
		<reference ref_id="CVE-2022-0459" ref_url="https://www.suse.com/security/cve/CVE-2022-0459/" source="CVE"/>
		<reference ref_id="CVE-2022-0460" ref_url="https://www.suse.com/security/cve/CVE-2022-0460/" source="CVE"/>
		<reference ref_id="CVE-2022-0461" ref_url="https://www.suse.com/security/cve/CVE-2022-0461/" source="CVE"/>
		<reference ref_id="CVE-2022-0462" ref_url="https://www.suse.com/security/cve/CVE-2022-0462/" source="CVE"/>
		<reference ref_id="CVE-2022-0463" ref_url="https://www.suse.com/security/cve/CVE-2022-0463/" source="CVE"/>
		<reference ref_id="CVE-2022-0464" ref_url="https://www.suse.com/security/cve/CVE-2022-0464/" source="CVE"/>
		<reference ref_id="CVE-2022-0465" ref_url="https://www.suse.com/security/cve/CVE-2022-0465/" source="CVE"/>
		<reference ref_id="CVE-2022-0466" ref_url="https://www.suse.com/security/cve/CVE-2022-0466/" source="CVE"/>
		<reference ref_id="CVE-2022-0467" ref_url="https://www.suse.com/security/cve/CVE-2022-0467/" source="CVE"/>
		<reference ref_id="CVE-2022-0468" ref_url="https://www.suse.com/security/cve/CVE-2022-0468/" source="CVE"/>
		<reference ref_id="CVE-2022-0469" ref_url="https://www.suse.com/security/cve/CVE-2022-0469/" source="CVE"/>
		<reference ref_id="CVE-2022-0470" ref_url="https://www.suse.com/security/cve/CVE-2022-0470/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQK3YBZP7LLGFOZF2RYGZC5GDDRHRI6/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 84.0.4316.14
  - CHR-8753 Update chromium on desktop-stable-98-4316 to
    98.0.4758.82
  - DNA-97177 Battery saver – the icon looks bad for DPI!=100%
  - DNA-97614 automatic video pop-out for most popular websites
    broadcasting Winter Olympic Games 2022
  - DNA-97804 Promote O84 to stable
  
- The update to chromium 98.0.4758.82 fixes following issues:
  CVE-2022-0452, CVE-2022-0453, CVE-2022-0454, CVE-2022-0455,
  CVE-2022-0456, CVE-2022-0457, CVE-2022-0458, CVE-2022-0459,
  CVE-2022-0460, CVE-2022-0461, CVE-2022-0462, CVE-2022-0463,
  CVE-2022-0464, CVE-2022-0465, CVE-2022-0466, CVE-2022-0467,
  CVE-2022-0468, CVE-2022-0469, CVE-2022-0470
  
- Complete Opera 84.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-84/

- Update to 83.0.4254.54
  - DNA-96581 Fast tab tooltip doesn’t always show related sites
    with scrollable tab strip
  - DNA-96608 Cannot drag a tab to create a new window
  - DNA-96657 Do not make tab tooltip hoverable if there’s no
    list of tabs
  - DNA-97291 Crash at 
    opera::flow::FlowSessionImpl::RegisterDevice(base::OnceCallback)
  - DNA-97468 Incorrect number of restored tabs when video-popout
    is detached
  - DNA-97476 Add retry to stapling during signing
  - DNA-97609 Failing MetricsReporterTest.TimeSpent* smoketests
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0452/">CVE-2022-0452</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0453/">CVE-2022-0453</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0454/">CVE-2022-0454</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0455/">CVE-2022-0455</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0456/">CVE-2022-0456</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0457/">CVE-2022-0457</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0458/">CVE-2022-0458</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0459/">CVE-2022-0459</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0460/">CVE-2022-0460</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0461/">CVE-2022-0461</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0462/">CVE-2022-0462</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0463/">CVE-2022-0463</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0464/">CVE-2022-0464</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0465/">CVE-2022-0465</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0466/">CVE-2022-0466</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0467/">CVE-2022-0467</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0468/">CVE-2022-0468</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0469/">CVE-2022-0469</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0470/">CVE-2022-0470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695048" comment="opera-84.0.4316.14-lp153.2.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52238" version="1" class="patch">
	<metadata>
		<title>Security update for sphinx (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1157590" ref_url="https://bugzilla.suse.com/1157590" source="BUGZILLA"/>
		<reference ref_id="1195227" ref_url="https://bugzilla.suse.com/1195227" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29050" ref_url="https://www.suse.com/security/cve/CVE-2020-29050/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2Z7YY7HZ2IKSH75SHSRUFT5AJHJJOLN/" source="SUSE-SU"/>
		<description>
This update for sphinx fixes the following issues:

- CVE-2020-29050: SphinxSearch in Sphinx Technologies Sphinx allows directory traversal (in conjunction with CVE-2019-14511) because the mysql client can be used for CALL SNIPPETS and load_file operations on a full pathname (e.g., a file in the /etc directory). (boo#1195227)
- update to 2.0.6 release		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157590">SUSE bug 1157590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195227">SUSE bug 1195227</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29050/">CVE-2020-29050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670269" comment="libsphinxclient-0_0_1-2.2.11-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670270" comment="libsphinxclient-devel-2.2.11-lp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670271" comment="sphinx-2.2.11-lp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52239" version="1" class="patch">
	<metadata>
		<title>Security update for connman (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194175" ref_url="https://bugzilla.suse.com/1194175" source="BUGZILLA"/>
		<reference ref_id="1194176" ref_url="https://bugzilla.suse.com/1194176" source="BUGZILLA"/>
		<reference ref_id="1194177" ref_url="https://bugzilla.suse.com/1194177" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23096" ref_url="https://www.suse.com/security/cve/CVE-2022-23096/" source="CVE"/>
		<reference ref_id="CVE-2022-23097" ref_url="https://www.suse.com/security/cve/CVE-2022-23097/" source="CVE"/>
		<reference ref_id="CVE-2022-23098" ref_url="https://www.suse.com/security/cve/CVE-2022-23098/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<description>
This update for connman fixes the following issues:

Update to 1.41: (boo#1194177, boo#1194176, boo#1194175)

* Fix issue with RTNL netlink message alignment.
* Fix issue with dnsproxy and timeout for TCP feature. (CVE-2022-23097, CVE-2022-23096)
* Fix issue with dnsproxy and busy loop in TCP server. (CVE-2022-23098)
* Fix issue with WiFi connection with no passphrase.
* Add support for wpa_supplicant and WPA3-SAE functionality.
* Add support for D-Bus ObjectManager interface.
- Add systemd hardening configuration
- Disabled openconnect plugin due to version conflict
- Disabled vpnc plugin for i568 missing dependency
- Disabled hh2serial and tist_working for ppc64le due to version conflict
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194175">SUSE bug 1194175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194176">SUSE bug 1194176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194177">SUSE bug 1194177</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23096/">CVE-2022-23096</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23097/">CVE-2022-23097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23098/">CVE-2022-23098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670188" comment="connman-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670189" comment="connman-client-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670190" comment="connman-devel-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670191" comment="connman-doc-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670192" comment="connman-nmcompat-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670193" comment="connman-plugin-hh2serial-gps-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670194" comment="connman-plugin-iospm-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670195" comment="connman-plugin-l2tp-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670196" comment="connman-plugin-openvpn-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670197" comment="connman-plugin-polkit-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670198" comment="connman-plugin-pptp-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670199" comment="connman-plugin-tist-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670200" comment="connman-plugin-vpnc-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670201" comment="connman-plugin-wireguard-1.41-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670202" comment="connman-test-1.41-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52240" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1144018" ref_url="https://bugzilla.suse.com/1144018" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1194681" ref_url="https://bugzilla.suse.com/1194681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15803" ref_url="https://www.suse.com/security/cve/CVE-2020-15803/" source="CVE"/>
		<reference ref_id="CVE-2021-27927" ref_url="https://www.suse.com/security/cve/CVE-2021-27927/" source="CVE"/>
		<reference ref_id="CVE-2022-23134" ref_url="https://www.suse.com/security/cve/CVE-2022-23134/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTUQBSMWYBVSTVDYNNRW5EOI5CCOSTPZ/" source="SUSE-SU"/>
		<description>
This update for zabbix fixes the following issues:

Zabbix is shipped in version 4.0.38.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144018">SUSE bug 1144018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194681">SUSE bug 1194681</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15803/">CVE-2020-15803</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27927/">CVE-2021-27927</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23134/">CVE-2022-23134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670203" comment="zabbix-agent-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670204" comment="zabbix-java-gateway-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670205" comment="zabbix-phpfrontend-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670206" comment="zabbix-proxy-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670207" comment="zabbix-proxy-mysql-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670208" comment="zabbix-proxy-postgresql-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670209" comment="zabbix-proxy-sqlite-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670210" comment="zabbix-server-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670211" comment="zabbix-server-mysql-4.0.38-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670212" comment="zabbix-server-postgresql-4.0.38-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52241" version="1" class="patch">
	<metadata>
		<title>Security update for mc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190180" ref_url="https://bugzilla.suse.com/1190180" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36370" ref_url="https://www.suse.com/security/cve/CVE-2021-36370/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5SJPZ2MSI7IPFCS5TFZZVXF4NN6XKYKJ/" source="SUSE-SU"/>
		<description>
This update for mc fixes the following issues:

Midnight Commander 4.8.27:

* Core

  - Reimplement version detection (#3603, #4249)
  - Significantly reduce rebuilt time after version change (#2252, #4266)
  - Drop automatic migration of configuration from ~/.mc to XDG-based directories (#3682)
  - zsh: support custom configuration file: ~/.local/share/mc/.zshrc (#4203)
  - Widgets: implement WST_VISIBLE state to show/hide widgets (#2919)
  - Find File: add Follow symlinks option (#2020) 

* VFS

  - extfs: support unrar-6 (#4154)
  - extfs: support official 7z binary (7zz) (#4239)
  - ftpfs: apply file list parser from lftp project (#2841, #3174) 

* Editor

  - Word completion: get candidates from all open files (#4160)
  - etags: get rid of hardcoded list length and window width (#4132)
  - Update syntax files:
    - python (#4140) 
  - Add syntax highlighting:
    - Verilog and SystemVerilog? header files (#4215)
    - JSON (#4250)
    - openrc-run scripts (#4246) 
* Misc

  - Filehighlight of c++ and h++ files as sources (#4194)
  - Filehighlight of JSON files as documents (#4250)
  - Support of alacritty terminal emulator (​https://github.com/alacritty/alacritty) (#4248)
  - Support of foot terminal emulator (​https://codeberg.org/dnkl/foot) (#4251)
  - Support of (alt+)shift+arrow keys in st terminal emulator (st.suckless.org) (#4267)
  - Mouse support in screen: don't check  variable (#4233)
  - mc.ext: support fb2 e-books (#4167)
  - ext.d: use mediainfo to view info about various media files (#4167)
  - Remove OS/distro-specific package-related stuff from source tree (#4217) 

* Fixes

  - FTBFS against NCurses on OS X 10.9.5 (#4181)
  - Segfault on dialog before panels get visible (#4244)
  - Crash if shadow is out of screen (build against NCurses) (#4192)
  - Crash in search (#4222)
  - Crash on startup with enabled subshell in FreeBSD (workaround) (#4213)
  - Hang on start randomly with zsh as subshell (#4198)
  - If command line is invisible it's partially displayed (#4182)
  - Broken handling of zip archives (#4180, #4183)
  - Broken handling of jar files as zip archives (#4223)
  - Timestamps of symlinks, sockets, fifos, etc are not preserved after copy/move (#3985)
  - %view action in the user menu doesn't work on no-exec filesystem (#4242)
  - Hardlinks are not colored by file type or extension (#3375)
  - mcedit: silent macro makes terminal disrupted (#4171)
  - mcedit: disrupting of TAGS file path (#4207)
  - vfs: unable to browse compressed tar archives (#4191)
  - sftpfs vfs: CVE-2021-36370: server fingerprint isn't verified 
    (discovered by AUT-milCERT during an audit of open source software) (#4259)
  - ftpfs vfs: month of file is always January (#4260)
  - Tests: log files are written by libcheck and automake simultaneously (#3986) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190180">SUSE bug 1190180</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-36370/">CVE-2021-36370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670405" comment="mc-4.8.27-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670406" comment="mc-lang-4.8.27-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52242" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184561" ref_url="https://bugzilla.suse.com/1184561" source="BUGZILLA"/>
		<reference ref_id="1185679" ref_url="https://bugzilla.suse.com/1185679" source="BUGZILLA"/>
		<reference ref_id="1186124" ref_url="https://bugzilla.suse.com/1186124" source="BUGZILLA"/>
		<reference ref_id="1189458" ref_url="https://bugzilla.suse.com/1189458" source="BUGZILLA"/>
		<reference ref_id="1193671" ref_url="https://bugzilla.suse.com/1193671" source="BUGZILLA"/>
		<reference ref_id="1193673" ref_url="https://bugzilla.suse.com/1193673" source="BUGZILLA"/>
		<reference ref_id="1193675" ref_url="https://bugzilla.suse.com/1193675" source="BUGZILLA"/>
		<reference ref_id="1193676" ref_url="https://bugzilla.suse.com/1193676" source="BUGZILLA"/>
		<reference ref_id="1193678" ref_url="https://bugzilla.suse.com/1193678" source="BUGZILLA"/>
		<reference ref_id="1195906" ref_url="https://bugzilla.suse.com/1195906" source="BUGZILLA"/>
		<reference ref_id="1195918" ref_url="https://bugzilla.suse.com/1195918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40323" ref_url="https://www.suse.com/security/cve/CVE-2021-40323/" source="CVE"/>
		<reference ref_id="CVE-2021-40324" ref_url="https://www.suse.com/security/cve/CVE-2021-40324/" source="CVE"/>
		<reference ref_id="CVE-2021-40325" ref_url="https://www.suse.com/security/cve/CVE-2021-40325/" source="CVE"/>
		<reference ref_id="CVE-2021-45082" ref_url="https://www.suse.com/security/cve/CVE-2021-45082/" source="CVE"/>
		<reference ref_id="CVE-2021-45083" ref_url="https://www.suse.com/security/cve/CVE-2021-45083/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QYJBECOXKL6LM6PP3ZL5EKF4GRPTFTD5/" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).
- CVE-2021-45082: Fixed incomplete template sanitation (bsc#1193678).
- CVE-2021-40323, CVE-2021-40324, CVE-2021-40325: Fixed Remote Code Execution in the XMLRPC API which additionally allowed arbitrary file read and write as root (boo#1189458).

The following non-security bugs were fixed:

- Fix issues with installation module logging and validation (boo#1195918)
- Move configuration files ownership to apache (boo#1195906)
- Remove hardcoded test credentials (boo#1193673)
- Prevent log pollution (boo#1193675)
- Missing sanity check on MongoDB configuration file (boo#1193676)
- Avoid traceback when building tftp files for ppc arch system when boot_loader is not set (boo#1185679)
- Prevent some race conditions when writting tftpboot files and the destination directory is not existing (boo#1186124)
- Fix trail stripping in case of using UTF symbols (boo#1184561)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184561">SUSE bug 1184561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185679">SUSE bug 1185679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186124">SUSE bug 1186124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189458">SUSE bug 1189458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193671">SUSE bug 1193671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193673">SUSE bug 1193673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193675">SUSE bug 1193675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193676">SUSE bug 1193676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193678">SUSE bug 1193678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195906">SUSE bug 1195906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195918">SUSE bug 1195918</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40323/">CVE-2021-40323</cve>
	<cve impact="critical" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40324/">CVE-2021-40324</cve>
	<cve impact="critical" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40325/">CVE-2021-40325</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45082/">CVE-2021-45082</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-45083/">CVE-2021-45083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670407" comment="cobbler-3.1.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670408" comment="cobbler-tests-3.1.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670409" comment="cobbler-web-3.1.2-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52243" version="1" class="patch">
	<metadata>
		<title>Security update for envoy-proxy (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1167073" ref_url="https://bugzilla.suse.com/1167073" source="BUGZILLA"/>
		<reference ref_id="1173559" ref_url="https://bugzilla.suse.com/1173559" source="BUGZILLA"/>
		<reference ref_id="1180121" ref_url="https://bugzilla.suse.com/1180121" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12603" ref_url="https://www.suse.com/security/cve/CVE-2020-12603/" source="CVE"/>
		<reference ref_id="CVE-2020-12604" ref_url="https://www.suse.com/security/cve/CVE-2020-12604/" source="CVE"/>
		<reference ref_id="CVE-2020-12605" ref_url="https://www.suse.com/security/cve/CVE-2020-12605/" source="CVE"/>
		<reference ref_id="CVE-2020-35471" ref_url="https://www.suse.com/security/cve/CVE-2020-35471/" source="CVE"/>
		<reference ref_id="CVE-2020-8663" ref_url="https://www.suse.com/security/cve/CVE-2020-8663/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUFXLLYPEPLGLE3CNOENBUDET76YJXPI/" source="SUSE-SU"/>
		<description>
This update for envoy-proxy fixes the following issues:

Update to 1.14.6:

- CVE-2020-35471: Fixed a denial of service via dropped and truncated UDP datagrams (boo#1180121).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167073">SUSE bug 1167073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173559">SUSE bug 1173559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180121">SUSE bug 1180121</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12603/">CVE-2020-12603</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12604/">CVE-2020-12604</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12605/">CVE-2020-12605</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35471/">CVE-2020-35471</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8663/">CVE-2020-8663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670542" comment="envoy-proxy-1.14.6-bp153.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670543" comment="envoy-proxy-source-1.14.6-bp153.3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52244" version="1" class="patch">
	<metadata>
		<title>Security update for libdxfrw, librecad (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192936" ref_url="https://bugzilla.suse.com/1192936" source="BUGZILLA"/>
		<reference ref_id="1192937" ref_url="https://bugzilla.suse.com/1192937" source="BUGZILLA"/>
		<reference ref_id="1192938" ref_url="https://bugzilla.suse.com/1192938" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21898" ref_url="https://www.suse.com/security/cve/CVE-2021-21898/" source="CVE"/>
		<reference ref_id="CVE-2021-21899" ref_url="https://www.suse.com/security/cve/CVE-2021-21899/" source="CVE"/>
		<reference ref_id="CVE-2021-21900" ref_url="https://www.suse.com/security/cve/CVE-2021-21900/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6TWLTKRSHNPCLQL7UXQSITHNYJT5XSK5/" source="SUSE-SU"/>
		<description>
This update for libdxfrw, librecad fixes the following issues:

- Update to version 1.0.1+git.20220109:

  * fixed ambiguous error for DRW_Dimension::parseDwg()
  * fixed enless while()-loop for pre 2004 versions
  * dwgReader::readDwgObjects() stop reading after 1st error
  * dwgReader::readDwgEntities() stop reading after 1st error
  * replace ENTRY_PARSE macro with template method
  * remove unused DRW_Class::parseCode() method
  * protect vector&lt;&gt;.reserve() calls
  * Added NULL check for hatch code 93
  * Fix bounds check in DRW_LWPolyline
  * fix, check maxClassNum for valid value
  * fixed wrong 2010+ check for 64-bit size
  * Set compiler warnings on by default, because makes harder for bugs to go undetected. 	modified:   CMakeLists.txt
  * Fixed fall through and other warnings (#54)
  * fix 'Vertex ID' printout

- Update to version 1.0.1+git.20211110:

  * fixed heap use after free vulnerability CVE-2021-21900 (boo#1192938)
  * minor improvements to dwg2dxf, formatting and message output on success
  * fixed heap buffer overflow vulnerability CVE-2021-21899 (boo#1192937)
  * dwg2dxf - enable debug output of libdxfrw by command line switch
  * fixed out-of-bounds write vulnerability CVE-2021-21898 (boo#1192936)
  * fixed please note section formatting
  * updated README.md for LibreCAD_3 branch and sf.net successor
  * fixed LibreCAD 2 issue #1371, read failed with binary DXF
  * Use ununordered_map instead of map
  * manual merge changes from LibreCAD2
  * and much more

- Update to version 1.0.1+git.20200429:

  * Fix includes install dir
  * Export target as libdxfrw::libdxfrw to keep consistency with Conan packages
  * Add archive destination in install
  * Install DXFRW::dxfrw target
  * Remove duplicate target properties
  * Remove version from pkg-config file
  * Let CMake handle C++11 compiler definition
  * Change minimal required CMake version to 3.0
  * cmake: add doc target
  * README.md: fix typo
  * cmake: generate and install pkgconfig
  * cmake: add one for dwg2dxf
  * cmake: set library VERSIONs
  * cmake: use GNUInstallDirs

- Update to version 0.6.3+git.20190501:

  * Add build status and update example link
  * Add Travis-CI script
  * [#10] Fix compilation on GCC
  * Fix bugs with .dwg import of TEXT and MTEXT entities
  * This was unnecessary
  * Link libdxfrw against libstdc++
  * Return an error when the file ends prematurely
  * Add version getter
  * Fix polyline 2d/3d write
  * Initialize return buffers in GetRawChar8 et al.

- update to 2.2.0-rc3

  * major release
  * DWG imports are more reliable now
  * and a lot more of bugfixes and improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192936">SUSE bug 1192936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192937">SUSE bug 1192937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192938">SUSE bug 1192938</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21898/">CVE-2021-21898</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21899/">CVE-2021-21899</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21900/">CVE-2021-21900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670544" comment="libdxfrw-devel-1.0.1+git.20220109-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670545" comment="libdxfrw-tools-1.0.1+git.20220109-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670546" comment="libdxfrw1-1.0.1+git.20220109-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670547" comment="librecad-2.2.0~rc3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670548" comment="librecad-parts-2.2.0~rc3-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52245" version="1" class="patch">
	<metadata>
		<title>Security update for shapelib (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196236" ref_url="https://bugzilla.suse.com/1196236" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0699" ref_url="https://www.suse.com/security/cve/CVE-2022-0699/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0068-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B3VSER4WPCPULJGLJVI75SE2NKX4RQH/" source="SUSE-SU"/>
		<description>
This update for shapelib fixes the following issues:

- CVE-2022-0699: Fixed a Double-free vulnerability in contrib/shpsort.c
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196236">SUSE bug 1196236</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0699/">CVE-2022-0699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670549" comment="libshp-devel-1.5.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670550" comment="libshp2-1.5.0-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670551" comment="shapelib-1.5.0-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52246" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs-electron (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-30625" ref_url="https://www.suse.com/security/cve/CVE-2021-30625/" source="CVE"/>
		<reference ref_id="CVE-2021-30626" ref_url="https://www.suse.com/security/cve/CVE-2021-30626/" source="CVE"/>
		<reference ref_id="CVE-2021-30627" ref_url="https://www.suse.com/security/cve/CVE-2021-30627/" source="CVE"/>
		<reference ref_id="CVE-2021-30628" ref_url="https://www.suse.com/security/cve/CVE-2021-30628/" source="CVE"/>
		<reference ref_id="CVE-2021-30630" ref_url="https://www.suse.com/security/cve/CVE-2021-30630/" source="CVE"/>
		<reference ref_id="CVE-2021-30631" ref_url="https://www.suse.com/security/cve/CVE-2021-30631/" source="CVE"/>
		<reference ref_id="CVE-2021-30632" ref_url="https://www.suse.com/security/cve/CVE-2021-30632/" source="CVE"/>
		<reference ref_id="CVE-2021-30633" ref_url="https://www.suse.com/security/cve/CVE-2021-30633/" source="CVE"/>
		<reference ref_id="CVE-2021-37981" ref_url="https://www.suse.com/security/cve/CVE-2021-37981/" source="CVE"/>
		<reference ref_id="CVE-2021-37984" ref_url="https://www.suse.com/security/cve/CVE-2021-37984/" source="CVE"/>
		<reference ref_id="CVE-2021-37987" ref_url="https://www.suse.com/security/cve/CVE-2021-37987/" source="CVE"/>
		<reference ref_id="CVE-2021-37989" ref_url="https://www.suse.com/security/cve/CVE-2021-37989/" source="CVE"/>
		<reference ref_id="CVE-2021-37992" ref_url="https://www.suse.com/security/cve/CVE-2021-37992/" source="CVE"/>
		<reference ref_id="CVE-2021-37996" ref_url="https://www.suse.com/security/cve/CVE-2021-37996/" source="CVE"/>
		<reference ref_id="CVE-2021-37998" ref_url="https://www.suse.com/security/cve/CVE-2021-37998/" source="CVE"/>
		<reference ref_id="CVE-2021-38001" ref_url="https://www.suse.com/security/cve/CVE-2021-38001/" source="CVE"/>
		<reference ref_id="CVE-2021-38002" ref_url="https://www.suse.com/security/cve/CVE-2021-38002/" source="CVE"/>
		<reference ref_id="CVE-2021-38003" ref_url="https://www.suse.com/security/cve/CVE-2021-38003/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2JZKFAH5MWINMQLTSYZ2GQCLX5UGIGE/" source="SUSE-SU"/>
		<description>
This update for nodejs-electron fixes the following issues:

- Fix webpack-4 with OpenSSL 3.0

Update to version 16.0.9

* https://github.com/electron/electron/releases/tag/v16.0.9

Update to version 16.0.8

* https://github.com/electron/electron/releases/tag/v16.0.8

- Add devel package with node headers (e.g. for node-gyp)

- Update to version 16.0.7

  * https://github.com/electron/electron/releases/tag/v16.0.7

- Update to version 15.3.3

  * https://github.com/electron/electron/releases/tag/v15.3.3

- Update to version 13.6.3
  https://github.com/electron/electron/releases/tag/v13.6.3

- Update to version 13.6.2
  https://github.com/electron/electron/releases/tag/v13.6.2
- Fix for CVE-2021-37998
- Fix for CVE-2021-38001
- Fix for CVE-2021-38002
- Fix for CVE-2021-38003

- Do not build with H264

- Update to version 13.6.1
  https://github.com/electron/electron/releases/tag/v13.6.1
- Fix for CVE-2021-37981
- Fix for CVE-2021-37984
- Fix for CVE-2021-37987
- Fix for CVE-2021-37989
- Fix for CVE-2021-37992
- Fix for CVE-2021-37996

- Update to version 13.5.1
  https://github.com/electron/electron/releases/tag/v13.5.1

- Update to version 13.5.0
  https://github.com/electron/electron/releases/tag/v13.5.0
- Fix for CVE-2021-30627
- Fix for CVE-2021-30631
- Fix for CVE-2021-30632
- Fix for CVE-2021-30625
- Fix for CVE-2021-30626
- Fix for CVE-2021-30628
- Fix for CVE-2021-30630
- Fix for CVE-2021-30633

- Version 13.4.0

- Update to version 13.1.8
  * https://github.com/electron/electron/releases/tag/v13.1.8

- Update to version 13.1.7
  * https://github.com/electron/electron/releases/tag/v13.1.7

- Update to version 13.1.6
  * https://github.com/electron/electron/releases/tag/v13.1.6
  * https://github.com/electron/electron/releases/tag/v13.1.5

- Update to version 13.1.4
  * https://github.com/electron/electron/releases/tag/v13.1.4
  * https://github.com/electron/electron/releases/tag/v13.1.3

- Build with vaapi support

- Install missing vk_swiftshader_icd.json

- Update to version 13.1.2
  * https://github.com/electron/electron/releases/tag/v13.1.2
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30625/">CVE-2021-30625</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30626/">CVE-2021-30626</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30627/">CVE-2021-30627</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30628/">CVE-2021-30628</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30630/">CVE-2021-30630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-30631/">CVE-2021-30631</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30632/">CVE-2021-30632</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30633/">CVE-2021-30633</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37981/">CVE-2021-37981</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37984/">CVE-2021-37984</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37987/">CVE-2021-37987</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37989/">CVE-2021-37989</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37992/">CVE-2021-37992</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37996/">CVE-2021-37996</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37998/">CVE-2021-37998</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38001/">CVE-2021-38001</cve>
	<cve impact="moderate" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38002/">CVE-2021-38002</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38003/">CVE-2021-38003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670791" comment="nodejs-electron-16.0.9-bp153.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670792" comment="nodejs-electron-devel-16.0.9-bp153.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52247" version="1" class="patch">
	<metadata>
		<title>Security update for bitcoin (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-3195" ref_url="https://www.suse.com/security/cve/CVE-2021-3195/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQOIWU7XODRDIITDKWB45QLM5US3ATJW/" source="SUSE-SU"/>
		<description>
This update for bitcoin fixes the following issues:

Update to version 0.21.2

* P2P protocol and network code
  * use NetPermissions::HasFlag() in CConnman::Bind()
  * Rate limit the processing of rumoured addresses
* Wallet
  * Do not iterate a directory if having an error while accessing it
* RPC
  * Reset scantxoutset progress before inferring descriptors
* Build System
  * depends: update Qt 5.9 source url
  * Update Windows code signing certificate
  * Use custom MacOS code signing tool
  * Fix build with Boost 1.77.0
* Tests and QA
  * Build with --enable-werror by default, and document exceptions
  * Fix intermittent feature_taproot issue
  * Fix macOS brew install command
  * add missing ECCVerifyHandle to base_encode_decode
  * Run fuzzer task for the master branch only
* GUI
  * Do not use QClipboard::Selection on Windows and macOS.
  * Remove user input from URI error message
  * Draw 'eye' sign at the beginning of watch-only addresses
* Miscellaneous
  * Fix crash when parsing command line with -noincludeconf=0
  * util: Properly handle -noincludeconf on command line (take 2)

Update to version 0.21.1

* Consensus:
  * Speedy trial support for versionbits
  * Speedy trial activation parameters for Taproot
* P2P protocol and network code
  * allow CSubNet of non-IP networks
  * Avoid UBSan warning in ProcessMessage
* Wallet
  * Introduce DeferredSignatureChecker and have
    SignatureExtractorClass subclass it
  * Avoid requesting fee rates multiple times during coin selection
* RPC and other APIs:
  * Disallow sendtoaddress and sendmany when private keys disabled
    CVE-2021-3195

Update to version 0.21.0:

* For full details see release-notes-0.21.0.md

Update to version 0.20.1

* Mining
  * Fix GBT: Restore '!segwit' and 'csv' to 'rules' key
* P2P protocol and network code
  * Replace automatic bans with discouragement filter
* Wallet
  * Handle concurrent wallet loading
  * Minimal fix to restore conflicted transaction notifications 
* RPC and other APIs
  * Increment input value sum only once per UTXO in decodepsbt
  * psbt: Increment input value sum only once per UTXO in decodepsbt
  * psbt: Include and allow both non_witness_utxo and witness_utxo for segwit inputs
* GUI
  * Add missing QPainterPath include
  * update Qt base translations for macOS release
* Misc
  * util: Don't reference errno when pthread fails
  * Fix locking on WSL using flock instead of fcntl

Update to version 0.20.0:

* See https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-0.20.0.md

- Do not run bitcoind in daemon mode. Running it not as a
  background process makes it working properly with journald
  (instead of writing logs in /var/log).

Update to version 0.19.1:

* Wallet
  * Fix origfee return for bumpfee with feerate arg
  * Fix unique_ptr usage in boost::signals2
  * Fix issue with conflicted mempool tx in listsinceblock
  * Bug: IsUsedDestination shouldn't use key id as script id for
    ScriptHash
  * IsUsedDestination should count any known single-key address
  * Reset reused transactions cache
* RPC and other APIs
  * cli: Fix fatal leveldb error when specifying
    -blockfilterindex=basic twice
  * require second argument only for scantxoutset start action
  * zmq: Fix due to invalid argument and multiple notifiers
  * psbt: handle unspendable psbts
  * psbt: check that various indexes and amounts are within
    bounds
* GUI
  * Fix missing qRegisterMetaType for size_t
  * disable File-&gt;CreateWallet during startup
  * Fix comparison function signature
  * Fix unintialized WalletView::progressDialog
* Tests and QA
  * Appveyor improvement - text file for vcpkg package list
  * fix 'bitcoind already running' warnings on macOS
  * add missing #include to fix compiler errors
* Platform support
  * Update msvc build for Visual Studio 2019 v16.4
  * Updates to appveyor config for VS2019 and Qt5.9.8 + msvc
    project fixes
  * bug-fix macos: give free bytes to F_PREALLOCATE
* Miscellaneous
  * init: Stop indexes on shutdown after ChainStateFlushed
    callback
  * util: Add missing headers to util/fees.cpp
  * Unbreak build with Boost 1.72.0
  * scripts: Fix symbol-check &amp; security-check argument passing
  * Log to net category for exceptions in ProcessMessages
  * Update univalue subtree
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3195/">CVE-2021-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670793" comment="bitcoin-qt5-0.21.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670794" comment="bitcoin-test-0.21.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670795" comment="bitcoin-utils-0.21.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670796" comment="bitcoind-0.21.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670797" comment="libbitcoinconsensus-devel-0.21.2-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670798" comment="libbitcoinconsensus0-0.21.2-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52248" version="1" class="patch">
	<metadata>
		<title>Security update for perl-App-cpanminus (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2020-16154" ref_url="https://www.suse.com/security/cve/CVE-2020-16154/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2R4OBBVU7JBUBEWOTAIN5NEZXBGJK6O/" source="SUSE-SU"/>
		<description>
This update for perl-App-cpanminus fixes the following issues:

updated to 1.7045

see /usr/share/doc/packages/perl-App-cpanminus/Changes

Security fixes:

- [CVE-2020-16154] remove the functionality to verify CHECKSUMS signature

updated to 1.7044

see /usr/share/doc/packages/perl-App-cpanminus/Changes
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-06"/>
	<updated date="2022-03-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16154/">CVE-2020-16154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671072" comment="perl-App-cpanminus-1.7045-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52249" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196641" ref_url="https://bugzilla.suse.com/1196641" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0789" ref_url="https://www.suse.com/security/cve/CVE-2022-0789/" source="CVE"/>
		<reference ref_id="CVE-2022-0790" ref_url="https://www.suse.com/security/cve/CVE-2022-0790/" source="CVE"/>
		<reference ref_id="CVE-2022-0791" ref_url="https://www.suse.com/security/cve/CVE-2022-0791/" source="CVE"/>
		<reference ref_id="CVE-2022-0792" ref_url="https://www.suse.com/security/cve/CVE-2022-0792/" source="CVE"/>
		<reference ref_id="CVE-2022-0793" ref_url="https://www.suse.com/security/cve/CVE-2022-0793/" source="CVE"/>
		<reference ref_id="CVE-2022-0794" ref_url="https://www.suse.com/security/cve/CVE-2022-0794/" source="CVE"/>
		<reference ref_id="CVE-2022-0795" ref_url="https://www.suse.com/security/cve/CVE-2022-0795/" source="CVE"/>
		<reference ref_id="CVE-2022-0796" ref_url="https://www.suse.com/security/cve/CVE-2022-0796/" source="CVE"/>
		<reference ref_id="CVE-2022-0797" ref_url="https://www.suse.com/security/cve/CVE-2022-0797/" source="CVE"/>
		<reference ref_id="CVE-2022-0798" ref_url="https://www.suse.com/security/cve/CVE-2022-0798/" source="CVE"/>
		<reference ref_id="CVE-2022-0799" ref_url="https://www.suse.com/security/cve/CVE-2022-0799/" source="CVE"/>
		<reference ref_id="CVE-2022-0800" ref_url="https://www.suse.com/security/cve/CVE-2022-0800/" source="CVE"/>
		<reference ref_id="CVE-2022-0801" ref_url="https://www.suse.com/security/cve/CVE-2022-0801/" source="CVE"/>
		<reference ref_id="CVE-2022-0802" ref_url="https://www.suse.com/security/cve/CVE-2022-0802/" source="CVE"/>
		<reference ref_id="CVE-2022-0803" ref_url="https://www.suse.com/security/cve/CVE-2022-0803/" source="CVE"/>
		<reference ref_id="CVE-2022-0804" ref_url="https://www.suse.com/security/cve/CVE-2022-0804/" source="CVE"/>
		<reference ref_id="CVE-2022-0805" ref_url="https://www.suse.com/security/cve/CVE-2022-0805/" source="CVE"/>
		<reference ref_id="CVE-2022-0806" ref_url="https://www.suse.com/security/cve/CVE-2022-0806/" source="CVE"/>
		<reference ref_id="CVE-2022-0807" ref_url="https://www.suse.com/security/cve/CVE-2022-0807/" source="CVE"/>
		<reference ref_id="CVE-2022-0808" ref_url="https://www.suse.com/security/cve/CVE-2022-0808/" source="CVE"/>
		<reference ref_id="CVE-2022-0809" ref_url="https://www.suse.com/security/cve/CVE-2022-0809/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5453Q4VJE7C3IX6ZNB5ISXRZJI77AX3/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 99.0.4844.51 (boo#1196641)

* CVE-2022-0789: Heap buffer overflow in ANGLE
* CVE-2022-0790: Use after free in Cast UI
* CVE-2022-0791: Use after free in Omnibox
* CVE-2022-0792: Out of bounds read in ANGLE
* CVE-2022-0793: Use after free in Views
* CVE-2022-0794: Use after free in WebShare
* CVE-2022-0795: Type Confusion in Blink Layout
* CVE-2022-0796: Use after free in Media
* CVE-2022-0797: Out of bounds memory access in Mojo
* CVE-2022-0798: Use after free in MediaStream
* CVE-2022-0799: Insufficient policy enforcement in Installer
* CVE-2022-0800: Heap buffer overflow in Cast UI
* CVE-2022-0801: Inappropriate implementation in HTML parser
* CVE-2022-0802: Inappropriate implementation in Full screen mode
* CVE-2022-0803: Inappropriate implementation in Permissions
* CVE-2022-0804: Inappropriate implementation in Full screen mode
* CVE-2022-0805: Use after free in Browser Switcher
* CVE-2022-0806: Data leak in Canvas
* CVE-2022-0807: Inappropriate implementation in Autofill
* CVE-2022-0808: Use after free in Chrome OS Shell
* CVE-2022-0809: Out of bounds memory access in WebXR
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-07"/>
	<updated date="2022-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196641">SUSE bug 1196641</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0789/">CVE-2022-0789</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0790/">CVE-2022-0790</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0791/">CVE-2022-0791</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0792/">CVE-2022-0792</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0793/">CVE-2022-0793</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0794/">CVE-2022-0794</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0795/">CVE-2022-0795</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0796/">CVE-2022-0796</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0797/">CVE-2022-0797</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0798/">CVE-2022-0798</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0799/">CVE-2022-0799</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0800/">CVE-2022-0800</cve>
	<cve impact="critical" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0801/">CVE-2022-0801</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0802/">CVE-2022-0802</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0803/">CVE-2022-0803</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0804/">CVE-2022-0804</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0805/">CVE-2022-0805</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0806/">CVE-2022-0806</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0807/">CVE-2022-0807</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0808/">CVE-2022-0808</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0809/">CVE-2022-0809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671271" comment="chromedriver-99.0.4844.51-bp153.2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671272" comment="chromium-99.0.4844.51-bp153.2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52250" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-0603" ref_url="https://www.suse.com/security/cve/CVE-2022-0603/" source="CVE"/>
		<reference ref_id="CVE-2022-0604" ref_url="https://www.suse.com/security/cve/CVE-2022-0604/" source="CVE"/>
		<reference ref_id="CVE-2022-0605" ref_url="https://www.suse.com/security/cve/CVE-2022-0605/" source="CVE"/>
		<reference ref_id="CVE-2022-0606" ref_url="https://www.suse.com/security/cve/CVE-2022-0606/" source="CVE"/>
		<reference ref_id="CVE-2022-0607" ref_url="https://www.suse.com/security/cve/CVE-2022-0607/" source="CVE"/>
		<reference ref_id="CVE-2022-0608" ref_url="https://www.suse.com/security/cve/CVE-2022-0608/" source="CVE"/>
		<reference ref_id="CVE-2022-0609" ref_url="https://www.suse.com/security/cve/CVE-2022-0609/" source="CVE"/>
		<reference ref_id="CVE-2022-0610" ref_url="https://www.suse.com/security/cve/CVE-2022-0610/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7KXX2TTV5W7GPPK56SZGJJJ4MI5ONP4/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Opera was updated to 84.0.4316.21:

  - CHR-8762 Update chromium on desktop-stable-98-4316 to
    98.0.4758.102
  - DNA-97333 ‘Add a site’ label on start page tile barely visible
  - DNA-97691 Opera 84 translations
  - DNA-97767 Wrong string in FR
  - DNA-97855 Crash at
    ScopedProfileKeepAlive::~ScopedProfileKeepAlive()
  - DNA-97982 Enable #snap-upstream-implementation on all streams
- The update to chromium 98.0.4758.102 fixes following issues:
  CVE-2022-0603, CVE-2022-0604, CVE-2022-0605, CVE-2022-0606, 
  CVE-2022-0607, CVE-2022-0608, CVE-2022-0609, CVE-2022-0610
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-07"/>
	<updated date="2022-03-07"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0603/">CVE-2022-0603</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0604/">CVE-2022-0604</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0605/">CVE-2022-0605</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0606/">CVE-2022-0606</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0607/">CVE-2022-0607</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0608/">CVE-2022-0608</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0609/">CVE-2022-0609</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0610/">CVE-2022-0610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695049" comment="opera-84.0.4316.21-lp153.2.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52251" version="1" class="patch">
	<metadata>
		<title>Security update for minidlna (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1196814" ref_url="https://bugzilla.suse.com/1196814" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26505" ref_url="https://www.suse.com/security/cve/CVE-2022-26505/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXEFRXJEYR7QPAMYNWTJIYKTVX5OEQ7O/" source="SUSE-SU"/>
		<description>
This update for minidlna fixes the following issues:

minidlna was updated to version 1.3.1 (boo#1196814)

- Fixed a potential crash in SSDP request parsing.
- Fixed a configure script failure on some platforms.
- Protect against DNS rebinding attacks. (CVE-2022-26505)
- Fix an socket leakage issue on some platforms.
- Minor bug fixes.

- add 'su minidlna minidlna' to the logrotate config
- Added hardening to systemd service(s) (boo#1181400).
- Use sysusers macros to create minidlna user
- Don't hardrequire logrotate, we don't write log files anymore
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196814">SUSE bug 1196814</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26505/">CVE-2022-26505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672558" comment="minidlna-1.3.1-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52252" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1099808" ref_url="https://bugzilla.suse.com/1099808" source="BUGZILLA"/>
		<reference ref_id="1112959" ref_url="https://bugzilla.suse.com/1112959" source="BUGZILLA"/>
		<reference ref_id="1118896" ref_url="https://bugzilla.suse.com/1118896" source="BUGZILLA"/>
		<reference ref_id="1126503" ref_url="https://bugzilla.suse.com/1126503" source="BUGZILLA"/>
		<reference ref_id="1137528" ref_url="https://bugzilla.suse.com/1137528" source="BUGZILLA"/>
		<reference ref_id="1157968" ref_url="https://bugzilla.suse.com/1157968" source="BUGZILLA"/>
		<reference ref_id="1157969" ref_url="https://bugzilla.suse.com/1157969" source="BUGZILLA"/>
		<reference ref_id="1164133" ref_url="https://bugzilla.suse.com/1164133" source="BUGZILLA"/>
		<reference ref_id="1164134" ref_url="https://bugzilla.suse.com/1164134" source="BUGZILLA"/>
		<reference ref_id="1164135" ref_url="https://bugzilla.suse.com/1164135" source="BUGZILLA"/>
		<reference ref_id="1164136" ref_url="https://bugzilla.suse.com/1164136" source="BUGZILLA"/>
		<reference ref_id="1164137" ref_url="https://bugzilla.suse.com/1164137" source="BUGZILLA"/>
		<reference ref_id="1164138" ref_url="https://bugzilla.suse.com/1164138" source="BUGZILLA"/>
		<reference ref_id="1164139" ref_url="https://bugzilla.suse.com/1164139" source="BUGZILLA"/>
		<reference ref_id="1164140" ref_url="https://bugzilla.suse.com/1164140" source="BUGZILLA"/>
		<reference ref_id="1165393" ref_url="https://bugzilla.suse.com/1165393" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1167440" ref_url="https://bugzilla.suse.com/1167440" source="BUGZILLA"/>
		<reference ref_id="1167532" ref_url="https://bugzilla.suse.com/1167532" source="BUGZILLA"/>
		<reference ref_id="1167873" ref_url="https://bugzilla.suse.com/1167873" source="BUGZILLA"/>
		<reference ref_id="1171162" ref_url="https://bugzilla.suse.com/1171162" source="BUGZILLA"/>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="1174302" ref_url="https://bugzilla.suse.com/1174302" source="BUGZILLA"/>
		<reference ref_id="1180816" ref_url="https://bugzilla.suse.com/1180816" source="BUGZILLA"/>
		<reference ref_id="1180942" ref_url="https://bugzilla.suse.com/1180942" source="BUGZILLA"/>
		<reference ref_id="1181119" ref_url="https://bugzilla.suse.com/1181119" source="BUGZILLA"/>
		<reference ref_id="1181935" ref_url="https://bugzilla.suse.com/1181935" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
		<description>

Ansible was updated to 2.9.21 to fix lots of bugs and security issues.

Update to version 2.9.20, maintenance release containing numerous bugfixes.

Update to version 2.9.19 with minor changes and a few bug fixes.

Update to version 2.9.18:

* CVE-2021-20228 where default and fallback values for no_log parameters
  to modules were not previously masked. (bsc#1181935)
* CVE-2021-20178 where several parameters to the snmp_facts module were
  logged and displayed despite containing sensitive information. (bsc#1180816)
* CVE-2021-20180 where several parameters to the
  bitbucket_pipeline_variable were logged and displayed despite
  containing sensitive information. (bsc#1180942)
* CVE-2021-20191 which addresses a number of modules whose parameters
  were logged and displayed despite containing sensitive
  information. For the full list of affected modules, refer to the
  changelog linked below. (bsc#1181119)
 
Update to version 2.9.17 with minor changes and a few bug fixes.

Update to version 2.9.16 with minor changes and many bug fixes.

update to version 2.9.15 with following breaking change:

* ansible-galaxy login command has been removed

update to version 2.9.14 with many small improvements and bug fixes,
most notably:

* kubectl - connection plugin now redact kubectl_token and 
   kubectl_password in console log (CVE-2020-1753 bsc#1166389).

update to version 2.9.13 with many bug fixes, most notably:

* A security issue was addressed in the 'dnf' module, which previously
  did not check GPG signatures of packages.
* A bug in the 'cron' module was fixed. In some cases prior to this
  fix, the module would inadvertently remove cron entries.

update to version 2.9.12 with many bug fixes,
most notably the following security fixes:

* security issue - copy - Redact the value of the no_log 'content' 
  parameter in the result's invocation.module_args in check mode. 
  Previously when used with check mode and with '-vvv', the module would 
  not censor the content if a change would be made to the destination path. 
  (CVE-2020-14332 bsc#1174302)
* security issue atomic_move - change default permissions when creating 
  temporary files so they are not world readable 
  (https://github.com/ansible/ansible/issues/67794) (CVE-2020-1736 bsc#1164134)
* Fix warning for default permission change when no mode is specified. 
  Follow up to https://github.com/ansible/ansible/issues/67794. 
  (CVE-2020-1736)
* Sanitize no_log values from any response keys that might be returned 
  from the uri module (CVE-2020-14330 bsc#1174145).
* reset logging level to INFO due to CVE-2019-14846.

update to version 2.9.11 with many bug fixes

update to version 2.9.10 with many bug fixes.

- Add CVE-2020-1733_avoid_mkdir_p.patch to fix CVE-2020-1733
  (bsc#1164140)

update to version 2.9.9

* fix for a regression introduced in 2.9.8

update to version 2.9.8, maintenance release containing numerous bugfixes

update to version 2.9.7 with many bug fixes,
especially for these security issues:

- bsc#1164140 CVE-2020-1733 - insecure temporary directory when
  running become_user from become directive
- bsc#1164139 CVE-2020-1734 shell enabled by default in a pipe
  lookup plugin subprocess
- bsc#1164137 CVE-2020-1735 - path injection on dest parameter
  in fetch module
- bsc#1164134 CVE-2020-1736 atomic_move primitive sets
  permissive permissions
- bsc#1164138 CVE-2020-1737 - Extract-Zip function in win_unzip
  module does not check extracted path
- bsc#1164136 CVE-2020-1738 module package can be selected by
  the ansible facts
- bsc#1164133 CVE-2020-1739  - svn module leaks password when
  specified as a parameter
- bsc#1164135 CVE-2020-1740 - secrets readable after
  ansible-vault edit
- bsc#1165393 CVE-2020-1746 - information disclosure issue in
  ldap_attr and ldap_entry modules
- bsc#1166389 CVE-2020-1753 - kubectl connection plugin leaks
  sensitive information
- bsc#1167532 CVE-2020-10684 - code injection when using
  ansible_facts as a subkey
- bsc#1167440 CVE-2020-10685 - modules which use files
  encrypted with vault are not properly cleaned up
- bsc#1167873 CVE-2020-10691 - archive traversal vulnerability in ansible-galaxy collection install [2]

Fixed before 2.9.6, but not yet listed:
- bsc#1171162 CVE-2020-10729 two random password lookups in
  same task return same value
- bsc#1157968 CVE-2019-14904 vulnerability in solaris_zone
  module via crafted solaris zone
- bsc#1157969 CVE-2019-14905 malicious code could craft
  filename in nxos_file_copy module
- bsc#1112959 CVE-2018-16837 Information leak in 'user' module patch added
- (bsc#1137528) CVE-2019-10156: ansible: templating causing an
- bsc#1118896 CVE-2018-16876 Information disclosure in vvv+ mode with no_log on (https://github.com/ansible/ansible/pull/49569)
- Includes fix for bsc#1099808 (CVE-2018-10875) ansible.cfg is being read
  from current working directory allowing possible code execution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099808">SUSE bug 1099808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112959">SUSE bug 1112959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118896">SUSE bug 1118896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137528">SUSE bug 1137528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157968">SUSE bug 1157968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157969">SUSE bug 1157969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164133">SUSE bug 1164133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164134">SUSE bug 1164134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164135">SUSE bug 1164135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164136">SUSE bug 1164136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164137">SUSE bug 1164137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164138">SUSE bug 1164138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164139">SUSE bug 1164139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164140">SUSE bug 1164140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165393">SUSE bug 1165393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167440">SUSE bug 1167440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167532">SUSE bug 1167532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167873">SUSE bug 1167873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171162">SUSE bug 1171162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174302">SUSE bug 1174302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180816">SUSE bug 1180816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180942">SUSE bug 1180942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181119">SUSE bug 1181119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181935">SUSE bug 1181935</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673312" comment="ansible-2.9.21-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673313" comment="ansible-doc-2.9.21-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673314" comment="ansible-test-2.9.21-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52253" version="1" class="patch">
	<metadata>
		<title>Security update for weechat (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190206" ref_url="https://bugzilla.suse.com/1190206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40516" ref_url="https://www.suse.com/security/cve/CVE-2021-40516/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIN6EHDK3X2MKPRRVYID7266KDLB6SHB/" source="SUSE-SU"/>
		<description>
This update for weechat fixes the following issues:

update to 3.2.1:

* CVE-2021-40516: relay: fix crash when decoding a malformed
  websocket frame (boo#1190206)

update to 3.2

main changes:

  * use XDG directories by default (config, data, cache, runtime)
  * add support of IRC SASL mechanisms
    SCRAM-SHA-1, SCRAM-SHA-256 and SCRAM-SHA-512
  * automatically load system certificates
    without giving a hardcoded path to the file with certificates
  * add options to customize commands executed on system signals received
    (SIGHUP, SIGQUIT, SIGTERM, SIGUSR1, SIGUSR2)
  * add bar item 'tls_version' and buflist format
  * add signals 'cursor_start' and 'cursor_end'
  * add function crypto_hmac in API
  * add translated string in evaluation of expressions with 'translate:xxx'
  * add info 'weechat_daemon'
  * add Python stub for WeeChat API
  * add variables '${tg_shell_argc}' and '${tg_shell_argvN}'
    in command trigger evaluated strings
  * many bugs fixed.

for all changes, please visit:
  https://weechat.org/files/changelog/ChangeLog-3.2.html

update to 3.1

New features

  * core: add options weechat.look.hotlist_update_on_buffer_switch
    and weechat.look.read_marker_update_on_buffer_switch (issue #992, issue #993)
  * core: add option sec.crypt.passphrase_command to read passphrase from an
    external program on startup, remove option sec.crypt.passphrase_file (issue #141)
  * core: improve debug in command /eval: display more verbose debug
    with two '-d', add indentation and colors
  * core: add options 'setvar' and 'delvar' in command /buffer,
    rename option 'localvar' to 'listvar'
  * core: add buffer local variable 'completion_default_template' (evaluated)
    to override the value of option 'weechat.completion.default_template' (issue #1600)
  * core: add option 'recreate' in command /filter
  * core: add raw string in evaluation of expressions with 'raw:xxx' (issue #1611)
  * core: add evaluation of conditions in evaluation of expressions
    with 'eval_cond:xxx' (issue #1582)
  * api: add info_hashtable 'secured_data'
  * irc: add info 'irc_is_message_ignored'
  * irc: add server option 'default_chantypes',
    used when the server does not send them in message 005 (issue #1610)
  * trigger: add variable '${tg_trigger_name}' in command trigger evaluated strings (issue #1580)

- Bug fixes

  * core: fix quoted line in cursor mode (issue #1602)
  * core: fix wrong size of the new window after vertical split (issue #1612)
  * core: do not remove quotes in arguments of command /eval
    as they can be part of the evaluated expression/condition (issue #1601)
  * core: display an error when the buffer is not found with command /command -buffer
  * buflist: add option buflist.look.use_items to speed up display of buflist (issue #1613)
  * irc: add bar item 'irc_nick_prefix'
  * irc: fix separator between nick and host in bar item 'irc_nick_host'
  * irc: fix completion of commands /halfop and /dehalfop

- Documentation

  * do not build weechat-headless man page if headless binary is disabled (issue #1607)

update to 3.0.1:

  * exec: fix search of command by identifier
  * spell: fix refresh of bar item 'spell_suggest' when the input becomes empty (issue #1586)
  * spell: fix crash with IRC color codes in command line (issue #1589)

update to 3.0

New features

  * api: add optional list of colors in infos 'nick_color' and 'nick_color_name' (issue #1565)
  * api: add argument 'bytes' in function string_dyn_concat
  * api: add function string_color_code_size (issue #1547)
  * exec: add option '-oerr' to send stderr to buffer (now disabled by default) (issue #1566)
  * fset: add option fset.look.auto_refresh (issue #1553)
  * irc: add pointer to irc_nick in focus of bar item 'buffer_nicklist' (issue #1535, issue #1538)
  * irc: allow to send text on buffers with commands /allchan, /allpv and /allserv
  * irc: evaluate command executed by commands /allchan, /allpv and /allserv (issue #1536)
  * script: add option script.scripts.download_enabled (issue #1548)
  * trigger: add variable 'tg_argc' in data set by command trigger (issue #1576)
  * trigger: add variable 'tg_trigger_name' in data set by all triggers (issue #1567, issue #1568)

Bug fixes

  * core: set 'notify_level' to 3 if there is a highlight in the line (issue #1529)
  * core: do not add line with highlight and tag 'notify_none' to hotlist (issue #1529)
  * irc: remove SASL timeout message displayed by error
    after successful SASL authentication (issue #1515)
  * irc: send all channels in a single JOIN command when reconnecting to the server (issue #1551)
  * script: do not automatically download list of scripts on startup
    if the file is too old (issue #1548)
  * spell: properly skip WeeChat and IRC color codes when checking words in input (issue #1547)
  * trigger: fix recursive calls to triggers using regex (issue #1546)
  * trigger: add ${tg_tags} !!- ,notify_none, in conditions of default trigger 'beep' (issue #1529)

- Tests

  * core: add tests on GUI line functions

- Build

  * core: disable debug by default in autotools build
  * tests: fix compilation with CppUTest ≥ 4.0

- new .desktop file from weechat sources
- update to 2.9
- New features
  * core: add bar option 'color_bg_inactive': color for window bars
    in inactive window (issue #732)
  * core: add Alacritty title escape sequence support (issue #1517)
  * core: display notify level for current buffer
    with command /buffer notify (issue #1505)
  * core: count only visible nicks in bar item 'buffer_nicklist_count',
    add bar items 'buffer_nicklist_count_groups' and 'buffer_nicklist_count_all'
    (issue #1506)
  * core: set default size for input bar to 0 (automatic) (issue #1498)
  * core: add default key Alt+Enter to insert a newline (issue #1498)
  * core: add flag 'input_multiline' in buffer (issue #984, issue #1063)
  * core: add a scalable WeeChat logo (SVG) (issue #1454, issue #1456)
  * core: add base 16/32/64 encoding/decoding in evaluation of expressions
    with 'base_encode:base,xxx' and 'base_decode:base,xxx'
  * core: add case sensitive wildcard matching comparison operator (==* and !!*)
    and case sensitive/insensitive include comparison operators (==-, !!-, =-, !-)
    in evaluation of expressions
  * core: add default key Alt+Shift+N to toggle nicklist bar
  * core: add command line option '--stdout' in weechat-headless binary
    to log to stdout rather than ~/.weechat/weechat.log (issue #1475, issue #1477)
  * core: reload configuration files on SIGHUP (issue #1476)
  * api: add pointer '_bar_window' in hashtable sent to hook focus callback (issue #1450)
  * api: add info_hashtable 'focus_info' (issue #1245, issue #1257)
  * api: rename function hook_completion_get_string to completion_get_string
    and hook_completion_list_add to completion_list_add
  * api: add functions completion_new, completion_search and completion_free
  * api: add hdata 'completion_word'
  * buflist: add default key Alt+Shift+B to toggle buflist
  * buflist: add options enable/disable/toggle in command /buflist
  * buflist: evaluate option buflist.look.sort so that sort can be customized
    for each of the three buflist bar items (issue #1465)
  * irc: add support of UTF8MAPPING (issue #1528)
  * irc: display account messages in buffers (issue #1250)
  * python: add WeeChat sharedir python directory to PYTHONPATH (issue #1537)
  * relay: increase default limits for IRC backlog options
  * relay: add command 'handshake' in weechat relay protocol and nonce
    to prevent replay attacks, add options relay.network.password_hash_algo,
    relay.network.password_hash_iterations, relay.network.nonce_size (issue #1474)
  * relay: add command 'completion' in weechat relay protocol
    to perform a completion on a string at a given position (issue #1484)
  * relay: add option relay.network.auth_timeout
  * relay: update default colors for client status
  * relay: add status 'waiting_auth' in irc and weechat protocols (issue #1358)
  * trigger: evaluate arguments of command when the trigger is created (issue #1472)
- Bug fixes
  * core: fix command /window scroll_beyond_end when buffer has fewer lines
    than chat height (issue #1509)
  * core: force buffer property 'time_for_each_line' to 0 for buffers
    with free content (issue #1485)
  * core: don’t collapse consecutive newlines in lines displayed
    before the first buffer is created
  * core: don’t remove consecutive newlines when pasting text (issue #1500)
  * core: don’t collapse consecutive newlines in bar content (issue #1500)
  * core: fix WEECHAT_SHAREDIR with CMake build (issue #1461)
  * core: fix memory leak in calculation of expression on FreeBSD (issue #1469)
  * core: fix resize of a bar when its size is 0 (automatic) (issue #1470)
  * api: fix use of pointer after free in function key_unbind
  * api: replace plugin and buffer name by buffer pointer in argument 'modifier_data'
    sent to weechat_print modifier callback (issue #42)
  * buflist: add 'window' pointer in bar item evaluation only if it’s not NULL
    (if bar type is 'window')
  * exec: fix use of same task id for different tasks (issue #1491)
  * fifo: fix errors when writing in the FIFO pipe (issue #713)
  * guile: enable again /guile eval (issue #1514)
  * irc: use new default chantypes '#&amp;' when the server does not send it
  * irc: add support of optional server in info 'irc_is_nick',
    fix check of nick using UTF8MAPPING isupport value (issue #1528)
  * irc: fix add of ignore with flags in regex, display full ignore mask
    in list of ignores (issue #1518)
  * irc: do not remove spaces at the end of users messages received (issue #1513)
  * irc: fix realname delimiter color in WHO/WHOX response (issue #1497)
  * irc: reuse a buffer with wrong type 'channel'
    when a private message is received (issue #869)
  * python: fix crash when invalid UTF-8 string is in a WeeChat hashtable
    converted to a Python dict (issue #1463)
  * relay: add missing field 'notify_level' in message '_buffer_line_added' (issue #1529)
  * relay: fix slow send of data to clients when SSL is enabled
  * trigger: only return trigger’s return code
    when condition evaluates to true (issue #592)
  * trigger: fix truncated trigger command with commands /trigger input|output|recreate
  * trigger: do not hide values of options with /set command in cmd_pass trigger
- Documentation
  * add includes directory
  * merge 53 auto-generated files into 11 files
  * fix broken literal blocks in Japanese docs with Firefox (issue #1466)
- Tests
  * core: add CI with GitHub Actions, move codecov.io upload to GitHub Actions
  * core: switch to Ubuntu Bionic on Travis CI, use pylint3 to lint Python scripts
  * core: run tests on plugins only if the plugins are enabled and compiled
  * irc: add tests on IRC color and channel functions
- Build
  * javascript: disable build by default and remove Debian packaging
    of JavaScript plugin (issue #360)
  * core: make GnuTLS a required dependency
  * core: fix build with CMake 3.17.0
  * core: fix build with cygport on Cygwin
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-18"/>
	<updated date="2022-03-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190206">SUSE bug 1190206</bugzilla>
	<cve impact="low" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-40516/">CVE-2021-40516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673716" comment="weechat-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673717" comment="weechat-devel-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673718" comment="weechat-lang-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673719" comment="weechat-lua-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673720" comment="weechat-perl-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673721" comment="weechat-python-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673722" comment="weechat-ruby-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673723" comment="weechat-spell-3.2.1-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673724" comment="weechat-tcl-3.2.1-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52254" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197163" ref_url="https://bugzilla.suse.com/1197163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0971" ref_url="https://www.suse.com/security/cve/CVE-2022-0971/" source="CVE"/>
		<reference ref_id="CVE-2022-0972" ref_url="https://www.suse.com/security/cve/CVE-2022-0972/" source="CVE"/>
		<reference ref_id="CVE-2022-0973" ref_url="https://www.suse.com/security/cve/CVE-2022-0973/" source="CVE"/>
		<reference ref_id="CVE-2022-0974" ref_url="https://www.suse.com/security/cve/CVE-2022-0974/" source="CVE"/>
		<reference ref_id="CVE-2022-0975" ref_url="https://www.suse.com/security/cve/CVE-2022-0975/" source="CVE"/>
		<reference ref_id="CVE-2022-0976" ref_url="https://www.suse.com/security/cve/CVE-2022-0976/" source="CVE"/>
		<reference ref_id="CVE-2022-0977" ref_url="https://www.suse.com/security/cve/CVE-2022-0977/" source="CVE"/>
		<reference ref_id="CVE-2022-0978" ref_url="https://www.suse.com/security/cve/CVE-2022-0978/" source="CVE"/>
		<reference ref_id="CVE-2022-0979" ref_url="https://www.suse.com/security/cve/CVE-2022-0979/" source="CVE"/>
		<reference ref_id="CVE-2022-0980" ref_url="https://www.suse.com/security/cve/CVE-2022-0980/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0085-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4Z4LLOJXXGP4GXUSNG4BEUSYEPI3FBAL/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to version 99.0.4844.74 (boo#1197163)

* CVE-2022-0971: Use after free in Blink Layout
* CVE-2022-0972: Use after free in Extensions
* CVE-2022-0973: Use after free in Safe Browsing
* CVE-2022-0974: Use after free in Splitscreen
* CVE-2022-0975: Use after free in ANGLE
* CVE-2022-0976: Heap buffer overflow in GPU
* CVE-2022-0977: Use after free in Browser UI
* CVE-2022-0978: Use after free in ANGLE
* CVE-2022-0979: Use after free in Safe Browsing
* CVE-2022-0980: Use after free in New Tab Page
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-20"/>
	<updated date="2022-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197163">SUSE bug 1197163</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0971/">CVE-2022-0971</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0972/">CVE-2022-0972</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0973/">CVE-2022-0973</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0974/">CVE-2022-0974</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0975/">CVE-2022-0975</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0976/">CVE-2022-0976</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0977/">CVE-2022-0977</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0978/">CVE-2022-0978</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0979/">CVE-2022-0979</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0980/">CVE-2022-0980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673868" comment="chromedriver-99.0.4844.74-bp153.2.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673869" comment="chromium-99.0.4844.74-bp153.2.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52255" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197552" ref_url="https://bugzilla.suse.com/1197552" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1096" ref_url="https://www.suse.com/security/cve/CVE-2022-1096/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQX4BVMFKUTV6DOPDTL26H5DQJJFUPXZ/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 99.0.4844.84:

* CVE-2022-1096: Type Confusion in V8 (boo#1197552)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-28"/>
	<updated date="2022-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197552">SUSE bug 1197552</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1096/">CVE-2022-1096</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677063" comment="chromedriver-99.0.4844.84-bp153.2.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677064" comment="chromium-99.0.4844.84-bp153.2.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52256" version="1" class="patch">
	<metadata>
		<title>Security update for openSUSE-build-key (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197293" ref_url="https://bugzilla.suse.com/1197293" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJSGTBRZ3S3KQFEVL2JFOGU46SU7RRE3/" source="SUSE-SU"/>
		<description>
This update for openSUSE-build-key fixes the following issues:

- Disabled the SLE11 build key as SLE11 is EOL now, also key was
  1024bit RSA (removed gpg-pubkey-307e3d54-5aaa90a5.asc)
  Also obsolete old build key.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197293">SUSE bug 1197293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677851" comment="openSUSE-build-key-1.0-lp153.4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52257" version="1" class="patch">
	<metadata>
		<title>Security update for fish3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197139" ref_url="https://bugzilla.suse.com/1197139" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20001" ref_url="https://www.suse.com/security/cve/CVE-2022-20001/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRNZU5M6WR5TPTNDAIMOYXCJP2ONI4FB/" source="SUSE-SU"/>
		<description>

This update for fish3 fixes the following issues:

- CVE-2022-20001: Navigating to a compromised git repository may lead to arbitrary code execution (bsc#1197139)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197139">SUSE bug 1197139</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20001/">CVE-2022-20001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677852" comment="fish3-3.3.1-bp153.2.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677853" comment="fish3-devel-3.3.1-bp153.2.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52258" version="1" class="patch">
	<metadata>
		<title>Security update for icingaweb2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196911" ref_url="https://bugzilla.suse.com/1196911" source="BUGZILLA"/>
		<reference ref_id="1196913" ref_url="https://bugzilla.suse.com/1196913" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24714" ref_url="https://www.suse.com/security/cve/CVE-2022-24714/" source="CVE"/>
		<reference ref_id="CVE-2022-24715" ref_url="https://www.suse.com/security/cve/CVE-2022-24715/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZ3SOPUOKOBQCVEVEU6YPIZRX5AB77WX/" source="SUSE-SU"/>
		<description>
This update for icingaweb2 fixes the following issues:

icingaweb2 was updated to 2.8.6

This is a security release.

* Security Fixes

- CVE-2022-24715: SSH resources allow arbitrary code execution for authenticated users (GHSA-v9mv-h52f-7g63 boo#1196911)
- CVE-2022-24714: Unwanted disclosure of hosts and related data, linked to decommissioned services (GHSA-qcmg-vr56-x9wf boo#1196913)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196911">SUSE bug 1196911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196913">SUSE bug 1196913</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24714/">CVE-2022-24714</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24715/">CVE-2022-24715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677854" comment="icingacli-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677855" comment="icingaweb2-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677856" comment="icingaweb2-common-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677857" comment="icingaweb2-vendor-HTMLPurifier-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677858" comment="icingaweb2-vendor-JShrink-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677859" comment="icingaweb2-vendor-Parsedown-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677860" comment="icingaweb2-vendor-dompdf-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677861" comment="icingaweb2-vendor-lessphp-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677862" comment="icingaweb2-vendor-zf1-2.8.6-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677863" comment="php-Icinga-2.8.6-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52259" version="1" class="patch">
	<metadata>
		<title>Security update for nextcloud (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196905" ref_url="https://bugzilla.suse.com/1196905" source="BUGZILLA"/>
		<reference ref_id="1196908" ref_url="https://bugzilla.suse.com/1196908" source="BUGZILLA"/>
		<reference ref_id="1196952" ref_url="https://bugzilla.suse.com/1196952" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41239" ref_url="https://www.suse.com/security/cve/CVE-2021-41239/" source="CVE"/>
		<reference ref_id="CVE-2021-41241" ref_url="https://www.suse.com/security/cve/CVE-2021-41241/" source="CVE"/>
		<reference ref_id="CVE-2021-41741" ref_url="https://www.suse.com/security/cve/CVE-2021-41741/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZTHEQMMIKP2RX3EBMXDQAOIVUPMCDFB/" source="SUSE-SU"/>
		<description>
This update for nextcloud fixes the following issues:

nextcloud was updated to 21.0.9:

- CVE-2021-41239 (CWE-200): user enumeration setting not obeyed in User Status API (boo#1196905)
- CVE-2021-41241 (CWE-863): groupfolders advanced permissions is not obeyed for subfolders (boo#1196908)
- CVE-2021-41741 (CWE-400): High memory usage for generating preview of broken image (boo#1196952)
- For more changes see https://nextcloud.com/changelog/#21-0-9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196905">SUSE bug 1196905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196908">SUSE bug 1196908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196952">SUSE bug 1196952</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41239/">CVE-2021-41239</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41241/">CVE-2021-41241</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41741/">CVE-2021-41741</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677864" comment="nextcloud-21.0.9-bp153.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677865" comment="nextcloud-apache-21.0.9-bp153.2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52260" version="1" class="patch">
	<metadata>
		<title>Security update for minetest (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1193141" ref_url="https://bugzilla.suse.com/1193141" source="BUGZILLA"/>
		<reference ref_id="1202423" ref_url="https://bugzilla.suse.com/1202423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-35978" ref_url="https://www.suse.com/security/cve/CVE-2022-35978/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0001-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BEL53A6YRA752TFXGECQDT4XJ7UK6P5/" source="SUSE-SU"/>
		<description>
This update for minetest fixes the following issues:

Update to version 5.6.0

  * Fix CVE-2022-35978 ( boo#1202423 ): Mod scripts can escape sandbox in single player mode
  * `name` in game.conf is deprecated for the game title, use `title` instead
  * Add depth sorting for node faces
  * Various bug fixes
  * Full changes: https://dev.minetest.net/Changelog#5.5.0_.E2.86.92_5.6.0

- Introduced mbranch-protection=none CXX flag to resolve boo#1193141
  (aarch64).

Update to version 5.5.0 &amp; 5.5.1:

  * Full log for version 5.5.0: https://dev.minetest.net/Changelog#5.4.0_.E2.86.92_5.5.0
  * This release switches from Irrlicht to our own fork called IrrlichtMt.
  * Full log for version 5.5.1: https://dev.minetest.net/Changelog#5.5.0_.E2.86.92_5.5.1
  * This is a maintenance release based on 5.5.0, it contains bugfixes but no new features.

- Added hardening to systemd service(s) (boo#1181400). 

- Update to version 5.4.1:
  * This is a maintenance release based on 5.4.0,
    it contains bugfixes but no new features.

- Update to version 5.4.0
  * Full log: https://dev.minetest.net/Changelog#5.3.0_.E2.86.92_5.4.0
  * Removed support for bumpmapping, generated normal maps
    and parallax occlusion
  * By default, the crosshair will now change to an 'X' when
    pointing to objects
  * Prevent players accessing inventories of other players
  * Prevent interacting with items out of the hotbar
  * Prevent players from being able to modify ItemStack meta

- Update to version 5.3.0. 
  (see https://dev.minetest.net/Changelog#5.2.0_.E2.86.92_5.3.0)
  * Formspec improvements, including a scrolling GUI element
  * Performance improvements to the Server and API
  * Many bug fixes and small features
- Now requires desktop-file-utils version &gt;= 0.25.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193141">SUSE bug 1193141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202423">SUSE bug 1202423</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35978/">CVE-2022-35978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730894" comment="minetest-5.6.0-bp154.2.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730895" comment="minetest-data-5.6.0-bp154.2.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730896" comment="minetest-lang-5.6.0-bp154.2.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730897" comment="minetestserver-5.6.0-bp154.2.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52261" version="1" class="patch">
	<metadata>
		<title>Security update for libheimdal (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870/" source="CVE"/>
		<reference ref_id="CVE-2021-3671" ref_url="https://www.suse.com/security/cve/CVE-2021-3671/" source="CVE"/>
		<reference ref_id="CVE-2021-44758" ref_url="https://www.suse.com/security/cve/CVE-2021-44758/" source="CVE"/>
		<reference ref_id="CVE-2022-3437" ref_url="https://www.suse.com/security/cve/CVE-2022-3437/" source="CVE"/>
		<reference ref_id="CVE-2022-41916" ref_url="https://www.suse.com/security/cve/CVE-2022-41916/" source="CVE"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<reference ref_id="CVE-2022-44640" ref_url="https://www.suse.com/security/cve/CVE-2022-44640/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCW7YX6RG5EAFBRU3SLTXKN5NWVODXTH/" source="SUSE-SU"/>
		<description>
This update for libheimdal fixes the following issues:

Update to version 7.8.0

- CVE-2022-42898 PAC parse integer overflows
- CVE-2022-3437 Overflows and non-constant time leaks in DES{,3} and arcfour
- CVE-2022-41916 Fix Unicode normalization read of 1 bytes past end of array
- CVE-2021-44758 A null pointer de-reference DoS in SPNEGO acceptors
- CVE-2021-3671 A null pointer de-reference when handling missing sname in TGS-REQ
- CVE-2022-44640 Heimdal KDC: invalid free in ASN.1 codec
- CVE-2019-14870: Validate client attributes in protocol-transition
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-16"/>
	<updated date="2023-01-16"/>
	<severity>Important</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3671/">CVE-2021-3671</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44758/">CVE-2021-44758</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-3437/">CVE-2022-3437</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41916/">CVE-2022-41916</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44640/">CVE-2022-44640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009732611" comment="libasn1-8-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732612" comment="libgssapi3-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732613" comment="libhcrypto4-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732614" comment="libhdb9-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732615" comment="libheimbase1-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732616" comment="libheimdal-devel-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732617" comment="libheimedit0-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732618" comment="libheimntlm0-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732619" comment="libhx509-5-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732620" comment="libkadm5clnt7-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732621" comment="libkadm5srv8-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732622" comment="libkafs0-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732623" comment="libkdc2-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732624" comment="libkrb5-26-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732625" comment="libotp0-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732626" comment="libroken18-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732627" comment="libsl0-7.8.0-bp153.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732628" comment="libwind0-7.8.0-bp153.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52262" version="1" class="patch">
	<metadata>
		<title>Security update for tor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1207110" ref_url="https://bugzilla.suse.com/1207110" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2ARZWMPD2KIDUMHPCZV4554WN7MZQTZ/" source="SUSE-SU"/>
		<description>
This update for tor fixes the following issues:

tor 0.4.7.13:

* fix SafeSocks option to avoid DNS leaks (boo#1207110, TROVE-2022-002)
* improve congestion control
* fix relay channel handling

tor 0.4.7.12:

* new key for moria1
* new metrics are exported on the MetricsPort for the congestion control subsystem
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-16"/>
	<updated date="2023-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207110">SUSE bug 1207110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732629" comment="tor-0.4.7.13-bp153.2.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52263" version="1" class="patch">
	<metadata>
		<title>Security update for multimon-ng (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1206542" ref_url="https://bugzilla.suse.com/1206542" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36619" ref_url="https://www.suse.com/security/cve/CVE-2020-36619/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L32DS6DZG7UVWWLTPMQBMKONSINMACOF/" source="SUSE-SU"/>
		<description>
This update for multimon-ng fixes the following issues:

- Update to new upstream release 1.2.0
  * Separated FLEX and FLEX_NEXT. The former is identical to 1.1.9,
    while FLEX_NEXT gained new features, as well as known
    regressions. (See #168)
  * Fix CVE-2020-36619 (boo#1206542)
  * Several smaller POCSAG fixes.
  * Fix for opening large wav files with improper header.

- Update to new upstream release 1.1.9
  * multimon-ng now has a man page, let's try to keep it updated.
  * FLEX: Changes to group messages and delimiters.
  * FMS: Fixed a problem with the direction of telegrams.
  * POCSAG: Support for the Slovenian charset.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-01-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206542">SUSE bug 1206542</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36619/">CVE-2020-36619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730948" comment="multimon-ng-1.2.0-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52264" version="1" class="patch">
	<metadata>
		<title>Security update for pkgconf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1207394" ref_url="https://bugzilla.suse.com/1207394" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24056" ref_url="https://www.suse.com/security/cve/CVE-2023-24056/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZWDULBZHRPQHGUXNQ3HNNHRJ3YXPJ7QH/" source="SUSE-SU"/>
		<description>
This update for pkgconf fixes the following issues:

- CVE-2023-24056: FIxed variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c (boo#1207394).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-09"/>
	<updated date="2023-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207394">SUSE bug 1207394</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24056/">CVE-2023-24056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009738549" comment="libpkgconf-devel-1.5.3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738550" comment="libpkgconf3-1.5.3-bp153.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738551" comment="pkgconf-1.5.3-bp153.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52265" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185713" ref_url="https://bugzilla.suse.com/1185713" source="BUGZILLA"/>
		<reference ref_id="1186608" ref_url="https://bugzilla.suse.com/1186608" source="BUGZILLA"/>
		<reference ref_id="1186611" ref_url="https://bugzilla.suse.com/1186611" source="BUGZILLA"/>
		<reference ref_id="1193240" ref_url="https://bugzilla.suse.com/1193240" source="BUGZILLA"/>
		<reference ref_id="1194115" ref_url="https://bugzilla.suse.com/1194115" source="BUGZILLA"/>
		<reference ref_id="1194116" ref_url="https://bugzilla.suse.com/1194116" source="BUGZILLA"/>
		<reference ref_id="1194117" ref_url="https://bugzilla.suse.com/1194117" source="BUGZILLA"/>
		<reference ref_id="1195086" ref_url="https://bugzilla.suse.com/1195086" source="BUGZILLA"/>
		<reference ref_id="1195088" ref_url="https://bugzilla.suse.com/1195088" source="BUGZILLA"/>
		<reference ref_id="1198297" ref_url="https://bugzilla.suse.com/1198297" source="BUGZILLA"/>
		<reference ref_id="1198398" ref_url="https://bugzilla.suse.com/1198398" source="BUGZILLA"/>
		<reference ref_id="1198399" ref_url="https://bugzilla.suse.com/1198399" source="BUGZILLA"/>
		<reference ref_id="1201923" ref_url="https://bugzilla.suse.com/1201923" source="BUGZILLA"/>
		<reference ref_id="1203793" ref_url="https://bugzilla.suse.com/1203793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32052" ref_url="https://www.suse.com/security/cve/CVE-2021-32052/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="CVE-2021-44420" ref_url="https://www.suse.com/security/cve/CVE-2021-44420/" source="CVE"/>
		<reference ref_id="CVE-2021-45115" ref_url="https://www.suse.com/security/cve/CVE-2021-45115/" source="CVE"/>
		<reference ref_id="CVE-2021-45116" ref_url="https://www.suse.com/security/cve/CVE-2021-45116/" source="CVE"/>
		<reference ref_id="CVE-2021-45452" ref_url="https://www.suse.com/security/cve/CVE-2021-45452/" source="CVE"/>
		<reference ref_id="CVE-2022-22818" ref_url="https://www.suse.com/security/cve/CVE-2022-22818/" source="CVE"/>
		<reference ref_id="CVE-2022-23833" ref_url="https://www.suse.com/security/cve/CVE-2022-23833/" source="CVE"/>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2022-28347" ref_url="https://www.suse.com/security/cve/CVE-2022-28347/" source="CVE"/>
		<reference ref_id="CVE-2022-36359" ref_url="https://www.suse.com/security/cve/CVE-2022-36359/" source="CVE"/>
		<reference ref_id="CVE-2022-41323" ref_url="https://www.suse.com/security/cve/CVE-2022-41323/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHF5IZKTZ2T4T4QQYZMUFHW422X3WCU6/" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2022-41323: Fixed potential denial-of-service vulnerability in internationalized URLs (boo#1203793)
- CVE-2022-36359: Fixed a potential reflected file download vulnerability in FileResponse (boo#1201923)

- Update from 2.2.12 to 2.2.28 (boo#1198297)

  * Many CVEs fixes (check https://github.com/django/django/blob/main/docs/releases/)

  2.2.28:

  - CVE-2022-28346: Fixed potential SQL injection in QuerySet.annotate(), aggregate(), and extra() (bsc#1198398)
  - CVE-2022-28347: Fixed potential SQL injection via QuerySet.explain(**options) (bsc#1198399)

  2.2.27:

  - CVE-2022-22818: Fixed possible XSS via ``{% debug %}`` template tag (bsc#1195086)
  - CVE-2022-23833: Fixed denial-of-service possibility in file uploads (bsc#1195088)

  2.2.26: 

  - CVE-2021-45115: Denial-of-service possibility in ``UserAttributeSimilarityValidator`` (bsc#1194115)
  - CVE-2021-45116: Potential information disclosure in ``dictsort`` template filter (bsc#1194117)
  - CVE-2021-45452: Potential directory-traversal via ``Storage.save()`` (bsc#)

  2.2.25:

  - CVE-2021-44420: Potential bypass of an upstream access control based on URL paths (bsc#1193240)

  2.2.24:

  - CVE-2021-33203: Potential directory traversal via ``admindocs``
  - CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses

  2.2.23:

  - regression fix

  2.2.22:

  - CVE-2021-32052: Header injection possibility since ``URLValidator`` accepted newlines in input on Python 3.9.5+

		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185713">SUSE bug 1185713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186608">SUSE bug 1186608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186611">SUSE bug 1186611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193240">SUSE bug 1193240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194115">SUSE bug 1194115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194116">SUSE bug 1194116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194117">SUSE bug 1194117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195086">SUSE bug 1195086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195088">SUSE bug 1195088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198297">SUSE bug 1198297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198398">SUSE bug 1198398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198399">SUSE bug 1198399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201923">SUSE bug 1201923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203793">SUSE bug 1203793</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32052/">CVE-2021-32052</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44420/">CVE-2021-44420</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45115/">CVE-2021-45115</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45116/">CVE-2021-45116</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-45452/">CVE-2021-45452</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22818/">CVE-2022-22818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23833/">CVE-2022-23833</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28347/">CVE-2022-28347</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-36359/">CVE-2022-36359</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41323/">CVE-2022-41323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730949" comment="python3-Django-2.2.28-bp153.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52266" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185895" ref_url="https://bugzilla.suse.com/1185895" source="BUGZILLA"/>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32490" ref_url="https://www.suse.com/security/cve/CVE-2021-32490/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-32490 [bsc#1185895]: Out of bounds write in function DJVU:filter_bv() via crafted djvu file
- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185895">SUSE bug 1185895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32490/">CVE-2021-32490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497897" comment="djvulibre-3.5.27-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620119" comment="djvulibre-doc-3.5.27-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495781" comment="libdjvulibre-devel-3.5.27-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495782" comment="libdjvulibre21-3.5.27-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52267" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1651-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GTVENJITKPNO2UD2FTT2WK4SNRNME6PL/" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493926" comment="graphviz-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493927" comment="graphviz-devel-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625252" comment="graphviz-doc-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501511" comment="graphviz-gd-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497898" comment="graphviz-gnome-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625253" comment="graphviz-guile-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625254" comment="graphviz-gvedit-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625255" comment="graphviz-java-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625256" comment="graphviz-lua-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496550" comment="graphviz-perl-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625257" comment="graphviz-php-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493928" comment="graphviz-plugins-core-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501512" comment="graphviz-python-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625258" comment="graphviz-ruby-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625259" comment="graphviz-smyrna-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499860" comment="graphviz-tcl-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493929" comment="libgraphviz6-2.40.1-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52268" version="1" class="patch">
	<metadata>
		<title>Security update for fribidi (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1156260" ref_url="https://bugzilla.suse.com/1156260" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NAPU2NE5KWWCW4NS2FW7DLCSMM442VDM/" source="SUSE-SU"/>
		<description>
This update for fribidi fixes the following issues:

Security issues fixed:

- CVE-2019-18397: Avoid buffer overflow. (bsc#1156260)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493935" comment="fribidi-1.0.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493936" comment="fribidi-devel-1.0.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493937" comment="libfribidi0-1.0.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495783" comment="libfribidi0-32bit-1.0.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52269" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184153" ref_url="https://bugzilla.suse.com/1184153" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24994" ref_url="https://www.suse.com/security/cve/CVE-2020-24994/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYONME5VDBAM5FSXOCS4YFULDEBSTWDL/" source="SUSE-SU"/>
		<description>
This update for libass fixes the following issues:

- CVE-2020-24994: Fixed a stack overflow in the parse_tag (bsc#1184153).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184153">SUSE bug 1184153</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24994/">CVE-2020-24994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495784" comment="libass-devel-0.14.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495785" comment="libass9-0.14.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620163" comment="libass9-32bit-0.14.0-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52270" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1666-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMIXIE2QCSQNEBZOFYWWIWYINHYQA6A5/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

- Update to OpenJDK 8u292 build 10 with OpenJ9 0.26.0 virtual machine.
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009620165" comment="java-1_8_0-openj9-1.8.0.292-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620166" comment="java-1_8_0-openj9-accessibility-1.8.0.292-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620167" comment="java-1_8_0-openj9-demo-1.8.0.292-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620168" comment="java-1_8_0-openj9-devel-1.8.0.292-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620169" comment="java-1_8_0-openj9-headless-1.8.0.292-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620170" comment="java-1_8_0-openj9-javadoc-1.8.0.292-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620171" comment="java-1_8_0-openj9-src-1.8.0.292-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52271" version="1" class="patch">
	<metadata>
		<title>Security update for libu2f-host (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1124781" ref_url="https://bugzilla.suse.com/1124781" source="BUGZILLA"/>
		<reference ref_id="1128140" ref_url="https://bugzilla.suse.com/1128140" source="BUGZILLA"/>
		<reference ref_id="1184648" ref_url="https://bugzilla.suse.com/1184648" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20340" ref_url="https://www.suse.com/security/cve/CVE-2018-20340/" source="CVE"/>
		<reference ref_id="CVE-2019-9578" ref_url="https://www.suse.com/security/cve/CVE-2019-9578/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6NOI7O3I53SFL6DVLZH5VWF6EO4AISA/" source="SUSE-SU"/>
		<description>
This update for libu2f-host fixes the following issues:

This update ships the u2f-host package (jsc#ECO-3687 bsc#1184648)

Version 1.1.10 (released 2019-05-15)

- Add new devices to udev rules.
- Fix a potentially uninitialized buffer (CVE-2019-9578, bsc#1128140)

Version 1.1.9 (released 2019-03-06)

- Fix CID copying from the init response, which broke compatibility with
some devices.

Version 1.1.8 (released 2019-03-05)

- Add udev rules
- Drop 70-old-u2f.rules and use 70-u2f.rules for everything
- Use a random nonce for setting up CID to prevent fingerprinting
- CVE-2019-9578: Parse the response to init in a more stable way to prevent
  leakage of uninitialized stack memory back to the device (bsc#1128140).

Version 1.1.7 (released 2019-01-08)

- Fix for trusting length from device in device init.
- Fix for buffer overflow when receiving data from device. (YSA-2019-01,
  CVE-2018-20340, bsc#1124781)
- Add udev rules for some new devices.

- Add udev rule for Feitian ePass FIDO 
  - Add a timeout to the register and authenticate actions.		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124781">SUSE bug 1124781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128140">SUSE bug 1128140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184648">SUSE bug 1184648</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20340/">CVE-2018-20340</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9578/">CVE-2019-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493942" comment="libu2f-host-devel-1.1.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625260" comment="libu2f-host-doc-1.1.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493943" comment="libu2f-host0-1.1.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493944" comment="u2f-host-1.1.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52272" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-5_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185715" ref_url="https://bugzilla.suse.com/1185715" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XD33DNJH2JNZCIIOPYYFAACZRFEZSRKI/" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-5_1 fixes the following issues:

- CVE-2021-22885: Fixed possible information disclosure / unintended method execution in Action Pack (bsc#1185715).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185715">SUSE bug 1185715</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501513" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625261" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52273" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185013" ref_url="https://bugzilla.suse.com/1185013" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q55SWQQWWFLTPBSSMBPSJOSFUIHSY6H6/" source="SUSE-SU"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3504: hivex: missing bounds check within hivex_open() (bsc#1185013)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185013">SUSE bug 1185013</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625262" comment="hivex-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493945" comment="hivex-devel-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620211" comment="hivex-lang-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493946" comment="libhivex0-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496552" comment="ocaml-hivex-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496553" comment="ocaml-hivex-devel-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493947" comment="perl-Win-Hivex-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625263" comment="python-hivex-1.3.14-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52274" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBJDOC5P7XCTDSENHRNLNXYRSHFI4CYU/" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
- Allow partial chain verification [jsc#SLE-17956]
  * Have intermediate certificates in the trust store be treated
    as trust-anchors, in the same way as self-signed root CA
    certificates are. This allows users to verify servers using
    the intermediate cert only, instead of needing the whole chain.
  * Set FLAG_TRUSTED_FIRST unconditionally.
  * Do not check partial chains with CRL check.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493948" comment="curl-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625264" comment="curl-mini-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493949" comment="libcurl-devel-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620220" comment="libcurl-devel-32bit-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625265" comment="libcurl-mini-devel-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493950" comment="libcurl4-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493951" comment="libcurl4-32bit-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625266" comment="libcurl4-mini-7.66.0-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52275" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKAEBUWSUHMGHAQQGZGGJL4XNRQXGZEZ/" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- Upgrade to version 13.3:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-19"/>
	<updated date="2021-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493960" comment="postgresql13-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499880" comment="postgresql13-contrib-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499881" comment="postgresql13-devel-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499882" comment="postgresql13-docs-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625268" comment="postgresql13-llvmjit-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499883" comment="postgresql13-plperl-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499884" comment="postgresql13-plpython-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499885" comment="postgresql13-pltcl-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499886" comment="postgresql13-server-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499887" comment="postgresql13-server-devel-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497901" comment="postgresql13-test-13.3-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52276" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTGWJY2VML3YAAFAOOYJAQP5SZ4X6XWG/" source="SUSE-SU"/>
		<description>
This update for python-httplib2 fixes the following issues:

- Update to version 0.19.0 (bsc#1182053).
- CVE-2021-21240: Fixed regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed unescaped part of uri where an attacker could change request headers and body (bsc#1182053).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497902" comment="python2-httplib2-0.19.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493961" comment="python3-httplib2-0.19.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52277" version="1" class="patch">
	<metadata>
		<title>Security update for nginx (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186126" ref_url="https://bugzilla.suse.com/1186126" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKTQ3CIPQ5OLG2MFTQXWBRDD66NWPZBF/" source="SUSE-SU"/>
		<description>
This update for nginx fixes the following issues:

- CVE-2021-23017: nginx DNS resolver off-by-one heap write (bsc#1186126)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186126">SUSE bug 1186126</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500096" comment="nginx-1.19.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500097" comment="nginx-source-1.19.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620366" comment="vim-plugin-nginx-1.19.8-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52278" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1819-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DDS7NLC6D7UVP25OVRWIRK6Y44WZKCU/" source="SUSE-SU"/>
		<description>
This update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly fixes the following issues:

gstreamer was updated to version 1.16.3 (bsc#1181255):

- delay creation of threadpools
- bin: Fix `deep-element-removed` log message
- buffer: fix meta sequence number fallback on rpi
- bufferlist: foreach: always remove as parent if buffer is changed
- bus: Make setting/replacing/clearing the sync handler thread-safe
- elementfactory: Fix missing features in case a feature moves to another filename
- element: When removing a ghost pad also unset its target
- meta: intern registered impl string
- registry: Use a toolchain-specific registry file on Windows
- systemclock: Invalid internal time calculation causes non-increasing clock time on Windows
- value: don't write to `const char *`
- value: Fix segfault comparing empty GValueArrays
- Revert floating enforcing
- aggregator: fix iteration direction in skip_buffers
- sparsefile: fix possible crash when seeking
- baseparse: cache fix
- baseparse: fix memory leak when subclass skips whole input buffer
- baseparse: Set the private duration before posting a duration-changed message
- basetransform: allow not passthrough if generate_output is implemented
- identity: Fix a minor leak using meta_str
- queue: protect against lost wakeups for iterm_del condition
- queue2: Avoid races when posting buffering messages
- queue2: Fix missing/dropped buffering messages at startup
- identity: Unblock condition variable on FLUSH_START
- check: Use `g_thread_yield()` instead of `g_usleep(1)`
- tests: use cpu_family for arch checks
- gst-launch: Follow up to missing `s/g_print/gst_print/g`
- gst-inspect: Add define guard for `g_log_writer_supports_color()`
- gst-launch: go back down to `GST_STATE_NULL` in one step.
- device-monitor: list hidden providers before listing devices
- autotools build fixes for GNU make 4.3

gstreamer-plugins-good was updated to version 1.16.3 (bsc#1181255):

- deinterlace: on-the-fly renegotiation
- flacenc: Pass audio info from set_format() to query_total_samples() explicitly
- flacparse: fix broken reordering of flac metadata
- jack: Use jack_free(3) to release ports
- jpegdec: check buffer size before dereferencing
- pulse: fix discovery of newly added devices
- qtdemux fuzzing fixes
- qtdemux: Add 'mp3 ' fourcc that VLC seems to produce now
- qtdemux: Specify REDIRECT information in error message
- rtpbin: fix shutdown crash in rtpbin
- rtpsession: rename RTCP thread
- rtpvp8pay, rtpvp9pay: fix caps leak in set_caps()
- rtpjpegdepay: outputs framed jpeg
- rtpjitterbuffer: Properly free internal packets queue in finalize()
- rtspsrc: Don't return TRUE for unhandled query
- rtspsrc: Avoid stack overflow recursing waiting for response
- rtspsrc: Use the correct type for storing the max-rtcp-rtp-time-diff property
- rtspsrc: Error out when failling to receive message response
- rtspsrc: Fix for segmentation fault when handling set/get_parameter requests
- speex: Fix crash on Windows caused by cross-CRT issue
- speexdec: Crash when stopping the pipeline
- splitmuxsrc: Properly stop the loop if no part reader is present
- use gst_element_class_set_metadata when passing dynamic strings
- v4l2videodec: Increase internal bitstream pool size
- v4l2: fix crash when handling unsupported video format
- videocrop: allow properties to be animated by GstController
- videomixer: Don't leak peer caps
- vp8enc/vp8enc: set 1 for the default value of VP8E_SET_STATIC_THRESHOLD
- wavenc: Fix writing of the channel mask with &gt;2 channels

gstreamer-plugins-bad was updated to version 1.16.3 (bsc#1181255):

- amcvideodec: fix sync meta copying not taking a reference
- audiobuffersplit: Perform discont tracking on running time
- audiobuffersplit: Specify in the template caps that only interleaved audio is supported
- audiobuffersplit: Unset DISCONT flag if not discontinuous
- autoconvert: Fix lock-less exchange or free condition
- autoconvert: fix compiler warnings with g_atomic on recent GLib versions
- avfvideosrc: element requests camera permissions even with capture-screen property is true
- codecparsers: h264parser: guard against ref_pic_markings overflow
- dtlsconnection: Avoid segmentation fault when no srtp capabilities are negotiated
- dtls/connection: fix EOF handling with openssl 1.1.1e
- fdkaacdec: add support for mpegversion=2
- hls: Check nettle version to ensure AES128 support
- ipcpipeline: Rework compiler checks
- interlace: Increment phase_index before checking if we're at the end of the phase
- lv2: Make it build with -fno-common
- h264parser: Do not allocate too large size of memory for registered user data SEI
- ladspa: fix unbounded integer properties
- modplug: avoid division by zero
- msdkdec: Fix GstMsdkContext leak
- msdkenc: fix leaks on windows
- musepackdec: Don't fail all queries if no sample rate is known yet
- openslessink: Allow openslessink to handle 48kHz streams.
- opencv: allow compilation against 4.2.x
- proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc
- vulkan: Drop use of VK_RESULT_BEGIN_RANGE
- wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset
- wasapi: Fix possible deadlock while downwards state change
- waylandsink: Clear window when pipeline is stopped
- webrtc: Support non-trickle ICE candidates in the SDP
- webrtc: Unmap all non-binary buffers received via the datachannel
- meson: build with neon 0.31
- Drop upstream fixed patch: gstreamer-h264parser-fix-overflow.patch

- h264parser: guard against ref_pic_markings overflow
  (bsc#1181255 CVE-2021-3185)

- Disable the kate/libtiger plugin.  Kate streams for karaoke are not
  used anymore, and the source tarball for libtiger is no longer
  available upstream. (jsc#SLE-13843)

gstreamer-plugins-ugly was updated to version 1.16.3 (bsc#1181255):

+ x264enc: corrected em_data value in CEA-708 CC SEI message

gstreamer-plugins-base was updated to version 1.16.3 (bsc#1181255):

- audioaggregator: Check all downstream allowed caps structures if they support the upstream rate
- audioaggregator: Fix negotiation with downstream if there is no peer yet
- audioencoder: fix segment event leak
- discoverer: Fix caps handling in `pad-added` signal handler
- discoverer: Start discovering next URI from right thread
- fft: Update our kiss fft version, fixes thread-safety and concurrency issues and misc other things
- gl: numerous memory fixes (use-after-free, leaks, missing NULL-ify)
- gl/display/egl: ensure debug category is initialized
- gstglwindow_x11: fix resize
- pbutils: Add latest H.264 level values
- rtpbuffer: fix header extension length validation
- video: Fix NV12_64Z32 number of component
- video-format: RGB16/15 are not 16 bit per component but only 5.333 and 5
- video: fix top/bottom field flags
- videodecoder: don't copy interlace-mode from reference state
- appsrc/appsink: Make setting/replacing callbacks thread-safe
- compositor: Fix checkerboard filling for BGRx/RGBx and UYVY/YUY2/YVYU
- decodebin3: only force streams-selected seqnum after a select-streams
- glupload: Fix fallback from direct dmabuf to dmabuf upload method
- glvideomixer: perform `_get_highest_precision()` on the GL thread
- libvisual: use `gst_element_class_set_metadata()` when passing dynamic strings
- oggstream: Workaround for broken PAR in VP8 BOS
- subparse: accept WebVTT timestamps without an hour component
- playbin: Handle error message with redirection indication
- textrender: Fix AYUV output.
- typefind: Consider MPEG-PS PSM to be a PES type
- uridecodebin3: default to non-0 buffer-size and buffer-duration, otherwise it could potentially cause big memory allocations over time
- videoaggregator: Don't configure NULL chroma-site/colorimetry
- videorate/videoscale/audioresample: Ensure that the caps returned from...
- build: Replace bashisms in configure for Wayland and GLES3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493962" comment="gstreamer-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497903" comment="gstreamer-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494282" comment="gstreamer-devel-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625269" comment="gstreamer-doc-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493963" comment="gstreamer-lang-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493964" comment="gstreamer-plugins-base-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620380" comment="gstreamer-plugins-base-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494283" comment="gstreamer-plugins-base-devel-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620383" comment="gstreamer-plugins-base-devel-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625270" comment="gstreamer-plugins-base-doc-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493965" comment="gstreamer-plugins-base-lang-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493966" comment="gstreamer-plugins-good-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620387" comment="gstreamer-plugins-good-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625271" comment="gstreamer-plugins-good-doc-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625272" comment="gstreamer-plugins-good-extra-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620391" comment="gstreamer-plugins-good-extra-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625273" comment="gstreamer-plugins-good-gtk-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625274" comment="gstreamer-plugins-good-jack-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620395" comment="gstreamer-plugins-good-jack-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493967" comment="gstreamer-plugins-good-lang-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625275" comment="gstreamer-plugins-good-qtqml-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625276" comment="gstreamer-plugins-ugly-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620399" comment="gstreamer-plugins-ugly-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625277" comment="gstreamer-plugins-ugly-doc-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509390" comment="gstreamer-plugins-ugly-lang-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494284" comment="gstreamer-utils-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493968" comment="libgstallocators-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620407" comment="libgstallocators-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493969" comment="libgstapp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620410" comment="libgstapp-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493970" comment="libgstaudio-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497904" comment="libgstaudio-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493971" comment="libgstfft-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620424" comment="libgstfft-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493972" comment="libgstgl-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620427" comment="libgstgl-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493973" comment="libgstpbutils-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620439" comment="libgstpbutils-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493975" comment="libgstreamer-1_0-0-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497905" comment="libgstreamer-1_0-0-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493976" comment="libgstriff-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620450" comment="libgstriff-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493977" comment="libgstrtp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620453" comment="libgstrtp-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493978" comment="libgstrtsp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620456" comment="libgstrtsp-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493979" comment="libgstsdp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620462" comment="libgstsdp-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493980" comment="libgsttag-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497906" comment="libgsttag-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493981" comment="libgstvideo-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497907" comment="libgstvideo-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493982" comment="typelib-1_0-Gst-1_0-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494285" comment="typelib-1_0-GstAllocators-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494286" comment="typelib-1_0-GstApp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494287" comment="typelib-1_0-GstAudio-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494288" comment="typelib-1_0-GstGL-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494289" comment="typelib-1_0-GstPbutils-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494290" comment="typelib-1_0-GstRtp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494291" comment="typelib-1_0-GstRtsp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494292" comment="typelib-1_0-GstSdp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494293" comment="typelib-1_0-GstTag-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494294" comment="typelib-1_0-GstVideo-1_0-1.16.3-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52279" version="1" class="patch">
	<metadata>
		<title>Security update for lz4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185438" ref_url="https://bugzilla.suse.com/1185438" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MA4LQPPDXUEKHDKVDM24RJVHSV2EC67P/" source="SUSE-SU"/>
		<description>
This update for lz4 fixes the following issues:

- CVE-2021-3520: Fixed memory corruption due to an integer overflow bug caused by memmove argument (bsc#1185438).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185438">SUSE bug 1185438</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494295" comment="liblz4-1-1.9.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494296" comment="liblz4-1-32bit-1.9.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494297" comment="liblz4-devel-1.9.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494298" comment="lz4-1.9.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52280" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183453" ref_url="https://bugzilla.suse.com/1183453" source="BUGZILLA"/>
		<reference ref_id="1185073" ref_url="https://bugzilla.suse.com/1185073" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSDG2HIUJDFCATG54EOVCAT5D4AVXXKE/" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:


- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- Switched from /var/run to /run (bsc#1185073)
- Hardening: Compiled binary with PIE flags to make it position independent
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183453">SUSE bug 1183453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185073">SUSE bug 1185073</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500098" comment="bind-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500099" comment="bind-chrootenv-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494299" comment="bind-devel-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500100" comment="bind-doc-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494300" comment="bind-utils-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494301" comment="libbind9-1600-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494302" comment="libdns1605-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494303" comment="libirs-devel-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494304" comment="libirs1601-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494305" comment="libisc1606-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494306" comment="libisccc1600-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494307" comment="libisccfg1600-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494308" comment="libns1604-9.16.6-22.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494309" comment="python3-bind-9.16.6-22.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52281" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185619" ref_url="https://bugzilla.suse.com/1185619" source="BUGZILLA"/>
		<reference ref_id="1186020" ref_url="https://bugzilla.suse.com/1186020" source="BUGZILLA"/>
		<reference ref_id="1186021" ref_url="https://bugzilla.suse.com/1186021" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3509" ref_url="https://www.suse.com/security/cve/CVE-2021-3509/" source="CVE"/>
		<reference ref_id="CVE-2021-3524" ref_url="https://www.suse.com/security/cve/CVE-2021-3524/" source="CVE"/>
		<reference ref_id="CVE-2021-3531" ref_url="https://www.suse.com/security/cve/CVE-2021-3531/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD76XLAQUNHRCX53LARPKA7IODR5MCPO/" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- Update to 15.2.12-83-g528da226523:
- (CVE-2021-3509) fix cookie injection issue (bsc#1186021)
- (CVE-2021-3531) RGWSwiftWebsiteHandler::is_web_dir checks empty subdir_name (bsc#1186020)
- (CVE-2021-3524) sanitize \r in s3 CORSConfiguration’s ExposeHeader (bsc#1185619)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185619">SUSE bug 1185619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186020">SUSE bug 1186020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186021">SUSE bug 1186021</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3509/">CVE-2021-3509</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3524/">CVE-2021-3524</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3531/">CVE-2021-3531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009620511" comment="ceph-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620512" comment="ceph-base-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493983" comment="ceph-common-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620513" comment="ceph-fuse-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620514" comment="ceph-grafana-dashboards-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620515" comment="ceph-immutable-object-cache-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620516" comment="ceph-mds-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620517" comment="ceph-mgr-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620518" comment="ceph-mgr-cephadm-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620519" comment="ceph-mgr-dashboard-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620520" comment="ceph-mgr-diskprediction-cloud-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620521" comment="ceph-mgr-diskprediction-local-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620522" comment="ceph-mgr-k8sevents-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620523" comment="ceph-mgr-modules-core-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620524" comment="ceph-mgr-rook-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620525" comment="ceph-mon-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620526" comment="ceph-osd-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620527" comment="ceph-prometheus-alerts-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620528" comment="ceph-radosgw-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620529" comment="ceph-test-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601179" comment="cephadm-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620530" comment="cephfs-shell-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493984" comment="libcephfs-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493985" comment="libcephfs2-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493986" comment="librados-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493987" comment="librados2-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493988" comment="libradospp-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493989" comment="librbd-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493990" comment="librbd1-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493991" comment="librgw-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493992" comment="librgw2-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493993" comment="python3-ceph-argparse-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493994" comment="python3-ceph-common-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493995" comment="python3-cephfs-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493996" comment="python3-rados-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493997" comment="python3-rbd-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493998" comment="python3-rgw-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493999" comment="rados-objclass-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620531" comment="rbd-fuse-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620532" comment="rbd-mirror-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494000" comment="rbd-nbd-15.2.12.83+g528da226523-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52282" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184372" ref_url="https://bugzilla.suse.com/1184372" source="BUGZILLA"/>
		<reference ref_id="1184373" ref_url="https://bugzilla.suse.com/1184373" source="BUGZILLA"/>
		<reference ref_id="1184374" ref_url="https://bugzilla.suse.com/1184374" source="BUGZILLA"/>
		<reference ref_id="1184375" ref_url="https://bugzilla.suse.com/1184375" source="BUGZILLA"/>
		<reference ref_id="1184376" ref_url="https://bugzilla.suse.com/1184376" source="BUGZILLA"/>
		<reference ref_id="1184377" ref_url="https://bugzilla.suse.com/1184377" source="BUGZILLA"/>
		<reference ref_id="1184378" ref_url="https://bugzilla.suse.com/1184378" source="BUGZILLA"/>
		<reference ref_id="1184379" ref_url="https://bugzilla.suse.com/1184379" source="BUGZILLA"/>
		<reference ref_id="1184380" ref_url="https://bugzilla.suse.com/1184380" source="BUGZILLA"/>
		<reference ref_id="1184796" ref_url="https://bugzilla.suse.com/1184796" source="BUGZILLA"/>
		<reference ref_id="1184797" ref_url="https://bugzilla.suse.com/1184797" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21341" ref_url="https://www.suse.com/security/cve/CVE-2021-21341/" source="CVE"/>
		<reference ref_id="CVE-2021-21342" ref_url="https://www.suse.com/security/cve/CVE-2021-21342/" source="CVE"/>
		<reference ref_id="CVE-2021-21343" ref_url="https://www.suse.com/security/cve/CVE-2021-21343/" source="CVE"/>
		<reference ref_id="CVE-2021-21344" ref_url="https://www.suse.com/security/cve/CVE-2021-21344/" source="CVE"/>
		<reference ref_id="CVE-2021-21345" ref_url="https://www.suse.com/security/cve/CVE-2021-21345/" source="CVE"/>
		<reference ref_id="CVE-2021-21346" ref_url="https://www.suse.com/security/cve/CVE-2021-21346/" source="CVE"/>
		<reference ref_id="CVE-2021-21347" ref_url="https://www.suse.com/security/cve/CVE-2021-21347/" source="CVE"/>
		<reference ref_id="CVE-2021-21348" ref_url="https://www.suse.com/security/cve/CVE-2021-21348/" source="CVE"/>
		<reference ref_id="CVE-2021-21349" ref_url="https://www.suse.com/security/cve/CVE-2021-21349/" source="CVE"/>
		<reference ref_id="CVE-2021-21350" ref_url="https://www.suse.com/security/cve/CVE-2021-21350/" source="CVE"/>
		<reference ref_id="CVE-2021-21351" ref_url="https://www.suse.com/security/cve/CVE-2021-21351/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:

- Upgrade to 1.4.16
- CVE-2021-21351: remote attacker to load and execute arbitrary code (bsc#1184796)
- CVE-2021-21349: SSRF can lead to a remote attacker to request data from internal resources (bsc#1184797)
- CVE-2021-21350: arbitrary code execution (bsc#1184380)
- CVE-2021-21348: remote attacker could cause denial of service by consuming maximum CPU time (bsc#1184374)
- CVE-2021-21347: remote attacker to load and execute arbitrary code from a remote host (bsc#1184378)
- CVE-2021-21344: remote attacker could load and execute arbitrary code from a remote host (bsc#1184375)
- CVE-2021-21342: server-side forgery (bsc#1184379)
- CVE-2021-21341: remote attacker could cause a denial of service by allocating 100% CPU time (bsc#1184377)
- CVE-2021-21346: remote attacker could load and execute arbitrary code (bsc#1184373)
- CVE-2021-21345: remote attacker with sufficient rights could execute commands (bsc#1184372)
- CVE-2021-21343: replace or inject objects, that result in the deletion of files on the local host (bsc#1184376)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184372">SUSE bug 1184372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184373">SUSE bug 1184373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184374">SUSE bug 1184374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184375">SUSE bug 1184375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184376">SUSE bug 1184376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184377">SUSE bug 1184377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184378">SUSE bug 1184378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184379">SUSE bug 1184379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184380">SUSE bug 1184380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184796">SUSE bug 1184796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184797">SUSE bug 1184797</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21341/">CVE-2021-21341</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21342/">CVE-2021-21342</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21343/">CVE-2021-21343</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21344/">CVE-2021-21344</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21345/">CVE-2021-21345</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21346/">CVE-2021-21346</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21347/">CVE-2021-21347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21348/">CVE-2021-21348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21349/">CVE-2021-21349</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21350/">CVE-2021-21350</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21351/">CVE-2021-21351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496554" comment="xstream-1.4.16-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620562" comment="xstream-benchmark-1.4.16-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620563" comment="xstream-javadoc-1.4.16-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620564" comment="xstream-parent-1.4.16-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52283" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THX5XKYZAL23HUQMVLFS3L572S4DHQUX/" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494008" comment="dhcp-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494009" comment="dhcp-client-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494010" comment="dhcp-devel-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625278" comment="dhcp-doc-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499890" comment="dhcp-relay-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499891" comment="dhcp-server-4.3.6.P1-6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52284" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NCYKG2YTUVFTW5R7DJWWWJGLDWU7XE5/" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494011" comment="libpolkit0-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620572" comment="libpolkit0-32bit-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494012" comment="polkit-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494013" comment="polkit-devel-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620576" comment="polkit-doc-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494014" comment="typelib-1_0-Polkit-1_0-0.116-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52285" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180827" ref_url="https://bugzilla.suse.com/1180827" source="BUGZILLA"/>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAJ7F7M4LLALLHLSQR7PD7HCTVHGAFMX/" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827)
- Update avahi-daemon-check-dns.sh from Debian. Our previous version relied on ifconfig, route, and init.d.
- Add sudo to requires: used to drop privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625279" comment="python-avahi-0.6.32-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625280" comment="python-avahi-gtk-0.6.32-5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52286" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185086" ref_url="https://bugzilla.suse.com/1185086" source="BUGZILLA"/>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186198" ref_url="https://bugzilla.suse.com/1186198" source="BUGZILLA"/>
		<reference ref_id="1186199" ref_url="https://bugzilla.suse.com/1186199" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29950" ref_url="https://www.suse.com/security/cve/CVE-2021-29950/" source="CVE"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29956" ref_url="https://www.suse.com/security/cve/CVE-2021-29956/" source="CVE"/>
		<reference ref_id="CVE-2021-29957" ref_url="https://www.suse.com/security/cve/CVE-2021-29957/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FGBREHMZI3UK2I6TGJZ75S4VSJHXVNF/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 78.10.2
- CVE-2021-29957: Fixed partial protection of inline OpenPGP message not indicated (bsc#1186198).
- CVE-2021-29956: Fixed Thunderbird stored OpenPGP secret keys without master password protection (bsc#1186199).
- CVE-2021-29951: Fixed Thunderbird Maintenance Service could have been started or stopped by domain users (bsc#1185633).
- CVE-2021-29950: Fixed logic issue potentially leaves key material unlocked (bsc#1185086).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185086">SUSE bug 1185086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186198">SUSE bug 1186198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186199">SUSE bug 1186199</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29950/">CVE-2021-29950</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29956/">CVE-2021-29956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29957/">CVE-2021-29957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625281" comment="MozillaThunderbird-78.10.2-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625282" comment="MozillaThunderbird-translations-common-78.10.2-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625283" comment="MozillaThunderbird-translations-other-78.10.2-8.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52287" version="1" class="patch">
	<metadata>
		<title>Security update for python-py (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1184505" ref_url="https://bugzilla.suse.com/1184505" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5MZ7NDWQ2PACIOK5L2D7CNODUCJCARI/" source="SUSE-SU"/>
		<description>
This update for python-py fixes the following issues:

- CVE-2020-29651: Fixed regular expression denial of service in svnwc.py (bsc#1179805, bsc#1184505).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184505">SUSE bug 1184505</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498299" comment="python2-py-1.8.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494015" comment="python3-py-1.8.1-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52288" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185688" ref_url="https://bugzilla.suse.com/1185688" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2020-36328: Fixed heap-based buffer overflow in WebPDecode*Into functions (bsc#1185688).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185688">SUSE bug 1185688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009504861" comment="libwebp6-0.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497908" comment="libwebp6-32bit-0.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009504862" comment="libwebpdecoder2-0.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620676" comment="libwebpdecoder2-32bit-0.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009504864" comment="libwebpextras0-0.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620682" comment="libwebpextras0-32bit-0.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009504865" comment="libwebpmux2-0.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620685" comment="libwebpmux2-32bit-0.5.0-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52289" version="1" class="patch">
	<metadata>
		<title>Security update for umoci (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184147" ref_url="https://bugzilla.suse.com/1184147" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1863-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32XRLICOS7YBFMQSQOIJWZLGKXA56ZCP/" source="SUSE-SU"/>
		<description>
This update for umoci fixes the following issues:

Update to v0.4.7 (bsc#1184147).

- CVE-2021-29136: Fixed overwriting of host files via malicious layer (bsc#1184147).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184147">SUSE bug 1184147</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494421" comment="umoci-0.4.7-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52290" version="1" class="patch">
	<metadata>
		<title>Security update for snakeyaml (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1159488" ref_url="https://bugzilla.suse.com/1159488" source="BUGZILLA"/>
		<reference ref_id="1186088" ref_url="https://bugzilla.suse.com/1186088" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18640" ref_url="https://www.suse.com/security/cve/CVE-2017-18640/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FQSQDG6EG5IGZXIQVLQHFSBMALXOT6L6/" source="SUSE-SU"/>
		<description>
This update for snakeyaml fixes the following issues:

- Upgrade to 1.28
- CVE-2017-18640: The Alias feature allows entity expansion during a load operation (bsc#1159488, bsc#1186088)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159488">SUSE bug 1159488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186088">SUSE bug 1186088</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18640/">CVE-2017-18640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496555" comment="snakeyaml-1.28-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620688" comment="snakeyaml-javadoc-1.28-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52291" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-09"/>
	<updated date="2021-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495810" comment="MozillaFirefox-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625284" comment="MozillaFirefox-branding-upstream-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625285" comment="MozillaFirefox-buildsymbols-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495811" comment="MozillaFirefox-devel-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495812" comment="MozillaFirefox-translations-common-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495813" comment="MozillaFirefox-translations-other-78.11.0-8.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52292" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42BXAKC6WUYJZ65BBT2CMMJRVQFPVQI3/" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: pam_radius: buffer overflow in password field (bsc#1163933)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499918" comment="pam_radius-1.4.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620767" comment="pam_radius-32bit-1.4.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52293" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1897-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TE4MZKP3FOYVRFOKL6QQUC77PHP2K76/" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494024" comment="libX11-6-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494025" comment="libX11-6-32bit-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494026" comment="libX11-data-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494027" comment="libX11-devel-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620772" comment="libX11-devel-32bit-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494028" comment="libX11-xcb1-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494029" comment="libX11-xcb1-32bit-1.6.5-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52294" version="1" class="patch">
	<metadata>
		<title>Security update for libopenmpt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186663" ref_url="https://bugzilla.suse.com/1186663" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:1914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KSE7XFTNSSNEOWC7CY5BJTMT7YMJ54W/" source="SUSE-SU"/>
		<description>
This update for libopenmpt fixes the following issues:

Various bugfix and stability issues were fixed, some of those
might have security impact.

libopenmpt was updated to 0.3.28:

* Fixed excessive memory consumption with malformed files in
  various formats.

Changes in 0.3.27:

* AMS: Avoid allocating excessive amount of memory for compressed
  song message in malformed files.
* S3M: Some samples were imported with a too high sample rate if
  module was saved with Scream Tracker 3.

Changes in 0.3.26:

* DMF: Improve import of finetune effect with parameters larger
  than +/-15.

Changes in 0.3.25:

* AMS: An upper bound for uncompressed sample size is now
  established to avoid memory exhaustion from malformed files.
* MO3: Avoid certain ModPlug hacks from being fixed up twice,
  which could lead to e.g. very narrow pan swing range for old
  OpenMPT IT files saved with a recent MO3 encoder version.
* IMF: Instrument sample mapping was off by one octave, notable
  in the guitar part of Astaris by Karsten Koch.
* PLM: Percentage offset (Mxx) was slightly off.

Changes in 0.3.24:

* PP20: The first few bytes of some files were not decompressed
  properly, making some files unplayable (depending on the
  original format).

Changes in 0.3.23:

* IT: Global volume slides with both nibbles set preferred the
  “slide up” nibble over the “slide down” nibble in old OpenMPT
  versions, unlike other slides. Such old files are now imported
  correctly again.
* IT: Fixed an edge case where, if the filter hit full cutoff /
  no resonance on the first tick of a row where a new delayed
  note would be triggered, the filter would be disabled even
  though it should stay active. Fixes trace.it by maddie.
* XM: Out-of-range arpeggio clamping behaviour broke in OpenMPT
  1.23.05.00. The arpeggios in Binary World by Dakota now play
  correctly again.
* S3M: Support old-style sample pre-amp value in very early
  S3M files.
* S3M: Only force-enable fast slides for files ST 3.00.
  Previously, any S3M file made with an ST3 version older than
  3.20 enabled them.
* M15: Improve tracker detection heuristics to never assume
  SoundTracker 2.0 if there is a huge number of Dxx commands,
  as that is a definite hint that they should be treated as
  volume slides. Fixes Monty On The Run by Master Blaster.

Changes in 0.3.22:

* IT: Disable retrigger with short notes quirk for modules saved
  with Chibi Tracker, as it does not implement that quirk.
* MOD: Fix early song ending due to ProTracker pattern jump quirk
  (EEx + Dxx on same row) if infinite looping is disabled.
  Fixes Haunted Tracks.mod by Triace.
* MOD: Vibrato type “ramp down” was upside down.

Changes in 0.3.21:

* IT: Vibrato was too fast in Old Effects mode since
  libopenmpt 0.3.
* XM: Treat 8bitbubsy’s FT2 clone exactly like Fasttracker 2 with
  respect to compatibility and playback flags. For example,
  FT2 Pan Law was not applied.
* DMF: Some files had a wrong tempo since libopenmpt
  0.2.5705-beta15.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-09"/>
	<updated date="2021-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186663">SUSE bug 1186663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495814" comment="libmodplug-devel-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495815" comment="libmodplug1-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620863" comment="libmodplug1-32bit-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495816" comment="libopenmpt-devel-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495817" comment="libopenmpt0-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620867" comment="libopenmpt0-32bit-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495818" comment="libopenmpt_modplug1-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620870" comment="libopenmpt_modplug1-32bit-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625286" comment="openmpt123-0.3.28-2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52295" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AR6HBOC5J6QPVBH5GMPTQIK63SAT3C5S/" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack bypasses all existing protection mechanisms. (bsc#1186015)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494030" comment="libxml2-2-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494031" comment="libxml2-2-32bit-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494032" comment="libxml2-devel-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620889" comment="libxml2-devel-32bit-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620891" comment="libxml2-doc-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494033" comment="libxml2-tools-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498300" comment="python2-libxml2-python-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494034" comment="python3-libxml2-python-2.9.7-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52296" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)
    See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

    See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

    See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

  - CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

    See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494035" comment="ucode-intel-20210525-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52297" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1175144" ref_url="https://bugzilla.suse.com/1175144" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176681" ref_url="https://bugzilla.suse.com/1176681" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179484" ref_url="https://bugzilla.suse.com/1179484" source="BUGZILLA"/>
		<reference ref_id="1179686" ref_url="https://bugzilla.suse.com/1179686" source="BUGZILLA"/>
		<reference ref_id="1181103" ref_url="https://bugzilla.suse.com/1181103" source="BUGZILLA"/>
		<reference ref_id="1182282" ref_url="https://bugzilla.suse.com/1182282" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="1183373" ref_url="https://bugzilla.suse.com/1183373" source="BUGZILLA"/>
		<reference ref_id="1186290" ref_url="https://bugzilla.suse.com/1186290" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-17380" ref_url="https://www.suse.com/security/cve/CVE-2020-17380/" source="CVE"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20263" ref_url="https://www.suse.com/security/cve/CVE-2021-20263/" source="CVE"/>
		<reference ref_id="CVE-2021-3409" ref_url="https://www.suse.com/security/cve/CVE-2021-3409/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Switch method of splitting off hw-s390x-virtio-gpu-ccw.so as a module to what was accepted upstream (bsc#1181103)
- Fix OOB access in sdhci interface (CVE-2020-17380, bsc#1175144, CVE-2020-25085, bsc#1176681, CVE-2021-3409, bsc#1182282)
- Fix potential privilege escalation in virtiofsd tool (CVE-2021-20263, bsc#1183373)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix heap overflow in MSIx emulation (CVE-2020-27821, bsc#1179686)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- QEMU BIOS fails to read stage2 loader on s390x (bsc#1186290)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2020-29129, bsc#1179484, CVE-2021-3419, bsc#1182975)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175144">SUSE bug 1175144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176681">SUSE bug 1176681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179686">SUSE bug 1179686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181103">SUSE bug 1181103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183373">SUSE bug 1183373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186290">SUSE bug 1186290</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17380/">CVE-2020-17380</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20263/">CVE-2021-20263</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3409/">CVE-2021-3409</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500101" comment="qemu-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625287" comment="qemu-arm-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625288" comment="qemu-audio-alsa-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625289" comment="qemu-audio-pa-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625290" comment="qemu-audio-spice-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500106" comment="qemu-block-curl-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625291" comment="qemu-block-dmg-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625292" comment="qemu-block-gluster-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500107" comment="qemu-block-iscsi-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625293" comment="qemu-block-nfs-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500108" comment="qemu-block-rbd-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500109" comment="qemu-block-ssh-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500110" comment="qemu-chardev-baum-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625294" comment="qemu-chardev-spice-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625295" comment="qemu-extra-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500112" comment="qemu-guest-agent-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625296" comment="qemu-hw-display-qxl-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625297" comment="qemu-hw-display-virtio-gpu-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625298" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625299" comment="qemu-hw-display-virtio-vga-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625300" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625301" comment="qemu-hw-usb-redirect-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625302" comment="qemu-hw-usb-smartcard-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500119" comment="qemu-ipxe-1.0.0+-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625303" comment="qemu-ivshmem-tools-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500120" comment="qemu-ksm-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500121" comment="qemu-kvm-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500122" comment="qemu-lang-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009620964" comment="qemu-microvm-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625304" comment="qemu-ppc-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625305" comment="qemu-s390x-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500125" comment="qemu-seabios-1.14.0_0_g155821a-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500126" comment="qemu-sgabios-8-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500127" comment="qemu-skiboot-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494310" comment="qemu-tools-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500128" comment="qemu-ui-curses-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625306" comment="qemu-ui-gtk-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625307" comment="qemu-ui-opengl-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625308" comment="qemu-ui-spice-app-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625309" comment="qemu-ui-spice-core-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500133" comment="qemu-vgabios-1.14.0_0_g155821a-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625310" comment="qemu-vhost-user-gpu-5.2.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625311" comment="qemu-x86-5.2.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52298" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4FJJNOEZPW7IPJGLCW6LJNTZX7JZBBT/" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497909" comment="djvulibre-3.5.27-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621028" comment="djvulibre-doc-3.5.27-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495819" comment="libdjvulibre-devel-3.5.27-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495820" comment="libdjvulibre21-3.5.27-11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52299" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="1186674" ref_url="https://bugzilla.suse.com/1186674" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1951-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSSCTPCNB3RDCWJ6DOALIIRKDXUAVGPB/" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Check if dpkgnotify is executable (bsc#1186674)
- Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028)
- Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028)
- Fix issue parsing errors in ansiblegate state module
- Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607)
- transactional_update: detect recursion in the executor
- Add subpackage `salt-transactional-update` (jsc#SLE-18033)
- Remove duplicate directories
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186674">SUSE bug 1186674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494312" comment="python3-salt-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494313" comment="salt-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500135" comment="salt-api-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494314" comment="salt-bash-completion-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500136" comment="salt-cloud-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494315" comment="salt-doc-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500137" comment="salt-fish-completion-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500138" comment="salt-master-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494316" comment="salt-minion-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500139" comment="salt-proxy-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500140" comment="salt-ssh-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500141" comment="salt-standalone-formulas-configuration-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500142" comment="salt-syndic-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500182" comment="salt-transactional-update-3002.2-8.41.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494317" comment="salt-zsh-completion-3002.2-8.41.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52300" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker, runc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1168481" ref_url="https://bugzilla.suse.com/1168481" source="BUGZILLA"/>
		<reference ref_id="1175081" ref_url="https://bugzilla.suse.com/1175081" source="BUGZILLA"/>
		<reference ref_id="1175821" ref_url="https://bugzilla.suse.com/1175821" source="BUGZILLA"/>
		<reference ref_id="1181594" ref_url="https://bugzilla.suse.com/1181594" source="BUGZILLA"/>
		<reference ref_id="1181641" ref_url="https://bugzilla.suse.com/1181641" source="BUGZILLA"/>
		<reference ref_id="1181677" ref_url="https://bugzilla.suse.com/1181677" source="BUGZILLA"/>
		<reference ref_id="1181730" ref_url="https://bugzilla.suse.com/1181730" source="BUGZILLA"/>
		<reference ref_id="1181732" ref_url="https://bugzilla.suse.com/1181732" source="BUGZILLA"/>
		<reference ref_id="1181749" ref_url="https://bugzilla.suse.com/1181749" source="BUGZILLA"/>
		<reference ref_id="1182451" ref_url="https://bugzilla.suse.com/1182451" source="BUGZILLA"/>
		<reference ref_id="1182476" ref_url="https://bugzilla.suse.com/1182476" source="BUGZILLA"/>
		<reference ref_id="1182947" ref_url="https://bugzilla.suse.com/1182947" source="BUGZILLA"/>
		<reference ref_id="1183024" ref_url="https://bugzilla.suse.com/1183024" source="BUGZILLA"/>
		<reference ref_id="1183855" ref_url="https://bugzilla.suse.com/1183855" source="BUGZILLA"/>
		<reference ref_id="1184768" ref_url="https://bugzilla.suse.com/1184768" source="BUGZILLA"/>
		<reference ref_id="1184962" ref_url="https://bugzilla.suse.com/1184962" source="BUGZILLA"/>
		<reference ref_id="1185405" ref_url="https://bugzilla.suse.com/1185405" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284/" source="CVE"/>
		<reference ref_id="CVE-2021-21285" ref_url="https://www.suse.com/security/cve/CVE-2021-21285/" source="CVE"/>
		<reference ref_id="CVE-2021-21334" ref_url="https://www.suse.com/security/cve/CVE-2021-21334/" source="CVE"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
		<description>
This update for containerd, docker, runc fixes the following issues:

Docker was updated to 20.10.6-ce (bsc#1184768, bsc#1182947, bsc#1181594)

* Switch version to use -ce suffix rather than _ce to avoid confusing other
  tools (bsc#1182476).
* CVE-2021-21284: Fixed a potential privilege escalation when the root user in 
  the remapped namespace has access to the host filesystem (bsc#1181732)
* CVE-2021-21285: Fixed an issue where pulling a malformed Docker image manifest 
  crashes the dockerd daemon (bsc#1181730). 
* btrfs quotas being removed by Docker regularly (bsc#1183855, bsc#1175081)

runc was updated to v1.0.0~rc93 (bsc#1182451, bsc#1175821 bsc#1184962).

* Use the upstream runc package (bsc#1181641, bsc#1181677, bsc#1175821).
* Fixed /dev/null is not available (bsc#1168481).
* CVE-2021-30465: Fixed a symlink-exchange attack vulnarability (bsc#1185405).

containerd was updated to v1.4.4

* CVE-2021-21334: Fixed a potential information leak through environment variables (bsc#1183397).
* Handle a requirement from docker (bsc#1181594).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168481">SUSE bug 1168481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175081">SUSE bug 1175081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175821">SUSE bug 1175821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181594">SUSE bug 1181594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181641">SUSE bug 1181641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181677">SUSE bug 1181677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181730">SUSE bug 1181730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181732">SUSE bug 1181732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181749">SUSE bug 1181749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182451">SUSE bug 1182451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182476">SUSE bug 1182476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182947">SUSE bug 1182947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183024">SUSE bug 1183024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183855">SUSE bug 1183855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184768">SUSE bug 1184768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184962">SUSE bug 1184962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185405">SUSE bug 1185405</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21285/">CVE-2021-21285</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21334/">CVE-2021-21334</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494422" comment="containerd-1.4.4-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625312" comment="containerd-ctr-1.4.4-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494423" comment="docker-20.10.6_ce-6.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494424" comment="docker-bash-completion-20.10.6_ce-6.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494432" comment="docker-fish-completion-20.10.6_ce-6.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621052" comment="docker-zsh-completion-20.10.6_ce-6.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494425" comment="runc-1.0.0~rc93-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52301" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186764" ref_url="https://bugzilla.suse.com/1186764" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEVT5FS4C2453YNMGNJH5GEW4YPAD5DS/" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-17541: Fixed a stack-based buffer overflow in the 'transform' component (bsc#1186764).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186764">SUSE bug 1186764</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497910" comment="libjpeg-turbo-1.5.3-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494039" comment="libjpeg62-62.2.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621058" comment="libjpeg62-32bit-62.2.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494040" comment="libjpeg62-devel-62.2.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621061" comment="libjpeg62-devel-32bit-62.2.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625313" comment="libjpeg62-turbo-1.5.3-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494041" comment="libjpeg8-8.1.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495821" comment="libjpeg8-32bit-8.1.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494042" comment="libjpeg8-devel-8.1.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621067" comment="libjpeg8-devel-32bit-8.1.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494043" comment="libturbojpeg0-8.1.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621070" comment="libturbojpeg0-32bit-8.1.2-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52302" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1171164" ref_url="https://bugzilla.suse.com/1171164" source="BUGZILLA"/>
		<reference ref_id="1171569" ref_url="https://bugzilla.suse.com/1171569" source="BUGZILLA"/>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185916" ref_url="https://bugzilla.suse.com/1185916" source="BUGZILLA"/>
		<reference ref_id="1185918" ref_url="https://bugzilla.suse.com/1185918" source="BUGZILLA"/>
		<reference ref_id="1185919" ref_url="https://bugzilla.suse.com/1185919" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="1185923" ref_url="https://bugzilla.suse.com/1185923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="CVE-2021-28652" ref_url="https://www.suse.com/security/cve/CVE-2021-28652/" source="CVE"/>
		<reference ref_id="CVE-2021-28662" ref_url="https://www.suse.com/security/cve/CVE-2021-28662/" source="CVE"/>
		<reference ref_id="CVE-2021-31806" ref_url="https://www.suse.com/security/cve/CVE-2021-31806/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- update to 4.15:
- CVE-2021-28652: Broken cache manager URL parsing (bsc#1185918)
- CVE-2021-28651: Memory leak in RFC 2169 response parsing (bsc#1185921)
- CVE-2021-28662: Limit HeaderLookupTable_t::lookup() to BadHdr and specific IDs (bsc#1185919)
- CVE-2021-31806: Handle more Range requests (bsc#1185916)
- CVE-2020-25097: HTTP Request Smuggling vulnerability (bsc#1183436)
- Handle more partial responses (bsc#1185923)
- fix previous change to reinstante permissions macros, because the wrong path has been used (bsc#1171569).
- use libexecdir instead of libdir to conform to recent changes in Factory (bsc#1171164).
- Reinstate permissions macros for pinger binary, because the permissions
  package is also responsible for setting up the cap_net_raw capability,
  currently a fresh squid install doesn't get a capability bit at all (bsc#1171569).
- Change pinger and basic_pam_auth helper to use standard permissions. pinger uses cap_net_raw=ep instead (bsc#1171569)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171164">SUSE bug 1171164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171569">SUSE bug 1171569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185916">SUSE bug 1185916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185918">SUSE bug 1185918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185919">SUSE bug 1185919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185923">SUSE bug 1185923</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28652/">CVE-2021-28652</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28662/">CVE-2021-28662</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31806/">CVE-2021-31806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499923" comment="squid-4.15-5.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52303" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVY7TKRUVVD5PT3ITLWLB2FFEX6JT7UW/" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494046" comment="postgresql10-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497146" comment="postgresql10-contrib-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497147" comment="postgresql10-devel-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499924" comment="postgresql10-docs-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497148" comment="postgresql10-plperl-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497149" comment="postgresql10-plpython-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497150" comment="postgresql10-pltcl-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497151" comment="postgresql10-server-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625314" comment="postgresql10-test-10.17-8.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52304" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177437" ref_url="https://bugzilla.suse.com/1177437" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1179458" ref_url="https://bugzilla.suse.com/1179458" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180100" ref_url="https://bugzilla.suse.com/1180100" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182377" ref_url="https://bugzilla.suse.com/1182377" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1182712" ref_url="https://bugzilla.suse.com/1182712" source="BUGZILLA"/>
		<reference ref_id="1182713" ref_url="https://bugzilla.suse.com/1182713" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183077" ref_url="https://bugzilla.suse.com/1183077" source="BUGZILLA"/>
		<reference ref_id="1183095" ref_url="https://bugzilla.suse.com/1183095" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183249" ref_url="https://bugzilla.suse.com/1183249" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1183310" ref_url="https://bugzilla.suse.com/1183310" source="BUGZILLA"/>
		<reference ref_id="1183311" ref_url="https://bugzilla.suse.com/1183311" source="BUGZILLA"/>
		<reference ref_id="1183312" ref_url="https://bugzilla.suse.com/1183312" source="BUGZILLA"/>
		<reference ref_id="1183313" ref_url="https://bugzilla.suse.com/1183313" source="BUGZILLA"/>
		<reference ref_id="1183314" ref_url="https://bugzilla.suse.com/1183314" source="BUGZILLA"/>
		<reference ref_id="1183315" ref_url="https://bugzilla.suse.com/1183315" source="BUGZILLA"/>
		<reference ref_id="1183316" ref_url="https://bugzilla.suse.com/1183316" source="BUGZILLA"/>
		<reference ref_id="1183317" ref_url="https://bugzilla.suse.com/1183317" source="BUGZILLA"/>
		<reference ref_id="1183318" ref_url="https://bugzilla.suse.com/1183318" source="BUGZILLA"/>
		<reference ref_id="1183319" ref_url="https://bugzilla.suse.com/1183319" source="BUGZILLA"/>
		<reference ref_id="1183320" ref_url="https://bugzilla.suse.com/1183320" source="BUGZILLA"/>
		<reference ref_id="1183321" ref_url="https://bugzilla.suse.com/1183321" source="BUGZILLA"/>
		<reference ref_id="1183322" ref_url="https://bugzilla.suse.com/1183322" source="BUGZILLA"/>
		<reference ref_id="1183323" ref_url="https://bugzilla.suse.com/1183323" source="BUGZILLA"/>
		<reference ref_id="1183324" ref_url="https://bugzilla.suse.com/1183324" source="BUGZILLA"/>
		<reference ref_id="1183325" ref_url="https://bugzilla.suse.com/1183325" source="BUGZILLA"/>
		<reference ref_id="1183326" ref_url="https://bugzilla.suse.com/1183326" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183815" ref_url="https://bugzilla.suse.com/1183815" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184197" ref_url="https://bugzilla.suse.com/1184197" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184199" ref_url="https://bugzilla.suse.com/1184199" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184264" ref_url="https://bugzilla.suse.com/1184264" source="BUGZILLA"/>
		<reference ref_id="1184386" ref_url="https://bugzilla.suse.com/1184386" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184615" ref_url="https://bugzilla.suse.com/1184615" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184769" ref_url="https://bugzilla.suse.com/1184769" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184943" ref_url="https://bugzilla.suse.com/1184943" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1184953" ref_url="https://bugzilla.suse.com/1184953" source="BUGZILLA"/>
		<reference ref_id="1184955" ref_url="https://bugzilla.suse.com/1184955" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185010" ref_url="https://bugzilla.suse.com/1185010" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185110" ref_url="https://bugzilla.suse.com/1185110" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185550" ref_url="https://bugzilla.suse.com/1185550" source="BUGZILLA"/>
		<reference ref_id="1185558" ref_url="https://bugzilla.suse.com/1185558" source="BUGZILLA"/>
		<reference ref_id="1185573" ref_url="https://bugzilla.suse.com/1185573" source="BUGZILLA"/>
		<reference ref_id="1185581" ref_url="https://bugzilla.suse.com/1185581" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185640" ref_url="https://bugzilla.suse.com/1185640" source="BUGZILLA"/>
		<reference ref_id="1185641" ref_url="https://bugzilla.suse.com/1185641" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185670" ref_url="https://bugzilla.suse.com/1185670" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185736" ref_url="https://bugzilla.suse.com/1185736" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185796" ref_url="https://bugzilla.suse.com/1185796" source="BUGZILLA"/>
		<reference ref_id="1185840" ref_url="https://bugzilla.suse.com/1185840" source="BUGZILLA"/>
		<reference ref_id="1185857" ref_url="https://bugzilla.suse.com/1185857" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185954" ref_url="https://bugzilla.suse.com/1185954" source="BUGZILLA"/>
		<reference ref_id="1185980" ref_url="https://bugzilla.suse.com/1185980" source="BUGZILLA"/>
		<reference ref_id="1185982" ref_url="https://bugzilla.suse.com/1185982" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186009" ref_url="https://bugzilla.suse.com/1186009" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186118" ref_url="https://bugzilla.suse.com/1186118" source="BUGZILLA"/>
		<reference ref_id="1186219" ref_url="https://bugzilla.suse.com/1186219" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186349" ref_url="https://bugzilla.suse.com/1186349" source="BUGZILLA"/>
		<reference ref_id="1186352" ref_url="https://bugzilla.suse.com/1186352" source="BUGZILLA"/>
		<reference ref_id="1186353" ref_url="https://bugzilla.suse.com/1186353" source="BUGZILLA"/>
		<reference ref_id="1186354" ref_url="https://bugzilla.suse.com/1186354" source="BUGZILLA"/>
		<reference ref_id="1186355" ref_url="https://bugzilla.suse.com/1186355" source="BUGZILLA"/>
		<reference ref_id="1186356" ref_url="https://bugzilla.suse.com/1186356" source="BUGZILLA"/>
		<reference ref_id="1186357" ref_url="https://bugzilla.suse.com/1186357" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186401" ref_url="https://bugzilla.suse.com/1186401" source="BUGZILLA"/>
		<reference ref_id="1186408" ref_url="https://bugzilla.suse.com/1186408" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186467" ref_url="https://bugzilla.suse.com/1186467" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186512" ref_url="https://bugzilla.suse.com/1186512" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20268" ref_url="https://www.suse.com/security/cve/CVE-2021-20268/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28952" ref_url="https://www.suse.com/security/cve/CVE-2021-28952/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489/" source="CVE"/>
		<reference ref_id="CVE-2021-3490" ref_url="https://www.suse.com/security/cve/CVE-2021-3490/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).
- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).
- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)
- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).
- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).
- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).
- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).
- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).
- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).
- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).
- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).
- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).
- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).
- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).
- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda/realtek: the bass speaker can't output sound on Yoga 9i (git-fixes).
- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).
- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hda: ignore invalid NHLT table (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).
- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).
- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).
- ALSA: usb-audio: Add support for many Roland devices' implicit feedback quirks (git-fixes).
- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).
- ALSA: usb-audio: Check connector value on resume (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).
- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).
- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).
- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).
- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).
- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).
- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).
- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).
- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).
- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).
- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).
- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).
- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).
- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: check all BUSIF status when error (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt1015: fix i2c communication error (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).
- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt711: add snd_soc_component remove callback (git-fixes).
- ASoC: samsung: snow: remove useless test (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: soc-core kABI workaround (git-fixes).
- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).
- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: avoid deadlock between hci_dev-&gt;lock and socket lock (git-fixes).
- Bluetooth: btqca: Add valid le states quirk (git-fixes).
- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Documentation/ABI: sysfs-platform-ideapad-laptop: update device attribute paths (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).
- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).
- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).
- Goodix Fingerprint device is not a modem (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- Hibernation: Fix Hibernate not blocked in Secure Boot with no EFI secret key 
- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).
- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).
- KEYS: trusted: Fix memory leak on object td (git-fixes).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).
- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183324).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI: dwc: Move iATU detection earlier (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).
- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Re-enable yenta socket driver for x86_64 (bsc#1186349)
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: fix return value for unsupported ioctls (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- Update config files. (bsc#1185010)
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: fsl-mc: add the dpdbg device type (bsc#1185670).
- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: qcom: Put child node before return (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- ch_ktls: Fix kernel panic (jsc#SLE-15131).
- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).
- ch_ktls: fix device connection close (jsc#SLE-15131).
- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).
- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).
- cifs: New optype for session operations (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: remove broken __exit annotations (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Update in-core bitset after committing the metadata (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dmaengine: Fix a double free in dma_async_device_register (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).
- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).
- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).
- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).
- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).
- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).
- dmaengine: idxd: fix dma device lifetime (git-fixes).
- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).
- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).
- dmaengine: idxd: fix wq size store permission state (git-fixes).
- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing 'field overwritten' issue (git-fixes).
- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).
- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).
- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).
- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).
- drm/amd/display: Fix debugfs link_settings entry (git-fixes).
- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).
- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).
- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).
- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).
- drm/amd/display: changing sr exit latency (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amd/display: turn DPMS off on connector unplug (git-fixes).
- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' (bsc#1152489) 
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).
- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).
- drm/amdgpu/display: remove redundant continue statement (git-fixes).
- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).
- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).
- drm/amdgpu/swsmu: add interrupt work function (git-fixes).
- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).
- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).
- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE &gt; AMDGPU_PAGE_SIZE (git-fixes).
- drm/amdgpu: Fix some unload driver issues (git-fixes).
- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).
- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).
- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).
- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: 	* context changes
- drm/amdkfd: dqm fence memory corruption (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/compat: Clear bounce structures (git-fixes).
- drm/dp_mst: Revise broadcast msg lct &amp; lcr (git-fixes).
- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915/display: fix compiler warning about array overrun (git-fixes).
- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).
- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).
- drm/i915/overlay: Fix active retire callback alignment (git-fixes).
- drm/i915/selftests: Fix some error codes (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).
- drm/i915: Fix crash in auto_retire (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).
- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).
- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/ingenic: Fix non-OSD mode (git-fixes).
- drm/ingenic: Register devm action to cleanup encoders (git-fixes).
- drm/komeda: Fix bit check to import to value of proper type (git-fixes).
- drm/lima: fix reference leak in lima_pm_busy (git-fixes).
- drm/mcde/panel: Inverse misunderstood flag (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: 	* replaced mtk_ddp_write() with writel()
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) Backporting notes: 	* taken for 9b73bde39cf2 ('drm/msm: Fix use-after-free in msm_gem with carveout') 	* context changes
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: 	* context changes
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: 	* context changes
- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: 	* context changes
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489)
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: 	* context changes
- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).
- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: 	* context changes
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).
- drm/qxl: do not run release if qxl failed to init (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/radeon: fix AGP dependency (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).
- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).
- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: 	* context changes
- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- drm/tegra: dc: Restore coupling of display controllers (git-fixes).
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/tilcdc: send vblank event when disabling crtc (git-fixes).
- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: 	* context changes 	* change vc4_hdmi to vc4-&gt;hdmi 	* removed references to encoder-&gt;hdmi_monitor
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- drm: meson_drv add shutdown function (git-fixes).
- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: 	* context changes
- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).
- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).
- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).
- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).
- exec: Move would_dump into flush_old_exec (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).
- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).
- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).
- firmware: qcom_scm: Workaround lack of 'is available' call on SC7180 (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).
- ftrace: Fix modify_ftrace_direct (bsc#1177028).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: fix write deadlock (bsc#1185573).
- fuse: verify write return (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- gcc-plugins: drop support for GCC &amp;lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).
- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- gpiolib: Do not free if pin ranges are not defined (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: mlxbf: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).
- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).
- i2c: tegra: Clean up and improve comments (bsc#1184386).
- i2c: tegra: Clean up printk messages (bsc#1184386).
- i2c: tegra: Clean up probe function (bsc#1184386).
- i2c: tegra: Clean up variable names (bsc#1184386).
- i2c: tegra: Clean up variable types (bsc#1184386).
- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).
- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).
- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).
- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).
- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).
- i2c: tegra: Factor out register polling into separate function (bsc#1184386).
- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).
- i2c: tegra: Improve driver module description (bsc#1184386).
- i2c: tegra: Improve formatting of variables (bsc#1184386).
- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).
- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).
- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).
- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).
- i2c: tegra: Remove 'dma' variable from tegra_i2c_xfer_msg() (bsc#1184386).
- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).
- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).
- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).
- i2c: tegra: Remove outdated barrier() (bsc#1184386).
- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).
- i2c: tegra: Rename wait/poll functions (bsc#1184386).
- i2c: tegra: Reorder location of functions in the code (bsc#1184386).
- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).
- i2c: tegra: Use clk-bulk helpers (bsc#1184386).
- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).
- i2c: tegra: Use platform_get_irq() (bsc#1184386).
- i2c: tegra: Use reset_control_reset() (bsc#1184386).
- i2c: tegra: Use threaded interrupt (bsc#1184386).
- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- i40e: Fix sparse error: uninitialized symbol 'ring' (jsc#SLE-13701).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Continue probe on link/PHY errors (jsc#SLE-12878).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).
- ice: fix memory allocation call (jsc#SLE-12878).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igb: XDP extack message on error (jsc#SLE-13536).
- igb: XDP xmit back fix error code (jsc#SLE-13536).
- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).
- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).
- igb: check timestamp validity (git-fixes).
- igb: skb add metasize for xdp (jsc#SLE-13536).
- igb: take VLAN double header into account (jsc#SLE-13536).
- igb: use xdp_do_flush (jsc#SLE-13536).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- intel_th: pci: Add Alder Lake-M support (git-fixes).
- intel_th: pci: Add Rocket Lake CPU support (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).
- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- iommu: Check dev-&gt;iommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).
- iommu: Switch gather-&gt;end to the inclusive end (bsc#1183314).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- iwlwifi: add support for Qu with AX201 device (git-fixes).
- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kABI: repair after 'nVMX: Properly handle userspace interrupt window request' 
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&amp;lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).
- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).
- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Fix bail out from 'ringbuf_process_ring()' on error (bsc#1177028).
- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).
- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).
- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mISDN: fix crash in fritzpci (git-fixes).
- mac80211: Allow HE operation to be longer than expected (git-fixes).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: saa7134: use sg_dma_len when building pgtable (git-fixes).
- media: saa7146: use sg_dma_len when building pgtable (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt7601u: fix always true expression (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).
- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).
- mt76: mt76x0: disable GTK offloading (git-fixes).
- mt76: mt7915: fix aggr len debugfs node (git-fixes).
- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx4_en: update moderation when config reset (git-fixes).
- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).
- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).
- net/mlx5: Fix health error state handling (bsc#1186467).
- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).
- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).
- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: cls_api: Fix uninitialised struct field bo-&gt;unlocked_driver_cb (bsc#1176447).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).
- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).
- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).
- netfilter: nftables: allow to update flowtable flags (bsc#1176447).
- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).
- netsec: restore phy power state after controller reset (bsc#1183757).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: devlink: initialize the devlink port attribute 'lanes' (bsc#1176447).
- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).
- nvme: clean up the check for too large logic block sizes (bsc#1180197).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix initialization of the zone bitmaps (bsc#1180197).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: freeze the queue over -&gt;lba_shift updates (bsc#1180197).
- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: move nvme_validate_ns (bsc#1180197).
- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).
- nvme: query namespace identifiers before adding the namespace (bsc#1180197).
- nvme: refactor nvme_validate_ns (bsc#1180197).
- nvme: remove nvme_identify_ns_list (bsc#1180197).
- nvme: remove nvme_update_formats (bsc#1180197).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).
- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).
- nvme: rename __nvme_revalidate_disk (bsc#1180197).
- nvme: rename _nvme_revalidate_disk (bsc#1180197).
- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvme: update the known admin effects (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- ocfs2: fix a use after free on error (bsc#1184738).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: lewisburg: Update number of pins in community (git-fixes).
- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).
- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).
- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).
- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).
- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).
- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).
- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).
- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).
- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).
- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).
- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).
- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).
- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- r8169: do not advertise pause in jumbo mode (git-fixes).
- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).
- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- rtw88: coex: 8821c: correct antenna switch function (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- s390/pci: fix leak of PCI device structure (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- sata_mv: add IRQ checks (git-fixes).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).
- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).
- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).
- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).
- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP &amp; NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- scsi: target: tcmu: Fix use-after-free of se_cmd-&gt;priv (bsc#1186356).
- scsi: target: tcmu: Fix warning: 'page' may be used uninitialized (bsc#1186357).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- security: keys: trusted: fix TPM2 authorizations (git-fixes).
- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).
- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz &amp;lt; p_memsz (git-fixes).
- software node: Fix node registration (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).
- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).
- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).
- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).
- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).
- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).
- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).
- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).
- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).
- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).
- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).
- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: fwserial: Fix error handling in fwserial_create (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).
- staging: most: sound: add sanity check for function argument (git-fixes).
- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).
- staging: rtl8188eu: prevent -&gt;ssid overflow in rtw_wx_set_scan() (git-fixes).
- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).
- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).
- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- staging: rtl8192u: fix -&gt;ssid overflow in r8192_wx_set_scan() (git-fixes).
- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).
- staging: rtl8712: unterminated string leads to read overflow (git-fixes).
- stop_machine: mark helpers __always_inline (git-fixes).
- supported.conf:
- supported.conf: add bsc1185010 dependency
- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- tee: optee: remove need_resched() before cond_resched() (git-fixes).
- tee: optee: replace might_sleep with cond_resched (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).
- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).
- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).
- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).
- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).
- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).
- tpm: acpi: Check eventlog signature before using it (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).
- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: stop playback on function disable (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: Fix suspend with devices connected for a64 (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).
- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).
- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).
- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- usbip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- usbip: fix stub_dev to check for stream socket (git-fixes).
- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- usbip: fix vhci_hcd to check for stream socket (git-fixes).
- usbip: fix vudc to check for stream socket (git-fixes).
- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- usbip: tools: fix build error for multiple definition (git-fixes).
- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).
- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).
- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).
- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- vfio/pci: Move VGA and VF initialization to functions (git-fixes).
- vfio/pci: Re-order vfio_pci_probe() (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).
- vrf: fix a comment about loopback device (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).
- vxlan: move debug check after netdev unregister (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).
- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes). 
- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177437">SUSE bug 1177437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179458">SUSE bug 1179458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180100">SUSE bug 1180100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182377">SUSE bug 1182377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182712">SUSE bug 1182712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182713">SUSE bug 1182713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183077">SUSE bug 1183077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183095">SUSE bug 1183095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183249">SUSE bug 1183249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183310">SUSE bug 1183310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183311">SUSE bug 1183311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183312">SUSE bug 1183312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183313">SUSE bug 1183313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183314">SUSE bug 1183314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183315">SUSE bug 1183315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183316">SUSE bug 1183316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183317">SUSE bug 1183317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183318">SUSE bug 1183318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183319">SUSE bug 1183319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183320">SUSE bug 1183320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183321">SUSE bug 1183321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183322">SUSE bug 1183322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183323">SUSE bug 1183323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183324">SUSE bug 1183324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183325">SUSE bug 1183325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183326">SUSE bug 1183326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183815">SUSE bug 1183815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184197">SUSE bug 1184197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184199">SUSE bug 1184199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184264">SUSE bug 1184264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184386">SUSE bug 1184386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184615">SUSE bug 1184615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184769">SUSE bug 1184769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184943">SUSE bug 1184943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184953">SUSE bug 1184953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184955">SUSE bug 1184955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185010">SUSE bug 1185010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185110">SUSE bug 1185110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185550">SUSE bug 1185550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185558">SUSE bug 1185558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185573">SUSE bug 1185573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185581">SUSE bug 1185581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185640">SUSE bug 1185640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185641">SUSE bug 1185641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185670">SUSE bug 1185670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185736">SUSE bug 1185736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185796">SUSE bug 1185796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185840">SUSE bug 1185840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185857">SUSE bug 1185857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185954">SUSE bug 1185954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185980">SUSE bug 1185980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185982">SUSE bug 1185982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186009">SUSE bug 1186009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186118">SUSE bug 1186118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186219">SUSE bug 1186219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186349">SUSE bug 1186349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186352">SUSE bug 1186352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186353">SUSE bug 1186353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186354">SUSE bug 1186354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186355">SUSE bug 1186355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186356">SUSE bug 1186356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186357">SUSE bug 1186357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186401">SUSE bug 1186401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186408">SUSE bug 1186408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186467">SUSE bug 1186467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186512">SUSE bug 1186512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20268/">CVE-2021-20268</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28952/">CVE-2021-28952</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3490/">CVE-2021-3490</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009621082" comment="cluster-md-kmp-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621083" comment="dlm-kmp-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621084" comment="gfs2-kmp-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498194" comment="kernel-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498195" comment="kernel-azure-devel-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621085" comment="kernel-azure-extra-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621086" comment="kernel-azure-livepatch-devel-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621087" comment="kernel-azure-optional-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498196" comment="kernel-devel-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498197" comment="kernel-source-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498198" comment="kernel-syms-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621088" comment="kselftests-kmp-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621089" comment="ocfs2-kmp-azure-5.3.18-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621090" comment="reiserfs-kmp-azure-5.3.18-38.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52305" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182377" ref_url="https://bugzilla.suse.com/1182377" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1182712" ref_url="https://bugzilla.suse.com/1182712" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1183310" ref_url="https://bugzilla.suse.com/1183310" source="BUGZILLA"/>
		<reference ref_id="1183311" ref_url="https://bugzilla.suse.com/1183311" source="BUGZILLA"/>
		<reference ref_id="1183312" ref_url="https://bugzilla.suse.com/1183312" source="BUGZILLA"/>
		<reference ref_id="1183313" ref_url="https://bugzilla.suse.com/1183313" source="BUGZILLA"/>
		<reference ref_id="1183314" ref_url="https://bugzilla.suse.com/1183314" source="BUGZILLA"/>
		<reference ref_id="1183315" ref_url="https://bugzilla.suse.com/1183315" source="BUGZILLA"/>
		<reference ref_id="1183316" ref_url="https://bugzilla.suse.com/1183316" source="BUGZILLA"/>
		<reference ref_id="1183317" ref_url="https://bugzilla.suse.com/1183317" source="BUGZILLA"/>
		<reference ref_id="1183318" ref_url="https://bugzilla.suse.com/1183318" source="BUGZILLA"/>
		<reference ref_id="1183319" ref_url="https://bugzilla.suse.com/1183319" source="BUGZILLA"/>
		<reference ref_id="1183320" ref_url="https://bugzilla.suse.com/1183320" source="BUGZILLA"/>
		<reference ref_id="1183321" ref_url="https://bugzilla.suse.com/1183321" source="BUGZILLA"/>
		<reference ref_id="1183322" ref_url="https://bugzilla.suse.com/1183322" source="BUGZILLA"/>
		<reference ref_id="1183323" ref_url="https://bugzilla.suse.com/1183323" source="BUGZILLA"/>
		<reference ref_id="1183324" ref_url="https://bugzilla.suse.com/1183324" source="BUGZILLA"/>
		<reference ref_id="1183326" ref_url="https://bugzilla.suse.com/1183326" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183815" ref_url="https://bugzilla.suse.com/1183815" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184197" ref_url="https://bugzilla.suse.com/1184197" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184199" ref_url="https://bugzilla.suse.com/1184199" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184264" ref_url="https://bugzilla.suse.com/1184264" source="BUGZILLA"/>
		<reference ref_id="1184386" ref_url="https://bugzilla.suse.com/1184386" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184615" ref_url="https://bugzilla.suse.com/1184615" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184769" ref_url="https://bugzilla.suse.com/1184769" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184943" ref_url="https://bugzilla.suse.com/1184943" source="BUGZILLA"/>
		<reference ref_id="1184955" ref_url="https://bugzilla.suse.com/1184955" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185010" ref_url="https://bugzilla.suse.com/1185010" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185550" ref_url="https://bugzilla.suse.com/1185550" source="BUGZILLA"/>
		<reference ref_id="1185558" ref_url="https://bugzilla.suse.com/1185558" source="BUGZILLA"/>
		<reference ref_id="1185573" ref_url="https://bugzilla.suse.com/1185573" source="BUGZILLA"/>
		<reference ref_id="1185581" ref_url="https://bugzilla.suse.com/1185581" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185640" ref_url="https://bugzilla.suse.com/1185640" source="BUGZILLA"/>
		<reference ref_id="1185641" ref_url="https://bugzilla.suse.com/1185641" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185670" ref_url="https://bugzilla.suse.com/1185670" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185736" ref_url="https://bugzilla.suse.com/1185736" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185796" ref_url="https://bugzilla.suse.com/1185796" source="BUGZILLA"/>
		<reference ref_id="1185840" ref_url="https://bugzilla.suse.com/1185840" source="BUGZILLA"/>
		<reference ref_id="1185857" ref_url="https://bugzilla.suse.com/1185857" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185980" ref_url="https://bugzilla.suse.com/1185980" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186009" ref_url="https://bugzilla.suse.com/1186009" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186118" ref_url="https://bugzilla.suse.com/1186118" source="BUGZILLA"/>
		<reference ref_id="1186219" ref_url="https://bugzilla.suse.com/1186219" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186349" ref_url="https://bugzilla.suse.com/1186349" source="BUGZILLA"/>
		<reference ref_id="1186352" ref_url="https://bugzilla.suse.com/1186352" source="BUGZILLA"/>
		<reference ref_id="1186353" ref_url="https://bugzilla.suse.com/1186353" source="BUGZILLA"/>
		<reference ref_id="1186354" ref_url="https://bugzilla.suse.com/1186354" source="BUGZILLA"/>
		<reference ref_id="1186355" ref_url="https://bugzilla.suse.com/1186355" source="BUGZILLA"/>
		<reference ref_id="1186356" ref_url="https://bugzilla.suse.com/1186356" source="BUGZILLA"/>
		<reference ref_id="1186357" ref_url="https://bugzilla.suse.com/1186357" source="BUGZILLA"/>
		<reference ref_id="1186401" ref_url="https://bugzilla.suse.com/1186401" source="BUGZILLA"/>
		<reference ref_id="1186408" ref_url="https://bugzilla.suse.com/1186408" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186512" ref_url="https://bugzilla.suse.com/1186512" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20268" ref_url="https://www.suse.com/security/cve/CVE-2021-20268/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28952" ref_url="https://www.suse.com/security/cve/CVE-2021-28952/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489/" source="CVE"/>
		<reference ref_id="CVE-2021-3490" ref_url="https://www.suse.com/security/cve/CVE-2021-3490/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).
- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).
- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)
- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).
- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).
- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).
- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).
- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).
- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).
- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).
- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).
- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).
- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).
- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).
- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda/realtek: the bass speaker can't output sound on Yoga 9i (git-fixes).
- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).
- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hda: ignore invalid NHLT table (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).
- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).
- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).
- ALSA: usb-audio: Add support for many Roland devices' implicit feedback quirks (git-fixes).
- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).
- ALSA: usb-audio: Check connector value on resume (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).
- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).
- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).
- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).
- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).
- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).
- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).
- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).
- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).
- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).
- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).
- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).
- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).
- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: check all BUSIF status when error (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt1015: fix i2c communication error (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).
- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt711: add snd_soc_component remove callback (git-fixes).
- ASoC: samsung: snow: remove useless test (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: soc-core kABI workaround (git-fixes).
- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).
- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: avoid deadlock between hci_dev-&gt;lock and socket lock (git-fixes).
- Bluetooth: btqca: Add valid le states quirk (git-fixes).
- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).
- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).
- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).
- Goodix Fingerprint device is not a modem (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).
- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).
- KEYS: trusted: Fix memory leak on object td (git-fixes).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).
- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183324).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI: dwc: Move iATU detection earlier (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).
- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Re-enable yenta socket driver for x86_64 (bsc#1186349)
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: fix return value for unsupported ioctls (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: fix get_max_io_size() (git-fixes).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: fsl-mc: add the dpdbg device type (bsc#1185670).
- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: qcom: Put child node before return (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- ch_ktls: Fix kernel panic (jsc#SLE-15131).
- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).
- ch_ktls: fix device connection close (jsc#SLE-15131).
- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).
- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).
- cifs: New optype for session operations (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: remove broken __exit annotations (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Update in-core bitset after committing the metadata (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dmaengine: Fix a double free in dma_async_device_register (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).
- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).
- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).
- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).
- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).
- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).
- dmaengine: idxd: fix dma device lifetime (git-fixes).
- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).
- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).
- dmaengine: idxd: fix wq size store permission state (git-fixes).
- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing 'field overwritten' issue (git-fixes).
- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).
- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).
- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).
- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).
- drm/amd/display: Fix debugfs link_settings entry (git-fixes).
- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).
- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).
- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).
- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).
- drm/amd/display: changing sr exit latency (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amd/display: turn DPMS off on connector unplug (git-fixes).
- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) Backporting notes: 	* rename amd/pm to amd/powerplay 	* context changes
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).
- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).
- drm/amdgpu/display: remove redundant continue statement (git-fixes).
- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).
- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).
- drm/amdgpu/swsmu: add interrupt work function (git-fixes).
- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).
- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).
- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE &gt; AMDGPU_PAGE_SIZE (git-fixes).
- drm/amdgpu: Fix some unload driver issues (git-fixes).
- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).
- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).
- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).
- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: 	* context changes
- drm/amdkfd: dqm fence memory corruption (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/compat: Clear bounce structures (git-fixes).
- drm/dp_mst: Revise broadcast msg lct &amp; lcr (git-fixes).
- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915/display: fix compiler warning about array overrun (git-fixes).
- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).
- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).
- drm/i915/overlay: Fix active retire callback alignment (git-fixes).
- drm/i915/selftests: Fix some error codes (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).
- drm/i915: Fix crash in auto_retire (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).
- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).
- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/ingenic: Fix non-OSD mode (git-fixes).
- drm/ingenic: Register devm action to cleanup encoders (git-fixes).
- drm/komeda: Fix bit check to import to value of proper type (git-fixes).
- drm/lima: fix reference leak in lima_pm_busy (git-fixes).
- drm/mcde/panel: Inverse misunderstood flag (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: 	* replaced mtk_ddp_write() with writel()
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) Backporting notes: 	* taken for 9b73bde39cf2 ('drm/msm: Fix use-after-free in msm_gem with carveout') 	* context changes
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: 	* context changes
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: 	* context changes
- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: 	* context changes
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: 	* context changes
- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).
- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: 	* context changes
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).
- drm/qxl: do not run release if qxl failed to init (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/radeon: fix AGP dependency (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).
- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).
- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: 	* context changes
- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- drm/tegra: dc: Restore coupling of display controllers (git-fixes).
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/tilcdc: send vblank event when disabling crtc (git-fixes).
- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: 	* context changes 	* change vc4_hdmi to vc4-&gt;hdmi 	* removed references to encoder-&gt;hdmi_monitor
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- drm: meson_drv add shutdown function (git-fixes).
- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: 	* context changes
- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).
- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).
- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).
- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).
- exec: Move would_dump into flush_old_exec (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).
- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).
- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).
- firmware: qcom_scm: Workaround lack of 'is available' call on SC7180 (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).
- ftrace: Fix modify_ftrace_direct (bsc#1177028).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: fix write deadlock (bsc#1185573).
- fuse: verify write return (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- gcc-plugins: drop support for GCC &amp;lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).
- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- gpiolib: Do not free if pin ranges are not defined (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: mlxbf: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).
- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).
- i2c: tegra: Clean up and improve comments (bsc#1184386).
- i2c: tegra: Clean up printk messages (bsc#1184386).
- i2c: tegra: Clean up probe function (bsc#1184386).
- i2c: tegra: Clean up variable names (bsc#1184386).
- i2c: tegra: Clean up variable types (bsc#1184386).
- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).
- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).
- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).
- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).
- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).
- i2c: tegra: Factor out register polling into separate function (bsc#1184386).
- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).
- i2c: tegra: Improve driver module description (bsc#1184386).
- i2c: tegra: Improve formatting of variables (bsc#1184386).
- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).
- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).
- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).
- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).
- i2c: tegra: Remove 'dma' variable from tegra_i2c_xfer_msg() (bsc#1184386).
- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).
- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).
- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).
- i2c: tegra: Remove outdated barrier() (bsc#1184386).
- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).
- i2c: tegra: Rename wait/poll functions (bsc#1184386).
- i2c: tegra: Reorder location of functions in the code (bsc#1184386).
- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).
- i2c: tegra: Use clk-bulk helpers (bsc#1184386).
- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).
- i2c: tegra: Use platform_get_irq() (bsc#1184386).
- i2c: tegra: Use reset_control_reset() (bsc#1184386).
- i2c: tegra: Use threaded interrupt (bsc#1184386).
- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- i40e: Fix sparse error: uninitialized symbol 'ring' (jsc#SLE-13701).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Continue probe on link/PHY errors (jsc#SLE-12878).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).
- ice: fix memory allocation call (jsc#SLE-12878).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igb: XDP extack message on error (jsc#SLE-13536).
- igb: XDP xmit back fix error code (jsc#SLE-13536).
- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).
- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).
- igb: check timestamp validity (git-fixes).
- igb: skb add metasize for xdp (jsc#SLE-13536).
- igb: take VLAN double header into account (jsc#SLE-13536).
- igb: use xdp_do_flush (jsc#SLE-13536).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- intel_th: pci: Add Alder Lake-M support (git-fixes).
- intel_th: pci: Add Rocket Lake CPU support (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).
- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- iommu: Check dev-&gt;iommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).
- iommu: Switch gather-&gt;end to the inclusive end (bsc#1183314).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- iwlwifi: add support for Qu with AX201 device (git-fixes).
- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&amp;lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).
- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).
- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).
- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Fix bail out from 'ringbuf_process_ring()' on error (bsc#1177028).
- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).
- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).
- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mISDN: fix crash in fritzpci (git-fixes).
- mac80211: Allow HE operation to be longer than expected (git-fixes).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: saa7134: use sg_dma_len when building pgtable (git-fixes).
- media: saa7146: use sg_dma_len when building pgtable (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt7601u: fix always true expression (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).
- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).
- mt76: mt76x0: disable GTK offloading (git-fixes).
- mt76: mt7915: fix aggr len debugfs node (git-fixes).
- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx4_en: update moderation when config reset (git-fixes).
- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).
- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).
- net/mlx5: Fix health error state handling (bsc#1186467).
- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).
- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).
- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: cls_api: Fix uninitialised struct field bo-&gt;unlocked_driver_cb (bsc#1176447).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).
- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).
- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).
- netfilter: nftables: allow to update flowtable flags (bsc#1176447).
- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).
- netsec: restore phy power state after controller reset (bsc#1183757).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: devlink: initialize the devlink port attribute 'lanes' (bsc#1176447).
- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999). 
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).
- nvme: clean up the check for too large logic block sizes (bsc#1180197).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix initialization of the zone bitmaps (bsc#1180197).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: freeze the queue over -&gt;lba_shift updates (bsc#1180197).
- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: move nvme_validate_ns (bsc#1180197).
- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).
- nvme: query namespace identifiers before adding the namespace (bsc#1180197).
- nvme: refactor nvme_validate_ns (bsc#1180197).
- nvme: remove nvme_identify_ns_list (bsc#1180197).
- nvme: remove nvme_update_formats (bsc#1180197).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).
- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).
- nvme: rename __nvme_revalidate_disk (bsc#1180197).
- nvme: rename _nvme_revalidate_disk (bsc#1180197).
- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvme: update the known admin effects (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- ocfs2: fix a use after free on error (bsc#1184738).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: lewisburg: Update number of pins in community (git-fixes).
- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).
- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).
- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).
- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).
- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).
- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).
- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).
- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).
- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).
- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).
- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).
- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).
- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- r8169: do not advertise pause in jumbo mode (git-fixes).
- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).
- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- rtw88: coex: 8821c: correct antenna switch function (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- s390/pci: fix leak of PCI device structure (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- sata_mv: add IRQ checks (git-fixes).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).
- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).
- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).
- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).
- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP &amp; NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- scsi: target: tcmu: Fix use-after-free of se_cmd-&gt;priv (bsc#1186356).
- scsi: target: tcmu: Fix warning: 'page' may be used uninitialized (bsc#1186357).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- security: keys: trusted: fix TPM2 authorizations (git-fixes).
- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).
- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz &amp;lt; p_memsz (git-fixes).
- software node: Fix node registration (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).
- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).
- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).
- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).
- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).
- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).
- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).
- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).
- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).
- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).
- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).
- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).
- staging: fwserial: Fix error handling in fwserial_create (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).
- staging: most: sound: add sanity check for function argument (git-fixes).
- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).
- staging: rtl8188eu: prevent -&gt;ssid overflow in rtw_wx_set_scan() (git-fixes).
- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).
- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).
- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- staging: rtl8192u: fix -&gt;ssid overflow in r8192_wx_set_scan() (git-fixes).
- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).
- staging: rtl8712: unterminated string leads to read overflow (git-fixes).
- stop_machine: mark helpers __always_inline (git-fixes).
- supported.conf:
- supported.conf: add bsc1185010 dependency
- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- tee: optee: remove need_resched() before cond_resched() (git-fixes).
- tee: optee: replace might_sleep with cond_resched (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).
- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).
- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).
- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).
- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).
- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).
- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).
- tpm: acpi: Check eventlog signature before using it (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).
- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: stop playback on function disable (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: Fix suspend with devices connected for a64 (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).
- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).
- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).
- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- usbip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- usbip: fix stub_dev to check for stream socket (git-fixes).
- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- usbip: fix vhci_hcd to check for stream socket (git-fixes).
- usbip: fix vudc to check for stream socket (git-fixes).
- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- usbip: tools: fix build error for multiple definition (git-fixes).
- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).
- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).
- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).
- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- vfio/pci: Move VGA and VF initialization to functions (git-fixes).
- vfio/pci: Re-order vfio_pci_probe() (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).
- vrf: fix a comment about loopback device (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).
- vxlan: move debug check after netdev unregister (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).
- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182377">SUSE bug 1182377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182712">SUSE bug 1182712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183310">SUSE bug 1183310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183311">SUSE bug 1183311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183312">SUSE bug 1183312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183313">SUSE bug 1183313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183314">SUSE bug 1183314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183315">SUSE bug 1183315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183316">SUSE bug 1183316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183317">SUSE bug 1183317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183318">SUSE bug 1183318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183319">SUSE bug 1183319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183320">SUSE bug 1183320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183321">SUSE bug 1183321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183322">SUSE bug 1183322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183323">SUSE bug 1183323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183324">SUSE bug 1183324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183326">SUSE bug 1183326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183815">SUSE bug 1183815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184197">SUSE bug 1184197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184199">SUSE bug 1184199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184264">SUSE bug 1184264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184386">SUSE bug 1184386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184615">SUSE bug 1184615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184769">SUSE bug 1184769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184943">SUSE bug 1184943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184955">SUSE bug 1184955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185010">SUSE bug 1185010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185550">SUSE bug 1185550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185558">SUSE bug 1185558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185573">SUSE bug 1185573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185581">SUSE bug 1185581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185640">SUSE bug 1185640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185641">SUSE bug 1185641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185670">SUSE bug 1185670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185736">SUSE bug 1185736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185796">SUSE bug 1185796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185840">SUSE bug 1185840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185857">SUSE bug 1185857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185980">SUSE bug 1185980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186009">SUSE bug 1186009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186118">SUSE bug 1186118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186219">SUSE bug 1186219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186349">SUSE bug 1186349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186352">SUSE bug 1186352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186353">SUSE bug 1186353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186354">SUSE bug 1186354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186355">SUSE bug 1186355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186356">SUSE bug 1186356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186357">SUSE bug 1186357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186401">SUSE bug 1186401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186408">SUSE bug 1186408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186512">SUSE bug 1186512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20268/">CVE-2021-20268</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28952/">CVE-2021-28952</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3490/">CVE-2021-3490</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009621091" comment="cluster-md-kmp-64kb-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501742" comment="cluster-md-kmp-default-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621092" comment="cluster-md-kmp-preempt-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621093" comment="dlm-kmp-64kb-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501743" comment="dlm-kmp-default-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621094" comment="dlm-kmp-preempt-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621095" comment="gfs2-kmp-64kb-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501744" comment="gfs2-kmp-default-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621096" comment="gfs2-kmp-preempt-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494318" comment="kernel-64kb-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494319" comment="kernel-64kb-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621097" comment="kernel-64kb-extra-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621098" comment="kernel-64kb-livepatch-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621099" comment="kernel-64kb-optional-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621100" comment="kernel-debug-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621101" comment="kernel-debug-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621102" comment="kernel-debug-livepatch-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494320" comment="kernel-default-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494321" comment="kernel-default-base-5.3.18-59.5.2.18.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621103" comment="kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494322" comment="kernel-default-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621104" comment="kernel-default-extra-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621105" comment="kernel-default-livepatch-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621106" comment="kernel-default-livepatch-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621107" comment="kernel-default-optional-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494323" comment="kernel-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496652" comment="kernel-docs-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621108" comment="kernel-docs-html-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621109" comment="kernel-kvmsmall-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621110" comment="kernel-kvmsmall-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621111" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494324" comment="kernel-macros-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496653" comment="kernel-obs-build-5.3.18-59.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621113" comment="kernel-obs-qa-5.3.18-59.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494325" comment="kernel-preempt-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496654" comment="kernel-preempt-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621114" comment="kernel-preempt-extra-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621115" comment="kernel-preempt-livepatch-devel-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621116" comment="kernel-preempt-optional-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496655" comment="kernel-source-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621117" comment="kernel-source-vanilla-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496656" comment="kernel-syms-5.3.18-59.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494326" comment="kernel-zfcpdump-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621118" comment="kselftests-kmp-64kb-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621119" comment="kselftests-kmp-default-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621120" comment="kselftests-kmp-preempt-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621121" comment="ocfs2-kmp-64kb-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501745" comment="ocfs2-kmp-default-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621122" comment="ocfs2-kmp-preempt-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621123" comment="reiserfs-kmp-64kb-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497152" comment="reiserfs-kmp-default-5.3.18-59.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621124" comment="reiserfs-kmp-preempt-5.3.18-59.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52306" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNSY4TLUBETGRMX7GD6NXLOWEVJP6B4Z/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497125" comment="java-1_8_0-openjdk-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625315" comment="java-1_8_0-openjdk-accessibility-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497126" comment="java-1_8_0-openjdk-demo-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497127" comment="java-1_8_0-openjdk-devel-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497128" comment="java-1_8_0-openjdk-headless-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621130" comment="java-1_8_0-openjdk-javadoc-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625316" comment="java-1_8_0-openjdk-src-1.8.0.292-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52307" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AKC5KVKWVYW4R23NQPYSXI57JD6CIYN/" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

Upgrade to version 12.7:

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494047" comment="postgresql12-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497153" comment="postgresql12-contrib-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497154" comment="postgresql12-devel-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497155" comment="postgresql12-docs-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625317" comment="postgresql12-llvmjit-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497156" comment="postgresql12-plperl-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497157" comment="postgresql12-plpython-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497158" comment="postgresql12-pltcl-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497159" comment="postgresql12-server-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497160" comment="postgresql12-server-devel-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625318" comment="postgresql12-test-12.7-8.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52308" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186651" ref_url="https://bugzilla.suse.com/1186651" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29505" ref_url="https://www.suse.com/security/cve/CVE-2021-29505/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKAZW7SPSOY6JEPAX2RCIZEGPKTEBUNC/" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:

Upgrade to 1.4.17

- CVE-2021-29505: Fixed potential code execution when unmarshalling with XStream instances
  using an uninitialized security framework (bsc#1186651)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186651">SUSE bug 1186651</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29505/">CVE-2021-29505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496563" comment="xstream-1.4.17-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621142" comment="xstream-benchmark-1.4.17-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621143" comment="xstream-javadoc-1.4.17-3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621144" comment="xstream-parent-1.4.17-3.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52309" version="1" class="patch">
	<metadata>
		<title>Security update for tpm2.0-tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186490" ref_url="https://bugzilla.suse.com/1186490" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3565" ref_url="https://www.suse.com/security/cve/CVE-2021-3565/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:1998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FABT25LIO7DOQ34GM7NCGQ5RVCTZMIJV/" source="SUSE-SU"/>
		<description>
This update for tpm2.0-tools fixes the following issues:

- CVE-2021-3565: Fixed issue when no encrypted session with the TPM is used (bsc#1186490).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186490">SUSE bug 1186490</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3565/">CVE-2021-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494327" comment="tpm2.0-tools-4.3.0-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52310" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ICXVMKW77QQMPCB3IHIGROEJNPYKPRO/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 78.11 (bsc#1186696)

Security issues fixed:

- CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
- CVE-2021-29967: Memory safety bugs fixed in Thunderbird 78.11

General improvements:

- OpenPGP could not be disabled for an account if a key was previously configured
- Recipients were unable to decrypt some messages when the sender had changed the message encryption from OpenPGP to S/MIME
- Contacts moved between CardDAV address books were not synced to the new server
- CardDAV compatibility fixes for Google Contacts
- Folder pane had no clear indication of focus on macOS
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625319" comment="MozillaThunderbird-78.11.0-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625320" comment="MozillaThunderbird-translations-common-78.11.0-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625321" comment="MozillaThunderbird-translations-other-78.11.0-8.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52311" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184366" ref_url="https://bugzilla.suse.com/1184366" source="BUGZILLA"/>
		<reference ref_id="1184367" ref_url="https://bugzilla.suse.com/1184367" source="BUGZILLA"/>
		<reference ref_id="1184368" ref_url="https://bugzilla.suse.com/1184368" source="BUGZILLA"/>
		<reference ref_id="1187117" ref_url="https://bugzilla.suse.com/1187117" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28163" ref_url="https://www.suse.com/security/cve/CVE-2021-28163/" source="CVE"/>
		<reference ref_id="CVE-2021-28164" ref_url="https://www.suse.com/security/cve/CVE-2021-28164/" source="CVE"/>
		<reference ref_id="CVE-2021-28165" ref_url="https://www.suse.com/security/cve/CVE-2021-28165/" source="CVE"/>
		<reference ref_id="CVE-2021-28169" ref_url="https://www.suse.com/security/cve/CVE-2021-28169/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4KKN3NUA6VAZ6XTFLI3KB3IHAPVD46L/" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

Update to version 9.4.42.v20210604

- Fix: bsc#1187117, CVE-2021-28169 - possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory
- Fix: bsc#1184367, CVE-2021-28165 - jetty server high CPU when client send data length &gt; 17408
- Fix: bsc#1184368, CVE-2021-28164 - Normalize ambiguous URIs
- Fix: bsc#1184366, CVE-2021-28163 - Exclude webapps directory from deployment scan
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184366">SUSE bug 1184366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184367">SUSE bug 1184367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184368">SUSE bug 1184368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187117">SUSE bug 1187117</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28163/">CVE-2021-28163</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28164/">CVE-2021-28164</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28165/">CVE-2021-28165</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28169/">CVE-2021-28169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009621158" comment="jetty-annotations-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621159" comment="jetty-client-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621160" comment="jetty-continuation-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496564" comment="jetty-http-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496565" comment="jetty-io-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621161" comment="jetty-jaas-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621162" comment="jetty-javax-websocket-client-impl-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621163" comment="jetty-javax-websocket-server-impl-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621164" comment="jetty-jmx-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621165" comment="jetty-jndi-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621166" comment="jetty-jsp-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621167" comment="jetty-minimal-javadoc-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621168" comment="jetty-openid-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621169" comment="jetty-plus-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621170" comment="jetty-proxy-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496566" comment="jetty-security-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496567" comment="jetty-server-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496568" comment="jetty-servlet-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496569" comment="jetty-util-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496570" comment="jetty-util-ajax-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621171" comment="jetty-webapp-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621172" comment="jetty-websocket-api-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621173" comment="jetty-websocket-client-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621174" comment="jetty-websocket-common-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621175" comment="jetty-websocket-javadoc-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621176" comment="jetty-websocket-server-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621177" comment="jetty-websocket-servlet-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621178" comment="jetty-xml-9.4.42-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52312" version="1" class="patch">
	<metadata>
		<title>Security update for python-rsa (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172389" ref_url="https://bugzilla.suse.com/1172389" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V4YOO76ZUMWHQXJCEHC2KUOF54N5673X/" source="SUSE-SU"/>
		<description>
This update for python-rsa fixes the following issues:

- CVE-2020-13757: Proper handling of leading '\0' bytes during decryption of ciphertext (bsc#1172389)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497911" comment="python2-rsa-3.4.2-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494053" comment="python3-rsa-3.4.2-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52313" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSHLMCUKP3HZEQVMO6GPO4MIFBHEZ53K/" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-09"/>
	<updated date="2021-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494054" comment="xterm-330-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494055" comment="xterm-bin-330-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52314" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187045" ref_url="https://bugzilla.suse.com/1187045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYARUF6IH56FOIKBV7PTO7AXODL5GKNT/" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2021-33503: Fixed a denial of service when the URL contained many @ characters in the authority component (bsc#1187045)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494329" comment="python3-urllib3-1.25.10-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52315" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1171257" ref_url="https://bugzilla.suse.com/1171257" source="BUGZILLA"/>
		<reference ref_id="1176293" ref_url="https://bugzilla.suse.com/1176293" source="BUGZILLA"/>
		<reference ref_id="1179831" ref_url="https://bugzilla.suse.com/1179831" source="BUGZILLA"/>
		<reference ref_id="1181368" ref_url="https://bugzilla.suse.com/1181368" source="BUGZILLA"/>
		<reference ref_id="1182281" ref_url="https://bugzilla.suse.com/1182281" source="BUGZILLA"/>
		<reference ref_id="1182293" ref_url="https://bugzilla.suse.com/1182293" source="BUGZILLA"/>
		<reference ref_id="1182382" ref_url="https://bugzilla.suse.com/1182382" source="BUGZILLA"/>
		<reference ref_id="1185092" ref_url="https://bugzilla.suse.com/1185092" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="1186674" ref_url="https://bugzilla.suse.com/1186674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315/" source="CVE"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028) 

- Check if dpkgnotify is executable (bsc#1186674)
- Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028)
- virt module updates
  * network: handle missing ipv4 netmask attribute
  * more network support
  * PCI/USB host devices passthrough support
- Set distro requirement to oldest supported version in requirements/base.txt
- Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382)
- Always require `python3-distro` (bsc#1182293)
- Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing
- Fix pkg states when DEB package has 'all' arch
- Do not force beacons configuration to be a list.
- Remove msgpack &lt; 1.0.0 from base requirements (bsc#1176293)
- msgpack support for version &gt;= 1.0.0 (bsc#1171257)
- Fix issue parsing errors in ansiblegate state module
- Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607)
- transactional_update: detect recursion in the executor
- Add subpackage salt-transactional-update (jsc#SLE-18033)
- Improvements on 'ansiblegate' module (bsc#1185092):
  * New methods: ansible.targets / ansible.discover_playbooks
- Add support for Alibaba Cloud Linux 2 (Aliyun Linux)
- Regression fix of salt-ssh on processing targets
- Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281)
- Add notify beacon for Debian/Ubuntu systems
- Fix zmq bug that causes salt-call to freeze (bsc#1181368)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1171257">SUSE bug 1171257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176293">SUSE bug 1176293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179831">SUSE bug 1179831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181368">SUSE bug 1181368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182281">SUSE bug 1182281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182293">SUSE bug 1182293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182382">SUSE bug 1182382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185092">SUSE bug 1185092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186674">SUSE bug 1186674</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498301" comment="python2-distro-1.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52316" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:2118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVZMDACJTLKYXDDR64S4Y6DEUXES6UKU/" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500177" comment="ovmf-202008-10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500178" comment="ovmf-tools-202008-10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621227" comment="qemu-ovmf-ia32-202008-10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500179" comment="qemu-ovmf-x86_64-202008-10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621228" comment="qemu-ovmf-x86_64-debug-202008-10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621229" comment="qemu-uefi-aarch32-202008-10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500180" comment="qemu-uefi-aarch64-202008-10.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52317" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot23 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187418" ref_url="https://bugzilla.suse.com/1187418" source="BUGZILLA"/>
		<reference ref_id="1187419" ref_url="https://bugzilla.suse.com/1187419" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157/" source="CVE"/>
		<reference ref_id="CVE-2021-33515" ref_url="https://www.suse.com/security/cve/CVE-2021-33515/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G567PZ5Z5XTMWM5HHQHCWSMCWQSOWCGA/" source="SUSE-SU"/>
		<description>
This update for dovecot23 fixes the following issues:

- CVE-2021-29157: Local attacker can login as any user and access their emails (bsc#1187418)
- CVE-2021-33515: Attacker can potentially steal user credentials and mails (bsc#1187419)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187418">SUSE bug 1187418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187419">SUSE bug 1187419</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33515/">CVE-2021-33515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499955" comment="dovecot23-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499956" comment="dovecot23-backend-mysql-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499957" comment="dovecot23-backend-pgsql-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499958" comment="dovecot23-backend-sqlite-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499959" comment="dovecot23-devel-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499960" comment="dovecot23-fts-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499961" comment="dovecot23-fts-lucene-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499962" comment="dovecot23-fts-solr-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499963" comment="dovecot23-fts-squat-2.3.11.3-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52318" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179930" ref_url="https://bugzilla.suse.com/1179930" source="BUGZILLA"/>
		<reference ref_id="1179931" ref_url="https://bugzilla.suse.com/1179931" source="BUGZILLA"/>
		<reference ref_id="1179932" ref_url="https://bugzilla.suse.com/1179932" source="BUGZILLA"/>
		<reference ref_id="1179933" ref_url="https://bugzilla.suse.com/1179933" source="BUGZILLA"/>
		<reference ref_id="1180102" ref_url="https://bugzilla.suse.com/1180102" source="BUGZILLA"/>
		<reference ref_id="1180232" ref_url="https://bugzilla.suse.com/1180232" source="BUGZILLA"/>
		<reference ref_id="1181598" ref_url="https://bugzilla.suse.com/1181598" source="BUGZILLA"/>
		<reference ref_id="1181599" ref_url="https://bugzilla.suse.com/1181599" source="BUGZILLA"/>
		<reference ref_id="1183353" ref_url="https://bugzilla.suse.com/1183353" source="BUGZILLA"/>
		<reference ref_id="1184110" ref_url="https://bugzilla.suse.com/1184110" source="BUGZILLA"/>
		<reference ref_id="1185128" ref_url="https://bugzilla.suse.com/1185128" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26418" ref_url="https://www.suse.com/security/cve/CVE-2020-26418/" source="CVE"/>
		<reference ref_id="CVE-2020-26419" ref_url="https://www.suse.com/security/cve/CVE-2020-26419/" source="CVE"/>
		<reference ref_id="CVE-2020-26420" ref_url="https://www.suse.com/security/cve/CVE-2020-26420/" source="CVE"/>
		<reference ref_id="CVE-2020-26421" ref_url="https://www.suse.com/security/cve/CVE-2020-26421/" source="CVE"/>
		<reference ref_id="CVE-2020-26422" ref_url="https://www.suse.com/security/cve/CVE-2020-26422/" source="CVE"/>
		<reference ref_id="CVE-2021-22173" ref_url="https://www.suse.com/security/cve/CVE-2021-22173/" source="CVE"/>
		<reference ref_id="CVE-2021-22174" ref_url="https://www.suse.com/security/cve/CVE-2021-22174/" source="CVE"/>
		<reference ref_id="CVE-2021-22191" ref_url="https://www.suse.com/security/cve/CVE-2021-22191/" source="CVE"/>
		<reference ref_id="CVE-2021-22207" ref_url="https://www.suse.com/security/cve/CVE-2021-22207/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
		<description>
This update for wireshark, libvirt, sbc and libqt5-qtmultimedia fixes the following issues:

Update wireshark to version 3.4.5

- New and updated support and bug fixes for multiple protocols
- Asynchronous DNS resolution is always enabled
- Protobuf fields can be dissected as Wireshark (header) fields
- UI improvements

Including security fixes for:

- CVE-2021-22191: Wireshark could open unsafe URLs (bsc#1183353).
- CVE-2021-22207: MS-WSP dissector excessive memory consumption (bsc#1185128)
- CVE-2020-26422: QUIC dissector crash (bsc#1180232)
- CVE-2020-26418: Kafka dissector memory leak (bsc#1179930)
- CVE-2020-26419: Multiple dissector memory leaks (bsc#1179931)
- CVE-2020-26420: RTPS dissector memory leak (bsc#1179932) 
- CVE-2020-26421: USB HID dissector crash (bsc#1179933)
- CVE-2021-22173: Fix USB HID dissector memory leak (bsc#1181598)
- CVE-2021-22174: Fix USB HID dissector crash (bsc#1181599)

libqt5-qtmultimedia and sbc are necessary dependencies. libvirt is needed to rebuild wireshark-plugin-libvirt.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179930">SUSE bug 1179930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179931">SUSE bug 1179931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179932">SUSE bug 1179932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179933">SUSE bug 1179933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180102">SUSE bug 1180102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180232">SUSE bug 1180232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181598">SUSE bug 1181598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181599">SUSE bug 1181599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183353">SUSE bug 1183353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184110">SUSE bug 1184110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185128">SUSE bug 1185128</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26418/">CVE-2020-26418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26419/">CVE-2020-26419</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26420/">CVE-2020-26420</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26421/">CVE-2020-26421</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26422/">CVE-2020-26422</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22173/">CVE-2021-22173</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22174/">CVE-2021-22174</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22191/">CVE-2021-22191</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22207/">CVE-2021-22207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494064" comment="libsbc1-1.3-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621265" comment="libsbc1-32bit-1.3-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494065" comment="libwireshark14-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494066" comment="libwiretap11-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494067" comment="libwsutil12-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625322" comment="sbc-1.3-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495822" comment="sbc-devel-1.3-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494068" comment="wireshark-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495823" comment="wireshark-devel-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495824" comment="wireshark-ui-qt-3.4.5-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52319" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187040" ref_url="https://bugzilla.suse.com/1187040" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13950" ref_url="https://www.suse.com/security/cve/CVE-2020-13950/" source="CVE"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-13950 [bsc#1187040]: mod_proxy NULL pointer dereference
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187040">SUSE bug 1187040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13950/">CVE-2020-13950</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494069" comment="apache2-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499964" comment="apache2-devel-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499965" comment="apache2-doc-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497924" comment="apache2-event-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625323" comment="apache2-example-pages-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494070" comment="apache2-prefork-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494071" comment="apache2-utils-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499966" comment="apache2-worker-2.4.43-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52320" version="1" class="patch">
	<metadata>
		<title>Security update for cryptctl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186226" ref_url="https://bugzilla.suse.com/1186226" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18906" ref_url="https://www.suse.com/security/cve/CVE-2019-18906/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZG2JNQUB6EYLM4HAOZIJV25FIOJAG6B6/" source="SUSE-SU"/>
		<description>
This update for cryptctl fixes the following issues:

Update to version 2.4:

- CVE-2019-18906: Client side password hashing was equivalent to clear text password storage (bsc#1186226)
- First step to use plain text password instead of hashed password.
- Move repository into the SUSE github organization
- in RPC server, if client comes from localhost, remember its ipv4 localhost address instead of ipv6 address
- tell a record to clear expired pending commands upon saving a command result; introduce pending commands RPC test case
- avoid hard coding 127.0.0.1 in host ID of alive message test; let system administrator mount and unmount disks by issuing these two commands on key server.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186226">SUSE bug 1186226</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18906/">CVE-2019-18906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494072" comment="cryptctl-2.4-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52321" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZAR7UXBYGOSW57CMLBEWIM7KTCVMXFZ/" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494073" comment="libhogweed4-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494074" comment="libhogweed4-32bit-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494075" comment="libnettle-devel-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621316" comment="libnettle-devel-32bit-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494076" comment="libnettle6-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494077" comment="libnettle6-32bit-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625324" comment="nettle-3.4.1-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52322" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OAEOIZP7UCK4NGUIUZ6IFRBR53WK6NVU/" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- Fixed plaintext password entries in logfiles (bsc#1184016).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499967" comment="freeradius-server-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499968" comment="freeradius-server-devel-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625325" comment="freeradius-server-doc-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499969" comment="freeradius-server-krb5-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499970" comment="freeradius-server-ldap-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499971" comment="freeradius-server-libs-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499972" comment="freeradius-server-mysql-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499973" comment="freeradius-server-perl-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499974" comment="freeradius-server-postgresql-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499975" comment="freeradius-server-python3-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499976" comment="freeradius-server-sqlite-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499977" comment="freeradius-server-utils-3.0.21-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52323" version="1" class="patch">
	<metadata>
		<title>Security update for gupnp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186590" ref_url="https://bugzilla.suse.com/1186590" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWMAQ7IJUIENIJYPPEUVGYSZ473DP5EV/" source="SUSE-SU"/>
		<description>
This update for gupnp fixes the following issues:

- CVE-2021-33516: Fixed a DNS rebinding, which could trick the browser into triggering actions against local UPnP services (bsc#1186590).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186590">SUSE bug 1186590</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495825" comment="libgupnp-1_2-0-1.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621338" comment="libgupnp-1_2-0-32bit-1.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497912" comment="libgupnp-devel-1.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497913" comment="typelib-1_0-GUPnP-1_0-1.2.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52324" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWBBOB3KB4MSVNKBUGK3UIYPYWCHNLS/" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625326" comment="libgcrypt-cavs-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494078" comment="libgcrypt-devel-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621352" comment="libgcrypt-devel-32bit-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494079" comment="libgcrypt20-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494080" comment="libgcrypt20-32bit-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494081" comment="libgcrypt20-hmac-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494082" comment="libgcrypt20-hmac-32bit-1.8.2-8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52325" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN5N7FWEJ6MCV273IVKMPXUXFO2LDVCF/" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495826" comment="libIlmImf-2_2-23-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621359" comment="libIlmImf-2_2-23-32bit-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495827" comment="libIlmImfUtil-2_2-23-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621362" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625327" comment="openexr-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495828" comment="openexr-devel-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625328" comment="openexr-doc-2.2.1-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52326" version="1" class="patch">
	<metadata>
		<title>Security update for bouncycastle (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186328" ref_url="https://bugzilla.suse.com/1186328" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15522" ref_url="https://www.suse.com/security/cve/CVE-2020-15522/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2163-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XW6YD6VRTKZILPJP3QZQB6MFPZKOQLU6/" source="SUSE-SU"/>
		<description>
This update for bouncycastle fixes the following issues:

- CVE-2020-15522: Fixed a timing issue within the EC math library (bsc#1186328).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186328">SUSE bug 1186328</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15522/">CVE-2020-15522</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496561" comment="bouncycastle-1.64-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621371" comment="bouncycastle-javadoc-1.64-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621372" comment="bouncycastle-mail-1.64-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496562" comment="bouncycastle-pg-1.64-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621373" comment="bouncycastle-pkix-1.64-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621374" comment="bouncycastle-tls-1.64-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52327" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DE7IGDIJ6QCS3LA5C7SC67VRDUWKSAEV/" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615873" comment="arpwatch-2.1a15-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625329" comment="arpwatch-ethercodes-build-2.1a15-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52328" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185570" ref_url="https://bugzilla.suse.com/1185570" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186155" ref_url="https://bugzilla.suse.com/1186155" source="BUGZILLA"/>
		<reference ref_id="1186286" ref_url="https://bugzilla.suse.com/1186286" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186472" ref_url="https://bugzilla.suse.com/1186472" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186677" ref_url="https://bugzilla.suse.com/1186677" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186885" ref_url="https://bugzilla.suse.com/1186885" source="BUGZILLA"/>
		<reference ref_id="1186928" ref_url="https://bugzilla.suse.com/1186928" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187039" ref_url="https://bugzilla.suse.com/1187039" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1187334" ref_url="https://bugzilla.suse.com/1187334" source="BUGZILLA"/>
		<reference ref_id="1187344" ref_url="https://bugzilla.suse.com/1187344" source="BUGZILLA"/>
		<reference ref_id="1187345" ref_url="https://bugzilla.suse.com/1187345" source="BUGZILLA"/>
		<reference ref_id="1187346" ref_url="https://bugzilla.suse.com/1187346" source="BUGZILLA"/>
		<reference ref_id="1187347" ref_url="https://bugzilla.suse.com/1187347" source="BUGZILLA"/>
		<reference ref_id="1187348" ref_url="https://bugzilla.suse.com/1187348" source="BUGZILLA"/>
		<reference ref_id="1187349" ref_url="https://bugzilla.suse.com/1187349" source="BUGZILLA"/>
		<reference ref_id="1187350" ref_url="https://bugzilla.suse.com/1187350" source="BUGZILLA"/>
		<reference ref_id="1187351" ref_url="https://bugzilla.suse.com/1187351" source="BUGZILLA"/>
		<reference ref_id="1187357" ref_url="https://bugzilla.suse.com/1187357" source="BUGZILLA"/>
		<reference ref_id="1187711" ref_url="https://bugzilla.suse.com/1187711" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. (bnc#1179610 bnc#1186463)
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free in drivers/infiniband/core/ucma.c which could be triggered if the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- ACPICA: Clean up context mutex during object deletion (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP EliteBook x360 1040 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Elite Dragonfly G2 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 840 Aero G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power G8 (git-fixes).
- ALSA: hda/realtek: headphone and mic do not work on an Acer laptop (git-fixes).
- ALSA: hda: update the power_state during the direct-complete (git-fixes).
- ALSA: seq: Fix race of snd_seq_timer_open() (git-fixes).
- ALSA: timer: Fix master timer notification (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ASoC: amd: fix for pcm_read() error (git-fixes).
- ASoC: cs43130: handle errors in cs43130_probe() properly (git-fixes).
- ASoC: Intel: soc-acpi: remove TGL RVP mixed SoundWire/TDM config (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1187357, bsc#1185570, bsc#1184631).
- bcache: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1187357).
- bcache: do not pass BIOSET_NEED_BVECS for the 'bio_set' embedded in 'cache_set' (bsc#1187357).
- bcache: fix a regression of code compiling failure in debug.c (bsc#1187357).
- bcache: inherit the optimal I/O size (bsc#1187357).
- bcache: reduce redundant code in bch_cached_dev_run() (bsc#1187357).
- bcache: remove bcache device self-defined readahead (bsc#1187357, bsc#1185570, bsc#1184631).
- bcache: remove PTR_CACHE (bsc#1187357).
- bcache: Use 64-bit arithmetic instead of 32-bit (bsc#1187357).
- bcache: use NULL instead of using plain integer as pointer (bsc#1187357).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- Bluetooth: fix the erroneous flush_work() order (git-fixes).
- brcmfmac: Add clm_blob firmware files to modinfo (bsc#1186677).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- char: hpet: add checks after calling ioremap (git-fixes).
- chelsio/chtls: unlock on error in chtls_pt_recvmsg() (jsc#SLE-15129).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4/ch_ktls: Clear resources when pf4 device is removed (jsc#SLE-15129).
- cxgb4: fix regression with HASH tc prio value update (jsc#SLE-15131).
- devlink: Correct VIRTUAL port to not have phys_port attributes (jsc#SLE-15172).
- dmaengine: idxd: add missing dsa driver unregister (git-fixes).
- dmaengine: idxd: Use cpu_feature_enabled() (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu/jpeg2.0: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/jpeg2.5: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/jpeg3: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/amdgpu: stop touching sched.ready in the backend (git-fixes).
- drm/amdgpu/vcn1: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/vcn2.0: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/vcn2.5: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/vcn3: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdkfd: correct sienna_cichlid SDMA RLC register offset error (git-fixes).
- drm/i915/selftests: Fix return value check in live_breadcrumbs_smoketest() (git-fixes).
- drm/mcde: Fix off by 10^3 in calculation (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/a6xx: fix incorrectly set uavflagprd_inv field for A650 (git-fixes).
- drm/msm/a6xx: update/fix CP_PROTECT initialization (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- efi/libstub: prevent read overflow in find_file_option() (git-fixes).
- Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691) 
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpio: wcd934x: Fix shift-out-of-bounds error (git-fixes).
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Update mgmt_msix_idx if num_ntfy changes (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: imx: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix allowing VF to request more/less queues via virtchnl (jsc#SLE-12878).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- ice: handle the VF VSI rebuild failure (jsc#SLE-12878).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iommu/amd: Keep track of amd_iommu_irq_remap state (https://bugzilla.kernel.org/show_bug.cgi?id=212133).
- iommu: Fix a boundary issue to avoid performance drop (bsc#1187344).
- iommu/virtio: Add missing MODULE_DEVICE_TABLE (bsc#1187345).
- iommu/vt-d: Remove WO permissions on second-level paging entries (bsc#1187346).
- iommu/vt-d: Report right snoop capability when using FL for IOVA (bsc#1187347).
- iommu/vt-d: Use user privilege for RID2PASID translation (bsc#1187348).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for rtw88 (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- lib: crc64: fix kernel-doc warning (bsc#1187357).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: bcache: avoid -Wempty-body warnings (bsc#1187357).
- md: bcache: Trivial typo fixes in the file journal.c (bsc#1187357).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mmc: sdhci: Clear unused bounce buffer at DMA mmap error path (bsc#1187039).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- netfilter: nf_tables: missing error reporting for not selected expressions (bsc#1176447).
- netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version (bsc#1176447).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: fix incorrect resp_msg issue (jsc#SLE-14777).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5e: Fix error path of updating netdev queues (jsc#SLE-15172).
- net/mlx5e: Fix incompatible casting (jsc#SLE-15172).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix null deref accessing lag dev (jsc#SLE-15172).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (jsc#SLE-15172).
- net/mlx5: Set reformat action when needed for termination rules (jsc#SLE-15172).
- net/mlx5: Set term table as an unmanaged flow table (jsc#SLE-15172).
- net/sched: act_ct: Offload connections with commit action (jsc#SLE-15172).
- net/sched: fq_pie: fix OOB access in the traffic path (jsc#SLE-15172).
- net/sched: fq_pie: re-factor fix for fq_pie endless loop (jsc#SLE-15172).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- net: zero-initialize tc skb extension on allocation (bsc#1176447).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv42: Copy offload should update the file size when appropriate (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- nvme: add new line after variable declatation (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: document nvme controller states (git-fixes).
- nvme: do not check nvme_req flags for new req (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: mark nvme_setup_passsthru() inline (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259, bsc#1186155).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme: reduce checks for zero command effects (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: rename nvme_init_identify() (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: split init identify into helper (bsc#1184259, bsc#1178612, bsc#1186155).
- nvmet: use new ana_log_size instead the old one (bsc#1178612, bsc#1184259, bsc#1186155).
- nvme: use NVME_CTRL_CMIC_ANA macro (bsc#1184259, bsc#1178612, bsc#1186155).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- powerpc/32: Fix boot failure with CONFIG_STACKPROTECTOR (jsc#SLE-13847 git-fixes).
- powerpc/kprobes: Fix validation of prefixed instructions across page boundary (jsc#SLE-13847 git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- rtw88: 8822c: add LC calibration for RTL8822C (git-fixes).
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning &amp; CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: smartpqi: Add additional logging for LUN resets (bsc#1186472).
- scsi: smartpqi: Add host level stream detection enable (bsc#1186472).
- scsi: smartpqi: Add new PCI IDs (bsc#1186472).
- scsi: smartpqi: Add phy ID support for the physical drives (bsc#1186472).
- scsi: smartpqi: Add stream detection (bsc#1186472).
- scsi: smartpqi: Add support for BMIC sense feature cmd and feature bits (bsc#1186472).
- scsi: smartpqi: Add support for long firmware version (bsc#1186472).
- scsi: smartpqi: Add support for new product ids (bsc#1186472).
- scsi: smartpqi: Add support for RAID1 writes (bsc#1186472).
- scsi: smartpqi: Add support for RAID5 and RAID6 writes (bsc#1186472).
- scsi: smartpqi: Add support for wwid (bsc#1186472).
- scsi: smartpqi: Align code with oob driver (bsc#1186472).
- scsi: smartpqi: Convert snprintf() to scnprintf() (bsc#1186472).
- scsi: smartpqi: Correct request leakage during reset operations (bsc#1186472).
- scsi: smartpqi: Correct system hangs when resuming from hibernation (bsc#1186472).
- scsi: smartpqi: Disable WRITE SAME for HBA NVMe disks (bsc#1186472).
- scsi: smartpqi: Fix blocks_per_row static checker issue (bsc#1186472).
- scsi: smartpqi: Fix device pointer variable reference static checker issue (bsc#1186472).
- scsi: smartpqi: Fix driver synchronization issues (bsc#1186472).
- scsi: smartpqi: Refactor aio submission code (bsc#1186472).
- scsi: smartpqi: Refactor scatterlist code (bsc#1186472).
- scsi: smartpqi: Remove timeouts from internal cmds (bsc#1186472).
- scsi: smartpqi: Remove unused functions (bsc#1186472).
- scsi: smartpqi: Synchronize device resets with mutex (bsc#1186472).
- scsi: smartpqi: Update device scan operations (bsc#1186472).
- scsi: smartpqi: Update enclosure identifier in sysfs (bsc#1186472).
- scsi: smartpqi: Update event handler (bsc#1186472).
- scsi: smartpqi: Update OFA management (bsc#1186472).
- scsi: smartpqi: Update RAID bypass handling (bsc#1186472).
- scsi: smartpqi: Update SAS initiator_port_protocols and target_port_protocols (bsc#1186472).
- scsi: smartpqi: Update soft reset management for OFA (bsc#1186472).
- scsi: smartpqi: Update suspend/resume and shutdown (bsc#1186472).
- scsi: smartpqi: Update version to 2.1.8-045 (bsc#1186472).
- scsi: smartpqi: Use host-wide tag space (bsc#1186472).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- serial: 8250_pci: handle FL_NOIRQ board flag (git-fixes).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- thunderbolt: usb4: Fix NVM read buffer bounds and offset issue (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- UCSI fixup of array of PDOs (git-fixes).
- usb: chipidea: imx: Fix Battery Charger 1.2 CDP detection (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- usb: typec: intel_pmc_mux: Put fwnode in error case during -&gt;probe() (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/boot/64: Explicitly map boot_params and command line (jsc#SLE-14337).
- x86/boot/compressed/64: Add 32-bit boot #VC handler (jsc#SLE-14337).
- x86/boot/compressed/64: Add CPUID sanity check to 32-bit boot-path (jsc#SLE-14337).
- x86/boot/compressed/64: Check SEV encryption in 64-bit boot-path (jsc#SLE-14337).
- x86/boot/compressed/64: Check SEV encryption in the 32-bit boot-path (jsc#SLE-14337).
- x86/boot/compressed/64: Cleanup exception handling before booting kernel (jsc#SLE-14337).
- x86/boot/compressed/64: Introduce sev_status (jsc#SLE-14337).
- x86/boot/compressed/64: Reload CS in startup_32 (jsc#SLE-14337).
- x86/boot/compressed/64: Sanity-check CPUID results in the early #VC handler (jsc#SLE-14337).
- x86/boot/compressed/64: Setup IDT in startup_32 boot path (jsc#SLE-14337).
- x86/cpufeatures: Force disable X86_FEATURE_ENQCMD and remove update_pasid() (bsc#1178134).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- x86/fpu: Prevent state corruption in __fpu__restore_sig() (bsc#1178134).
- x86/head/64: Check SEV encryption before switching to kernel page-table (jsc#SLE-14337).
- x86/head/64: Disable stack protection for head$(BITS).o (jsc#SLE-14337).
- x86/ioremap: Map efi_mem_reserve() memory as encrypted for SEV (bsc#1186885).
- x86/sev: Check SME/SEV support in CPUID first (jsc#SLE-14337).
- x86/sev: Do not require Hypervisor CPUID bit for SEV guests (jsc#SLE-14337).
- x86/sev-es: Do not return NULL from sev_es_get_ghcb() (bsc#1187349).
- x86/sev-es: Do not support MMIO to/from encrypted memory (jsc#SLE-14337).
- x86/sev-es: Forward page-faults which happen during emulation (bsc#1187350).
- x86/sev-es: Replace open-coded hlt-loops with sev_es_terminate() (jsc#SLE-14337).
- x86/sev-es: Use __put_user()/__get_user() for data accesses (bsc#1187351).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185570">SUSE bug 1185570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186155">SUSE bug 1186155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186286">SUSE bug 1186286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186472">SUSE bug 1186472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186677">SUSE bug 1186677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186885">SUSE bug 1186885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186928">SUSE bug 1186928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187039">SUSE bug 1187039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187334">SUSE bug 1187334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187344">SUSE bug 1187344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187345">SUSE bug 1187345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187346">SUSE bug 1187346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187347">SUSE bug 1187347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187348">SUSE bug 1187348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187349">SUSE bug 1187349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187350">SUSE bug 1187350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187351">SUSE bug 1187351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187357">SUSE bug 1187357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187711">SUSE bug 1187711</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009621377" comment="cluster-md-kmp-64kb-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615914" comment="cluster-md-kmp-default-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621378" comment="cluster-md-kmp-preempt-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621379" comment="dlm-kmp-64kb-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615915" comment="dlm-kmp-default-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621380" comment="dlm-kmp-preempt-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621381" comment="gfs2-kmp-64kb-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615916" comment="gfs2-kmp-default-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621382" comment="gfs2-kmp-preempt-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615876" comment="kernel-64kb-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615877" comment="kernel-64kb-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621383" comment="kernel-64kb-extra-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621384" comment="kernel-64kb-livepatch-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621385" comment="kernel-64kb-optional-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621386" comment="kernel-debug-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621387" comment="kernel-debug-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621388" comment="kernel-debug-livepatch-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615878" comment="kernel-default-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615879" comment="kernel-default-base-5.3.18-59.10.1.18.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621389" comment="kernel-default-base-rebuild-5.3.18-59.10.1.18.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615880" comment="kernel-default-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621390" comment="kernel-default-extra-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621391" comment="kernel-default-livepatch-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621392" comment="kernel-default-livepatch-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621393" comment="kernel-default-optional-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615881" comment="kernel-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615897" comment="kernel-docs-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621394" comment="kernel-docs-html-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621395" comment="kernel-kvmsmall-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621396" comment="kernel-kvmsmall-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621397" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615882" comment="kernel-macros-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615898" comment="kernel-obs-build-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621399" comment="kernel-obs-qa-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615883" comment="kernel-preempt-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615899" comment="kernel-preempt-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621400" comment="kernel-preempt-extra-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621401" comment="kernel-preempt-livepatch-devel-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621402" comment="kernel-preempt-optional-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615900" comment="kernel-source-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621403" comment="kernel-source-vanilla-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615901" comment="kernel-syms-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615884" comment="kernel-zfcpdump-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621404" comment="kselftests-kmp-64kb-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621405" comment="kselftests-kmp-default-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621406" comment="kselftests-kmp-preempt-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621407" comment="ocfs2-kmp-64kb-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615917" comment="ocfs2-kmp-default-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621408" comment="ocfs2-kmp-preempt-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621409" comment="reiserfs-kmp-64kb-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615902" comment="reiserfs-kmp-default-5.3.18-59.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621410" comment="reiserfs-kmp-preempt-5.3.18-59.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52329" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1186622" ref_url="https://bugzilla.suse.com/1186622" source="BUGZILLA"/>
		<reference ref_id="1187443" ref_url="https://bugzilla.suse.com/1187443" source="BUGZILLA"/>
		<reference ref_id="1187444" ref_url="https://bugzilla.suse.com/1187444" source="BUGZILLA"/>
		<reference ref_id="1187445" ref_url="https://bugzilla.suse.com/1187445" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to 1.16.5.

Includes these security fixes 

- CVE-2021-33195: net: Lookup functions may return invalid host names (bsc#1187443).
- CVE-2021-33196: archive/zip: malformed archive may cause panic or memory exhaustion (bsc#1186622).
- CVE-2021-33197: net/http/httputil: ReverseProxy forwards Connection headers if first one is empty (bsc#1187444)
- CVE-2021-33198: math/big: (*Rat).SetString with '1.770p02041010010011001001' crashes with 'makeslice: len out of range' (bsc#1187445).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186622">SUSE bug 1186622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187443">SUSE bug 1187443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187444">SUSE bug 1187444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187445">SUSE bug 1187445</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615799" comment="go1.16-1.16.5-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615800" comment="go1.16-doc-1.16.5-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615801" comment="go1.16-race-1.16.5-1.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52330" version="1" class="patch">
	<metadata>
		<title>Security update for lua53 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175448" ref_url="https://bugzilla.suse.com/1175448" source="BUGZILLA"/>
		<reference ref_id="1175449" ref_url="https://bugzilla.suse.com/1175449" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
		<description>
This update for lua53 fixes the following issues:

Update to version 5.3.6:

- CVE-2020-24371: lgc.c mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage (bsc#1175449)
- CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault in getlocal and setlocal (bsc#1175448)
- Long brackets with a huge number of '=' overflow some internal buffer arithmetic.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-10"/>
	<updated date="2021-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175448">SUSE bug 1175448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175449">SUSE bug 1175449</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494048" comment="liblua5_3-5-5.3.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494049" comment="liblua5_3-5-32bit-5.3.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494050" comment="lua53-5.3.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494051" comment="lua53-devel-5.3.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621417" comment="lua53-doc-5.3.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52331" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185570" ref_url="https://bugzilla.suse.com/1185570" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186155" ref_url="https://bugzilla.suse.com/1186155" source="BUGZILLA"/>
		<reference ref_id="1186286" ref_url="https://bugzilla.suse.com/1186286" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186472" ref_url="https://bugzilla.suse.com/1186472" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186677" ref_url="https://bugzilla.suse.com/1186677" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186885" ref_url="https://bugzilla.suse.com/1186885" source="BUGZILLA"/>
		<reference ref_id="1186928" ref_url="https://bugzilla.suse.com/1186928" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187039" ref_url="https://bugzilla.suse.com/1187039" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1187334" ref_url="https://bugzilla.suse.com/1187334" source="BUGZILLA"/>
		<reference ref_id="1187344" ref_url="https://bugzilla.suse.com/1187344" source="BUGZILLA"/>
		<reference ref_id="1187345" ref_url="https://bugzilla.suse.com/1187345" source="BUGZILLA"/>
		<reference ref_id="1187346" ref_url="https://bugzilla.suse.com/1187346" source="BUGZILLA"/>
		<reference ref_id="1187347" ref_url="https://bugzilla.suse.com/1187347" source="BUGZILLA"/>
		<reference ref_id="1187348" ref_url="https://bugzilla.suse.com/1187348" source="BUGZILLA"/>
		<reference ref_id="1187349" ref_url="https://bugzilla.suse.com/1187349" source="BUGZILLA"/>
		<reference ref_id="1187350" ref_url="https://bugzilla.suse.com/1187350" source="BUGZILLA"/>
		<reference ref_id="1187351" ref_url="https://bugzilla.suse.com/1187351" source="BUGZILLA"/>
		<reference ref_id="1187357" ref_url="https://bugzilla.suse.com/1187357" source="BUGZILLA"/>
		<reference ref_id="1187711" ref_url="https://bugzilla.suse.com/1187711" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. (bnc#1179610 bnc#1186463)
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free in drivers/infiniband/core/ucma.c which could be triggered if the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-36386: Fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- ACPICA: Clean up context mutex during object deletion (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Elite Dragonfly G2 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP EliteBook x360 1040 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 840 Aero G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power G8 (git-fixes).
- ALSA: hda/realtek: headphone and mic do not work on an Acer laptop (git-fixes).
- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- ALSA: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- ALSA: hda: update the power_state during the direct-complete (git-fixes).
- ALSA: seq: Fix race of snd_seq_timer_open() (git-fixes).
- ALSA: timer: Fix master timer notification (git-fixes).
- ASoC: Intel: soc-acpi: remove TGL RVP mixed SoundWire/TDM config (git-fixes).
- ASoC: amd: fix for pcm_read() error (git-fixes).
- ASoC: cs43130: handle errors in cs43130_probe() properly (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- Bluetooth: fix the erroneous flush_work() order (git-fixes).
- Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv42: Copy offload should update the file size when appropriate (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- UCSI fixup of array of PDOs (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- bcache: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1187357).
- bcache: Use 64-bit arithmetic instead of 32-bit (bsc#1187357).
- bcache: avoid oversized read request in cache missing code path (bsc#1187357, bsc#1185570, bsc#1184631).
- bcache: do not pass BIOSET_NEED_BVECS for the 'bio_set' embedded in 'cache_set' (bsc#1187357).
- bcache: fix a regression of code compiling failure in debug.c (bsc#1187357).
- bcache: inherit the optimal I/O size (bsc#1187357).
- bcache: reduce redundant code in bch_cached_dev_run() (bsc#1187357).
- bcache: remove PTR_CACHE (bsc#1187357).
- bcache: remove bcache device self-defined readahead (bsc#1187357, bsc#1185570, bsc#1184631).
- bcache: use NULL instead of using plain integer as pointer (bsc#1187357).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- brcmfmac: Add clm_blob firmware files to modinfo (bsc#1186677).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- char: hpet: add checks after calling ioremap (git-fixes).
- chelsio/chtls: unlock on error in chtls_pt_recvmsg() (jsc#SLE-15129).
- cxgb4/ch_ktls: Clear resources when pf4 device is removed (jsc#SLE-15129).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix regression with HASH tc prio value update (jsc#SLE-15131).
- devlink: Correct VIRTUAL port to not have phys_port attributes (jsc#SLE-15172).
- dmaengine: idxd: Use cpu_feature_enabled() (git-fixes).
- dmaengine: idxd: add missing dsa driver unregister (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu/jpeg2.0: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/jpeg2.5: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/jpeg3: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/vcn1: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/vcn2.0: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/vcn2.5: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu/vcn3: add cancel_delayed_work_sync before power gate (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/amdgpu: stop touching sched.ready in the backend (git-fixes).
- drm/amdkfd: correct sienna_cichlid SDMA RLC register offset error (git-fixes).
- drm/i915/selftests: Fix return value check in live_breadcrumbs_smoketest() (git-fixes).
- drm/mcde: Fix off by 10^3 in calculation (git-fixes).
- drm/msm/a6xx: fix incorrectly set uavflagprd_inv field for A650 (git-fixes).
- drm/msm/a6xx: update/fix CP_PROTECT initialization (git-fixes).
- efi/libstub: prevent read overflow in find_file_option() (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpio: wcd934x: Fix shift-out-of-bounds error (git-fixes).
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Update mgmt_msix_idx if num_ntfy changes (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- i2c: imx: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- ice: Fix allowing VF to request more/less queues via virtchnl (jsc#SLE-12878).
- ice: handle the VF VSI rebuild failure (jsc#SLE-12878).
- iommu/amd: Keep track of amd_iommu_irq_remap state (https://bugzilla.kernel.org/show_bug.cgi?id=212133).
- iommu/virtio: Add missing MODULE_DEVICE_TABLE (bsc#1187345).
- iommu/vt-d: Remove WO permissions on second-level paging entries (bsc#1187346).
- iommu/vt-d: Report right snoop capability when using FL for IOVA (bsc#1187347).
- iommu/vt-d: Use user privilege for RID2PASID translation (bsc#1187348).
- iommu: Fix a boundary issue to avoid performance drop (bsc#1187344).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for rtw88 (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- lib: crc64: fix kernel-doc warning (bsc#1187357).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- md: bcache: Trivial typo fixes in the file journal.c (bsc#1187357).
- md: bcache: avoid -Wempty-body warnings (bsc#1187357).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: sdhci: Clear unused bounce buffer at DMA mmap error path (bsc#1187039).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Set reformat action when needed for termination rules (jsc#SLE-15172).
- net/mlx5: Set term table as an unmanaged flow table (jsc#SLE-15172).
- net/mlx5e: Fix error path of updating netdev queues (jsc#SLE-15172).
- net/mlx5e: Fix incompatible casting (jsc#SLE-15172).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix null deref accessing lag dev (jsc#SLE-15172).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (jsc#SLE-15172).
- net/sched: act_ct: Offload connections with commit action (jsc#SLE-15172).
- net/sched: fq_pie: fix OOB access in the traffic path (jsc#SLE-15172).
- net/sched: fq_pie: re-factor fix for fq_pie endless loop (jsc#SLE-15172).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: fix incorrect resp_msg issue (jsc#SLE-14777).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: zero-initialize tc skb extension on allocation (bsc#1176447).
- netfilter: nf_tables: missing error reporting for not selected expressions (bsc#1176447).
- netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version (bsc#1176447).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259, bsc#1186155).
- nvme: add new line after variable declatation (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: do not check nvme_req flags for new req (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: mark nvme_setup_passsthru() inline (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: reduce checks for zero command effects (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: rename nvme_init_identify() (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: split init identify into helper (bsc#1184259, bsc#1178612, bsc#1186155).
- nvme: use NVME_CTRL_CMIC_ANA macro (bsc#1184259, bsc#1178612, bsc#1186155).
- nvmet: use new ana_log_size instead the old one (bsc#1178612, bsc#1184259, bsc#1186155).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- powerpc/32: Fix boot failure with CONFIG_STACKPROTECTOR (jsc#SLE-13847 git-fixes).
- powerpc/kprobes: Fix validation of prefixed instructions across page boundary (jsc#SLE-13847 git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- rtw88: 8822c: add LC calibration for RTL8822C (git-fixes).
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning &amp; CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: smartpqi: Add additional logging for LUN resets (bsc#1186472).
- scsi: smartpqi: Add host level stream detection enable (bsc#1186472).
- scsi: smartpqi: Add new PCI IDs (bsc#1186472).
- scsi: smartpqi: Add phy ID support for the physical drives (bsc#1186472).
- scsi: smartpqi: Add stream detection (bsc#1186472).
- scsi: smartpqi: Add support for BMIC sense feature cmd and feature bits (bsc#1186472).
- scsi: smartpqi: Add support for RAID1 writes (bsc#1186472).
- scsi: smartpqi: Add support for RAID5 and RAID6 writes (bsc#1186472).
- scsi: smartpqi: Add support for long firmware version (bsc#1186472).
- scsi: smartpqi: Add support for new product ids (bsc#1186472).
- scsi: smartpqi: Add support for wwid (bsc#1186472).
- scsi: smartpqi: Align code with oob driver (bsc#1186472).
- scsi: smartpqi: Convert snprintf() to scnprintf() (bsc#1186472).
- scsi: smartpqi: Correct request leakage during reset operations (bsc#1186472).
- scsi: smartpqi: Correct system hangs when resuming from hibernation (bsc#1186472).
- scsi: smartpqi: Disable WRITE SAME for HBA NVMe disks (bsc#1186472).
- scsi: smartpqi: Fix blocks_per_row static checker issue (bsc#1186472).
- scsi: smartpqi: Fix device pointer variable reference static checker issue (bsc#1186472).
- scsi: smartpqi: Fix driver synchronization issues (bsc#1186472).
- scsi: smartpqi: Refactor aio submission code (bsc#1186472).
- scsi: smartpqi: Refactor scatterlist code (bsc#1186472).
- scsi: smartpqi: Remove timeouts from internal cmds (bsc#1186472).
- scsi: smartpqi: Remove unused functions (bsc#1186472).
- scsi: smartpqi: Synchronize device resets with mutex (bsc#1186472).
- scsi: smartpqi: Update OFA management (bsc#1186472).
- scsi: smartpqi: Update RAID bypass handling (bsc#1186472).
- scsi: smartpqi: Update SAS initiator_port_protocols and target_port_protocols (bsc#1186472).
- scsi: smartpqi: Update device scan operations (bsc#1186472).
- scsi: smartpqi: Update enclosure identifier in sysfs (bsc#1186472).
- scsi: smartpqi: Update event handler (bsc#1186472).
- scsi: smartpqi: Update soft reset management for OFA (bsc#1186472).
- scsi: smartpqi: Update suspend/resume and shutdown (bsc#1186472).
- scsi: smartpqi: Update version to 2.1.8-045 (bsc#1186472).
- scsi: smartpqi: Use host-wide tag space (bsc#1186472).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: 8250_pci: handle FL_NOIRQ board flag (git-fixes).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- thunderbolt: usb4: Fix NVM read buffer bounds and offset issue (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: chipidea: imx: Fix Battery Charger 1.2 CDP detection (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- usb: typec: intel_pmc_mux: Put fwnode in error case during -&gt;probe() (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/boot/64: Explicitly map boot_params and command line (jsc#SLE-14337).
- x86/boot/compressed/64: Add 32-bit boot #VC handler (jsc#SLE-14337).
- x86/boot/compressed/64: Add CPUID sanity check to 32-bit boot-path (jsc#SLE-14337).
- x86/boot/compressed/64: Check SEV encryption in 64-bit boot-path (jsc#SLE-14337).
- x86/boot/compressed/64: Check SEV encryption in the 32-bit boot-path (jsc#SLE-14337).
- x86/boot/compressed/64: Cleanup exception handling before booting kernel (jsc#SLE-14337).
- x86/boot/compressed/64: Introduce sev_status (jsc#SLE-14337).
- x86/boot/compressed/64: Reload CS in startup_32 (jsc#SLE-14337).
- x86/boot/compressed/64: Sanity-check CPUID results in the early #VC handler (jsc#SLE-14337).
- x86/boot/compressed/64: Setup IDT in startup_32 boot path (jsc#SLE-14337).
- x86/cpufeatures: Force disable X86_FEATURE_ENQCMD and remove update_pasid() (bsc#1178134).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/fpu: Prevent state corruption in __fpu__restore_sig() (bsc#1178134).
- x86/head/64: Check SEV encryption before switching to kernel page-table (jsc#SLE-14337).
- x86/head/64: Disable stack protection for head$(BITS).o (jsc#SLE-14337).
- x86/ioremap: Map efi_mem_reserve() memory as encrypted for SEV (bsc#1186885).
- x86/sev-es: Do not return NULL from sev_es_get_ghcb() (bsc#1187349).
- x86/sev-es: Do not support MMIO to/from encrypted memory (jsc#SLE-14337).
- x86/sev-es: Forward page-faults which happen during emulation (bsc#1187350).
- x86/sev-es: Replace open-coded hlt-loops with sev_es_terminate() (jsc#SLE-14337).
- x86/sev-es: Use __put_user()/__get_user() for data accesses (bsc#1187351).
- x86/sev: Check SME/SEV support in CPUID first (jsc#SLE-14337).
- x86/sev: Do not require Hypervisor CPUID bit for SEV guests (jsc#SLE-14337).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-29"/>
	<updated date="2021-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185570">SUSE bug 1185570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186155">SUSE bug 1186155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186286">SUSE bug 1186286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186472">SUSE bug 1186472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186677">SUSE bug 1186677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186885">SUSE bug 1186885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186928">SUSE bug 1186928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187039">SUSE bug 1187039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187334">SUSE bug 1187334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187344">SUSE bug 1187344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187345">SUSE bug 1187345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187346">SUSE bug 1187346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187347">SUSE bug 1187347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187348">SUSE bug 1187348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187349">SUSE bug 1187349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187350">SUSE bug 1187350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187351">SUSE bug 1187351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187357">SUSE bug 1187357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187711">SUSE bug 1187711</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009621419" comment="cluster-md-kmp-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621420" comment="dlm-kmp-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621421" comment="gfs2-kmp-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615909" comment="kernel-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615910" comment="kernel-azure-devel-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621422" comment="kernel-azure-extra-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621423" comment="kernel-azure-livepatch-devel-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621424" comment="kernel-azure-optional-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615911" comment="kernel-devel-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615912" comment="kernel-source-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615913" comment="kernel-syms-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621425" comment="kselftests-kmp-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621426" comment="ocfs2-kmp-azure-5.3.18-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621427" comment="reiserfs-kmp-azure-5.3.18-38.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52332" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185981" ref_url="https://bugzilla.suse.com/1185981" source="BUGZILLA"/>
		<reference ref_id="1185990" ref_url="https://bugzilla.suse.com/1185990" source="BUGZILLA"/>
		<reference ref_id="1186010" ref_url="https://bugzilla.suse.com/1186010" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544/" source="CVE"/>
		<reference ref_id="CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545/" source="CVE"/>
		<reference ref_id="CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIASIXLUG5DPOL6IUP6OEGC7XFEJQSHY/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-3546: Fixed out-of-bounds write in virgl_cmd_get_capset (bsc#1185981).
- CVE-2021-3544: Fixed memory leaks found in the virtio vhost-user GPU device (bsc#1186010).
- CVE-2021-3545: Fixed information disclosure due to uninitialized memory read (bsc#1185990).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-09"/>
	<updated date="2021-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185990">SUSE bug 1185990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186010">SUSE bug 1186010</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500143" comment="qemu-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625330" comment="qemu-arm-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625331" comment="qemu-audio-alsa-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625332" comment="qemu-audio-pa-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625333" comment="qemu-audio-spice-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500148" comment="qemu-block-curl-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625334" comment="qemu-block-dmg-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625335" comment="qemu-block-gluster-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500149" comment="qemu-block-iscsi-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625336" comment="qemu-block-nfs-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500150" comment="qemu-block-rbd-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500151" comment="qemu-block-ssh-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500152" comment="qemu-chardev-baum-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625337" comment="qemu-chardev-spice-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625338" comment="qemu-extra-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500154" comment="qemu-guest-agent-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625339" comment="qemu-hw-display-qxl-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625340" comment="qemu-hw-display-virtio-gpu-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625341" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625342" comment="qemu-hw-display-virtio-vga-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625343" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625344" comment="qemu-hw-usb-redirect-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625345" comment="qemu-hw-usb-smartcard-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500161" comment="qemu-ipxe-1.0.0+-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625346" comment="qemu-ivshmem-tools-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500162" comment="qemu-ksm-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500163" comment="qemu-kvm-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500164" comment="qemu-lang-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009621498" comment="qemu-microvm-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625347" comment="qemu-ppc-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625348" comment="qemu-s390x-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500167" comment="qemu-seabios-1.14.0_0_g155821a-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500168" comment="qemu-sgabios-8-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500169" comment="qemu-skiboot-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494328" comment="qemu-tools-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500170" comment="qemu-ui-curses-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625349" comment="qemu-ui-gtk-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625350" comment="qemu-ui-opengl-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625351" comment="qemu-ui-spice-app-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625352" comment="qemu-ui-spice-core-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500175" comment="qemu-vgabios-1.14.0_0_g155821a-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625353" comment="qemu-vhost-user-gpu-5.2.0-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625354" comment="qemu-x86-5.2.0-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52333" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1186622" ref_url="https://bugzilla.suse.com/1186622" source="BUGZILLA"/>
		<reference ref_id="1187443" ref_url="https://bugzilla.suse.com/1187443" source="BUGZILLA"/>
		<reference ref_id="1187444" ref_url="https://bugzilla.suse.com/1187444" source="BUGZILLA"/>
		<reference ref_id="1187445" ref_url="https://bugzilla.suse.com/1187445" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

Update to 1.15.13.
    
Includes these security fixes 

- CVE-2021-33195: net: Lookup functions may return invalid host names (bsc#1187443).
- CVE-2021-33196: archive/zip: malformed archive may cause panic or memory exhaustion (bsc#1186622).
- CVE-2021-33197: net/http/httputil: ReverseProxy forwards Connection headers if first one is empty (bsc#1187444)
- CVE-2021-33198: math/big: (*Rat).SetString with '1.770p02041010010011001001' crashes with 'makeslice: len out of range' (bsc#1187445).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186622">SUSE bug 1186622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187443">SUSE bug 1187443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187444">SUSE bug 1187444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187445">SUSE bug 1187445</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615796" comment="go1.15-1.15.13-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615797" comment="go1.15-doc-1.15.13-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615798" comment="go1.15-race-1.15.13-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52334" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-20286" ref_url="https://www.suse.com/security/cve/CVE-2021-20286/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNYSQCMH37A42AG5LXPHSQQ6STSS3ZPT/" source="SUSE-SU"/>
		<description>
This update for kubevirt fixes the following issues:

General:

- Updated kubevirt to version 0.40.0
- Fixed an issue when calling `virsh-domcapabilities`
- Fixed the the wrong registry path for containers.

Security fixes:

- CVE-2021-20286: A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go
  in ilb/opt.c may lead to denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-11"/>
	<updated date="2021-07-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20286/">CVE-2021-20286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494433" comment="kubevirt-container-disk-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624273" comment="kubevirt-manifests-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624337" comment="kubevirt-tests-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494434" comment="kubevirt-virt-api-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494435" comment="kubevirt-virt-controller-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494436" comment="kubevirt-virt-handler-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494437" comment="kubevirt-virt-launcher-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494438" comment="kubevirt-virt-operator-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494426" comment="kubevirt-virtctl-0.40.0-5.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52335" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2021-0129,CVE-2020-26558: Check bluetooth security flags (bsc#1186463).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615874" comment="bluez-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624651" comment="bluez-auto-enable-devices-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625355" comment="bluez-cups-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625356" comment="bluez-deprecated-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615895" comment="bluez-devel-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624655" comment="bluez-devel-32bit-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625357" comment="bluez-test-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615875" comment="libbluetooth3-5.55-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624659" comment="libbluetooth3-32bit-5.55-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52336" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPWMH7OQGRFBQ2ZFL5Z3HCT443A45EIB/" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a use-after-free or potential undefined behaviour caused by shared UID's (bsc#1187105)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615791" comment="dbus-1-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615792" comment="dbus-1-devel-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624663" comment="dbus-1-devel-32bit-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624665" comment="dbus-1-devel-doc-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615793" comment="dbus-1-x11-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615794" comment="libdbus-1-3-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615795" comment="libdbus-1-3-32bit-1.12.2-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52337" version="1" class="patch">
	<metadata>
		<title>Security update for jdom2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187446" ref_url="https://bugzilla.suse.com/1187446" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33813" ref_url="https://www.suse.com/security/cve/CVE-2021-33813/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W33THYYFJ4Y4WPUQN66D2YC35Q6ZTRU/" source="SUSE-SU"/>
		<description>
This update for jdom2 fixes the following issues:

- CVE-2021-33813: XXE issue in SAXBuilder can cause a denial of service via a crafted HTTP request (bsc#1187446)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187446">SUSE bug 1187446</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33813/">CVE-2021-33813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615896" comment="jdom2-2.0.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624669" comment="jdom2-javadoc-2.0.6-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52338" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186722" ref_url="https://bugzilla.suse.com/1186722" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32625" ref_url="https://www.suse.com/security/cve/CVE-2021-32625/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLTYT5RW6FV5TOAPS5PDVLVHX5MWJZGB/" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

- Upgrade to 6.0.14
- CVE-2021-32625: An integer overflow bug could be exploited by using the STRALGO LCS command to cause remote remote code execution (bsc#1186722)
- Fix crash in UNLINK on a stream key with deleted consumer groups
- SINTERSTORE: Add missing keyspace del event when none of the sources exist
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186722">SUSE bug 1186722</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32625/">CVE-2021-32625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624065" comment="redis-6.0.14-6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52339" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1176919" ref_url="https://bugzilla.suse.com/1176919" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183682" ref_url="https://bugzilla.suse.com/1183682" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1186071" ref_url="https://bugzilla.suse.com/1186071" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)

The following non-security bugs were fixed:

- 0001-x86-sched-Treat-Intel-SNC-topology-as-default-COD-as.patch: (bsc#1187263).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- asm-generic/hyperv: Add missing function prototypes per -W1 warnings (bsc#1186071).
- ASoC: fsl-asoc-card: Set .owner attribute when registering card (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: rt5682: Fix the fast discharge for headset unplugging in soundwire mode (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ASoC: tas2562: Fix TDM_CFG0_SAMPRATE values (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- block: Discard page cache of zone reset target range (bsc#1187402).
- Bluetooth: Add a new USB ID for RTL8822CE (git-fixes).
- Bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1177028).
- bpf: Fix libelf endian handling in resolv_btfids (bsc#1177028).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- clocksource/drivers/hyper-v: Handle sched_clock differences inline (bsc#1186071).
- clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts (bsc#1186071).
- clocksource/drivers/hyper-v: Set clocksource rating based on Hyper-V feature (bsc#1186071).
- cxgb4: fix endianness when flashing boot image (jsc#SLE-15131).
- cxgb4: fix sleep in atomic when flashing PHY firmware (jsc#SLE-15131).
- cxgb4: fix wrong ethtool n-tuple rule lookup (jsc#SLE-15131).
- cxgb4: fix wrong shift (git-fixes).
- cxgb4: halt chip before flashing PHY firmware image (jsc#SLE-15131).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix error return code in two functions (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drivers: hv: Create a consistent pattern for checking Hyper-V hypercall status (bsc#1186071).
- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (bsc#1186071).
- Drivers: hv: Redo Hyper-V synthetic MSR get/set functions (bsc#1186071).
- Drivers: hv: vmbus: Check for pending channel interrupts before taking a CPU offline (bsc#1186071).
- Drivers: hv: vmbus: Drivers: hv: vmbus: Introduce CHANNELMSG_MODIFYCHANNEL_RESPONSE (bsc#1186071).
- Drivers: hv: vmbus: Drop error message when 'No request id available' (bsc#1183682).
- Drivers: hv: vmbus: Handle auto EOI quirk inline (bsc#1186071).
- Drivers: hv: vmbus: Introduce and negotiate VMBus protocol version 5.3 (bsc#1186071).
- Drivers: hv: vmbus: Move handling of VMbus interrupts (bsc#1186071).
- Drivers: hv: vmbus: Move hyperv_report_panic_msg to arch neutral code (bsc#1186071).
- Drivers: hv: vmbus: remove unused function (bsc#1186071).
- Drivers: hv: vmbus: Remove unused linux/version.h header (bsc#1186071).
- drm/amd/amdgpu:save psp ring wptr to avoid attack (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Fix potential memory leak in DMUB hw_init (git-fixes).
- drm/amdgpu: refine amdgpu_fru_get_product_info (git-fixes).
- drm/sun4i: dw-hdmi: Make HDMI PHY into a platform device (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm/vc4: hdmi: Make sure the controller is powered in detect (git-fixes).
- drm/vc4: hdmi: Move the HSM clock enable to runtime_pm (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- ethtool: strset: fix message length calculation (bsc#1176447).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hv: hyperv.h: a few mundane typo fixes (bsc#1186071).
- hv_netvsc: Add a comment clarifying batching logic (bsc#1186071).
- hv_netvsc: Add error handling while switching data path (bsc#1186071).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (bsc#1186071).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: parameterize functions responsible for Tx ring management (jsc#SLE-12878).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mlxsw: reg: Spectrum-3: Enforce lowest max-shaper burst size of 11 (bsc#1176774).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: E-Switch, Allow setting GUID for host PF vport (jsc#SLE-15172).
- net/mlx5: E-Switch, Read PF mac address (jsc#SLE-15172).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5: Reset mkey index on creation (jsc#SLE-15172).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nvmem: rmem: fix undefined reference to memremap (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: hv: Drop msi_controller structure (bsc#1186071).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Fix a kernel WARNING triggered by maxcpus=1 (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (jsc#SLE-13513 bsc#1176919 ltc#186162 git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- Removed patch that was incorrectly added to SLE15-SP2 (bsc#1186949)
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- s390/dasd: add missing discipline function (git-fixes).
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: storvsc: Enable scatterlist entry lengths &gt; 4Kbytes (bsc#1186071).
- scsi: storvsc: Parameterize number hardware queues (bsc#1186071).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- USB: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- USB: dwc3: core: fix kernel panic when do reboot (git-fixes).
- USB: dwc3: core: fix kernel panic when do reboot (git-fixes).
- USB: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- USB: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- USB: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- USB: fix various gadget panics on 10gbps cabling (git-fixes).
- USB: fix various gadget panics on 10gbps cabling (git-fixes).
- USB: gadget: eem: fix wrong eem header operation (git-fixes).
- USB: gadget: eem: fix wrong eem header operation (git-fixes).
- USB: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- USB: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- x86/elf: Use _BITUL() macro in UAPI headers (bsc#1178134).
- x86/fpu: Preserve supervisor states in sanitize_restored_user_xstate() (bsc#1178134).
- x86/hyper-v: Move hv_message_type to architecture neutral module
- x86/hyperv: Fix unused variable 'hi' warning in hv_apic_read (bsc#1186071).
- x86/hyperv: Fix unused variable 'msr_val' warning in hv_qlock_wait (bsc#1186071).
- x86/hyperv: Move hv_do_rep_hypercall to asm-generic (bsc#1186071).
- x86/hyperv: remove unused linux/version.h header (bsc#1186071).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-13"/>
	<updated date="2021-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176919">SUSE bug 1176919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183682">SUSE bug 1183682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186071">SUSE bug 1186071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624878" comment="cluster-md-kmp-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624879" comment="dlm-kmp-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624880" comment="gfs2-kmp-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624535" comment="kernel-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624536" comment="kernel-azure-devel-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624881" comment="kernel-azure-extra-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624882" comment="kernel-azure-livepatch-devel-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624883" comment="kernel-azure-optional-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624537" comment="kernel-devel-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624538" comment="kernel-source-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624539" comment="kernel-syms-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624884" comment="kselftests-kmp-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624885" comment="ocfs2-kmp-azure-5.3.18-38.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624886" comment="reiserfs-kmp-azure-5.3.18-38.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52340" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- Update to version 3.36.0
- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
  optimization (bsc#1173641)
- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator (bsc#1164719)
- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
- CVE-2019-19923: improper handling  of  certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference (bsc#1160309)
- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
- CVE-2019-19926: improper handling  of certain errors during parsing  multiSelect in select.c (bsc#1159715)
- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
  (bsc#1159491)
- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
  a shadow table name (bsc#1158960)
- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
  columns (bsc#1158959)
- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements (bsc#1158958)
- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service (bsc#1158812)
- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624163" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624164" comment="libsqlite3-0-32bit-3.36.0-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624165" comment="sqlite3-3.36.0-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624166" comment="sqlite3-devel-3.36.0-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625114" comment="sqlite3-doc-3.36.0-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52341" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172640" ref_url="https://bugzilla.suse.com/1172640" source="BUGZILLA"/>
		<reference ref_id="1186406" ref_url="https://bugzilla.suse.com/1186406" source="BUGZILLA"/>
		<reference ref_id="1186583" ref_url="https://bugzilla.suse.com/1186583" source="BUGZILLA"/>
		<reference ref_id="1186586" ref_url="https://bugzilla.suse.com/1186586" source="BUGZILLA"/>
		<reference ref_id="1186587" ref_url="https://bugzilla.suse.com/1186587" source="BUGZILLA"/>
		<reference ref_id="1186596" ref_url="https://bugzilla.suse.com/1186596" source="BUGZILLA"/>
		<reference ref_id="1186597" ref_url="https://bugzilla.suse.com/1186597" source="BUGZILLA"/>
		<reference ref_id="1186598" ref_url="https://bugzilla.suse.com/1186598" source="BUGZILLA"/>
		<reference ref_id="1186600" ref_url="https://bugzilla.suse.com/1186600" source="BUGZILLA"/>
		<reference ref_id="1186603" ref_url="https://bugzilla.suse.com/1186603" source="BUGZILLA"/>
		<reference ref_id="1186604" ref_url="https://bugzilla.suse.com/1186604" source="BUGZILLA"/>
		<reference ref_id="1186605" ref_url="https://bugzilla.suse.com/1186605" source="BUGZILLA"/>
		<reference ref_id="1186613" ref_url="https://bugzilla.suse.com/1186613" source="BUGZILLA"/>
		<reference ref_id="1186614" ref_url="https://bugzilla.suse.com/1186614" source="BUGZILLA"/>
		<reference ref_id="1186615" ref_url="https://bugzilla.suse.com/1186615" source="BUGZILLA"/>
		<reference ref_id="1186616" ref_url="https://bugzilla.suse.com/1186616" source="BUGZILLA"/>
		<reference ref_id="1186658" ref_url="https://bugzilla.suse.com/1186658" source="BUGZILLA"/>
		<reference ref_id="1186660" ref_url="https://bugzilla.suse.com/1186660" source="BUGZILLA"/>
		<reference ref_id="1186757" ref_url="https://bugzilla.suse.com/1186757" source="BUGZILLA"/>
		<reference ref_id="1186758" ref_url="https://bugzilla.suse.com/1186758" source="BUGZILLA"/>
		<reference ref_id="1186762" ref_url="https://bugzilla.suse.com/1186762" source="BUGZILLA"/>
		<reference ref_id="1186763" ref_url="https://bugzilla.suse.com/1186763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17539" ref_url="https://www.suse.com/security/cve/CVE-2019-17539/" source="CVE"/>
		<reference ref_id="CVE-2020-13904" ref_url="https://www.suse.com/security/cve/CVE-2020-13904/" source="CVE"/>
		<reference ref_id="CVE-2020-20448" ref_url="https://www.suse.com/security/cve/CVE-2020-20448/" source="CVE"/>
		<reference ref_id="CVE-2020-20451" ref_url="https://www.suse.com/security/cve/CVE-2020-20451/" source="CVE"/>
		<reference ref_id="CVE-2020-21041" ref_url="https://www.suse.com/security/cve/CVE-2020-21041/" source="CVE"/>
		<reference ref_id="CVE-2020-22015" ref_url="https://www.suse.com/security/cve/CVE-2020-22015/" source="CVE"/>
		<reference ref_id="CVE-2020-22016" ref_url="https://www.suse.com/security/cve/CVE-2020-22016/" source="CVE"/>
		<reference ref_id="CVE-2020-22017" ref_url="https://www.suse.com/security/cve/CVE-2020-22017/" source="CVE"/>
		<reference ref_id="CVE-2020-22019" ref_url="https://www.suse.com/security/cve/CVE-2020-22019/" source="CVE"/>
		<reference ref_id="CVE-2020-22020" ref_url="https://www.suse.com/security/cve/CVE-2020-22020/" source="CVE"/>
		<reference ref_id="CVE-2020-22021" ref_url="https://www.suse.com/security/cve/CVE-2020-22021/" source="CVE"/>
		<reference ref_id="CVE-2020-22022" ref_url="https://www.suse.com/security/cve/CVE-2020-22022/" source="CVE"/>
		<reference ref_id="CVE-2020-22023" ref_url="https://www.suse.com/security/cve/CVE-2020-22023/" source="CVE"/>
		<reference ref_id="CVE-2020-22025" ref_url="https://www.suse.com/security/cve/CVE-2020-22025/" source="CVE"/>
		<reference ref_id="CVE-2020-22026" ref_url="https://www.suse.com/security/cve/CVE-2020-22026/" source="CVE"/>
		<reference ref_id="CVE-2020-22031" ref_url="https://www.suse.com/security/cve/CVE-2020-22031/" source="CVE"/>
		<reference ref_id="CVE-2020-22032" ref_url="https://www.suse.com/security/cve/CVE-2020-22032/" source="CVE"/>
		<reference ref_id="CVE-2020-22033" ref_url="https://www.suse.com/security/cve/CVE-2020-22033/" source="CVE"/>
		<reference ref_id="CVE-2020-22034" ref_url="https://www.suse.com/security/cve/CVE-2020-22034/" source="CVE"/>
		<reference ref_id="CVE-2020-22038" ref_url="https://www.suse.com/security/cve/CVE-2020-22038/" source="CVE"/>
		<reference ref_id="CVE-2020-22039" ref_url="https://www.suse.com/security/cve/CVE-2020-22039/" source="CVE"/>
		<reference ref_id="CVE-2020-22043" ref_url="https://www.suse.com/security/cve/CVE-2020-22043/" source="CVE"/>
		<reference ref_id="CVE-2020-22044" ref_url="https://www.suse.com/security/cve/CVE-2020-22044/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2322-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MM55YS6XXAKFK3J35CDODMYMAZO6JX3S/" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-13904: Fixed use-after-free via a crafted EXTINF duration in an m3u8 file (bsc#1172640).
- CVE-2020-21041: Fixed buffer overflow vulnerability via apng_do_inverse_blend in libavcodec/pngenc.c  (bsc#1186406).
- CVE-2019-17539: Fixed NULL pointer dereference in avcodec_open2 in libavcodec/utils.c (bsc# 1154065).
- CVE-2020-22026: Fixed buffer overflow vulnerability in config_input() at libavfilter/af_tremolo.c (bsc#1186583).
- CVE-2020-22021: Fixed buffer overflow vulnerability in filter_edges function in libavfilter/vf_yadif.c (bsc#1186586).
- CVE-2020-22020: Fixed buffer overflow vulnerability in build_diff_map() in libavfilter/vf_fieldmatch.c (bsc#1186587).
- CVE-2020-22015: Fixed buffer overflow vulnerability in mov_write_video_tag() due to the out of bounds in libavformat/movenc.c (bsc#1186596).
- CVE-2020-22016: Fixed a heap-based Buffer Overflow vulnerability at libavcodec/get_bits.h when writing .mov files (bsc#1186598).
- CVE-2020-22017: Fixed a heap-based Buffer Overflow vulnerability in ff_fill_rectangle() in libavfilter/drawutils.c (bsc#1186600).
- CVE-2020-22022: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_fieldorder.c (bsc#1186603).
- CVE-2020-22023: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_bitplanenoise.c (bsc#1186604)
- CVE-2020-22025: Fixed a heap-based Buffer Overflow vulnerability in gaussian_blur at libavfilter/vf_edgedetect.c (bsc#1186605).
- CVE-2020-22031: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_w3fdif.c in filter16_complex_low() (bsc#1186613).
- CVE-2020-22032: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_edgedetect.c in gaussian_blur() (bsc#1186614).
- CVE-2020-22034: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_floodfill.c (bsc#1186616).
- CVE-2020-20451: Fixed denial of service issue due to resource management errors via fftools/cmdutils.c (bsc#1186658).
- CVE-2020-20448: Fixed divide by zero issue via libavcodec/ratecontrol.c (bsc#1186660).
- CVE-2020-22038: Fixed denial of service vulnerability due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c (bsc#1186757).
- CVE-2020-22039: Fixed denial of service vulnerability due to a memory leak in the inavi_add_ientry function (bsc#1186758).
- CVE-2020-22043: Fixed denial of service vulnerability due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c (bsc#1186762).
- CVE-2020-22044: Fixed denial of service vulnerability due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c (bsc#1186763).
- CVE-2020-22033,CVE-2020-22019: Fixed a heap-based Buffer Overflow Vulnerability at libavfilter/vf_vmafmotion.c in convolution_y_8bit() and in convolution_y_10bit() in libavfilter/vf_vmafmotion.c (bsc#1186615, bsc#1186597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172640">SUSE bug 1172640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186406">SUSE bug 1186406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186583">SUSE bug 1186583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186586">SUSE bug 1186586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186587">SUSE bug 1186587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186596">SUSE bug 1186596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186597">SUSE bug 1186597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186598">SUSE bug 1186598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186600">SUSE bug 1186600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186603">SUSE bug 1186603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186604">SUSE bug 1186604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186605">SUSE bug 1186605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186613">SUSE bug 1186613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186614">SUSE bug 1186614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186615">SUSE bug 1186615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186616">SUSE bug 1186616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186658">SUSE bug 1186658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186660">SUSE bug 1186660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186757">SUSE bug 1186757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186758">SUSE bug 1186758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186762">SUSE bug 1186762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186763">SUSE bug 1186763</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17539/">CVE-2019-17539</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13904/">CVE-2020-13904</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20448/">CVE-2020-20448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20451/">CVE-2020-20451</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21041/">CVE-2020-21041</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22015/">CVE-2020-22015</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-22016/">CVE-2020-22016</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22017/">CVE-2020-22017</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22019/">CVE-2020-22019</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22020/">CVE-2020-22020</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22021/">CVE-2020-22021</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22022/">CVE-2020-22022</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22023/">CVE-2020-22023</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22025/">CVE-2020-22025</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22026/">CVE-2020-22026</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22031/">CVE-2020-22031</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22032/">CVE-2020-22032</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22033/">CVE-2020-22033</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22034/">CVE-2020-22034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22038/">CVE-2020-22038</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22039/">CVE-2020-22039</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22043/">CVE-2020-22043</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22044/">CVE-2020-22044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615906" comment="ffmpeg-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625358" comment="ffmpeg-private-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625359" comment="libavcodec-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615885" comment="libavcodec57-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625119" comment="libavcodec57-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625360" comment="libavdevice-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615907" comment="libavdevice57-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625123" comment="libavdevice57-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625361" comment="libavfilter-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615908" comment="libavfilter6-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625127" comment="libavfilter6-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625362" comment="libavformat-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615886" comment="libavformat57-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625131" comment="libavformat57-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625363" comment="libavresample-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625364" comment="libavresample3-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625135" comment="libavresample3-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615887" comment="libavutil-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615888" comment="libavutil55-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625139" comment="libavutil55-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615889" comment="libpostproc-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615890" comment="libpostproc54-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625143" comment="libpostproc54-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615891" comment="libswresample-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615892" comment="libswresample2-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625147" comment="libswresample2-32bit-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615893" comment="libswscale-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615894" comment="libswscale4-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625151" comment="libswscale4-32bit-3.4.2-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52342" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183851" ref_url="https://bugzilla.suse.com/1183851" source="BUGZILLA"/>
		<reference ref_id="1183852" ref_url="https://bugzilla.suse.com/1183852" source="BUGZILLA"/>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187973" ref_url="https://bugzilla.suse.com/1187973" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- update to 12.22.2:
- CVE-2021-22918: Out of bounds read (bsc#1187973)
- CVE-2021-23362: ssri Regular Expression Denial of Service and hosted-git-info (bsc#1187977)
- CVE-2021-27290: Regular Expression Denial of Service (bsc#1187976)
- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)
- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)
- CVE-2020-7774: npm - Update y18n to fix Prototype-Pollution (bsc#1184450)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183851">SUSE bug 1183851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624229" comment="nodejs12-12.22.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624230" comment="nodejs12-devel-12.22.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624231" comment="nodejs12-docs-12.22.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624232" comment="npm12-12.22.2-4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52343" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1176919" ref_url="https://bugzilla.suse.com/1176919" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)

The following non-security bugs were fixed:

- 0001-x86-sched-Treat-Intel-SNC-topology-as-default-COD-as.patch: (bsc#1187263).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- ASoC: fsl-asoc-card: Set .owner attribute when registering card (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: rt5682: Fix the fast discharge for headset unplugging in soundwire mode (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ASoC: tas2562: Fix TDM_CFG0_SAMPRATE values (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- block: Discard page cache of zone reset target range (bsc#1187402).
- Bluetooth: Add a new USB ID for RTL8822CE (git-fixes).
- Bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1177028).
- bpf: Fix libelf endian handling in resolv_btfids (bsc#1177028).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- cxgb4: fix endianness when flashing boot image (jsc#SLE-15131).
- cxgb4: fix sleep in atomic when flashing PHY firmware (jsc#SLE-15131).
- cxgb4: fix wrong ethtool n-tuple rule lookup (jsc#SLE-15131).
- cxgb4: fix wrong shift (git-fixes).
- cxgb4: halt chip before flashing PHY firmware image (jsc#SLE-15131).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix error return code in two functions (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- drm/amd/amdgpu:save psp ring wptr to avoid attack (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Fix potential memory leak in DMUB hw_init (git-fixes).
- drm/amdgpu: refine amdgpu_fru_get_product_info (git-fixes).
- drm/sun4i: dw-hdmi: Make HDMI PHY into a platform device (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm/vc4: hdmi: Make sure the controller is powered in detect (git-fixes).
- drm/vc4: hdmi: Move the HSM clock enable to runtime_pm (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- ethtool: strset: fix message length calculation (bsc#1176447).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: parameterize functions responsible for Tx ring management (jsc#SLE-12878).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mlxsw: reg: Spectrum-3: Enforce lowest max-shaper burst size of 11 (bsc#1176774).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: E-Switch, Allow setting GUID for host PF vport (jsc#SLE-15172).
- net/mlx5: E-Switch, Read PF mac address (jsc#SLE-15172).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5: Reset mkey index on creation (jsc#SLE-15172).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- NFS: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- nvmem: rmem: fix undefined reference to memremap (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Fix a kernel WARNING triggered by maxcpus=1 (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (jsc#SLE-13513 bsc#1176919 ltc#186162 git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- Removed patch that was incorrectly added to SLE15-SP2 (bsc#1186949)
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- s390/dasd: add missing discipline function (git-fixes).
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- USB: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- USB: dwc3: core: fix kernel panic when do reboot (git-fixes).
- USB: dwc3: core: fix kernel panic when do reboot (git-fixes).
- USB: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- USB: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- USB: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- USB: fix various gadget panics on 10gbps cabling (git-fixes).
- USB: fix various gadget panics on 10gbps cabling (git-fixes).
- USB: gadget: eem: fix wrong eem header operation (git-fixes).
- USB: gadget: eem: fix wrong eem header operation (git-fixes).
- USB: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- USB: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- x86/elf: Use _BITUL() macro in UAPI headers (bsc#1178134).
- x86/fpu: Preserve supervisor states in sanitize_restored_user_xstate() (bsc#1178134).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176919">SUSE bug 1176919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625365" comment="cluster-md-kmp-64kb-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624233" comment="cluster-md-kmp-default-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625366" comment="cluster-md-kmp-preempt-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625367" comment="dlm-kmp-64kb-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624234" comment="dlm-kmp-default-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625368" comment="dlm-kmp-preempt-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625369" comment="gfs2-kmp-64kb-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624235" comment="gfs2-kmp-default-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625370" comment="gfs2-kmp-preempt-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624211" comment="kernel-64kb-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624212" comment="kernel-64kb-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625371" comment="kernel-64kb-extra-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625372" comment="kernel-64kb-livepatch-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625373" comment="kernel-64kb-optional-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625374" comment="kernel-debug-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625375" comment="kernel-debug-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625376" comment="kernel-debug-livepatch-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624213" comment="kernel-default-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624214" comment="kernel-default-base-5.3.18-59.13.1.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625377" comment="kernel-default-base-rebuild-5.3.18-59.13.1.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624215" comment="kernel-default-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625378" comment="kernel-default-extra-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625379" comment="kernel-default-livepatch-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625380" comment="kernel-default-livepatch-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625381" comment="kernel-default-optional-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624216" comment="kernel-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624220" comment="kernel-docs-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625382" comment="kernel-docs-html-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625383" comment="kernel-kvmsmall-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625384" comment="kernel-kvmsmall-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625385" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624217" comment="kernel-macros-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624221" comment="kernel-obs-build-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625386" comment="kernel-obs-qa-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624218" comment="kernel-preempt-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624222" comment="kernel-preempt-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625387" comment="kernel-preempt-extra-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625388" comment="kernel-preempt-livepatch-devel-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625389" comment="kernel-preempt-optional-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624223" comment="kernel-source-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625390" comment="kernel-source-vanilla-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624224" comment="kernel-syms-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624219" comment="kernel-zfcpdump-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625391" comment="kselftests-kmp-64kb-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625392" comment="kselftests-kmp-default-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625393" comment="kselftests-kmp-preempt-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625394" comment="ocfs2-kmp-64kb-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624236" comment="ocfs2-kmp-default-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625395" comment="ocfs2-kmp-preempt-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625396" comment="reiserfs-kmp-64kb-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624225" comment="reiserfs-kmp-default-5.3.18-59.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625397" comment="reiserfs-kmp-preempt-5.3.18-59.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52344" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183155" ref_url="https://bugzilla.suse.com/1183155" source="BUGZILLA"/>
		<reference ref_id="1183851" ref_url="https://bugzilla.suse.com/1183851" source="BUGZILLA"/>
		<reference ref_id="1183852" ref_url="https://bugzilla.suse.com/1183852" source="BUGZILLA"/>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187973" ref_url="https://bugzilla.suse.com/1187973" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

Update nodejs10 to 10.24.1.

Including fixes for 

- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)
- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)
- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)
- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)
- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)
- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)
- reduce memory footprint of test-worker-stdio (bsc#1183155)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183155">SUSE bug 1183155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183851">SUSE bug 1183851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624544" comment="nodejs10-10.24.1-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624545" comment="nodejs10-devel-10.24.1-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624546" comment="nodejs10-docs-10.24.1-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624547" comment="npm10-10.24.1-1.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52345" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187973" ref_url="https://bugzilla.suse.com/1187973" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

Update nodejs14 to 14.17.2.

Including fixes for:

- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)
- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)
- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)
- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624540" comment="nodejs14-14.17.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624541" comment="nodejs14-devel-14.17.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624542" comment="nodejs14-docs-14.17.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624543" comment="npm14-14.17.2-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52346" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1188229" ref_url="https://bugzilla.suse.com/1188229" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKQH4LHYIFOWBEGMGHD7S7TTV7JL4U7W/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

go1.16.6 (released 2021-07-12, bsc#1182345) includes a security fix to the
crypto/tls package, as well as bug fixes to the compiler, and the
net and net/http packages.

Security issue fixed:

CVE-2021-34558: Fixed crypto/tls: clients can panic when provided a certificate of the wrong type for the negotiated parameters (bsc#1188229)

go1.16 release:

* bsc#1188229 go#47143 CVE-2021-34558
* go#47145 security: fix CVE-2021-34558
* go#46999 net: LookupMX behaviour broken
* go#46981 net: TestCVE202133195 fails if /etc/resolv.conf specifies ndots larger than 3
* go#46769 syscall: TestGroupCleanupUserNamespace test failure on Fedora
* go#46657 runtime: deeply nested struct initialized with non-zero values
* go#44984 net/http: server not setting Content-Length in certain cases
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-19"/>
	<updated date="2021-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188229">SUSE bug 1188229</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624708" comment="go1.16-1.16.6-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624709" comment="go1.16-doc-1.16.6-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624710" comment="go1.16-race-1.16.6-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52347" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970 (bmo#1709976): Use-after-free in accessibility features of a document
* CVE-2021-30547 (bmo#1715766): Out of bounds write in ANGLE
* CVE-2021-29976 (bmo#1700895, bmo#1703334, bmo#1706910, bmo#1711576, bmo#1714391): Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-19"/>
	<updated date="2021-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625193" comment="MozillaFirefox-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625541" comment="MozillaFirefox-branding-upstream-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625542" comment="MozillaFirefox-buildsymbols-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625194" comment="MozillaFirefox-devel-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625195" comment="MozillaFirefox-translations-common-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625196" comment="MozillaFirefox-translations-other-78.12.0-8.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52348" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1188229" ref_url="https://bugzilla.suse.com/1188229" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZJXXUXBI66VV2PXRNAWN4MCE3AOHNBA/" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

- go1.15.14 (released 2021-07-12) includes a security fix to the
  crypto/tls package, as well as bug fixes to the linker, and the
  net package.
  CVE-2021-34558
  Refs bsc#1175132 go1.15 release tracking
  * bsc#1188229 go#47143 CVE-2021-34558
  * go#47144 security: fix CVE-2021-34558
  * go#47012 net: LookupMX behaviour broken
  * go#46994 net: TestCVE202133195 fails if /etc/resolv.conf specifies ndots larger than 3
  * go#46768 syscall: TestGroupCleanupUserNamespace test failure on Fedora
  * go#46684 x/build/cmd/release: linux-armv6l release tests aren't passing
  * go#46656 runtime: deeply nested struct initialized with non-zero values

- Fix extraneous trailing percent character %endif% in spec file.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-19"/>
	<updated date="2021-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188229">SUSE bug 1188229</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624711" comment="go1.15-1.15.14-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624712" comment="go1.15-doc-1.15.14-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624713" comment="go1.15-race-1.15.14-1.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52349" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184994" ref_url="https://bugzilla.suse.com/1184994" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QZX3NUVJOV7AC5ZERG2JQFSEIIX6QJXR/" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed a denial of service in systemd via unit_name_path_escape() (bsc#1188063)
- Skip udev rules if 'elevator=' is used (bsc#1184994)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184994">SUSE bug 1184994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625556" comment="systemd-bash-completion-234-24.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52350" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c (bnc#1188116 ).
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges (bsc#1188062).

The following non-security bugs were fixed:

- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625919" comment="cluster-md-kmp-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625920" comment="dlm-kmp-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625921" comment="gfs2-kmp-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625630" comment="kernel-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625631" comment="kernel-azure-devel-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625922" comment="kernel-azure-extra-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625923" comment="kernel-azure-livepatch-devel-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625924" comment="kernel-azure-optional-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625632" comment="kernel-devel-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625633" comment="kernel-source-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625634" comment="kernel-syms-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625925" comment="kselftests-kmp-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625926" comment="ocfs2-kmp-azure-5.3.18-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625927" comment="reiserfs-kmp-azure-5.3.18-38.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52351" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2410-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPIXUFHECPYFYLXDFG3MHBODZD7H7P2I/" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1)  (bsc#1188063)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625566" comment="libsystemd0-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625567" comment="libsystemd0-32bit-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625568" comment="libudev-devel-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625928" comment="libudev-devel-32bit-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625569" comment="libudev1-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625570" comment="libudev1-32bit-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625929" comment="nss-myhostname-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625930" comment="nss-myhostname-32bit-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625931" comment="nss-mymachines-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625932" comment="nss-mymachines-32bit-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625933" comment="nss-resolve-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625934" comment="nss-systemd-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625571" comment="systemd-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625572" comment="systemd-32bit-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625573" comment="systemd-container-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625574" comment="systemd-coredump-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625575" comment="systemd-devel-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625576" comment="systemd-doc-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625577" comment="systemd-journal-remote-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625578" comment="systemd-lang-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625935" comment="systemd-logger-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625936" comment="systemd-network-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625579" comment="systemd-sysvinit-246.13-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625580" comment="udev-246.13-7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52352" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188282" ref_url="https://bugzilla.suse.com/1188282" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOVJMTDKAFMTONFNVO7Z327OFE52V7FK/" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- CVE-2021-32760: Fixed a bug which allows untrusted container images to change permissions in the host's filesystem. (bsc#1188282)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188282">SUSE bug 1188282</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625590" comment="containerd-1.4.4-5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625937" comment="containerd-ctr-1.4.4-5.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52353" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="1187112" ref_url="https://bugzilla.suse.com/1187112" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2414-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHOZ6ZP4DJK5HMVJDBHGX4ILPY5COAZM/" source="SUSE-SU"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187112">SUSE bug 1187112</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624118" comment="caribou-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624119" comment="caribou-common-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624120" comment="caribou-devel-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624121" comment="caribou-gtk-module-common-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624122" comment="caribou-gtk2-module-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624123" comment="caribou-gtk3-module-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624124" comment="caribou-lang-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624125" comment="libcaribou0-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624126" comment="typelib-1_0-Caribou-1_0-0.4.21-12.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52354" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

Security issues fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).

The following non-security bugs were fixed:

- usb: dwc3: Fix debugfs creation flow (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625938" comment="cluster-md-kmp-64kb-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625647" comment="cluster-md-kmp-default-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625939" comment="cluster-md-kmp-preempt-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625940" comment="dlm-kmp-64kb-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625648" comment="dlm-kmp-default-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625941" comment="dlm-kmp-preempt-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625942" comment="gfs2-kmp-64kb-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625649" comment="gfs2-kmp-default-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625943" comment="gfs2-kmp-preempt-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625581" comment="kernel-64kb-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625582" comment="kernel-64kb-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625944" comment="kernel-64kb-extra-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625945" comment="kernel-64kb-livepatch-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625946" comment="kernel-64kb-optional-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625947" comment="kernel-debug-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625948" comment="kernel-debug-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625949" comment="kernel-debug-livepatch-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625583" comment="kernel-default-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625584" comment="kernel-default-base-5.3.18-59.16.1.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625950" comment="kernel-default-base-rebuild-5.3.18-59.16.1.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625585" comment="kernel-default-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625951" comment="kernel-default-extra-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625952" comment="kernel-default-livepatch-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625953" comment="kernel-default-livepatch-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625954" comment="kernel-default-optional-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625586" comment="kernel-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625607" comment="kernel-docs-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625955" comment="kernel-docs-html-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625956" comment="kernel-kvmsmall-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625957" comment="kernel-kvmsmall-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625958" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625587" comment="kernel-macros-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625608" comment="kernel-obs-build-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625959" comment="kernel-obs-qa-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625588" comment="kernel-preempt-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625609" comment="kernel-preempt-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625960" comment="kernel-preempt-extra-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625961" comment="kernel-preempt-livepatch-devel-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625962" comment="kernel-preempt-optional-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625610" comment="kernel-source-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625963" comment="kernel-source-vanilla-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625611" comment="kernel-syms-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625589" comment="kernel-zfcpdump-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625964" comment="kselftests-kmp-64kb-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625965" comment="kselftests-kmp-default-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625966" comment="kselftests-kmp-preempt-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625967" comment="ocfs2-kmp-64kb-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625650" comment="ocfs2-kmp-default-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625968" comment="ocfs2-kmp-preempt-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625969" comment="reiserfs-kmp-64kb-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625613" comment="reiserfs-kmp-default-5.3.18-59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625970" comment="reiserfs-kmp-preempt-5.3.18-59.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52355" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1153720" ref_url="https://bugzilla.suse.com/1153720" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1181193" ref_url="https://bugzilla.suse.com/1181193" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bnc#1179610)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bnc#1186463)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)
- CVE-2021-33200: Fix leakage of uninitialized bpf stack under speculation. (bsc#1186484)

The following non-security bugs were fixed:

- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).
- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).
- net: Do not set transport offset to invalid value (bsc#1176081).
- net: Introduce parse_protocol header_ops callback (bsc#1176081).
- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).
- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).
- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).
- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).
- net/packet: Remove redundant skb-&gt;protocol set (bsc#1176081).
- resource: Fix find_next_iomem_res() iteration issue (bsc#1181193).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- x86/crash: Add e820 reserved ranges to kdump kernel's e820 table (bsc#1181193).
- x86/debug: Extend the lower bound of crash kernel low reservations (bsc#1153720).
- x86/e820, ioport: Add a new I/O resource descriptor IORES_DESC_RESERVED (bsc#1181193).
- x86/mm: Rework ioremap resource mapping determination (bsc#1181193).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153720">SUSE bug 1153720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181193">SUSE bug 1181193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625875" comment="kernel-debug-base-4.12.14-197.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625696" comment="kernel-default-man-4.12.14-197.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625876" comment="kernel-kvmsmall-base-4.12.14-197.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625877" comment="kernel-vanilla-4.12.14-197.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625878" comment="kernel-vanilla-base-4.12.14-197.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625879" comment="kernel-vanilla-devel-4.12.14-197.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625880" comment="kernel-vanilla-livepatch-devel-4.12.14-197.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625881" comment="kernel-zfcpdump-man-4.12.14-197.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52356" version="1" class="patch">
	<metadata>
		<title>Security update for crmsh (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1163460" ref_url="https://bugzilla.suse.com/1163460" source="BUGZILLA"/>
		<reference ref_id="1175982" ref_url="https://bugzilla.suse.com/1175982" source="BUGZILLA"/>
		<reference ref_id="1179999" ref_url="https://bugzilla.suse.com/1179999" source="BUGZILLA"/>
		<reference ref_id="1184465" ref_url="https://bugzilla.suse.com/1184465" source="BUGZILLA"/>
		<reference ref_id="1185423" ref_url="https://bugzilla.suse.com/1185423" source="BUGZILLA"/>
		<reference ref_id="1187553" ref_url="https://bugzilla.suse.com/1187553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZ4AG2NNHICHYHJBLJR3CWGTGZLQBUDP/" source="SUSE-SU"/>
		<description>
This update for crmsh fixes the following issues:

Update to version 4.3.1+20210624.67223df2:

- Fix: ocfs2: Skip verifying UUID for ocfs2 device on top of raid or lvm on the join node (bsc#1187553)
- Fix: history: use Path.mkdir instead of mkdir command(bsc#1179999, CVE-2020-35459)
- Dev: crash_test: Add big warnings to have users' attention to potential failover(jsc#SLE-17979)
- Dev: crash_test: rename preflight_check as crash_test(jsc#SLE-17979)
- Fix: bootstrap: update sbd watchdog timeout when using diskless SBD with qdevice(bsc#1184465)
- Dev: utils: allow configure link-local ipv6 address(bsc#1163460)
- Fix: parse: shouldn't allow property setting with an empty value(bsc#1185423)
- Fix: help: show help message from argparse(bsc#1175982)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163460">SUSE bug 1163460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175982">SUSE bug 1175982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179999">SUSE bug 1179999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184465">SUSE bug 1184465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185423">SUSE bug 1185423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187553">SUSE bug 1187553</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624130" comment="crmsh-4.3.1+20210702.4e0ee8fb-5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624131" comment="crmsh-scripts-4.3.1+20210702.4e0ee8fb-5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625871" comment="crmsh-test-4.3.1+20210702.4e0ee8fb-5.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52357" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625982" comment="curl-7.66.0-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625983" comment="libcurl-devel-7.66.0-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626208" comment="libcurl-devel-32bit-7.66.0-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625984" comment="libcurl4-7.66.0-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625985" comment="libcurl4-32bit-7.66.0-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52358" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187499" ref_url="https://bugzilla.suse.com/1187499" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="1187538" ref_url="https://bugzilla.suse.com/1187538" source="BUGZILLA"/>
		<reference ref_id="1187539" ref_url="https://bugzilla.suse.com/1187539" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499)
- CVE-2021-3607: Ensure correct input on ring init (bsc#1187539)
- CVE-2021-3608: Fix the ring init error flow (bsc#1187538)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187499">SUSE bug 1187499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187538">SUSE bug 1187538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187539">SUSE bug 1187539</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624748" comment="qemu-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625882" comment="qemu-arm-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625883" comment="qemu-audio-alsa-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625884" comment="qemu-audio-pa-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625885" comment="qemu-audio-spice-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624753" comment="qemu-block-curl-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625886" comment="qemu-block-dmg-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625887" comment="qemu-block-gluster-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624754" comment="qemu-block-iscsi-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625888" comment="qemu-block-nfs-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624755" comment="qemu-block-rbd-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624756" comment="qemu-block-ssh-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624757" comment="qemu-chardev-baum-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625889" comment="qemu-chardev-spice-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625890" comment="qemu-extra-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624759" comment="qemu-guest-agent-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625891" comment="qemu-hw-display-qxl-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625892" comment="qemu-hw-display-virtio-gpu-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625893" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625894" comment="qemu-hw-display-virtio-vga-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625895" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625896" comment="qemu-hw-usb-redirect-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625897" comment="qemu-hw-usb-smartcard-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624766" comment="qemu-ipxe-1.0.0+-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625898" comment="qemu-ivshmem-tools-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624767" comment="qemu-ksm-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624768" comment="qemu-kvm-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624769" comment="qemu-lang-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625899" comment="qemu-microvm-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625900" comment="qemu-ppc-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625901" comment="qemu-s390x-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624772" comment="qemu-seabios-1.14.0_0_g155821a-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624773" comment="qemu-sgabios-8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624774" comment="qemu-skiboot-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624705" comment="qemu-tools-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624775" comment="qemu-ui-curses-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625902" comment="qemu-ui-gtk-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625903" comment="qemu-ui-opengl-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625904" comment="qemu-ui-spice-app-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625905" comment="qemu-ui-spice-core-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624780" comment="qemu-vgabios-1.14.0_0_g155821a-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625906" comment="qemu-vhost-user-gpu-5.2.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625907" comment="qemu-x86-5.2.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52359" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-14275: stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625872" comment="transfig-3.2.8a-4.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52360" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186790" ref_url="https://bugzilla.suse.com/1186790" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:2457-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWKDNPIUIZB2RNLFK22UVL6QNQRA7S7P/" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to 3.4.6.

Including a fix for:

- DVB-S2-BB dissector infinite loop (bsc#1186790).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186790">SUSE bug 1186790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624701" comment="libwireshark14-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624702" comment="libwiretap11-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624703" comment="libwsutil12-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624704" comment="wireshark-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624706" comment="wireshark-devel-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624707" comment="wireshark-ui-qt-3.4.6-3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52361" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29969" ref_url="https://www.suse.com/security/cve/CVE-2021-29969/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 78.12

  * fixed: Sending an email containing HTML links with spaces in
    the URL sometimes resulted in broken links
  * fixed: Folder Pane display theme fixes for macOS
  * fixed: Chat account settings did not always save as expected
  * fixed: RSS feed subscriptions sometimes lost
  * fixed: Calendar: A parsing error for alarm triggers of type
    'DURATION' caused sync problems for some users
  * fixed: Various security fixes

MFSA 2021-30 (bsc#1188275)

* CVE-2021-29969: IMAP server responses sent by a MITM prior to STARTTLS could be processed
* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Thunderbird 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29969/">CVE-2021-29969</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625910" comment="MozillaThunderbird-78.12.0-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625911" comment="MozillaThunderbird-translations-common-78.12.0-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625912" comment="MozillaThunderbird-translations-other-78.12.0-8.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52362" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187165" ref_url="https://bugzilla.suse.com/1187165" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3588" ref_url="https://www.suse.com/security/cve/CVE-2021-3588/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD7KE3RMFCUKN7TQCYXDCNJGFVIORKJL/" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2021-3588: Fixed a missing bounds checks inside cli_feat_read_cb() function in src/gatt-database.c (bsc#1187165)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187165">SUSE bug 1187165</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3588/">CVE-2021-3588</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625564" comment="bluez-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625913" comment="bluez-auto-enable-devices-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625914" comment="bluez-cups-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625915" comment="bluez-deprecated-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625591" comment="bluez-devel-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625916" comment="bluez-devel-32bit-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625917" comment="bluez-test-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625565" comment="libbluetooth3-5.55-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625918" comment="libbluetooth3-32bit-5.55-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52363" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187499" ref_url="https://bugzilla.suse.com/1187499" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="1187538" ref_url="https://bugzilla.suse.com/1187538" source="BUGZILLA"/>
		<reference ref_id="1187539" ref_url="https://bugzilla.suse.com/1187539" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499)
- CVE-2021-3607: Ensure correct input on ring init (bsc#1187539)
- CVE-2021-3608: Fix the ring init error flow (bsc#1187538)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187499">SUSE bug 1187499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187538">SUSE bug 1187538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187539">SUSE bug 1187539</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626347" comment="qemu-s390-4.2.1-11.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52364" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="1183580" ref_url="https://bugzilla.suse.com/1183580" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LNQQ262LF4R2GIO7S7J6NRAUDKV7VGPB/" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Update from version 2.26.2 to version 2.31.1 (jsc#SLE-18152)

Security fixes:

- CVE-2021-21300: On case-insensitive file systems with support for symbolic links, if Git is configured globally 
  to apply delay-capable clean/smudge filters (such as Git LFS), Git could run remote code during a clone. (bsc#1183026)

Non security changes:

- Add `sysusers` file to create `git-daemon` user.
- Remove `perl-base` and `openssh-server` dependency on `git-core`and provide a `perl-Git` package. (jsc#SLE-17838)
- `fsmonitor` bug fixes
- Fix `git bisect` to take an annotated tag as a good/bad endpoint
- Fix a corner case in `git mv` on case insensitive systems
- Require only `openssh-clients` where possible (like Tumbleweed or SUSE Linux Enterprise &gt;= 15 SP3). (bsc#1183580)
- Drop `rsync` requirement, not necessary anymore.
- Use of `pack-redundant` command is discouraged and will trigger a warning. The replacement is `repack -d`.
- The `--format=%(trailers)` mechanism gets enhanced to make it easier to design output for machine consumption.
- No longer give message to choose between rebase or merge upon pull if the history `fast-forwards`.
- The configuration variable `core.abbrev` can be set to `no` to force no abbreviation regardless of the hash algorithm
- `git rev-parse` can be explicitly told to give output as absolute or relative path with the 
  `--path-format=(absolute|relative)` option.
- Bash completion update to make it easier for end-users to add completion for their custom `git` subcommands.
- `git maintenance` learned to drive scheduled maintenance on platforms whose native scheduling methods are not 'cron'.
- After expiring a reflog and making a single commit, the reflog for the branch would record a single entry that 
  knows both `@{0}` and `@{1}`, but we failed to answer 'what commit were we on?', i.e. `@{1}`
- `git bundle` learns `--stdin` option to read its refs from the standard input.  
  Also, it now does not lose refs when they point at the same object.
- `git log` learned a new `--diff-merges=&lt;how&gt;` option.
- `git ls-files` can and does show multiple entries when the index is unmerged, which is a source for confusion 
  unless `-s/-u` option is in use.  A new option `--deduplicate` has been introduced.
- `git worktree list` now annotates worktrees as prunable, shows locked and prunable attributes 
  in `--porcelain mode`, and gained a `--verbose` option.
- `git clone` tries to locally check out the branch pointed at by HEAD of the remote repository after it 
  is done, but the protocol did not convey the information necessary to do so when copying an empty repository.  
  The protocol v2 learned how to do so.
- There are other ways than `..` for a single token to denote a `commit range', namely `&lt;rev&gt;^!` 
   and `&lt;rev&gt;^-&lt;n&gt;`, but `git range-diff` did not understand them.
- The `git range-diff` command learned `--(left|right)-only` option to show only one side of the compared range.
- `git mergetool` feeds three versions (base, local and remote) of a conflicted path unmodified. 
  The command learned to optionally prepare these files with unconflicted parts already resolved.
- The `.mailmap` is documented to be read only from the root level of a working tree, but a stray file 
  in a bare repository also was read by accident, which has been corrected.
- `git maintenance` tool learned a new `pack-refs` maintenance task.
- Improved error message given when a configuration variable that is expected to have a boolean value.
- Signed commits and tags now allow verification of objects, whose two object names 
  (one in SHA-1, the other in SHA-256) are both signed.
- `git rev-list` command learned `--disk-usage` option.
- `git diff`, `git log` `--{skip,rotate}-to=&lt;path&gt;` allows the user to discard diff output for early 
  paths or move them to the end of the output.
- `git difftool` learned `--skip-to=&lt;path&gt;` option to restart an interrupted session from an arbitrary path.
- `git grep` has been tweaked to be limited to the sparse checkout paths.
- `git rebase --[no-]fork-point` gained a configuration variable `rebase.forkPoint` so that users do not have 
  to keep specifying a non-default setting.
- `git stash` did not work well in a sparsely checked out working tree.
- Newline characters in the host and path part of `git://` URL are now forbidden.
- `Userdiff` updates for PHP, Rust, CSS
- Avoid administrator error leading to data loss with `git push --force-with-lease[=&lt;ref&gt;]` by 
  introducing `--force-if-includes`
- only pull `asciidoctor` for the default ruby version
- The `--committer-date-is-author-date` option of `rebase` and `am` subcommands lost the e-mail address by 
  mistake in 2.29
- The transport protocol v2 has become the default again
- `git worktree` gained a `repair` subcommand, `git init --separate-git-dir` no longer corrupts administrative data 
  related to linked worktrees
- `git maintenance` introduced for repository maintenance tasks
- `fetch.writeCommitGraph` is deemed to be still a bit too risky and is no longer part of the 
  `feature.experimental` set.
- The commands in the `diff` family honors the `diff.relative` configuration variable.
- `git diff-files` has been taught to say paths that are marked as `intent-to-add` are new files, 
  not modified from an empty blob.
- `git gui` now allows opening work trees from the start-up dialog.
- `git bugreport` reports what shell is in use.
- Some repositories have commits that record wrong committer timezone; `git fast-import` has an option to pass 
  these timestamps intact to allow recreating existing repositories as-is.
- `git describe` will always use the `long` version when giving its output based misplaced tags 
- `git pull` issues a warning message until the `pull.rebase` configuration variable is explicitly given
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183580">SUSE bug 1183580</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625597" comment="git-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625598" comment="git-arch-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625562" comment="git-core-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625868" comment="git-credential-gnome-keyring-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625869" comment="git-credential-libsecret-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625599" comment="git-cvs-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625600" comment="git-daemon-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625601" comment="git-doc-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625602" comment="git-email-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625603" comment="git-gui-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625870" comment="git-p4-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625604" comment="git-svn-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625605" comment="git-web-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625606" comment="gitk-2.31.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625563" comment="perl-Git-2.31.1-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52365" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188517" ref_url="https://bugzilla.suse.com/1188517" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2322" ref_url="https://www.suse.com/security/cve/CVE-2010-2322/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OHWHBBR2CBRHE7HR6PAPJLGHP3QCHYHS/" source="SUSE-SU"/>
		<description>
This update for fastjar fixes the following issues:

- CVE-2010-2322: Fixed a directory traversal vulnerabilities. (bsc#1188517)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1188517">SUSE bug 1188517</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2010-2322/">CVE-2010-2322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626940" comment="fastjar-0.98-3.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52366" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MUHKED3PFGNJNQGTSDBJO4XYJVLOTNO/" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21705 [bsc#1188037]: SSRF bypass in FILTER_VALIDATE_URL
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-30"/>
	<updated date="2021-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627137" comment="php7-pear-Archive_Tar-7.2.5-4.76.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627138" comment="php7-wddx-7.2.5-4.76.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52367" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1176681" ref_url="https://bugzilla.suse.com/1176681" source="BUGZILLA"/>
		<reference ref_id="1185591" ref_url="https://bugzilla.suse.com/1185591" source="BUGZILLA"/>
		<reference ref_id="1186290" ref_url="https://bugzilla.suse.com/1186290" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187499" ref_url="https://bugzilla.suse.com/1187499" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="1187538" ref_url="https://bugzilla.suse.com/1187538" source="BUGZILLA"/>
		<reference ref_id="1187539" ref_url="https://bugzilla.suse.com/1187539" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499)
- CVE-2021-3607: Ensure correct input on ring init (bsc#1187539)
- CVE-2021-3608: Fix the ring init error flow (bsc#1187538)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)
- CVE-2020-25085: Fix out-of-bounds access issue while doing multi block SDMA (bsc#1176681)

Other issues fixed:

- QEMU BIOS fails to read stage2 loader (on s390x)(bsc#1186290)
- Fix qemu hang while cancelling migrating hugepage vm (bsc#1185591)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-02"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176681">SUSE bug 1176681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185591">SUSE bug 1185591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186290">SUSE bug 1186290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187499">SUSE bug 1187499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187538">SUSE bug 1187538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187539">SUSE bug 1187539</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625401" comment="qemu-audio-oss-3.1.1.1-9.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52368" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.3:
- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626880" comment="libjavascriptcoregtk-4_0-18-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626941" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626881" comment="libwebkit2gtk-4_0-37-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626942" comment="libwebkit2gtk-4_0-37-32bit-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626882" comment="libwebkit2gtk3-lang-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626884" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626885" comment="typelib-1_0-WebKit2-4_0-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626886" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626943" comment="webkit-jsc-4-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626883" comment="webkit2gtk-4_0-injected-bundles-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626887" comment="webkit2gtk3-devel-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626944" comment="webkit2gtk3-minibrowser-2.32.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52369" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182739" ref_url="https://bugzilla.suse.com/1182739" source="BUGZILLA"/>
		<reference ref_id="1183770" ref_url="https://bugzilla.suse.com/1183770" source="BUGZILLA"/>
		<reference ref_id="1185870" ref_url="https://bugzilla.suse.com/1185870" source="BUGZILLA"/>
		<reference ref_id="1185872" ref_url="https://bugzilla.suse.com/1185872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-27928" ref_url="https://www.suse.com/security/cve/CVE-2021-27928/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HCF3OMGBRJLQHPHAF7JZMSOEDMTGPZY/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.2.39 (bsc#1182739)
- CVE-2021-2166: DML unspecified vulnerability lead to complete DOS. (bsc#1185870)
- CVE-2021-2154: DML unspecified vulnerability can lead to complete DOS. (bsc#1185872)
- CVE-2021-27928: Fixed a remote code execution issue. (bsc#1183770)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182739">SUSE bug 1182739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183770">SUSE bug 1183770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185870">SUSE bug 1185870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185872">SUSE bug 1185872</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27928/">CVE-2021-27928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626432" comment="libmariadbd-devel-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626433" comment="libmariadbd19-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626434" comment="mariadb-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626652" comment="mariadb-bench-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626435" comment="mariadb-client-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626436" comment="mariadb-errormessages-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626653" comment="mariadb-rpm-macros-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626654" comment="mariadb-test-10.5.11-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626437" comment="mariadb-tools-10.5.11-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52370" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-compress (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188463" ref_url="https://bugzilla.suse.com/1188463" source="BUGZILLA"/>
		<reference ref_id="1188464" ref_url="https://bugzilla.suse.com/1188464" source="BUGZILLA"/>
		<reference ref_id="1188465" ref_url="https://bugzilla.suse.com/1188465" source="BUGZILLA"/>
		<reference ref_id="1188466" ref_url="https://bugzilla.suse.com/1188466" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35515" ref_url="https://www.suse.com/security/cve/CVE-2021-35515/" source="CVE"/>
		<reference ref_id="CVE-2021-35516" ref_url="https://www.suse.com/security/cve/CVE-2021-35516/" source="CVE"/>
		<reference ref_id="CVE-2021-35517" ref_url="https://www.suse.com/security/cve/CVE-2021-35517/" source="CVE"/>
		<reference ref_id="CVE-2021-36090" ref_url="https://www.suse.com/security/cve/CVE-2021-36090/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2612-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVOH7P2WI6SSS2OORQJBS45T5SKKO7BV/" source="SUSE-SU"/>
		<description>
This update for apache-commons-compress fixes the following issues:

- Updated to 1.21
- CVE-2021-35515: Fixed an infinite loop when reading a specially crafted 7Z archive. (bsc#1188463)
- CVE-2021-35516: Fixed an excessive memory allocation when reading a specially crafted 7Z archive. (bsc#1188464)
- CVE-2021-35517: Fixed an excessive memory allocation when reading a specially crafted TAR archive. (bsc#1188465)
- CVE-2021-36090: Fixed an excessive memory allocation when reading a specially crafted ZIP archive. (bsc#1188466)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188463">SUSE bug 1188463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188464">SUSE bug 1188464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188465">SUSE bug 1188465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188466">SUSE bug 1188466</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35515/">CVE-2021-35515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35516/">CVE-2021-35516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35517/">CVE-2021-35517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36090/">CVE-2021-36090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625986" comment="apache-commons-compress-1.21-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626206" comment="apache-commons-compress-javadoc-1.21-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52371" version="1" class="patch">
	<metadata>
		<title>Security update for spice-vdagent (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1173749" ref_url="https://bugzilla.suse.com/1173749" source="BUGZILLA"/>
		<reference ref_id="1177780" ref_url="https://bugzilla.suse.com/1177780" source="BUGZILLA"/>
		<reference ref_id="1177781" ref_url="https://bugzilla.suse.com/1177781" source="BUGZILLA"/>
		<reference ref_id="1177782" ref_url="https://bugzilla.suse.com/1177782" source="BUGZILLA"/>
		<reference ref_id="1177783" ref_url="https://bugzilla.suse.com/1177783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650/" source="CVE"/>
		<reference ref_id="CVE-2020-25651" ref_url="https://www.suse.com/security/cve/CVE-2020-25651/" source="CVE"/>
		<reference ref_id="CVE-2020-25652" ref_url="https://www.suse.com/security/cve/CVE-2020-25652/" source="CVE"/>
		<reference ref_id="CVE-2020-25653" ref_url="https://www.suse.com/security/cve/CVE-2020-25653/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
		<description>
This update for spice-vdagent fixes the following issues:

- Update to version 0.21.0
- CVE-2020-25650: memory DoS via arbitrary entries in `active_xfers` hash table (bsc#1177780)
- CVE-2020-25651: possible file transfer DoS and information leak via `active_xfers` hash map (bsc#1177781)
- CVE-2020-25652: possibility to exhaust file descriptors in `vdagentd` (bsc#1177782) 
- CVE-2020-25653: UNIX domain socket peer PID retrieved via `SO_PEERCRED` is subject to race condition (bsc#1177783) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173749">SUSE bug 1173749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177780">SUSE bug 1177780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177781">SUSE bug 1177781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177782">SUSE bug 1177782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177783">SUSE bug 1177783</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25651/">CVE-2020-25651</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25652/">CVE-2020-25652</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25653/">CVE-2020-25653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626231" comment="spice-vdagent-0.21.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52372" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182739" ref_url="https://bugzilla.suse.com/1182739" source="BUGZILLA"/>
		<reference ref_id="1183770" ref_url="https://bugzilla.suse.com/1183770" source="BUGZILLA"/>
		<reference ref_id="1185870" ref_url="https://bugzilla.suse.com/1185870" source="BUGZILLA"/>
		<reference ref_id="1185872" ref_url="https://bugzilla.suse.com/1185872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-27928" ref_url="https://www.suse.com/security/cve/CVE-2021-27928/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CIBQJA52DDSVBOYKKQO4M2QLZ3Q6SVJ2/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.2.39 (bsc#1182739)
- CVE-2021-2166: DML unspecified vulnerability lead to complete DOS. (bsc#1185870)
- CVE-2021-2154: DML unspecified vulnerability can lead to complete DOS. (bsc#1185872)
- CVE-2021-27928: Fixed a remote code execution issue. (bsc#1183770)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182739">SUSE bug 1182739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183770">SUSE bug 1183770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185870">SUSE bug 1185870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185872">SUSE bug 1185872</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27928/">CVE-2021-27928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626651" comment="mariadb-galera-10.4.20-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52373" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182739" ref_url="https://bugzilla.suse.com/1182739" source="BUGZILLA"/>
		<reference ref_id="1183770" ref_url="https://bugzilla.suse.com/1183770" source="BUGZILLA"/>
		<reference ref_id="1185868" ref_url="https://bugzilla.suse.com/1185868" source="BUGZILLA"/>
		<reference ref_id="1185870" ref_url="https://bugzilla.suse.com/1185870" source="BUGZILLA"/>
		<reference ref_id="1185872" ref_url="https://bugzilla.suse.com/1185872" source="BUGZILLA"/>
		<reference ref_id="1188300" ref_url="https://bugzilla.suse.com/1188300" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-2180" ref_url="https://www.suse.com/security/cve/CVE-2021-2180/" source="CVE"/>
		<reference ref_id="CVE-2021-27928" ref_url="https://www.suse.com/security/cve/CVE-2021-27928/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2617-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6NDRIJNIJ22E65XJ6O44JMLQOV7THNM/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.2.39 (bsc#1182739)
- CVE-2021-2166: DML unspecified vulnerability lead to complete DOS. (bsc#1185870)
- CVE-2021-2154: DML unspecified vulnerability can lead to complete DOS. (bsc#1185872)
- CVE-2021-2180: InnoDB unspecified vulnerability lead to complete DOS. (bsc#1185868)
- CVE-2021-27928: Fixed a remote code execution issue. (bsc#1183770)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182739">SUSE bug 1182739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183770">SUSE bug 1183770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185868">SUSE bug 1185868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185870">SUSE bug 1185870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185872">SUSE bug 1185872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188300">SUSE bug 1188300</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2180/">CVE-2021-2180</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27928/">CVE-2021-27928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626456" comment="libmysqld-devel-10.2.39-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626457" comment="libmysqld19-10.2.39-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52374" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZHYVND24KFSRRA7YPSSI2T72HICGJ3Z/" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- update to npm 6.14.13
- CVE-2021-27290: Fixed ssri Regular Expression Denial of Service. (bsc#1187976)
- CVE-2021-23362: Fixed hosted-git-info Regular Expression Denial of Service. (bsc#1187977)
- CVE-2020-7774: fixes y18n Prototype Pollution. (bsc#1184450)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626297" comment="nodejs8-8.17.0-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626298" comment="nodejs8-devel-8.17.0-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626299" comment="nodejs8-docs-8.17.0-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626300" comment="npm8-8.17.0-10.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52375" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTM6WP5W5E6E2WSTHST5KAOESVI2S47B/" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627353" comment="djvulibre-3.5.27-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627844" comment="djvulibre-doc-3.5.27-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627351" comment="libdjvulibre-devel-3.5.27-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627352" comment="libdjvulibre21-3.5.27-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52376" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1173600" ref_url="https://bugzilla.suse.com/1173600" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2875" ref_url="https://www.suse.com/security/cve/CVE-2020-2875/" source="CVE"/>
		<reference ref_id="CVE-2020-2933" ref_url="https://www.suse.com/security/cve/CVE-2020-2933/" source="CVE"/>
		<reference ref_id="CVE-2020-2934" ref_url="https://www.suse.com/security/cve/CVE-2020-2934/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2622-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHHGZ3MEHVZT3NYQIEG5WTISHLXRLW3D/" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- CVE-2020-2875: Unauthenticated attacker with network access via multiple protocols can compromise MySQL Connectors. (bsc#1173600)
- CVE-2020-2934: Fixed a vulnerability which could cause a partial denial of service of MySQL Connectors. (bsc#1173600)
- CVE-2020-2933: Fixed a vulnerability which could allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. (bsc#1173600)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173600">SUSE bug 1173600</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2875/">CVE-2020-2875</cve>
	<cve impact="moderate" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2933/">CVE-2020-2933</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-2934/">CVE-2020-2934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627141" comment="mysql-connector-java-5.1.47-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52377" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188035" ref_url="https://bugzilla.suse.com/1188035" source="BUGZILLA"/>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21704" ref_url="https://www.suse.com/security/cve/CVE-2021-21704/" source="CVE"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZBQEBPTH6UB3CIJQN5DS5XY65QU7M6A/" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21704: Fixed security issues in pdo_firebase module (bsc#1188035).
- CVE-2021-21705: Fixed SSRF bypass in FILTER_VALIDATE_URL (bsc#1188037).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188035">SUSE bug 1188035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21704/">CVE-2021-21704</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627355" comment="apache2-mod_php7-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627356" comment="php7-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627357" comment="php7-bcmath-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627358" comment="php7-bz2-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627359" comment="php7-calendar-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627360" comment="php7-ctype-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627361" comment="php7-curl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627362" comment="php7-dba-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627363" comment="php7-devel-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627364" comment="php7-dom-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627354" comment="php7-embed-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627365" comment="php7-enchant-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627366" comment="php7-exif-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627367" comment="php7-fastcgi-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627368" comment="php7-fileinfo-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627845" comment="php7-firebird-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627369" comment="php7-fpm-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627370" comment="php7-ftp-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627371" comment="php7-gd-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627372" comment="php7-gettext-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627373" comment="php7-gmp-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627374" comment="php7-iconv-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627375" comment="php7-intl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627376" comment="php7-json-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627377" comment="php7-ldap-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627378" comment="php7-mbstring-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627379" comment="php7-mysql-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627380" comment="php7-odbc-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627381" comment="php7-opcache-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627382" comment="php7-openssl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627383" comment="php7-pcntl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627384" comment="php7-pdo-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627385" comment="php7-pgsql-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627386" comment="php7-phar-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627387" comment="php7-posix-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627388" comment="php7-readline-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627389" comment="php7-shmop-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627390" comment="php7-snmp-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627391" comment="php7-soap-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627392" comment="php7-sockets-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627393" comment="php7-sodium-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627394" comment="php7-sqlite-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627395" comment="php7-sysvmsg-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627396" comment="php7-sysvsem-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627397" comment="php7-sysvshm-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627398" comment="php7-tidy-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627399" comment="php7-tokenizer-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627400" comment="php7-xmlreader-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627401" comment="php7-xmlrpc-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627402" comment="php7-xmlwriter-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627403" comment="php7-xsl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627404" comment="php7-zip-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627405" comment="php7-zlib-7.4.6-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52378" version="1" class="patch">
	<metadata>
		<title>Security update for python-reportlab (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182503" ref_url="https://bugzilla.suse.com/1182503" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28463" ref_url="https://www.suse.com/security/cve/CVE-2020-28463/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E52AKOBLZLRVRGNROGFREOUCWFZYLKPT/" source="SUSE-SU"/>
		<description>
This update for python-reportlab fixes the following issues:

- CVE-2020-28463: Fixed Server-side Request Forgery via img tags (bsc#1182503).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-09"/>
	<updated date="2021-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182503">SUSE bug 1182503</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-28463/">CVE-2020-28463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628197" comment="python2-reportlab-3.4.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628198" comment="python3-reportlab-3.4.0-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52379" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1187495" ref_url="https://bugzilla.suse.com/1187495" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188126" ref_url="https://bugzilla.suse.com/1188126" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188366" ref_url="https://bugzilla.suse.com/1188366" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188703" ref_url="https://bugzilla.suse.com/1188703" source="BUGZILLA"/>
		<reference ref_id="1188720" ref_url="https://bugzilla.suse.com/1188720" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188752" ref_url="https://bugzilla.suse.com/1188752" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188893" ref_url="https://bugzilla.suse.com/1188893" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a potential local privilege escalation in the  CAN BCM networking protocol (bsc#1187215).
- CVE-2021-3612: Fixed an out-of-bounds memory write flaw in the joystick devices subsystem. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)
- CVE-2021-35039: Fixed mishandling of signature verification. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bsc#1188080).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: DPTF: Fix reading of attributes (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: PM / fan: Put fan device IDs into separate header file (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: firewire-motu: fix detection for S/PDIF source on optical interface in v2 protocol (git-fixes).
- ALSA: firewire-motu: fix stream format for MOTU 8pre FireWire (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Apply LED fixup for HP Dragonfly G1, too (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: hda/realtek: Fix pop noise and 2 Front Mic issues on a machine (git-fixes).
- ALSA: hda/realtek: Improve fixup for HP Spectre x360 15-df0xxx (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 830 G8 Notebook PC (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook x360 830 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 450 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 630 G8 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hda: intel-dsp-cfg: add missing ElkhartLake PCI ID (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: pcm - fix mmap capability check for the snd-dummy driver (git-fixes).
- ALSA: pcm: Call substream ack() method upon compat mmap commit (git-fixes).
- ALSA: pcm: Fix mmap capability check (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add missing proc text entry for BESPOKEN type (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: Fix OOB access at proc output (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- ALSA: usx2y: Avoid camelCase (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: Intel: sof_sdw: add SOF_RT715_DAI_ID_FIX for AlderLake (git-fixes).
- ASoC: Intel: sof_sdw: add mutual exclusion between PCH DMIC and RT715 (git-fixes).
- ASoC: SOF: loader: Use snd_sof_dsp_block_read() instead sof_block_read() (git-fixes).
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: fsl_spdif: Fix error handler with pm_runtime_enable (git-fixes).
- ASoC: fsl_spdif: Fix unexpected interrupt after suspend (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: intel/boards: add missing MODULE_DEVICE_TABLE (git-fixes).
- ASoC: max98373-sdw: add missing memory allocation check (git-fixes).
- ASoC: max98373-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rk3328: fix missing clk_disable_unprepare() on error in rk3328_platform_probe() (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ASoC: rt1308-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: rt5682-sdw: set regcache_cache_only false before reading RT5682_DEVICE_ID (git-fixes).
- ASoC: rt5682-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt5682: Disable irq on shutdown (git-fixes).
- ASoC: rt5682: Fix a problem with error handling in the io init function of the soundwire (git-fixes).
- ASoC: rt5682: fix getting the wrong device id when the suspend_stress_test (git-fixes).
- ASoC: rt700-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt711-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt715-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: soc-pcm: fix the return value in dpcm_apply_symmetry() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- ASoC: wm_adsp: Correct wm_coeff_tlv_get handling (git-fixes).
- Bluetooth: Fix alt settings for incoming SCO with transparent coding format (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: L2CAP: Fix invalid access if ECRED Reconfigure fails (git-fixes).
- Bluetooth: L2CAP: Fix invalid access on ECRED Connection response (git-fixes).
- Bluetooth: Remove spurious error message (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btintel: Add infrastructure to read controller information (bsc#1188893).
- Bluetooth: btintel: Check firmware version before download (bsc#1188893).
- Bluetooth: btintel: Collect tlv based active firmware build info in FW mode (bsc#1188893).
- Bluetooth: btintel: Consolidate intel_version parsing (bsc#1188893).
- Bluetooth: btintel: Consolidate intel_version_tlv parsing (bsc#1188893).
- Bluetooth: btintel: Fix endianness issue for TLV version information (bsc#1188893).
- Bluetooth: btintel: Fix offset calculation boot address parameter (bsc#1188893).
- Bluetooth: btintel: Functions to send firmware header / payload (bsc#1188893).
- Bluetooth: btintel: Move operational checks after version check (bsc#1188893).
- Bluetooth: btintel: Refactor firmware download function (bsc#1188893).
- Bluetooth: btintel: Reorganized bootloader mode tlv checks in intel_version_tlv parsing (bsc#1188893).
- Bluetooth: btintel: Replace zero-length array with flexible-array member (bsc#1188893).
- Bluetooth: btintel: Skip reading firmware file version while in bootloader mode (bsc#1188893).
- Bluetooth: btqca: Do not modify firmware contents in-place (git-fixes).
- Bluetooth: btusb: Add *setup* function for new generation Intel controllers (bsc#1188893).
- Bluetooth: btusb: Add support USB ALT 3 for WBS (git-fixes).
- Bluetooth: btusb: Add support for GarfieldPeak controller (bsc#1188893).
- Bluetooth: btusb: Consolidate code for waiting firmware download (bsc#1188893).
- Bluetooth: btusb: Define a function to construct firmware filename (bsc#1188893).
- Bluetooth: btusb: Enable MSFT extension for Intel controllers (bsc#1188893).
- Bluetooth: btusb: Fix failing to init controllers with operation firmware (bsc#1188893).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: Helper function to download firmware to Intel adapters (bsc#1188893).
- Bluetooth: btusb: Map Typhoon peak controller to BTUSB_INTEL_NEWGEN (bsc#1188893).
- Bluetooth: btusb: Update boot parameter specific to SKU (bsc#1188893).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Bluetooth: btusb: print firmware file name on error loading firmware (bsc#1188893).
- Bluetooth: hci_intel: drop strange le16_to_cpu() against u8 values (bsc#1188893).
- Bluetooth: hci_intel: enable on new platform (bsc#1188893).
- Bluetooth: hci_intel: switch to list_for_each_entry() (bsc#1188893).
- Bluetooth: hci_qca: fix potential GPF (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- Bluetooth: mgmt: Fix the command returns garbage parameter value (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available (bsc#1188703).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: intel-gw: Fix INTx enable (git-fixes).
- PCI: intel-gw: Fix INTx enable (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).
- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- RDMA/hns: Remove unused parameter udata (jsc#SLE-15176).
- RDMA/mlx4: Remove unused parameter udata (jsc#SLE-15176).
- RDMA/mlx5: Remove unused parameter udata (jsc#SLE-15176).
- RDMA/rtrs-clt: Check if the queue_depth has changed during a reconnection (jsc#SLE-15176).
- RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats (jsc#SLE-15176).
- RDMA/rtrs-clt: Fix memory leak of not-freed sess-&gt;stats and stats-&gt;pcpu_stats (jsc#SLE-15176).
- RDMA/rtrs-srv: Fix memory leak of unfreed rtrs_srv_stats object (jsc#SLE-15176).
- RDMA/rtrs-srv: Fix memory leak when having multiple sessions (jsc#SLE-15176).
- RDMA/rtrs-srv: Replace atomic_t with percpu_ref for ids_inflight (jsc#SLE-15176).
- RDMA/rtrs-srv: Set minimal max_send_wr and max_recv_wr (jsc#SLE-15176).
- RDMA/rtrs: Do not reset hb_missed_max after re-connection (jsc#SLE-15176).
- RDMA/srp: Fix a recently introduced memory leak (jsc#SLE-15176).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'Bluetooth: btintel: Fix endianness issue for TLV version information' (bsc#1188893).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- Revert 'drm/i915: Propagate errors on awaiting already signaled fences' (git-fixes).
- Revert 'drm: add a locked version of drm_is_current_master' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- Revert 'iwlwifi: remove wide_cmd_header field' (bsc#1187495).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bonding: Add struct bond_ipesc to manage SA (bsc#1176447).
- bonding: disallow setting nested bonding + ipsec offload (bsc#1176447).
- bonding: fix build issue (git-fixes).
- bonding: fix incorrect return value of bond_ipsec_offload_ok() (bsc#1176447).
- bonding: fix null dereference in bond_ipsec_add_sa() (bsc#1176447).
- bonding: fix suspicious RCU usage in bond_ipsec_add_sa() (bsc#1176447).
- bonding: fix suspicious RCU usage in bond_ipsec_del_sa() (bsc#1176447).
- bonding: fix suspicious RCU usage in bond_ipsec_offload_ok() (bsc#1176447).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- brcmfmac: Fix a double-free in brcmf_sdio_bus_reset (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: imx8mq: remove SYS PLL 1/2 clock gates (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- coresight: Propagate symlink failure (git-fixes).
- coresight: core: Fix use of uninitialized pointer (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: Revert unnecessary patches that fix unreal use-after-free bugs (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- docs: virt/kvm: close inline string literal (bsc#1188703).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/dc: Fix a missing check bug in dm_dp_mst_detect() (git-fixes).
- drm/amd/display: Avoid HDCP over-read and corruption (git-fixes).
- drm/amd/display: Fix DCN 3.01 DSCCLK validation (git-fixes).
- drm/amd/display: Fix build warnings (git-fixes).
- drm/amd/display: Fix off-by-one error in DML (git-fixes).
- drm/amd/display: Release MST resources on switch from MST to SST (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix HDCP reset sequence on reinitialize (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdgpu: enable sdma0 tmz for Raven/Renoir(V2) (git-fixes).
- drm/amdgpu: remove unsafe optimization to drop preamble ib (git-fixes).
- drm/amdgpu: update golden setting for sienna_cichlid (git-fixes).
- drm/amdgpu: wait for moving fence after pinning (git-fixes).
- drm/amdkfd: Fix circular lock in nocpsch path (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/amdkfd: fix circular locking on get_wave_state (git-fixes).
- drm/amdkfd: use allowed domain for vmbo validation (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge/sii8620: fix dependency on extcon (git-fixes).
- drm/bridge: Fix the stop condition of drm_bridge_chain_pre_enable() (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/bridge: nwl-dsi: Force a full modeset when crtc_state-&gt;active is changed to be true (git-fixes).
- drm/dp_mst: Do not set proposed vcpi directly (git-fixes).
- drm/gma500: Add the missed drm_gem_object_put() in psb_user_framebuffer_create() (git-fixes).
- drm/i915/display: Do not zero past infoframes.vsc (git-fixes).
- drm/i915/gvt: Clear d3_entered on elsp cmd submission (git-fixes).
- drm/i915/selftests: use vma_lookup() in __igt_mmap() (git-fixes).
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm/dpu: Fix sm8250_mdp register length (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/msm: Fix error return code in msm_drm_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/nouveau: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/nouveau: fix dma_address check for CPU/GPU sync (git-fixes).
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm/panel: nt35510: Do not fail if DSI read fails (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/radeon: Call radeon_suspend_kms() in radeon_pci_shutdown() for Loongson64 (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: cdn-dp: fix sign extension on an int multiply for a u64 result (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/rockchip: lvds: Fix an error handling path (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/scheduler: Fix hang when sched_entity released (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: Fix clock source for VEC PixelValve on BCM2711 (git-fixes).
- drm/vc4: crtc: Skip the TXP (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/vc4: hdmi: Fix PM reference leak in vc4_hdmi_encoder_pre_crtc_co() (git-fixes).
- drm/vc4: hdmi: Fix error path of hpd-gpios (git-fixes).
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- drm/vc4: hdmi: Prevent clock unbalance (git-fixes).
- drm/vc4: txp: Properly set the possible_crtcs mask (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/vmwgfx: Fix cpu updates of coherent multisample surfaces (git-fixes).
- drm/vmwgfx: Mark a surface gpu-dirty after the SVGA3dCmdDXGenMips command (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- drm: add a locked version of drm_is_current_master (git-fixes).
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm: bridge: add missing word in Analogix help text (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm: rockchip: add missing registers for RK3066 (git-fixes).
- drm: rockchip: add missing registers for RK3188 (git-fixes).
- drm: rockchip: set alpha_en to 0 if it is not used (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- efi/tpm: Differentiate missing and invalid final event log table (bsc#1188036).
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i2c: designware: Adjust bus_freq_hz when refuse high speed mode set (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- i40e: Fix missing rtnl locking when setting up pf switch (jsc#SLE-13701).
- i40e: fix PTP on 5Gb links (jsc#SLE-13701).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- integrity: use arch_ima_get_secureboot instead of checking EFI_SECURE_BOOT when loading MokListRT (bsc#1188366).
- intel_th: Wait until port is in reset before programming it (git-fixes).
- iwl-trans: move dev_cmd_offs, page_offs to a common trans header (bsc#1187495).
- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() (git-fixes).
- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_gen2_enqueue_hcmd() (git-fixes).
- iwlwifi: acpi: evaluate dsm to disable 5.8GHz channels (bsc#1187495).
- iwlwifi: acpi: in non acpi compilations remove iwl_sar_geo_init (bsc#1187495).
- iwlwifi: acpi: prepare SAR profile selection code for multiple sizes (bsc#1187495).
- iwlwifi: acpi: remove dummy definition of iwl_sar_set_profile() (bsc#1187495).
- iwlwifi: acpi: rename geo structs to contain versioning (bsc#1187495).
- iwlwifi: acpi: support ppag table command v2 (bsc#1187495).
- iwlwifi: add a common struct for all iwl_tx_power_cmd versions (bsc#1187495).
- iwlwifi: add trans op to set PNVM (bsc#1187495).
- iwlwifi: align RX status flags with firmware (bsc#1187495).
- iwlwifi: api: fix u32 -&gt; __le32 (bsc#1187495).
- iwlwifi: bump FW API to 57 for AX devices (bsc#1187495).
- iwlwifi: bump FW API to 59 for AX devices (bsc#1187495).
- iwlwifi: calib: Demote seemingly unintentional kerneldoc header (bsc#1187495).
- iwlwifi: dbg: Do not touch the tlv data (bsc#1187495).
- iwlwifi: dbg: add debug host notification (DHN) time point (bsc#1187495).
- iwlwifi: dbg: add dumping special device memory (bsc#1187495).
- iwlwifi: dbg: remove IWL_FW_INI_TIME_POINT_WDG_TIMEOUT (bsc#1187495).
- iwlwifi: do not export acpi functions unnecessarily (bsc#1187495).
- iwlwifi: dvm: Demote a couple of nonconformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: devices: Fix function documentation formatting issues (bsc#1187495).
- iwlwifi: dvm: lib: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: rxon: Demote non-conformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: scan: Demote a few nonconformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: sta: Demote a bunch of nonconformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: tx: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: enable twt by default (bsc#1187495).
- iwlwifi: fix 11ax disabled bit in the regulatory capability flags (bsc#1187495).
- iwlwifi: fix sar geo table initialization (bsc#1187495).
- iwlwifi: fw: add default value for iwl_fw_lookup_cmd_ver (bsc#1187495).
- iwlwifi: fw: move assert descriptor parser to common code (bsc#1187495).
- iwlwifi: increase PNVM load timeout (bsc#1187495).
- iwlwifi: iwl-drv: Provide descriptions debugfs dentries (bsc#1187495).
- iwlwifi: iwl-trans: move tfd to trans layer (bsc#1187495).
- iwlwifi: move PNVM implementation to common code (bsc#1187495).
- iwlwifi: move all bus-independent TX functions to common code (bsc#1187495).
- iwlwifi: move bc_pool to a common trans header (bsc#1187495).
- iwlwifi: move bc_table_dword to a common trans header (bsc#1187495).
- iwlwifi: msix: limit max RX queues for 9000 family (bsc#1187495).
- iwlwifi: mvm: Add FTM initiator RTT smoothing logic (bsc#1187495).
- iwlwifi: mvm: Do not install CMAC/GMAC key in AP mode (bsc#1187495).
- iwlwifi: mvm: add PROTECTED_TWT firmware API (bsc#1187495).
- iwlwifi: mvm: add a get lmac id function (bsc#1187495).
- iwlwifi: mvm: add an option to add PASN station (bsc#1187495).
- iwlwifi: mvm: add d3 prints (bsc#1187495).
- iwlwifi: mvm: add support for new WOWLAN_TSC_RSC_PARAM version (bsc#1187495).
- iwlwifi: mvm: add support for new version of WOWLAN_TKIP_SETTING_API_S (bsc#1187495).
- iwlwifi: mvm: add support for range request command ver 11 (bsc#1187495).
- iwlwifi: mvm: add support for responder dynamic config command version 3 (bsc#1187495).
- iwlwifi: mvm: assign SAR table revision to the command later (bsc#1187495).
- iwlwifi: mvm: avoid possible NULL pointer dereference (bsc#1187495).
- iwlwifi: mvm: clear all scan UIDs (bsc#1187495).
- iwlwifi: mvm: d3: parse wowlan status version 11 (bsc#1187495).
- iwlwifi: mvm: d3: support GCMP ciphers (bsc#1187495).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: mvm: do not check if CSA event is running before removing (bsc#1187495).
- iwlwifi: mvm: do not send a CSA command the firmware does not know (bsc#1187495).
- iwlwifi: mvm: fix error print when session protection ends (git-fixes).
- iwlwifi: mvm: fix suspicious rcu usage warnings (bsc#1187495).
- iwlwifi: mvm: fix the type we use in the PPAG table validity checks (bsc#1187495).
- iwlwifi: mvm: get number of stations from TLV (bsc#1187495).
- iwlwifi: mvm: ignore the scan duration parameter (bsc#1187495).
- iwlwifi: mvm: initiator: add option for adding a PASN responder (bsc#1187495).
- iwlwifi: mvm: location: set the HLTK when PASN station is added (bsc#1187495).
- iwlwifi: mvm: ops: Remove unused static struct 'iwl_mvm_debug_names' (bsc#1187495).
- iwlwifi: mvm: prepare roc_done_wk to work sync (bsc#1187495).
- iwlwifi: mvm: process ba-notifications also when sta rcu is invalid (bsc#1187495).
- iwlwifi: mvm: re-enable TX after channel switch (bsc#1187495).
- iwlwifi: mvm: read and parse SKU ID if available (bsc#1187495).
- iwlwifi: mvm: remove memset of kek_kck command (bsc#1187495).
- iwlwifi: mvm: remove redundant log in iwl_mvm_tvqm_enable_txq() (bsc#1187495).
- iwlwifi: mvm: remove redundant support_umac_log field (bsc#1187495).
- iwlwifi: mvm: responder: allow to set only the HLTK for an associated station (bsc#1187495).
- iwlwifi: mvm: ring the doorbell and wait for PNVM load completion (bsc#1187495).
- iwlwifi: mvm: rs-fw: handle VHT extended NSS capability (bsc#1187495).
- iwlwifi: mvm: send stored PPAG command instead of local (bsc#1187495).
- iwlwifi: mvm: set PROTECTED_TWT feature if supported by firmware (bsc#1187495).
- iwlwifi: mvm: set PROTECTED_TWT in MAC data policy (bsc#1187495).
- iwlwifi: mvm: set enabled in the PPAG command properly (bsc#1187495).
- iwlwifi: mvm: stop claiming NL80211_EXT_FEATURE_SET_SCAN_DWELL (bsc#1187495).
- iwlwifi: mvm: store PPAG enabled/disabled flag properly (bsc#1187495).
- iwlwifi: mvm: support ADD_STA_CMD_API_S ver 12 (bsc#1187495).
- iwlwifi: mvm: support more GTK rekeying algorithms (bsc#1187495).
- iwlwifi: mvm: support new KEK KCK api (bsc#1187495).
- iwlwifi: mvm: tx: Demote misuse of kernel-doc headers (bsc#1187495).
- iwlwifi: mvm: use CHECKSUM_COMPLETE (bsc#1187495).
- iwlwifi: mvm: utils: Fix some doc-rot (bsc#1187495).
- iwlwifi: pcie: avoid potential PNVM leaks (bsc#1187495).
- iwlwifi: pcie: do not disable interrupts for reg_lock (bsc#1187495).
- iwlwifi: pcie: fix context info freeing (git-fixes).
- iwlwifi: pcie: fix the xtal latency value for a few qu devices (bsc#1187495).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- iwlwifi: pcie: implement set_pnvm op (bsc#1187495).
- iwlwifi: pcie: make iwl_pcie_txq_update_byte_cnt_tbl bus independent (bsc#1187495).
- iwlwifi: pcie: properly set LTR workarounds on 22000 devices (bsc#1187495).
- iwlwifi: phy-ctxt: add new API VER 3 for phy context cmd (bsc#1187495).
- iwlwifi: pnvm: do not skip everything when not reloading (bsc#1187495).
- iwlwifi: pnvm: do not try to load after failures (bsc#1187495).
- iwlwifi: pnvm: increment the pointer before checking the TLV (bsc#1187495).
- iwlwifi: pnvm: set the PNVM again if it was already loaded (bsc#1187495).
- iwlwifi: provide gso_type to GSO packets (bsc#1187495).
- iwlwifi: queue: bail out on invalid freeing (bsc#1187495).
- iwlwifi: read and parse PNVM file (bsc#1187495).
- iwlwifi: regulatory: regulatory capabilities api change (bsc#1187495).
- iwlwifi: remove iwl_validate_sar_geo_profile() export (bsc#1187495).
- iwlwifi: remove wide_cmd_header field (bsc#1187495).
- iwlwifi: rs: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: rs: align to new TLC config command API (bsc#1187495).
- iwlwifi: rs: set RTS protection for all non legacy rates (bsc#1187495).
- iwlwifi: sta: defer ADDBA transmit in case reclaimed SN != next SN (bsc#1187495).
- iwlwifi: stats: add new api fields for statistics cmd/ntfy (bsc#1187495).
- iwlwifi: support REDUCE_TX_POWER_CMD version 6 (bsc#1187495).
- iwlwifi: support version 3 of GEO_TX_POWER_LIMIT (bsc#1187495).
- iwlwifi: support version 5 of the alive notification (bsc#1187495).
- iwlwifi: thermal: support new temperature measurement API (bsc#1187495).
- iwlwifi: update prph scratch structure to include PNVM data (bsc#1187495).
- iwlwifi: use correct group for alive notification (bsc#1187495).
- iwlwifi: wowlan: adapt to wowlan status API version 10 (bsc#1187495).
- iwlwifi: yoyo: add support for internal buffer allocation in D3 (bsc#1187495).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- ixgbevf: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).
- kABI compatibility fix for max98373_priv struct (git-fixes).
- kABI workaround for btintel symbol changes (bsc#1188893).
- kABI workaround for intel_th_driver (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kabi/severities: ignore kABI of iwlwifi symbols (bsc#1187495) iwlwifi driver consists of several modules and all exported symbols are internal uses. Let's ignore kABI checks of those.
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- kernel-binary.spec: Fix up usrmerge for non-modular kernels.
- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: class: The -ENOTSUPP should never be seen by user space (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- mac80211: consider per-CPU statistics if present (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- mac80211: reset profile_periodicity/ema_ap (git-fixes).
- mac80211_hwsim: add concurrent channels scanning support over virtio (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: fix fixed-rate tx status reporting (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: mt7915: fix IEEE80211_HE_PHY_CAP7_MAX_NC for station mode (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mvpp2: suppress warning (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net/sched: act_ct: remove and free nf_table callbacks (jsc#SLE-15172).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: fec_ptp: fix issue caused by refactor the fec_devtype (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: ipw2x00,iwlegacy,iwlwifi: Remove in_interrupt() from debug macros (bsc#1187495).
- net: iwlwifi: Remove in_interrupt() from tracing macro (bsc#1187495).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: netdevsim: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).
- net: phy: fix save wrong speed and duplex problem if autoneg is on (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: phy: realtek: add delay to fix RXC generation issue (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- netfilter: ctnetlink: suspicious RCU usage in ctnetlink_dump_helpinfo (bsc#1176447).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- prctl: PR_{G,S}ET_IO_FLUSHER to support controlling memory reclaim (bsc#1188752).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- rtw88: 8822c: fix lc calibration timing (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- scsi: ibmvfc: Fix command state accounting and stale response detection (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial: 8250_pci: Add support for new HPE serial device (git-fixes).
- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).
- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- skbuff: Fix build with SKB extensions disabled (jsc#SLE-15172).
- skbuff: Release nfct refcount on napi stolen or re-used skbs (jsc#SLE-15172).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121). 
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- thermal/drivers/int340x/processor_thermal: Fix tcc setting (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- thunderbolt: Bond lanes only when dual_link_port != NULL in alloc_dev_default() (git-fixes).
- timers: Fix get_next_timer_interrupt() with no timers pending (git-fixes)
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: Fix xfrm offload fallback fail case (bsc#1176447).
- xfrm: delete xfrm4_output_finish xfrm6_output_finish declarations (bsc#1176447).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
- xsk: Fix missing validation for skb and unaligned mode (jsc#SLE-13706).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187495">SUSE bug 1187495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188126">SUSE bug 1188126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188366">SUSE bug 1188366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188703">SUSE bug 1188703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188720">SUSE bug 1188720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188752">SUSE bug 1188752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188893">SUSE bug 1188893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628028" comment="cluster-md-kmp-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628029" comment="dlm-kmp-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628030" comment="gfs2-kmp-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627891" comment="kernel-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627892" comment="kernel-azure-devel-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628031" comment="kernel-azure-extra-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628032" comment="kernel-azure-livepatch-devel-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628033" comment="kernel-azure-optional-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627893" comment="kernel-devel-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627894" comment="kernel-source-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627895" comment="kernel-syms-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628034" comment="kselftests-kmp-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628035" comment="ocfs2-kmp-azure-5.3.18-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628036" comment="reiserfs-kmp-azure-5.3.18-38.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52380" version="1" class="patch">
	<metadata>
		<title>Security update for grafana (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183803" ref_url="https://bugzilla.suse.com/1183803" source="BUGZILLA"/>
		<reference ref_id="1183809" ref_url="https://bugzilla.suse.com/1183809" source="BUGZILLA"/>
		<reference ref_id="1183811" ref_url="https://bugzilla.suse.com/1183811" source="BUGZILLA"/>
		<reference ref_id="1183813" ref_url="https://bugzilla.suse.com/1183813" source="BUGZILLA"/>
		<reference ref_id="1184371" ref_url="https://bugzilla.suse.com/1184371" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27358" ref_url="https://www.suse.com/security/cve/CVE-2021-27358/" source="CVE"/>
		<reference ref_id="CVE-2021-27962" ref_url="https://www.suse.com/security/cve/CVE-2021-27962/" source="CVE"/>
		<reference ref_id="CVE-2021-28146" ref_url="https://www.suse.com/security/cve/CVE-2021-28146/" source="CVE"/>
		<reference ref_id="CVE-2021-28147" ref_url="https://www.suse.com/security/cve/CVE-2021-28147/" source="CVE"/>
		<reference ref_id="CVE-2021-28148" ref_url="https://www.suse.com/security/cve/CVE-2021-28148/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<description>
This update for grafana fixes the following issues:

- CVE-2021-27358: unauthenticated remote attackers to trigger a Denial of Service via a remote API call (bsc#1183803)
- Update to version 7.5.7:
  * Updated relref to 'Configuring exemplars' section (#34240) (#34243)
  * Added exemplar topic (#34147) (#34226)
  * Quota: Do not count folders towards dashboard quota (#32519) (#34025)
  * Instructions to separate emails with semicolons (#32499) (#34138)
  * Docs: Remove documentation of v8 generic OAuth feature (#34018)
  * Annotations: Prevent orphaned annotation tags cleanup when no annotations were cleaned (#33957) (#33975)
  * [GH-33898] Add missing --no-cache to Dockerfile. (#33906) (#33935)
  * ReleaseNotes: Updated changelog and release notes for 7.5.6 (#33932) (#33936)
  * Stop hoisting @icons/material (#33922)
  * Chore: fix react-color version in yarn.lock (#33914)
  * 'Release: Updated versions in package to 7.5.6' (#33909)
  * Loki: fix label browser crashing when + typed (#33900) (#33901)
  * Document `hide_version` flag (#33670) (#33881)
  * Add isolation level db configuration parameter (#33830) (#33878)
  * Sanitize PromLink button (#33874) (#33876)
  * Removed content as per MarcusE's suggestion in https://github.com/grafana/grafana/issues/33822. (#33870) (#33872)
  * Docs feedback: /administration/provisioning.md (#33804) (#33842)
  * Docs: delete from high availability docs references to removed configurations related to session storage (#33827) (#33851)
  * Docs: Update _index.md (#33797) (#33799)
  * Docs: Update installation.md (#33656) (#33703)
  * GraphNG: uPlot 1.6.9 (#33598) (#33612)
  * dont consider invalid email address a failed email (#33671) (#33681)
  * InfluxDB: Improve measurement-autocomplete behavior in query editor (#33494) (#33625)
  * add template for dashboard url parameters  (#33549) (#33588)
  * Add note to Snapshot API doc to specify that user has to provide the entire dashboard model  (#33572) (#33586)
  * Update team.md (#33454) (#33536)
  * Removed duplicate file 'dashboard_folder_permissions.md (#33497)
  * Document customQueryParameters for prometheus datasource provisioning (#33440) (#33495)
  * ReleaseNotes: Updated changelog and release notes for 7.5.5 (#33473) (#33492)
  * Documentation: Update developer-guide.md (#33478) (#33490)
  * add closed parenthesis to fix a hyperlink (#33471) (#33481)

- Update to version 7.5.5:
  * 'Release: Updated versions in package to 7.5.5' (#33469)
  * GraphNG: Fix exemplars window position (#33427) (#33462)
  * Remove field limitation from slack notification (#33113) (#33455)
  * Prometheus: Support POST in template variables (#33321) (#33441)
  * Instrumentation: Add success rate metrics for email notifications (#33359) (#33409)
  * Use either moment objects (for absolute times in the datepicker) or string (for relative time) (#33315) (#33406)
  * Docs: Removed type from find annotations example. (#33399) (#33403)
  * [v7.5.x]: FrontendMetrics: Adds new backend api that frontend can use to push frontend measurements and counters to prometheus (#33255)
  * Updated label for add panel. (#33285) (#33286)
  * Bug: Add git to Dockerfile.ubuntu (#33247) (#33248)
  * Docs: Sync latest master docs with 7.5.x (#33156)
  * Docs: Update getting-started-influxdb.md (#33234) (#33241)
  * Doc: Document the X-Grafana-Org-Id HTTP header (#32478) (#33239)
  * Minor Changes in Auditing.md (#31435) (#33238)
  * Docs: Add license check endpoint doc (#32987) (#33236)
  * Postgres: Fix time group macro when TimescaleDB is enabled and interval is less than a second (#33153) (#33219)
  * Docs: InfluxDB doc improvements (#32815) (#33185)
  * [v7.5.x] Loki: Pass Skip TLS Verify setting to alert queries (#33031)
  * update cla (#33181)
  * Fix inefficient regular expression (#33155) (#33159)
  * Auth: Don't clear auth token cookie when lookup token fails (#32999) (#33136)
  * Elasticsearch:  Add documentation for supported Elasticsearch query transformations (#33072) (#33128)
  * Update team.md (#33060) (#33084)
  * GE issue 1268 (#33049) (#33081)
  * Fixed some formatting issues for PRs from yesterday. (#33078) (#33079)
  * Explore: Load default data source in Explore when the provided source does not exist (#32992) (#33061)
  * Docs: Replace next with latest in aliases (#33054) (#33059)
  * Added missing link item. (#33052) (#33055)
  * Backport 33034 (#33038)
  * Docs: Backport 32916 to v7.5x  (#33008)
  * ReleaseNotes: Updated changelog and release notes for 7.5.4 (#32973) (#32998)
  * Elasticsearch: Force re-rendering of each editor row type change (#32993) (#32996)
  * Docs: Sync release branch with latest docs (#32986)

- Update to version 7.5.4:
  * 'Release: Updated versions in package to 7.5.4' (#32971)
  * fix(datasource_srv): prevent infinite loop where default datasource is named default (#32949) (#32967)
  * Added Azure Monitor support for Microsoft.AppConfiguration/configurationStores namespace (#32123) (#32968)
  * fix sqlite3 tx retry condition operator precedence (#32897) (#32952)
  * AzureMonitor: Add support for Virtual WAN namespaces (#32935) (#32947)
  * Plugins: Allow a non-dashboard page to be the default home page (#32926) (#32945)
  * GraphNG: uPlot 1.6.8 (#32859) (#32863)
  * Alerting: Add ability to include aliases with dashes (/) and at (@) signs in InfluxDB (#32844)
  * Prometheus: Allow exemplars endpoint in data source proxy (#32802) (#32804)
  * [v7.5.x] Table: Fixes table data links so they refer to correct row after sorting (#32758)
  * TablePanel: Makes sorting case-insensitive (#32435) (#32752)

- Update to version 7.5.3:
  * 'Release: Updated versions in package to 7.5.3' (#32745)
  * FolderPicker: Prevent dropdown menu from disappearing off screen (#32603) (#32741)
  * Loki: Remove empty annotations tags (#32359) (#32490)
  * SingleStat: fix wrong call to getDataLinkUIModel (#32721) (#32739)
  * Prometheus: Fix instant query to run two times when exemplars enabled (#32508) (#32726)
  * Elasticsearch: Fix bucket script variable duplication in UI (#32705) (#32714)
  * Variables: Confirms selection before opening new picker (#32586) (#32710)
  * CloudWarch: Fix service quotas link (#32686) (#32689)
  * Configuration: Prevent browser hanging / crashing with large number of org users (#32546) (#32598)
  * chore: bump execa to v2.1.0 (#32543) (#32592)
  * Explore: Fix bug where navigating to explore would result in wrong query and datasource to be shown (#32558)
  * Fix broken gtime tests (#32582) (#32587)
  * resolve conflicts (#32567)
  * gtime: Make ParseInterval deterministic (#32539) (#32560)
  * Dashboard: No longer includes default datasource when externally exporting dashboard with row (#32494) (#32535)
  * TextboxVariable: Limits the length of the preview value (#32472) (#32530)
  * AdHocVariable: Adds default data source (#32470) (#32476)
  * Variables: Fixes Unsupported data format error for null values (#32480) (#32487)
  * Prometheus: align exemplars check to latest api change (#32513) (#32515)
  * 'Release: Updated versions in package to 7.5.2' (#32502)
  * SigV4: Add support EC2 IAM role auth and possibility to toggle auth providers  (#32444) (#32488)
  * Set spanNulls to default (#32471) (#32486)
  * Graph: Fix setting right y-axis when standard option unit is configured (#32426) (#32442)
  * API: Return 409 on datasource version conflict (#32425) (#32433)
  * API: Return 400 on invalid Annotation requests (#32429) (#32431)
  * Variables: Fixes problem with data source variable when default ds is selected (#32384) (#32424)
  * Table: Fixes so links work for image cells (#32370) (#32410)
  * Variables: Fixes error when manually non-matching entering custom value in variable input/picker (#32390) (#32394)
  * DashboardQueryEditor: Run query after selecting source panel (#32383) (#32395)
  * API: Datasource endpoint should return 400 bad request if id and orgId is invalid (#32392) (#32397)
  * 'Release: Updated versions in package to 7.5.1' (#32362)
  * MSSQL: Upgrade go-mssqldb (#32347) (#32361)
  * GraphNG: Fix tooltip displaying wrong or no data (#32312) (#32348)
  * 'Release: Updated versions in package to 7.5.0' (#32308)
  * Loki: Fix text search in Label browser (#32293) (#32306)
  * Explore: Show all dataFrames in data tab in Inspector (#32161) (#32299)
  * PieChartV2: Add migration from old piechart (#32259) (#32291)
  * LibraryPanels: Adds Type and Description to DB (#32258) (#32288)
  * LibraryPanels: Prevents deletion of connected library panels (#32277) (#32284)
  * Library Panels: Add 'Discard' button to panel save modal (#31647) (#32281)
  * LibraryPanels: Changes to non readonly reducer (#32193) (#32200)
  * Notifications: InfluxDB - Fix regex to include metrics with hyphen in aliases (#32224) (#32262)
  * SSE/InfluxDB: Change InfluxQL to work with server side expressions (#31691) (#32102)
  * DashboardSettings: Fixes issue with tags list not updating when changes are made (#32241) (#32247)
  * Logs: If log message missing, use empty string (#32080) (#32243)
  * CloudWatch: Use latest version of aws sdk (#32217) (#32223)
  * Release: Updated versions in package to 7.5.0-beta.2 (#32158)
  * HttpServer: Make read timeout configurable but disabled by default (#31575) (#32154)
  * GraphNG: Ignore string fields when building data for uPlot in GraphNG (#32150) (#32151)
  * Fix loading timezone info on windows (#32029) (#32149)
  * SQLStore: Close session in withDbSession (#31775) (#32108)
  * Remove datalink template suggestions for accessing specific fields when there are multiple dataframes. (#32057) (#32148)
  * GraphNG: make sure dataset and config are in sync when initializing and re-initializing uPlot (#32106) (#32125)
  * MixedDataSource: Name is updated when data source variable changes (#32090) (#32144)
  * Backport 32005 to v7.5.x #32128 (#32130)
  * Loki: Label browser UI updates (#31737) (#32119)
  * ValueMappings: Fixes value 0 not being mapped (#31924) (#31929)
  * GraphNG: Fix tooltip series color for multi data frame scenario (#32098) (#32103)
  * LibraryPanels: Improves the Get All experience (#32028) (#32093)
  * Grafana/ui: display all selected levels for selected value when searching (#32030) (#32032)
  * Exemplars: always query exemplars (#31673) (#32024)
  * [v7.5.x] TimePicker: Fixes hidden time picker shown in kiosk TV mode (#32055)
  * Chore: Collect elasticsearch version usage stats (#31787) (#32063)
  * Chore: Tidy up Go deps (#32053)
  * GraphNG: Fix PlotLegend field display name being outdated (#32064) (#32066)
  * Data proxy: Fix encoded characters in URL path should be proxied encoded (#30597) (#32060)
  * [v7.5.x] Auth: Allow soft token revocation (#32037)
  * Snapshots: Fix usage of sign in link from the snapshot page (#31986) (#32036)
  * Make master green (#32011) (#32015)
  * Query editor: avoid avoiding word wrap on query editor components (#31949) (#31982)
  * Variables: Fixes filtering in picker with null items (#31979) (#31995)
  * TooltipContainer - use resize observer instead of getClientBoundingRect (#31937) (#32003)
  * Loki: Fix autocomplete when re-editing Loki label values (#31828) (#31987)
  * Loki: Fix type errors in language_provider (#31902) (#31945)
  * PanelInspect: Interpolates variables in CSV file name (#31936) (#31977)
  * Cloudwatch: use shared library for aws auth (#29550) (#31946)
  * Tooltip: partial perf improvement (#31774) (#31837) (#31957)
  * Backport 31913 to v7.5.x (#31955)
  * Grafana/ui: fix searchable options for Cascader with options update (#31906) (#31938)
  * Variables: Do not reset description on variable type change (#31933) (#31939)
  * [v7.5.x] AnnotationList: Adds spacing to UI  (#31888) (#31894)
  * Elasticseach: Support histogram fields (#29079) (#31914)
  * Chore: upgrade eslint and fork-ts-checker-webpack-plugin (#31854) (#31896)
  * Update scripts and Dockerfiles to use Go 1.16.1 (#31881) (#31891)
  * Templating: use dashboard timerange when variables are set to refresh 'On Dashboard Load' (#31721) (#31801)
  * [v7.5.x] Tempo: Add test for backend data source (#31835) (#31882)
  * Run go mod tidy to update go.mod and go.sum (#31859)
  * Grafana/ui: display all selected levels for Cascader (#31729) (#31862)
  * CloudWatch: Consume the grafana/aws-sdk (#31807) (#31861)
  * Cloudwatch: ListMetrics API page limit (#31788) (#31851)
  * Remove invalid attribute (#31848) (#31850)
  * CloudWatch: Restrict auth provider and assume role usage according to… (#31845)
  * CloudWatch: Add support for EC2 IAM role (#31804) (#31841)
  * Loki, Prometheus: Change the placement for query type explanation (#31784) (#31819)
  * Variables: Improves inspection performance and unknown filtering (#31811) (#31813)
  * Change piechart plugin state to beta (#31797) (#31798)
  * ReduceTransform: Include series with numeric string  names (#31763) (#31794)
  * Annotations: Make the annotation clean up batch size configurable (#31487) (#31769)
  * Fix escaping in ANSI and dynamic button removal (#31731) (#31767)
  * DataLinks: Bring back single click links for Stat, Gauge and BarGauge panel (#31692) (#31718)
  * log skipped, performed and duration for migrations (#31722) (#31754)
  * Search: Make items more compact (#31734) (#31750)
  * loki_datasource: add documentation to label_format and line_format (#31710) (#31746)
  * Tempo: Convert tempo to backend data source2 (#31733)
  * Elasticsearch: Fix script fields in query editor (#31681) (#31727)
  * Elasticsearch: revert to isoWeek when resolving weekly indices (#31709) (#31717)
  * Admin: Keeps expired api keys visible in table after delete (#31636) (#31675)
  * Tempo: set authentication header properly (#31699) (#31701)
  * Tempo: convert to backend data source (#31618) (#31695)
  * Update package.json (#31672)
  * Release: Bump version to 7.5.0-beta.1 (#31664)
  * Fix whatsNewUrl version to 7.5 (#31666)
  * Chore: add alias for what's new 7.5 (#31669)
  * Docs: Update doc for PostgreSQL authentication (#31434)
  * Docs: document report template variables (#31637)
  * AzureMonitor: Add deprecation message for App Insights/Insights Analytics (#30633)
  * Color: Fixes issue where colors where reset to gray when switch panels (#31611)
  * Live: Use pure WebSocket transport (#31630)
  * Docs: Fix broken image link (#31661)
  * Docs: Add Whats new in 7.5 (#31659)
  * Docs: Fix links for 7.5 (#31658)
  * Update enterprise-configuration.md (#31656)
  * Explore/Logs: Escaping of incorrectly escaped log lines (#31352)
  * Tracing: Small improvements to trace types (#31646)
  * Update _index.md (#31645)
  * AlertingNG: code refactoring (#30787)
  * Remove pkill gpg-agent (#31169)
  * Remove format for plugin routes (#31633)
  * Library Panels: Change unsaved change detection logic (#31477)
  * CloudWatch: Added AWS Timestream Metrics and Dimensions (#31624)
  * add new metrics and dimensions (#31595)
  * fix devenv dashboard content typo (#31583)
  * DashList: Sort starred and searched dashboard alphabetically (#31605)
  * Docs: Update whats-new-in-v7-4.md (#31612)
  * SSE: Add 'Classic Condition' on backend (#31511)
  * InfluxDB: Improve maxDataPoints error-message in Flux-mode, raise limits (#31259)
  * Alerting: PagerDuty: adding current state to the payload (#29270)
  * devenv: Fix typo (#31589)
  * Loki: Label browser (#30351)
  * LibraryPanels: No save modal when user is on same dashboard (#31606)
  * Bug: adding resolution for `react-use-measure` to prevent plugin tests from failing. (#31603)
  * Update node-graph.md (#31571)
  * test: pass Cypress options objects into selector wrappers (#31567)
  * Loki: Add support for alerting (#31424)
  * Tracing: Specify type of the data frame that is expected for TraceView (#31465)
  * LibraryPanels: Adds version column (#31590)
  * PieChart: Add color changing options to pie chart (#31588)
  * Explore: keep enabled/disabled state in angular based QueryEditors correctly (#31558)
  * Bring back correct legend sizing afer PlotLegend refactor (#31582)
  * Alerting: Fix bug in Discord for when name for metric value is absent (#31257)
  * LibraryPanels: Deletes library panels during folder deletion (#31572)
  * chore: bump lodash to 4.17.21 (#31549)
  * Elasticsearch: Fix impossibility to perform non-logs queries after importing queries from loki or prometheus in explore (#31518)
  * TestData: Fixes never ending annotations scenario (#31573)
  * CloudWatch: Added AWS Network Firewall metrics and dimensions (#31498)
  * propagate plugin unavailable message to UI (#31560)
  * ConfirmButton: updates story from knobs to controls (#31476)
  * Loki: Refactor line limit to use grafana/ui component (#31509)
  * LibraryPanels: Adds folder checks and permissions (#31473)
  * Add guide on custom option editors (#31254)
  * PieChart: Update text color and minor changes (#31546)
  * Grafana-data: bump markedjs to v2.x to resolve vulnerability (#31036)
  * Chore(deps): Bump google.golang.org/api from 0.39.0 to 0.40.0 (#31210)
  * PieChart: Improve piechart legend and options (#31446)
  * Chore(deps): Bump google.golang.org/grpc from 1.35.0 to 1.36.0 (#31541)
  * Chore(deps): Bump github.com/aws/aws-sdk-go from 1.37.7 to 1.37.20 (#31538)
  * Chore(deps): Bump github.com/prometheus/common from 0.17.0 to 0.18.0 (#31539)
  * Add multiselect options ui (#31501)
  * Profile: Fixes profile preferences being accessible when anonymous access was enabled (#31516)
  * Variables: Fixes error with: cannot read property length of undefined (#31458)
  * Explore: Show ANSI colored logs in logs context (#31510)
  * LogsPanel: Show all received logs  (#31505)
  * AddPanel: Design polish  (#31484)
  * TimeSeriesPanel: Remove unnecessary margin from legend  (#31467)
  * influxdb: flux: handle is-hidden (#31324)
  * Graph: Fix tooltip not showing when close to the edge of viewport  (#31493)
  * FolderPicker: Remove useNewForms from FolderPicker (#31485)
  * Add reportVariables feature toggle (#31469)
  * Grafana datasource: support multiple targets (#31495)
  * Update license-restrictions.md (#31488)
  * Docs: Derived fields links in logs detail view (#31482)
  * Docs: Add new data source links to Enterprise page (#31480)
  * Convert annotations to dataframes (#31400)
  * ReleaseNotes: Updated changelog and release notes for v7.4.2 (#31475)
  * GrafanaUI: Fixes typescript error for missing css prop (#31479)
  * Login: handle custom token creation error messages (#31283)
  * Library Panels: Don't list current panel in available panels list (#31472)
  * DashboardSettings: Migrate Link Settings to React (#31150)
  * Frontend changes for library panels feature (#30653)
  * Alerting notifier SensuGo: improvements in default message (#31428)
  * AppPlugins: Options to disable showing config page in nav (#31354)
  * add aws config (#31464)
  * Heatmap: Fix missing/wrong value in heatmap legend (#31430)
  * Chore: Fixes small typos (#31461)
  * Graphite/SSE: update graphite to work with server side expressions (#31455)
  * update the lastest version to 7.4.3 (#31457)
  * ReleaseNotes: Updated changelog and release notes for 7.4.3 (#31454)
  * AWS: Add aws plugin configuration (#31312)
  * Revert ''Release: Updated versions in package to 7.4.3' (#31444)' (#31452)
  * Remove UserSyncInfo.tsx (#31450)
  * Elasticsearch: Add word highlighting to search results (#30293)
  * Chore: Fix eslint react hook warnings in grafana-ui (#31092)
  * CloudWatch: Make it possible to specify custom api endpoint (#31402)
  * Chore: fixed incorrect naming for disable settings (#31448)
  * TraceViewer: Fix show log marker in spanbar (#30742)
  * LibraryPanels: Adds permissions to getAllHandler (#31416)
  * NamedColorsPalette: updates story from knobs to controls (#31443)
  * 'Release: Updated versions in package to 7.4.3' (#31444)
  * ColorPicker: updates story from knobs to controls (#31429)
  * Streaming: Fixes an issue with time series panel and streaming data source when scrolling back from being out of view (#31431)
  * ClipboardButton: updates story from knobs to controls (#31422)
  * we should never log unhashed tokens (#31432)
  * CI: Upgrade Dockerfiles wrt. Go, Node, Debian (#31407)
  * Elasticsearch: Fix query initialization logic &amp; query transformation from Promethous/Loki (#31322)
  * Postgres: allow providing TLS/SSL certificates as text in addition to file paths (#30353)
  * CloudWatch: Added AWS Ground Station metrics and dimensions (#31362)
  * TraceViewer: Fix trace to logs icon to show in right pane (#31414)
  * add hg team as migrations code owners (#31420)
  * Remove tidy-check script (#31423)
  * InfluxDB: handle columns named 'table' (#30985)
  * Prometheus: Use configured HTTP method for /series and /labels endpoints (#31401)
  * Devenv: Add gdev-influxdb2 data source (#31250)
  * Update grabpl from 0.5.38 to 0.5.42 version (#31419)
  * Move NOOP_CONTROL to storybook utils and change to a standalone file (#31421)
  * remove squadcast details from docs (#31413)
  * Add new Cloudwatch AWS/DDoSProtection metrics and dimensions (#31297)
  * Logging: add frontend logging helpers to @grafana/runtime package (#30482)
  * CallToActionCard: updates story from knobs to controls (#31393)
  * Add eu-south-1 cloudwatch region, closes #31197 (#31198)
  * Chore: Upgrade eslint packages (#31408)
  * Cascader: updates story from knobs to controls (#31399)
  * addressed issues 28763 and 30314. (#31404)
  * Added section Query a time series database by id (#31337)
  * Prometheus: Change default httpMethod for new instances to POST (#31292)
  * Data source list: Use Card component (#31326)
  * Chore: Remove gotest.tools dependency (#31391)
  * Revert 'StoryBook: Introduces Grafana Controls (#31351)' (#31388)
  * Chore(deps): Bump github.com/prometheus/common from 0.15.0 to 0.17.0 (#31387)
  * AdHocVariables: Fixes crash when values are stored as numbers (#31382)
  * Chore(deps): Bump github.com/golang/mock from 1.4.4 to 1.5.0 (#31379)
  * Chore: Fix strict errors, down to 416 (#31365)
  * Chore(deps): Bump github.com/getsentry/sentry-go from 0.9.0 to 0.10.0 (#31378)
  * StoryBook: Introduces Grafana Controls (#31351)
  * ReleaseNotes: Updated changelog and release notes for 7.4.2 (#31313)
  * Theming: Support for runtime theme switching and hooks for custom themes (#31301)
  * Devenv: Remove old-versioned loki blocks and update prometheus2 block  (#31282)
  * Zipkin: Show success on test data source (#30829)
  * Update grot template (needs more info) (#31350)
  * DatasourceSrv: Fix instance retrieval when datasource variable value set to 'default' (#31347)
  * TimeSeriesPanel: Fixes overlapping time axis ticks (#31332)
  * Grafana/UI: Add basic legend to the PieChart (#31278)
  * SAML: single logout only enabled in enterprise (#31325)
  * QueryEditor: handle query.hide changes in angular based query-editors (#31336)
  * DashboardLinks: Fixes another issue where dashboard links cause full page reload (#31334)
  * LibraryPanels: Syncs panel title with name (#31311)
  * Chore: Upgrade golangci-lint (#31330)
  * Add info to docs about concurrent session limits (#31333)
  * Table: Fixes issue with fixed min and auto max with bar gauge cell (#31316)
  * BarGuage: updates story from knobs to controls (#31223)
  * Docs: Clarifies how to add Key/Value pairs (#31303)
  * Usagestats: Exclude folders from total dashboard count (#31320)
  * ButtonCascader: updates story from knobs to controls (#31288)
  * test: allow check for Table as well as Graph for Explore e2e flow (#31290)
  * Grafana-UI: Update tooltip type (#31310)
  * fix 7.4.2 release note (#31299)
  * Add `--tries 3` arg when triggering e2e-tests upon releasing (#31285)
  * Chore: reduce strict errors for variables (#31241)
  * update latest release version (#31296)
  * ReleaseNotes: Updated changelog and release notes for 7.4.2 (#31291)
  * Correct name of Discord notifier tests (#31277)
  * Docs: Clarifies custom date formats for variables (#31271)
  * BigValue: updates story from knobs to controls (#31240)
  * Docs: Annotations update (#31194)
  * Introduce functions for interacting with library panels API (#30993)
  * Search: display sort metadata (#31167)
  * Folders: Editors should be able to edit name and delete folders (#31242)
  * Make Datetime local (No date if today) working (#31274)
  * UsageStats: Purpose named variables (#31264)
  * Snapshots: Disallow anonymous user to create snapshots (#31263)
  * only update usagestats every 30min (#31131)
  * Chore: grafana-toolkit uses grafana-ui and grafana-data workspaces (#30701)
  * Grafana-UI: Add id to Select to make it easier to test (#31230)
  * Prometheus: Fix enabling of disabled queries when editing in dashboard (#31055)
  * UI/Card: Fix handling of 'onClick' callback (#31225)
  * Loki: Add line limit for annotations (#31183)
  * Remove deprecated and breaking loki config field (#31227)
  * SqlDataSources: Fixes the Show Generated SQL button in query editors (#31236)
  * LibraryPanels: Disconnect before connect during dashboard save (#31235)
  * Disable Change Password for OAuth users (#27886)
  * TagsInput: Design update and component refactor (#31163)
  * Variables: Adds back default option for data source variable (#31208)
  * IPv6: Support host address configured with enclosing square brackets (#31226)
  * Postgres: Fix timeGroup macro converts long intervals to invalid numbers when TimescaleDB is enabled (#31179)
  * GraphNG: refactor core to class component (#30941)
  * Remove last synchronisation field from LDAP debug view (#30984)
  * Chore: Upgrade grafana-plugin-sdk-go to v0.88.0 (#30975)
  * Graph: Make axes unit option work even when field option unit is set (#31205)
  * AlertingNG:  Test definition  (#30886)
  * Docs: Update Influx config options (#31146)
  * WIP: Skip this call when we skip migrations (#31216)
  * use 0.1.0 (#31215)
  * DataSourceSrv: Filter out non queryable data sources by default (#31144)
  * QueryEditors: Fixes issue that happens after moving queries then editing would update other queries (#31193)
  * Chore: report eslint no-explicit-any errors to metrics (#31182)
  * Chore(deps): Bump cloud.google.com/go/storage from 1.12.0 to 1.13.0 (#31211)
  * Chore(deps): Bump xorm.io/xorm from 0.8.1 to 0.8.2 (#30773)
  * Alerting: Fix modal text for deleting obsolete notifier (#31171)
  * Chore(deps): Bump github.com/linkedin/goavro/v2 from 2.9.7 to 2.10.0 (#31204)
  * Variables: Fixes missing empty elements from regex filters (#31156)
  * StatPanels: Fixes to palette color scheme is not cleared when loading panel (#31126)
  * Fixed the typo. (#31189)
  * Docs: Rewrite preferences docs (#31154)
  * Explore/Refactor: Simplify URL handling (#29173)
  * DashboardLinks: Fixes links always cause full page reload (#31178)
  * Replace PR with Commit truncated hash when build fails (#31177)
  * Alert: update story to use controls (#31145)
  * Permissions: Fix team and role permissions on folders/dashboards not displayed for non Grafana Admin users (#31132)
  * CloudWatch: Ensure empty query row errors are not passed to the panel (#31172)
  * Update prometheus.md (#31173)
  * Variables: Extend option pickers to accept custom onChange callback (#30913)
  * Prometheus: Multiply exemplars timestamp to follow api change (#31143)
  * DashboardListPanel: Fixes issue with folder picker always showing All and using old form styles (#31160)
  * Add author name and pr number in drone pipeline notifications (#31124)
  * Prometheus: Add documentation for ad-hoc filters (#31122)
  * DataSourceSettings: Fixes add header button, it should not trigger a save &amp; test action (#31135)
  * Alerting: Fix so that sending an alert with the Alertmanager notifier doesn't fail when one of multiple configured URL's are down (#31079)
  * Chore: Update latest.json (#31139)
  * Docs: add 7.4.1 relese notes link (#31137)
  * PieChart: Progress on new core pie chart  (#28020)
  * ReleaseNotes: Updated changelog and release notes for 7.4.1 (#31133)
  * Eslint: no-duplicate-imports rule (bump grafana-eslint-config) (#30989)
  * Transforms: Fixes Outer join issue with duplicate field names not getting the same unique field names as before  (#31121)
  * MuxWriter: Handle error for already closed file (#31119)
  * Logging: sourcemap transform asset urls from CDN in logged stacktraces (#31115)
  * Search: add sort information in dashboard results (#30609)
  * area/grafana/e2e: ginstall should pull version specified (#31056)
  * Exemplars: Change CTA style (#30880)
  * Influx: Make max series limit configurable and show the limiting message if applied (#31025)
  * Docs: request security (#30937)
  * update configurePanel for 7.4.0 changes (#31093)
  * Elasticsearch: fix log row context erroring out (#31088)
  * Prometheus: Fix issues with ad-hoc filters (#30931)
  * LogsPanel: Add deduplication option for logs (#31019)
  * Drone: Make sure CDN upload is ok before pushing docker images (#31075)
  * PluginManager: Remove some global state (#31081)
  * test: update addDashboard flow for v7.4.0 changes (#31059)
  * Transformations: Fixed typo in FilterByValue transformer description. (#31078)
  * Docs: Group id should be 0 instead of 1 in Docker upgrade notes (#31074)
  * Usage stats: Adds source/distributor setting (#31039)
  * CDN: Add CDN upload step to enterprise and release pipelines (#31058)
  * Chore: Replace native select with grafana ui select  (#31030)
  * Docs: Update json-model.md (#31066)
  * Docs: Update whats-new-in-v7-4.md (#31069)
  * Added hyperlinks to Graphite documentation (#31064)
  * DashboardSettings: Update to new form styles (#31022)
  * CDN: Fixing drone CI config (#31052)
  * convert path to posix by default (#31045)
  * DashboardLinks: Fixes crash when link has no title (#31008)
  * Alerting: Fixes so notification channels are properly deleted (#31040)
  * Explore: Remove emotion error when displaying logs (#31026)
  * Elasticsearch: Fix alias field value not being shown in query editor (#30992)
  * CDN: Adds uppload to CDN step to drone CI (#30879)
  * Improved glossary (#31004)
  * BarGauge: Improvements to value sizing and table inner width calculations  (#30990)
  * Drone: Fix deployment image (#31027)
  * ColorPicker: migrated styles from sass to emotion (#30909)
  * Dashboard: Migrate general settings to react (#30914)
  * Chore(deps): Bump github.com/jung-kurt/gofpdf from 1.10.1 to 1.16.2 (#30586)
  * Chore(deps): Bump github.com/aws/aws-sdk-go from 1.36.31 to 1.37.7 (#31018)
  * Prometheus: Min step defaults to seconds when no unit is set to prevent errors when running alerts. (#30966)
  * Chore(deps): Bump github.com/magefile/mage from 1.10.0 to 1.11.0 (#31017)
  * Chore(deps): Bump github.com/grpc-ecosystem/go-grpc-middleware (#31013)
  * Graph: Fixes so graph is shown for non numeric time values (#30972)
  * CloudMonitoring: Prevent resource type variable function from crashing (#30901)
  * Chore(deps): Bump google.golang.org/api from 0.33.0 to 0.39.0 (#30971)
  * Build: Releases e2e and e2e-selectors too (#31006)
  * TextPanel: Fixes so panel title is updated when variables change (#30884)
  * Docs: Update configuration.md (login_maximum_inactive_lifetime_duration, login_maximum_lifetime_duration) (#31000)
  * instrumentation: make the first database histogram bucket smaller (#30995)
  * Grafana/UI: Remove DismissableFeatureInfoBox and replace with LocalSt… (#30988)
  * StatPanel: Fixes issue formatting date values using unit option (#30979)
  * Chore(deps): Bump actions/cache from v2 to v2.1.4 (#30973)
  * Units: Fixes formatting of duration units (#30982)
  * Elasticsearch: Show Size setting for raw_data metric (#30980)
  * Alerts: Dedupe alerts so that we do not fill the screen with the same alert messsage (#30935)
  * make sure service and slo display name is passed to segment comp (#30900)
  * assign changes in cloud datasources to the new cloud datasources team (#30645)
  * Table: Updates devenv test dashboard after change to TestData Randrom Table response (#30927)
  * Theme: Use higher order theme color variables rather then is light/dark logic (#30939)
  * Docs: Add alias for what's new in 7.4 (#30945)
  * e2e: extends selector factory to plugins (#30932)
  * Chore: Upgrade docker build image (#30820)
  * Docs: updated developer guide (#29978)
  * Alerts: Update Alert storybook to show more states (#30908)
  * Variables: Adds queryparam formatting option (#30858)
  * Chore: pad unknown values with undefined (#30808)
  * Transformers: add search to transform selection (#30854)
  * Exemplars: change api to reflect latest changes (#30910)
  * docs: use selinux relabelling on docker containers (#27685)
  * Docs: Fix bad image path for alert notification template (#30911)
  * Make value mappings correctly interpret numeric-like strings (#30893)
  * Chore: Update latest.json (#30905)
  * Docs: Update whats-new-in-v7-4.md (#30882)
  * Dashboard: Ignore changes to dashboard when the user session expires (#30897)
  * ReleaseNotes: Updated changelog and release notes for 7.4.0 (#30902)
  * test: add support for timeout to be passed in for addDatasource (#30736)
  * increase page size and make sure the cache supports query params (#30892)
  * DataSourceSettings: Adds info box and link to Grafana Cloud (#30891)
  * OAuth: custom username docs (#28400)
  * Panels: Remove value mapping of values that have been formatted #26763 (#30868)
  * Alerting: Fixes alert panel header icon not showing (#30840)
  * AlertingNG: Edit Alert Definition (#30676)
  * Logging: sourcemap support for frontend stacktraces (#30590)
  * Added 'Restart Grafana' topic. (#30844)
  * Docs: Org, Team, and User Admin (#30756)
  * bump grabpl version to 0.5.36 (#30874)
  * Plugins: Requests validator (#30445)
  * Docs: Update whats-new-in-v7-4.md (#30876)
  * Docs: Add server view folder (#30849)
  * Fixed image name and path  (#30871)
  * Grafana-ui: fixes closing modals with escape key (#30745)
  * InfluxDB: Add http configuration when selecting InfluxDB v2 flavor  (#30827)
  * TestData: Fixes issue with for ever loading state when all queries are hidden (#30861)
  * Chart/Tooltip: refactored style declaration (#30824)
  * ReleaseNotes: Updated changelog and release notes for 7.4.0-beta1 (#30853)
  * Grafana-ui: fixes no data message in Table component (#30821)
  * grafana/ui: Update pagination component for large number of pages (#30151)
  * Alerting: Customise OK notification priorities for Pushover notifier (#30169)
  * DashboardLinks: Support variable expression in to tooltip - Issue #30409 (#30569)
  * Chore: Remove panelTime.html, closes #30097 (#30842)
  * Docs: Time series panel, bar alignment docs (#30780)
  * Chore: add more docs annotations (#30847)
  * Transforms: allow boolean in field calculations (#30802)
  * Prometheus: Add tooltip to explain possibility to use patterns in text and title fields in annotations (#30825)
  * Update prometheus.md with image link fix (#30833)
  * BarChart: inside-align strokes, upgrade uPlot to 1.6.4. (#30806)
  * Update license-expiration.md (#30839)
  * Explore rewrite (#30804)
  * Prometheus: Set type of labels to string (#30831)
  * GrafanaUI: Add a way to persistently close InfoBox (#30716)
  * Fix typo in transformer registry (#30712)
  * Elasticsearch: Display errors with text responses (#30122)
  * CDN: Fixes cdn path when Grafana is under sub path (#30822)
  * TraceViewer: Fix lazy loading (#30700)
  * FormField: migrated sass styling to emotion (#30392)
  * AlertingNG: change API permissions (#30781)
  * Variables: Clears drop down state when leaving dashboard (#30810)
  * Grafana-UI: Add story/docs for ErrorBoundary (#30304)
  * Add missing callback dependency (#30797)
  * PanelLibrary: Adds library panel meta information to dashboard json (#30770)
  * Chore(deps): Bump gonum.org/v1/gonum from 0.6.0 to 0.8.2 (#30343)
  * Chore(deps): Bump gopkg.in/yaml.v2 from 2.3.0 to 2.4.0 (#30771)
  * GraphNG: improve behavior when switching between solid/dash/dots (#30796)
  * Chore(deps): Bump github.com/hashicorp/go-hclog from 0.14.1 to 0.15.0 (#30778)
  * Add width for Variable Editors (#30791)
  * Chore: Remove warning when calling resource (#30752)
  * Auth: Use SigV4 lib from grafana-aws-sdk  (#30713)
  * Panels: Fixes so panels are refreshed when scrolling past them fast (#30784)
  * GraphNG: add bar alignment option (#30499)
  * Expressions: Measure total transformation requests and elapsed time (#30514)
  * Menu: Mark menu components as internal (#30740)
  * TableInputCSV: migrated styles from sass to emotion (#30554)
  * CDN: Fix passing correct prefix to GetContentDeliveryURL (#30777)
  * Chore(deps): Bump gopkg.in/ini.v1 from 1.57.0 to 1.62.0 (#30772)
  * CDN: Adds support for serving assets over a CDN (#30691)
  * PanelEdit: Trigger refresh when changing data source (#30744)
  * Chore: remove __debug_bin (#30725)
  * BarChart: add alpha bar chart panel (#30323)
  * Docs: Time series panel (#30690)
  * Backend Plugins: Convert test data source to use SDK contracts (#29916)
  * Docs: Update whats-new-in-v7-4.md (#30747)
  * Add link to Elasticsearch docs. (#30748)
  * Mobile: Fixes issue scrolling on mobile in chrome (#30746)
  * TagsInput: Make placeholder configurable (#30718)
  * Docs: Add config settings for fonts in reporting (#30421)
  * Add menu.yaml to .gitignore (#30743)
  * bump cypress to 6.3.0 (#30644)
  * Datasource: Use json-iterator configuration compatible with standard library (#30732)
  * AlertingNG: Update UX to use new PageToolbar component (#30680)
  * Docs: Add usage insights export feature (#30376)
  * skip symlinks to directories when generating plugin manifest (#30721)
  * PluginCiE2E: Upgrade base images (#30696)
  * Variables: Fixes so text format will show All instead of custom all (#30730)
  * PanelLibrary: better handling of deleted panels (#30709)
  * Added section 'Curated dashboards for Google Cloud Monitoring' for 7.4 What's New (#30724)
  * Added 'curated dashboards' information and broke down, rearranged topics. (#30659)
  * Transform: improve the 'outer join' performance/behavior (#30407)
  * Add alt text to plugin logos (#30710)
  * Deleted menu.yaml file (#30717)
  * Dashboard: Top Share URL icon should share panel URL when on viewPanel page (#30000)
  * Added entry for web server. (#30715)
  * DashboardPicker: switch to promise-based debounce, return dashboard UID (#30706)
  * Use connected GraphNG in Explore (#30707)
  * Fix documentation for streaming data sources (#30704)
  * PanelLibrary: changes casing of responses and adds meta property (#30668)
  * Influx: Show all datapoints for dynamically windowed flux query (#30688)
  * Trace: trace to logs design update (#30637)
  * DeployImage: Switch base images to Debian (#30684)
  * Chore: remove CSP debug logging line (#30689)
  * Docs: 7.4 documentation for expressions (#30524)
  * PanelEdit: Get rid of last remaining usage of navbar-button (#30682)
  * Grafana-UI: Fix setting default value for MultiSelect (#30671)
  * CustomScrollbar: migrated styles from sass to emotion (#30506)
  * DashboardSettings &amp; PanelEdit: Use new PageToolbar (#30675)
  * Explore: Fix jumpy live tailing (#30650)
  * ci(npm-publish): add missing github package token to env vars (#30665)
  * PageToolbar: Extracting navbar styles &amp; layout into a modern emotion based component (#30588)
  * AlertingNG: pause/unpause definitions via the API (#30627)
  * Docs: Refer to product docs in whats new for alerting templating feature (#30652)
  * ReleaseNotes: Updated changelog and release notes for 7.4.0-beta1 (#30666)
  * Variables: Fixes display value when using capture groups in regex (#30636)
  * Docs: Update _index.md (#30655)
  * Docs: Auditing updates (#30433)
  * Docs: add hidden_users configuration field (#30435)
  * Docs: Define TLS/SSL terminology (#30533)
  * Docs: Fix expressions enabled description (#30589)
  * Docs: Update ES screenshots (#30598)
  * Licensing Docs: Adding license restrictions docs (#30216)
  * Update documentation-style-guide.md (#30611)
  * Docs: Update queries.md (#30616)
  * chore(grafana-ui): bump storybook to 6.1.15 (#30642)
  * DashboardSettings: fixes vertical scrolling (#30640)
  * Usage Stats: Remove unused method for getting user stats (#30074)
  * Grafana/UI: Unit picker should not set a category as unit (#30638)
  * Graph: Fixes auto decimals issue in legend and tooltip (#30628)
  * AlertingNG: List saved Alert definitions in Alert Rule list (#30603)
  * chore: bump redux toolkit to 1.5.0 for immer 8.0.1 vulnerability fix (#30605)
  * Grafana/UI: Add disable prop to Segment (#30539)
  * Variables: Fixes so queries work for numbers values too (#30602)
  * Admin: Fixes so form values are filled in from backend (#30544)
  * Docs: Add new override info and add whats new 7.4 links (#30615)
  * TestData: Improve what's new in v7.4 (#30612)
  * Docs: Update 7.4 What's New to use more correct description of alerting notification template feature (#30502)
  * NodeGraph: Add docs (#30504)
  * Loki: Improve live tailing errors and fix Explore's logs container type errors (#30517)
  * TimeRangePicker: Updates components to use new ToolbarButton &amp; ButtonGroup (#30570)
  * Update styling.md guide (#30594)
  * TestData: Adding what's new in v7.4 to the devenv dashboards (#30568)
  * Chore(deps): Bump github.com/aws/aws-sdk-go from 1.35.5 to 1.36.31 (#30583)
  * Chore(deps): Bump github.com/prometheus/client_golang (#30585)
  * Chore(deps): Bump gopkg.in/macaron.v1 from 1.3.9 to 1.4.0 (#30587)
  * Chore(deps): Bump github.com/google/uuid from 1.1.5 to 1.2.0 (#30584)
  * Explore: Fix logs hover state so that it is visible and in dark mode &amp; simply hover code (#30572)
  * RefreshPicker: Fixes so valid intervals in url are visible in RefreshPicker (#30474)
  * Add documentation for Exemplars (#30317)
  * OldGraph: Fix height issue in Firefox (#30565)
  * XY Chart: fix editor error with empty frame (no fields) (#30573)
  * ButtonSelect &amp; RefreshPicker: Rewrite of components to use new emotion based ToolbarButton &amp; Menu (#30510)
  * XY Chart: share legend config with timeseries (#30559)
  * configuration.md: Document Content Security Policy options (#30413)
  * DataFrame: cache frame/field index in field state (#30529)
  * List + before -; rm old Git ref; reformat. (#30543)
  * Expressions: Add option to disable feature (#30541)
  * Explore: Fix loading visualisation on the top of the new time series panel (#30553)
  * Prometheus: Fix show query instead of Value if no __name__ and metric (#30511)
  * Decimals: Big Improvements to auto decimals and fixes to auto decimals bug found in 7.4-beta1  (#30519)
  * Postgres: Convert tests to stdlib (#30536)
  * Storybook: Migrate card story to use controls  (#30535)
  * AlertingNG: Enable UI to Save Alert Definitions (#30394)
  * Postgres: Be consistent about TLS/SSL terminology (#30532)
  * Loki: Append refId to logs uid (#30418)
  * Postgres: Fix indentation (#30531)
  * GraphNG: uPlot 1.6.3 (fix bands not filling below 0). close #30523. (#30527)
  * updates for e2e docker image (#30465)
  * GraphNG: uPlot 1.6.2 (#30521)
  * Docs: Update whats-new-in-v7-4.md (#30520)
  * Prettier: ignore build and devenv dirs (#30501)
  * Chore: Upgrade grabpl version (#30486)
  * Explore: Update styling of buttons (#30493)
  * Cloud Monitoring: Fix legend naming with display name override (#30440)
  * GraphNG: Disable Plot logging by default (#30390)
  * Admin: Fixes so whole org drop down is visible when adding users to org (#30481)
  * Docs: include Makefile option for local assets (#30455)
  * Footer: Fixes layout issue in footer  (#30443)
  * TimeSeriesPanel: Fixed default value for gradientMode (#30484)
  * Docs: fix typo in what's new doc (#30489)
  * Chore: adds wait to e2e test (#30488)
  * chore: update packages dependent on dot-prop to fix security vulnerability (#30432)
  * Dashboard: Remove Icon and change copy -&gt; Copy to clipboard in the share embedded panel modal (#30480)
  * Chore: fix spelling mistake (#30473)
  * Chore: Restrict internal imports from other packages (#30453)
  * Docs: What's new fixes and improvements (#30469)
  * Timeseries: only migrage point size when configured (#30461)
  * Alerting: Hides threshold handle for percentual thresholds (#30431)
  * Graph: Fixes so only users with correct permissions can add annotations (#30419)
  * Chore: update latest version to 7.4.0-beta1 (#30452)
  * Docs: Add whats new 7.4 links (#30463)
  * Update whats-new-in-v7-4.md (#30460)
  * docs: 7.4 what's new (Add expressions note) (#30446)
  * Chore: Upgrade build pipeline tool (#30456)
  * PanelModel: Make sure the angular options are passed to react panel type changed handler (#30441)
  * Expressions: Fix button icon (#30444)
  * ReleaseNotes: Updated changelog and release notes for 7.4.0-beta1 (#30449)
  * Docs: Fix img link for alert notification template (#30436)
  * grafana/ui: Fix internal import from grafana/data (#30439)
  * prevent field config from being overwritten (#30437)
  * PanelOptions: Refactoring applying panel and field options out of PanelModel and add property clean up for properties not in field config registry  (#30389)
  * Dashboard: Remove template variables option from ShareModal (#30395)
  * Added doc content for variables inspector code change by Hugo (#30408)
  * Docs: update license expiration behavior for reporting (#30420)
  * Chore: use old version format in package.json (#30430)
  * Chore: upgrade NPM security vulnerabilities (#30397)
  * 'Release: Updated versions in package to 7.5.0-pre.0' (#30428)
  * contribute: Add backend and configuration guidelines for PRs (#30426)
  * Chore: Update what's new URL (#30424)
- Update to version 7.4.5
- CVE-2021-28146, CVE-2021-28147: Fix API permissions issues related to team-sync. (Enterprise) (bsc#1183811, bsc#1183809)
- CVE-2021-28148: Usage insights requires signed in users. (Enterprise) (bsc#1183813)
- CVE-2021-27962: Do not allow editors to incorrectly bypass permissions on the default data source. (Enterprise) (bsc#1184371)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183803">SUSE bug 1183803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183809">SUSE bug 1183809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183811">SUSE bug 1183811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183813">SUSE bug 1183813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184371">SUSE bug 1184371</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27358/">CVE-2021-27358</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-27962/">CVE-2021-27962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-28146/">CVE-2021-28146</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28147/">CVE-2021-28147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28148/">CVE-2021-28148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625874" comment="grafana-7.5.7-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52381" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-prometheus (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186242" ref_url="https://bugzilla.suse.com/1186242" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29622" ref_url="https://www.suse.com/security/cve/CVE-2021-29622/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3KPAMVZLF5BC7A6E5Z2QSNUUFHXGK6B/" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-prometheus fixes the following issues:

- Provide and reload firewalld configuration only for:
  + openSUSE Leap 15.0, 15.1, 15.2
  + SUSE SLE15, SLE15 SP1, SLE15 SP2
- Upgrade to upstream version 2.27.1 (jsc#SLE-18254)
  + Bugfix:
   * SECURITY: Fix arbitrary redirects under the /new endpoint (CVE-2021-29622, bsc#1186242)
  + Features:
    * Promtool: Retroactive rule evaluation functionality. #7675
    * Configuration: Environment variable expansion for external labels. Behind --enable-feature=expand-external-labels flag. #8649
    * TSDB: Add a flag(--storage.tsdb.max-block-chunk-segment-size) to control the max chunks file size of the blocks 
      for small Prometheus instances.
    * UI: Add a dark theme. #8604
    * AWS Lightsail Discovery: Add AWS Lightsail Discovery. #8693
    * Docker Discovery: Add Docker Service Discovery. #8629
    * OAuth: Allow OAuth 2.0 to be used anywhere an HTTP client is used. #8761
    * Remote Write: Send exemplars via remote write. Experimental and disabled by default. #8296
  + Enhancements:
    * Digital Ocean Discovery: Add __meta_digitalocean_vpc label. #8642
    * Scaleway Discovery: Read Scaleway secret from a file. #8643
    * Scrape: Add configurable limits for label size and count. #8777
    * UI: Add 16w and 26w time range steps. #8656
    * Templating: Enable parsing strings in humanize functions. #8682
  + Bugfixes:
    * UI: Provide errors instead of blank page on TSDB Status Page. #8654 #8659
    * TSDB: Do not panic when writing very large records to the WAL. #8790
    * TSDB: Avoid panic when mmaped memory is referenced after the file is closed. #8723
    * Scaleway Discovery: Fix nil pointer dereference. #8737
    * Consul Discovery: Restart no longer required after config update with no targets. #8766
- Add tarball with vendor modules and web assets
- Uyuni: Read formula data from exporters map
- Uyuni: Add support for TLS targets
- Upgrade to upstream version 2.26.0
  + Changes
    * Alerting: Using Alertmanager v2 API by default. #8626
    * Prometheus/Promtool: Binaries are now printing help and usage to stdout instead of stderr. #8542
  + Features
    * Remote: Add support for AWS SigV4 auth method for remote_write. #8509
    * PromQL: Allow negative offsets. Behind --enable-feature=promql-negative-offset flag. #8487
    * UI: Add advanced auto-completion, syntax highlighting and linting to graph page query input. #8634
  + Enhancements
    * PromQL: Add last_over_time, sgn, clamp functions. #8457
    * Scrape: Add support for specifying type of Authorization header credentials with Bearer by default. #8512
    * Scrape: Add follow_redirects option to scrape configuration. #8546
    * Remote: Allow retries on HTTP 429 response code for remote_write. #8237 #8477
    * Remote: Allow configuring custom headers for remote_read. #8516
    * UI: Hitting Enter now triggers new query. #8581
    * UI: Better handling of long rule and names on the /rules and /targets pages. #8608 #8609
    * UI: Add collapse/expand all button on the /targets page. #8486
- Upgrade to upstream version 2.25.0
  + Features
    * Include a new `--enable-feature=` flag that enables experimental features.
  + Enhancements
    * Add optional name property to testgroup for better test failure output. #8440
    * Add warnings into React Panel on the Graph page. #8427
    * TSDB: Increase the number of buckets for the compaction duration metric. #8342
    * Remote: Allow passing along custom remote_write HTTP headers. #8416
    * Mixins: Scope grafana configuration. #8332
    * Kubernetes SD: Add endpoint labels metadata. #8273
    * UI: Expose total number of label pairs in head in TSDB stats page. #8343
    * TSDB: Reload blocks every minute, to detect new blocks and enforce retention more often. #8343
  + Bug fixes
    * API: Fix global URL when external address has no port. #8359
    * Deprecate unused flag --alertmanager.timeout. #8407
- Upgrade to upstream version 2.24.1
  + Enhancements
    * Cache basic authentication results to significantly improve performance of HTTP endpoints.
- Upgrade to upstream version 2.24.0
  + Features
    * Add TLS and basic authentication to HTTP endpoints. #8316
    * promtool: Add check web-config subcommand to check web config files. #8319
    * promtool: Add tsdb create-blocks-from openmetrics subcommand to backfill metrics data from an OpenMetrics file.
  + Enhancements
    * HTTP API: Fast-fail queries with only empty matchers. #8288
    * HTTP API: Support matchers for labels API. #8301
    * promtool: Improve checking of URLs passed on the command line. #7956
    * SD: Expose IPv6 as a label in EC2 SD. #7086
    * SD: Reuse EC2 client, reducing frequency of requesting credentials. #8311
    * TSDB: Add logging when compaction takes more than the block time range. #8151
    * TSDB: Avoid unnecessary GC runs after compaction. #8276
- Upgrade to upstream version 2.23.0
  + Changes
    * UI: Make the React UI default. #8142
    * Remote write: The following metrics were removed/renamed in remote write. #6815
      &gt; prometheus_remote_storage_succeeded_samples_total was removed and prometheus_remote_storage_samples_total 
      was introduced for all the samples attempted to send.
      &gt; prometheus_remote_storage_sent_bytes_total was removed and replaced with 
      prometheus_remote_storage_samples_bytes_total and prometheus_remote_storage_metadata_bytes_total.
      &gt; prometheus_remote_storage_failed_samples_total -&gt; prometheus_remote_storage_samples_failed_total .
      &gt; prometheus_remote_storage_retried_samples_total -&gt; prometheus_remote_storage_samples_retried_total.
      &gt; prometheus_remote_storage_dropped_samples_total -&gt; prometheus_remote_storage_samples_dropped_total.
      &gt; prometheus_remote_storage_pending_samples -&gt; prometheus_remote_storage_samples_pending.
    * Remote: Do not collect non-initialized timestamp metrics. #8060
  + Enhancements
    * Remote write: Added a metric prometheus_remote_storage_max_samples_per_send for remote write. #8102
    * TSDB: Make the snapshot directory name always the same length. #8138
    * TSDB: Create a checkpoint only once at the end of all head compactions. #8067
    * TSDB: Avoid Series API from hitting the chunks. #8050
    * TSDB: Cache label name and last value when adding series during compactions making compactions faster. #8192
    * PromQL: Improved performance of Hash method making queries a bit faster. #8025
    * promtool: tsdb list now prints block sizes. #7993
    * promtool: Calculate mint and maxt per test avoiding unnecessary calculations. #8096
    * SD: Add filtering of services to Docker Swarm SD. #8074
- Uyuni: `hostname` label is now set to FQDN instead of IP
- Update to upstream version 2.22.1
- Update packaging
  * Remove systemd and shadow hard requirements
  * use systemd-sysusers to configure the user in a dedicated 'system-user-prometheus' subpackage
  * add 'prometheus' package alias
  + Add support for Prometheus exporters proxy
- Remove prometheus.firewall.xml source file
- Remove firewalld files. They are installed in the main firewalld
  package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186242">SUSE bug 1186242</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29622/">CVE-2021-29622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626765" comment="golang-github-prometheus-prometheus-2.27.1-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52382" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175478" ref_url="https://bugzilla.suse.com/1175478" source="BUGZILLA"/>
		<reference ref_id="1186242" ref_url="https://bugzilla.suse.com/1186242" source="BUGZILLA"/>
		<reference ref_id="1186508" ref_url="https://bugzilla.suse.com/1186508" source="BUGZILLA"/>
		<reference ref_id="1186581" ref_url="https://bugzilla.suse.com/1186581" source="BUGZILLA"/>
		<reference ref_id="1186650" ref_url="https://bugzilla.suse.com/1186650" source="BUGZILLA"/>
		<reference ref_id="1188846" ref_url="https://bugzilla.suse.com/1188846" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27962" ref_url="https://www.suse.com/security/cve/CVE-2021-27962/" source="CVE"/>
		<reference ref_id="CVE-2021-28146" ref_url="https://www.suse.com/security/cve/CVE-2021-28146/" source="CVE"/>
		<reference ref_id="CVE-2021-28147" ref_url="https://www.suse.com/security/cve/CVE-2021-28147/" source="CVE"/>
		<reference ref_id="CVE-2021-28148" ref_url="https://www.suse.com/security/cve/CVE-2021-28148/" source="CVE"/>
		<reference ref_id="CVE-2021-29622" ref_url="https://www.suse.com/security/cve/CVE-2021-29622/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

ansible:

- The support level for ansible is l2, not l3

dracut-saltboot:

- Force installation of libexpat.so.1 (bsc#1188846)
- Use kernel parameters from PXE formula also for local boot

golang-github-prometheus-prometheus:

- Provide and reload firewalld configuration only for:
  + openSUSE Leap 15.0, 15.1, 15.2
  + SUSE Linux Enterprise 15, 15 SP1, 15 SP2
- Upgrade to upstream version 2.27.1 (jsc#SLE-18254)
  + Bugfix:
   * SECURITY: Fix arbitrary redirects under the /new endpoint (CVE-2021-29622, bsc#1186242)
   * UI: Provide errors instead of blank page on TSDB Status Page. #8654 #8659
    * TSDB: Do not panic when writing very large records to the WAL. #8790
    * TSDB: Avoid panic when mmaped memory is referenced after the file is closed. #8723
    * Scaleway Discovery: Fix nil pointer dereference. #8737
    * Consul Discovery: Restart no longer required after config update with no targets. #8766
  + Features:
    * Promtool: Retroactive rule evaluation functionality.
    * Configuration: Environment variable expansion for external labels. 
      Behind '--enable-feature=expand-external-labels' flag.
    * Add a flag '--storage.tsdb.max-block-chunk-segment-size' to control the max chunks file size of the blocks for 
      small Prometheus instances.
    * UI: Add a dark theme.
    * AWS Lightsail Discovery: Add AWS Lightsail Discovery.
    * Docker Discovery: Add Docker Service Discovery.
    * OAuth: Allow OAuth 2.0 to be used anywhere an HTTP client is used.
    * Remote Write: Send exemplars via remote write. Experimental and disabled by default.
  + Enhancements:
    * Digital Ocean Discovery: Add '__meta_digitalocean_vpc' label.
    * Scaleway Discovery: Read Scaleway secret from a file.
    * Scrape: Add configurable limits for label size and count.
    * UI: Add 16w and 26w time range steps.
    * Templating: Enable parsing strings in humanize functions.
- Update package with changes from `server:monitoring` (bsc#1175478)
  Left out removal of 'firewalld' related configuration files as SUSE Linux Enterprise 15-SP1's
  `firewalld` package does not contain 'prometheus' configuration yet.

mgr-cfg:

- No visible impact for the user

mgr-custom-info:

- No visible impact for the user

mgr-osad:

- No visible impact for the user

mgr-push:

- No visible impact for the user

mgr-virtualization:

- No visible impact for the user

rhnlib:

- No visible impact for the user

spacecmd:

- Make spacecmd aware of retracted patches/packages
- Enhance help for installation types when creating distributions (bsc#1186581)
- Parse empty argument when nothing in between the separator

spacewalk-client-tools:

- Update translation strings

spacewalk-koan:

- Fix for spacewalk-koan tests after switching to the new
  Docker images

spacewalk-oscap:

- No visible impact for the user

suseRegisterInfo:

- No visible impact for the user

uyuni-common-libs:

- Handle broken RPM packages to prevent exceptions
  causing fails on repository synchronization (bsc#1186650)
- Maintainer field in debian packages are only recommended (bsc#1186508)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175478">SUSE bug 1175478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186242">SUSE bug 1186242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186508">SUSE bug 1186508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186581">SUSE bug 1186581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186650">SUSE bug 1186650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188846">SUSE bug 1188846</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-27962/">CVE-2021-27962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-28146/">CVE-2021-28146</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28147/">CVE-2021-28147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28148/">CVE-2021-28148</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29622/">CVE-2021-29622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626766" comment="ansible-2.9.21-1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626767" comment="ansible-doc-2.9.21-1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626768" comment="ansible-test-2.9.21-1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627140" comment="dracut-saltboot-0.1.1627546504.96a0b3e-1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626769" comment="mgr-cfg-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626770" comment="mgr-cfg-actions-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626771" comment="mgr-cfg-client-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626772" comment="mgr-cfg-management-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626773" comment="mgr-custom-info-4.2.2-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626774" comment="mgr-osa-dispatcher-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626775" comment="mgr-osad-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626776" comment="mgr-push-4.2.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626777" comment="mgr-virtualization-host-4.2.2-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626778" comment="python2-mgr-cfg-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626779" comment="python2-mgr-cfg-actions-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626780" comment="python2-mgr-cfg-client-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626781" comment="python2-mgr-cfg-management-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626782" comment="python2-mgr-osa-common-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626783" comment="python2-mgr-osa-dispatcher-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626784" comment="python2-mgr-osad-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626785" comment="python2-mgr-push-4.2.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626786" comment="python2-mgr-virtualization-common-4.2.2-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626787" comment="python2-mgr-virtualization-host-4.2.2-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626788" comment="python2-rhnlib-4.2.4-3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626789" comment="python2-spacewalk-check-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626790" comment="python2-spacewalk-client-setup-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626791" comment="python2-spacewalk-client-tools-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626792" comment="python2-spacewalk-koan-4.2.4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626793" comment="python2-spacewalk-oscap-4.2.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626794" comment="python2-suseRegisterInfo-4.2.4-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626795" comment="python2-uyuni-common-libs-4.2.5-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626796" comment="python3-mgr-cfg-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626797" comment="python3-mgr-cfg-actions-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626798" comment="python3-mgr-cfg-client-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626799" comment="python3-mgr-cfg-management-4.2.3-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626800" comment="python3-mgr-osa-common-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626801" comment="python3-mgr-osa-dispatcher-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626802" comment="python3-mgr-osad-4.2.6-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626803" comment="python3-mgr-push-4.2.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626804" comment="python3-mgr-virtualization-common-4.2.2-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626805" comment="python3-mgr-virtualization-host-4.2.2-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626806" comment="python3-rhnlib-4.2.4-3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626807" comment="python3-spacewalk-check-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626808" comment="python3-spacewalk-client-setup-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626809" comment="python3-spacewalk-client-tools-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626810" comment="python3-spacewalk-koan-4.2.4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626811" comment="python3-spacewalk-oscap-4.2.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626812" comment="python3-suseRegisterInfo-4.2.4-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626813" comment="python3-uyuni-common-libs-4.2.5-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626814" comment="spacecmd-4.2.11-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626815" comment="spacewalk-check-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626816" comment="spacewalk-client-setup-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626817" comment="spacewalk-client-tools-4.2.12-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626818" comment="spacewalk-koan-4.2.4-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626819" comment="spacewalk-oscap-4.2.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626820" comment="suseRegisterInfo-4.2.4-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52383" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179416" ref_url="https://bugzilla.suse.com/1179416" source="BUGZILLA"/>
		<reference ref_id="1181805" ref_url="https://bugzilla.suse.com/1181805" source="BUGZILLA"/>
		<reference ref_id="1183543" ref_url="https://bugzilla.suse.com/1183543" source="BUGZILLA"/>
		<reference ref_id="1183545" ref_url="https://bugzilla.suse.com/1183545" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

- Changed default package verification level to 'none' to be compatible to rpm-4.14.1
- Made illegal obsoletes a warning
- Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)
- Added support for enforcing signature policy and payload verification step to
  transactions (jsc#SLE-17817)
- Added :humansi and :hmaniec query formatters for human readable output
- Added query selectors for whatobsoletes and whatconflicts
- Added support for sorting caret higher than base version
- rpm does no longer require the signature header to be in a contiguous
  region when signing (bsc#1181805)

Security fixes:

- CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an
  attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM
  repository, to cause RPM database corruption. The highest threat from this vulnerability is to
  data integrity (bsc#1183543)

- CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file.
  This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,
  whose signature header was modified, to cause RPM database corruption and execute code. The highest
  threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)

- CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker
  who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability
  is to system availability.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179416">SUSE bug 1179416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181805">SUSE bug 1181805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498315" comment="python2-rpm-4.14.3-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494330" comment="python3-rpm-4.14.3-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494331" comment="rpm-4.14.3-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494332" comment="rpm-32bit-4.14.3-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496657" comment="rpm-build-4.14.3-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494333" comment="rpm-devel-4.14.3-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498199" comment="rpm-ndb-4.14.3-37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631125" comment="rpm-ndb-32bit-4.14.3-37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52384" version="1" class="patch">
	<metadata>
		<title>Security update for libdnf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183779" ref_url="https://bugzilla.suse.com/1183779" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<reference ref_id="CVE-2021-3445" ref_url="https://www.suse.com/security/cve/CVE-2021-3445/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2685-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/" source="SUSE-SU"/>
		<description>
This update for libdnf fixes the following issues:

- Fixed crash when loading DVD repositories

Update to 0.62.0

+ Change order of TransactionItemReason (rh#1921063)
+ Add two new comperators for security filters (rh#1918475)
+ Apply security filters for candidates with lower priority
+ Fix: Goal - translation of messages in global maps
+ Enhance description of modular solvables
+ Improve performance for module query 
+ Change mechanism of modular errata applicability (rh#1804234)
+ dnf_transaction_commit(): Remove second call to rpmtsSetVSFlags
+ Fix a couple of memory leaks
+ Fix: Setting of librepo handle in newHandle function
+ Remove failsafe data when module is not enabled (rh#1847035)
+ Expose librepo's checksum functions via SWIG
+ Fix: Mising check of 'hy_split_nevra()' return code
+ Do not allow 1 as installonly_limit value (rh#1926261)
+ Fix check whether the subkey can be used for signing
+ Hardening: add signature check with rpmcliVerifySignatures 
  (CVE-2021-3445, CVE-2021-3421, CVE-2021-20271, rh#1932079, rh#1932089, rh#1932090, bsc#1183779)
+ Add a config option sslverifystatus, defaults to false (rh#1814383)
+ [context] Add API for distro-sync

- Fix dependency for repo-config-zypp subpackage to work with SLE

Update to 0.60.0

+ Fix repo.fresh() implementation
+ Fix: Fully set ssl in newHandle function
+ [conf] Add options for working with certificates used with proxy
+ Apply proxy certificate options
+ lock: Switch return-if-fail to assert to quiet gcc -fanalyzer
+ build-sys: Clean up message about Python bindings
+ Modify module NSVCA parsing - context definition (rh#1926771)
+ [context] Fix: dnf_package_is_installonly (rh#1928056)
+ Fix problematic language
+ Add getApplicablePackages to advisory and isApplicable to advisorymodule
+ Keep isAdvisoryApplicable to preserve API
+ Run ModulePackageContainerTest tests in tmpdir, merge interdependent
+ [context] Support config file option 'proxy_auth_method', defaults 'any'
+ Properly handle multiple collections in updateinfo.xml (rh#1804234)
+ Support main config file option 'installonlypkgs'
+ Support main config file option 'protected_packages'

- Add repo-config-zypp subpackage to allow easily using Zypper
  repository configuration

- Backport support for using certificates for repository authorization
- Backport another fix for adding controls to installonlypkgs
- Add patch to move directory for dnf state data to /usr/lib/sysimage
- Backport fixes to add controls for installonlypkgs and protected_packages

Update to version 0.58.0

+ Option: Add reset() method
+ Add OptionBinds::getOption() method
+ [context] Add dnf_repo_conf_from_gkeyfile() and dnf_repo_conf_reset()
+ [context] Add support for options: minrate, throttle, bandwidth, timeout
+ [context] Remove g_key_file_get_string() from dnf_repo_set_keyfile_data()
+ Allow loading ext metadata even if only cache (solv) is present
+ Add ASAN_OPTIONS for test_libdnf_main
+ [context,API] Functions for accessing main/global configuration options
+ [context,API] Function for adding setopt
+ Add getter for modular obsoletes from ModuleMetadata
+ Add ModulePackage.getStaticContext() and getRequires()
+ Add compatible layer for MdDocuments v2
+ Fix modular queries with the new solver
+ Improve formatting of error string for modules
+ Change mechanism of module conflicts
+ Fix load/update FailSafe

Update to version 0.55.2

+ Improve performance of query installed() and available()
+ Swdb: Add a method to get the current transaction
+ [modules] Add special handling for src artifacts (rh#1809314)
+ Better msgs if 'basecachedir' or 'proxy_password' isn't set (rh#1888946)
+ Add new options module_stream_switch
+ Support allow_vendor_change setting in dnf context API

Update to version 0.55.0

+ Add vendor to dnf API (rh#1876561)
+ Add formatting function for solver error
+ Add error types in ModulePackageContainer
+ Implement module enable for context part
+ Improve string formatting for translation
+ Remove redundant printf and change logging info to notice (rh#1827424)
+ Add allow_vendor_change option (rh#1788371) (rh#1788371)

Update to version 0.54.2

+ history: Fix dnf history rollback when a package was removed (rh#1683134)
+ Add support for HY_GT, HY_LT in query nevra_strict
+ Fix parsing empty lines in config files
+ Accept '==' as an operator in reldeps (rh#1847946)
+ Add log file level main config option (rh#1802074)
+ Add protect_running_kernel configuration option (rh#1698145)
+ Context part of libdnf cannot assume zchunk is on (rh#1851841, rh#1779104)
+ Fix memory leak of resultingModuleIndex and handle g_object refs
+ Redirect librepo logs to libdnf logs with different source
+ Add hy_goal_lock
+ Enum/String conversions for Transaction Store/Replay
+ utils: Add a method to decode URLs
+ Unify hawkey.log line format with the rest of the logs

Update to version 0.48.0

+ Add prereq_ignoreinst &amp; regular_requires properties for pkg (rh#1543449)
+ Reset active modules when no module enabled or default (rh#1767351)
+ Add comment option to transaction (rh#1773679)
+ Failing to get module defauls is a recoverable error
+ Baseurl is not exclusive with mirrorlist/metalink (rh#1775184)
+ Add new function to reset all modules in C API (dnf_context_reset_all_modules)
+ [context] Fix to preserve additionalMetadata content (rh#1808677)
+ Fix filtering of DepSolvables with source rpms (rh#1812596)
+ Add setter for running kernel protection setting
+ Handle situation when an unprivileged user cannot create history database (rh#1634385)
+ Add query filter: latest by priority
+ Add DNF_NO_PROTECTED flag to allow empty list of protected packages
+ Remove 'dim' option from terminal colors to make them more readable (rh#1807774, rh#1814563)
+ [context] Error when main config file can't be opened (rh#1794864)
+ [context] Add function function dnf_context_is_set_config_file_path
+ swdb: Catch only SQLite3 exceptions and simplify the messages
+ MergedTransaction list multiple comments (rh#1773679)
+ Modify CMake to pull *.po files from weblate
+ Optimize DependencyContainer creation from an existing queue
+ fix a memory leak in dnf_package_get_requires()
+ Fix memory leaks on g_build_filename()
+ Fix memory leak in dnf_context_setup()
+ Add `hy_goal_favor` and `hy_goal_disfavor`
+ Define a cleanup function for `DnfPackageSet`
+ dnf-repo: fix dnf_repo_get_public_keys double-free
+ Do not cache RPMDB
+ Use single-quotes around string literals used in SQL statements
+ SQLite3: Do not close the database if it wasn't opened (rh#1761976)
+ Don't create a new history DB connection for in-memory DB
+ transaction/Swdb: Use a single logger variable in constructor
+ utils: Add a safe version of pathExists()
+ swdb: Handle the case when pathExists() fails on e.g. permission
+ Repo: prepend 'file://' if a local path is used as baseurl
+ Move urlEncode() to utils
+ utils: Add 'exclude' argument to urlEncode()
+ Encode package URL for downloading through librepo (rh#1817130)
+ Replace std::runtime_error with libdnf::RepoError
+ Fixes and error handling improvements of the File class
+ [context] Use ConfigRepo for gpgkey and baseurl (rh#1807864)
+ [context] support 'priority' option in .repo config file (rh#1797265)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-13"/>
	<updated date="2021-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183779">SUSE bug 1183779</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3445/">CVE-2021-3445</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630905" comment="hawkey-man-0.62.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630906" comment="libdnf-devel-0.62.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630907" comment="libdnf-repo-config-zypp-0.62.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630908" comment="libdnf2-0.62.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630909" comment="python3-hawkey-0.62.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630910" comment="python3-libdnf-0.62.0-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52385" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1187495" ref_url="https://bugzilla.suse.com/1187495" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188126" ref_url="https://bugzilla.suse.com/1188126" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188366" ref_url="https://bugzilla.suse.com/1188366" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188703" ref_url="https://bugzilla.suse.com/1188703" source="BUGZILLA"/>
		<reference ref_id="1188720" ref_url="https://bugzilla.suse.com/1188720" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188752" ref_url="https://bugzilla.suse.com/1188752" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188893" ref_url="https://bugzilla.suse.com/1188893" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a potential local privilege escalation in the  CAN BCM networking protocol (bsc#1187215).
- CVE-2021-3612: Fixed an out-of-bounds memory write flaw in the joystick devices subsystem. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)
- CVE-2021-35039: Fixed mishandling of signature verification. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bsc#1188080).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: DPTF: Fix reading of attributes (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: PM / fan: Put fan device IDs into separate header file (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: firewire-motu: fix detection for S/PDIF source on optical interface in v2 protocol (git-fixes).
- ALSA: firewire-motu: fix stream format for MOTU 8pre FireWire (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Apply LED fixup for HP Dragonfly G1, too (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: hda/realtek: Fix pop noise and 2 Front Mic issues on a machine (git-fixes).
- ALSA: hda/realtek: Improve fixup for HP Spectre x360 15-df0xxx (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 830 G8 Notebook PC (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook x360 830 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 450 G8 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 630 G8 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hda: intel-dsp-cfg: add missing ElkhartLake PCI ID (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: pcm - fix mmap capability check for the snd-dummy driver (git-fixes).
- ALSA: pcm: Call substream ack() method upon compat mmap commit (git-fixes).
- ALSA: pcm: Fix mmap capability check (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add missing proc text entry for BESPOKEN type (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: Fix OOB access at proc output (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- ALSA: usx2y: Avoid camelCase (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: Intel: sof_sdw: add SOF_RT715_DAI_ID_FIX for AlderLake (git-fixes).
- ASoC: Intel: sof_sdw: add mutual exclusion between PCH DMIC and RT715 (git-fixes).
- ASoC: SOF: loader: Use snd_sof_dsp_block_read() instead sof_block_read() (git-fixes).
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: fsl_spdif: Fix error handler with pm_runtime_enable (git-fixes).
- ASoC: fsl_spdif: Fix unexpected interrupt after suspend (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: intel/boards: add missing MODULE_DEVICE_TABLE (git-fixes).
- ASoC: max98373-sdw: add missing memory allocation check (git-fixes).
- ASoC: max98373-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rk3328: fix missing clk_disable_unprepare() on error in rk3328_platform_probe() (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ASoC: rt1308-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: rt5682-sdw: set regcache_cache_only false before reading RT5682_DEVICE_ID (git-fixes).
- ASoC: rt5682-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt5682: Disable irq on shutdown (git-fixes).
- ASoC: rt5682: Fix a problem with error handling in the io init function of the soundwire (git-fixes).
- ASoC: rt5682: fix getting the wrong device id when the suspend_stress_test (git-fixes).
- ASoC: rt700-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt711-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: rt715-sdw: use first_hw_init flag on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: soc-pcm: fix the return value in dpcm_apply_symmetry() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- ASoC: wm_adsp: Correct wm_coeff_tlv_get handling (git-fixes).
- Bluetooth: Fix alt settings for incoming SCO with transparent coding format (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: L2CAP: Fix invalid access if ECRED Reconfigure fails (git-fixes).
- Bluetooth: L2CAP: Fix invalid access on ECRED Connection response (git-fixes).
- Bluetooth: Remove spurious error message (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btintel: Add infrastructure to read controller information (bsc#1188893).
- Bluetooth: btintel: Check firmware version before download (bsc#1188893).
- Bluetooth: btintel: Collect tlv based active firmware build info in FW mode (bsc#1188893).
- Bluetooth: btintel: Consolidate intel_version parsing (bsc#1188893).
- Bluetooth: btintel: Consolidate intel_version_tlv parsing (bsc#1188893).
- Bluetooth: btintel: Fix endianness issue for TLV version information (bsc#1188893).
- Bluetooth: btintel: Fix offset calculation boot address parameter (bsc#1188893).
- Bluetooth: btintel: Functions to send firmware header / payload (bsc#1188893).
- Bluetooth: btintel: Move operational checks after version check (bsc#1188893).
- Bluetooth: btintel: Refactor firmware download function (bsc#1188893).
- Bluetooth: btintel: Reorganized bootloader mode tlv checks in intel_version_tlv parsing (bsc#1188893).
- Bluetooth: btintel: Replace zero-length array with flexible-array member (bsc#1188893).
- Bluetooth: btintel: Skip reading firmware file version while in bootloader mode (bsc#1188893).
- Bluetooth: btqca: Do not modify firmware contents in-place (git-fixes).
- Bluetooth: btusb: Add *setup* function for new generation Intel controllers (bsc#1188893).
- Bluetooth: btusb: Add support USB ALT 3 for WBS (git-fixes).
- Bluetooth: btusb: Add support for GarfieldPeak controller (bsc#1188893).
- Bluetooth: btusb: Consolidate code for waiting firmware download (bsc#1188893).
- Bluetooth: btusb: Define a function to construct firmware filename (bsc#1188893).
- Bluetooth: btusb: Enable MSFT extension for Intel controllers (bsc#1188893).
- Bluetooth: btusb: Fix failing to init controllers with operation firmware (bsc#1188893).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: Helper function to download firmware to Intel adapters (bsc#1188893).
- Bluetooth: btusb: Map Typhoon peak controller to BTUSB_INTEL_NEWGEN (bsc#1188893).
- Bluetooth: btusb: Update boot parameter specific to SKU (bsc#1188893).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Bluetooth: btusb: print firmware file name on error loading firmware (bsc#1188893).
- Bluetooth: hci_intel: drop strange le16_to_cpu() against u8 values (bsc#1188893).
- Bluetooth: hci_intel: enable on new platform (bsc#1188893).
- Bluetooth: hci_intel: switch to list_for_each_entry() (bsc#1188893).
- Bluetooth: hci_qca: fix potential GPF (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- Bluetooth: mgmt: Fix the command returns garbage parameter value (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available (bsc#1188703).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: intel-gw: Fix INTx enable (git-fixes).
- PCI: intel-gw: Fix INTx enable (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).
- PCI: tegra194: Fix tegra_pcie_ep_raise_msi_irq() ill-defined shift (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- RDMA/hns: Remove unused parameter udata (jsc#SLE-15176).
- RDMA/mlx4: Remove unused parameter udata (jsc#SLE-15176).
- RDMA/mlx5: Remove unused parameter udata (jsc#SLE-15176).
- RDMA/rtrs-clt: Check if the queue_depth has changed during a reconnection (jsc#SLE-15176).
- RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its stats (jsc#SLE-15176).
- RDMA/rtrs-clt: Fix memory leak of not-freed sess-&gt;stats and stats-&gt;pcpu_stats (jsc#SLE-15176).
- RDMA/rtrs-srv: Fix memory leak of unfreed rtrs_srv_stats object (jsc#SLE-15176).
- RDMA/rtrs-srv: Fix memory leak when having multiple sessions (jsc#SLE-15176).
- RDMA/rtrs-srv: Replace atomic_t with percpu_ref for ids_inflight (jsc#SLE-15176).
- RDMA/rtrs-srv: Set minimal max_send_wr and max_recv_wr (jsc#SLE-15176).
- RDMA/rtrs: Do not reset hb_missed_max after re-connection (jsc#SLE-15176).
- RDMA/srp: Fix a recently introduced memory leak (jsc#SLE-15176).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'Bluetooth: btintel: Fix endianness issue for TLV version information' (bsc#1188893).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- Revert 'drm/i915: Propagate errors on awaiting already signaled fences' (git-fixes).
- Revert 'drm: add a locked version of drm_is_current_master' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- Revert 'iwlwifi: remove wide_cmd_header field' (bsc#1187495).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bonding: Add struct bond_ipesc to manage SA (bsc#1176447).
- bonding: disallow setting nested bonding + ipsec offload (bsc#1176447).
- bonding: fix build issue (git-fixes).
- bonding: fix incorrect return value of bond_ipsec_offload_ok() (bsc#1176447).
- bonding: fix null dereference in bond_ipsec_add_sa() (bsc#1176447).
- bonding: fix suspicious RCU usage in bond_ipsec_add_sa() (bsc#1176447).
- bonding: fix suspicious RCU usage in bond_ipsec_del_sa() (bsc#1176447).
- bonding: fix suspicious RCU usage in bond_ipsec_offload_ok() (bsc#1176447).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- brcmfmac: Fix a double-free in brcmf_sdio_bus_reset (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: imx8mq: remove SYS PLL 1/2 clock gates (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- coresight: Propagate symlink failure (git-fixes).
- coresight: core: Fix use of uninitialized pointer (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- docs: virt/kvm: close inline string literal (bsc#1188703).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/dc: Fix a missing check bug in dm_dp_mst_detect() (git-fixes).
- drm/amd/display: Avoid HDCP over-read and corruption (git-fixes).
- drm/amd/display: Fix DCN 3.01 DSCCLK validation (git-fixes).
- drm/amd/display: Fix build warnings (git-fixes).
- drm/amd/display: Fix off-by-one error in DML (git-fixes).
- drm/amd/display: Release MST resources on switch from MST to SST (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix HDCP reset sequence on reinitialize (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdgpu: enable sdma0 tmz for Raven/Renoir(V2) (git-fixes).
- drm/amdgpu: remove unsafe optimization to drop preamble ib (git-fixes).
- drm/amdgpu: update golden setting for sienna_cichlid (git-fixes).
- drm/amdgpu: wait for moving fence after pinning (git-fixes).
- drm/amdkfd: Fix circular lock in nocpsch path (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/amdkfd: fix circular locking on get_wave_state (git-fixes).
- drm/amdkfd: use allowed domain for vmbo validation (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge/sii8620: fix dependency on extcon (git-fixes).
- drm/bridge: Fix the stop condition of drm_bridge_chain_pre_enable() (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/bridge: nwl-dsi: Force a full modeset when crtc_state-&gt;active is changed to be true (git-fixes).
- drm/dp_mst: Do not set proposed vcpi directly (git-fixes).
- drm/gma500: Add the missed drm_gem_object_put() in psb_user_framebuffer_create() (git-fixes).
- drm/i915/display: Do not zero past infoframes.vsc (git-fixes).
- drm/i915/gvt: Clear d3_entered on elsp cmd submission (git-fixes).
- drm/i915/selftests: use vma_lookup() in __igt_mmap() (git-fixes).
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm/dpu: Fix sm8250_mdp register length (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/msm: Fix error return code in msm_drm_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/nouveau: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/nouveau: fix dma_address check for CPU/GPU sync (git-fixes).
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm/panel: nt35510: Do not fail if DSI read fails (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/radeon: Call radeon_suspend_kms() in radeon_pci_shutdown() for Loongson64 (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: cdn-dp: fix sign extension on an int multiply for a u64 result (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/rockchip: lvds: Fix an error handling path (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/scheduler: Fix hang when sched_entity released (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: Fix clock source for VEC PixelValve on BCM2711 (git-fixes).
- drm/vc4: crtc: Skip the TXP (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/vc4: hdmi: Fix PM reference leak in vc4_hdmi_encoder_pre_crtc_co() (git-fixes).
- drm/vc4: hdmi: Fix error path of hpd-gpios (git-fixes).
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- drm/vc4: hdmi: Prevent clock unbalance (git-fixes).
- drm/vc4: txp: Properly set the possible_crtcs mask (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/vmwgfx: Fix cpu updates of coherent multisample surfaces (git-fixes).
- drm/vmwgfx: Mark a surface gpu-dirty after the SVGA3dCmdDXGenMips command (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- drm: add a locked version of drm_is_current_master (git-fixes).
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm: bridge: add missing word in Analogix help text (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm: rockchip: add missing registers for RK3066 (git-fixes).
- drm: rockchip: add missing registers for RK3188 (git-fixes).
- drm: rockchip: set alpha_en to 0 if it is not used (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- efi/tpm: Differentiate missing and invalid final event log table (bsc#1188036).
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i2c: designware: Adjust bus_freq_hz when refuse high speed mode set (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- i40e: Fix missing rtnl locking when setting up pf switch (jsc#SLE-13701).
- i40e: fix PTP on 5Gb links (jsc#SLE-13701).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- integrity: use arch_ima_get_secureboot instead of checking EFI_SECURE_BOOT when loading MokListRT (bsc#1188366).
- intel_th: Wait until port is in reset before programming it (git-fixes).
- iwl-trans: move dev_cmd_offs, page_offs to a common trans header (bsc#1187495).
- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() (git-fixes).
- iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_gen2_enqueue_hcmd() (git-fixes).
- iwlwifi: acpi: evaluate dsm to disable 5.8GHz channels (bsc#1187495).
- iwlwifi: acpi: in non acpi compilations remove iwl_sar_geo_init (bsc#1187495).
- iwlwifi: acpi: prepare SAR profile selection code for multiple sizes (bsc#1187495).
- iwlwifi: acpi: remove dummy definition of iwl_sar_set_profile() (bsc#1187495).
- iwlwifi: acpi: rename geo structs to contain versioning (bsc#1187495).
- iwlwifi: acpi: support ppag table command v2 (bsc#1187495).
- iwlwifi: add a common struct for all iwl_tx_power_cmd versions (bsc#1187495).
- iwlwifi: add trans op to set PNVM (bsc#1187495).
- iwlwifi: align RX status flags with firmware (bsc#1187495).
- iwlwifi: api: fix u32 -&gt; __le32 (bsc#1187495).
- iwlwifi: bump FW API to 57 for AX devices (bsc#1187495).
- iwlwifi: bump FW API to 59 for AX devices (bsc#1187495).
- iwlwifi: calib: Demote seemingly unintentional kerneldoc header (bsc#1187495).
- iwlwifi: dbg: Do not touch the tlv data (bsc#1187495).
- iwlwifi: dbg: add debug host notification (DHN) time point (bsc#1187495).
- iwlwifi: dbg: add dumping special device memory (bsc#1187495).
- iwlwifi: dbg: remove IWL_FW_INI_TIME_POINT_WDG_TIMEOUT (bsc#1187495).
- iwlwifi: do not export acpi functions unnecessarily (bsc#1187495).
- iwlwifi: dvm: Demote a couple of nonconformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: devices: Fix function documentation formatting issues (bsc#1187495).
- iwlwifi: dvm: lib: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: rxon: Demote non-conformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: scan: Demote a few nonconformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: sta: Demote a bunch of nonconformant kernel-doc headers (bsc#1187495).
- iwlwifi: dvm: tx: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: enable twt by default (bsc#1187495).
- iwlwifi: fix 11ax disabled bit in the regulatory capability flags (bsc#1187495).
- iwlwifi: fix sar geo table initialization (bsc#1187495).
- iwlwifi: fw: add default value for iwl_fw_lookup_cmd_ver (bsc#1187495).
- iwlwifi: fw: move assert descriptor parser to common code (bsc#1187495).
- iwlwifi: increase PNVM load timeout (bsc#1187495).
- iwlwifi: iwl-drv: Provide descriptions debugfs dentries (bsc#1187495).
- iwlwifi: iwl-trans: move tfd to trans layer (bsc#1187495).
- iwlwifi: move PNVM implementation to common code (bsc#1187495).
- iwlwifi: move all bus-independent TX functions to common code (bsc#1187495).
- iwlwifi: move bc_pool to a common trans header (bsc#1187495).
- iwlwifi: move bc_table_dword to a common trans header (bsc#1187495).
- iwlwifi: msix: limit max RX queues for 9000 family (bsc#1187495).
- iwlwifi: mvm: Add FTM initiator RTT smoothing logic (bsc#1187495).
- iwlwifi: mvm: Do not install CMAC/GMAC key in AP mode (bsc#1187495).
- iwlwifi: mvm: add PROTECTED_TWT firmware API (bsc#1187495).
- iwlwifi: mvm: add a get lmac id function (bsc#1187495).
- iwlwifi: mvm: add an option to add PASN station (bsc#1187495).
- iwlwifi: mvm: add d3 prints (bsc#1187495).
- iwlwifi: mvm: add support for new WOWLAN_TSC_RSC_PARAM version (bsc#1187495).
- iwlwifi: mvm: add support for new version of WOWLAN_TKIP_SETTING_API_S (bsc#1187495).
- iwlwifi: mvm: add support for range request command ver 11 (bsc#1187495).
- iwlwifi: mvm: add support for responder dynamic config command version 3 (bsc#1187495).
- iwlwifi: mvm: assign SAR table revision to the command later (bsc#1187495).
- iwlwifi: mvm: avoid possible NULL pointer dereference (bsc#1187495).
- iwlwifi: mvm: clear all scan UIDs (bsc#1187495).
- iwlwifi: mvm: d3: parse wowlan status version 11 (bsc#1187495).
- iwlwifi: mvm: d3: support GCMP ciphers (bsc#1187495).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: mvm: do not check if CSA event is running before removing (bsc#1187495).
- iwlwifi: mvm: do not send a CSA command the firmware does not know (bsc#1187495).
- iwlwifi: mvm: fix error print when session protection ends (git-fixes).
- iwlwifi: mvm: fix suspicious rcu usage warnings (bsc#1187495).
- iwlwifi: mvm: fix the type we use in the PPAG table validity checks (bsc#1187495).
- iwlwifi: mvm: get number of stations from TLV (bsc#1187495).
- iwlwifi: mvm: ignore the scan duration parameter (bsc#1187495).
- iwlwifi: mvm: initiator: add option for adding a PASN responder (bsc#1187495).
- iwlwifi: mvm: location: set the HLTK when PASN station is added (bsc#1187495).
- iwlwifi: mvm: ops: Remove unused static struct 'iwl_mvm_debug_names' (bsc#1187495).
- iwlwifi: mvm: prepare roc_done_wk to work sync (bsc#1187495).
- iwlwifi: mvm: process ba-notifications also when sta rcu is invalid (bsc#1187495).
- iwlwifi: mvm: re-enable TX after channel switch (bsc#1187495).
- iwlwifi: mvm: read and parse SKU ID if available (bsc#1187495).
- iwlwifi: mvm: remove memset of kek_kck command (bsc#1187495).
- iwlwifi: mvm: remove redundant log in iwl_mvm_tvqm_enable_txq() (bsc#1187495).
- iwlwifi: mvm: remove redundant support_umac_log field (bsc#1187495).
- iwlwifi: mvm: responder: allow to set only the HLTK for an associated station (bsc#1187495).
- iwlwifi: mvm: ring the doorbell and wait for PNVM load completion (bsc#1187495).
- iwlwifi: mvm: rs-fw: handle VHT extended NSS capability (bsc#1187495).
- iwlwifi: mvm: send stored PPAG command instead of local (bsc#1187495).
- iwlwifi: mvm: set PROTECTED_TWT feature if supported by firmware (bsc#1187495).
- iwlwifi: mvm: set PROTECTED_TWT in MAC data policy (bsc#1187495).
- iwlwifi: mvm: set enabled in the PPAG command properly (bsc#1187495).
- iwlwifi: mvm: stop claiming NL80211_EXT_FEATURE_SET_SCAN_DWELL (bsc#1187495).
- iwlwifi: mvm: store PPAG enabled/disabled flag properly (bsc#1187495).
- iwlwifi: mvm: support ADD_STA_CMD_API_S ver 12 (bsc#1187495).
- iwlwifi: mvm: support more GTK rekeying algorithms (bsc#1187495).
- iwlwifi: mvm: support new KEK KCK api (bsc#1187495).
- iwlwifi: mvm: tx: Demote misuse of kernel-doc headers (bsc#1187495).
- iwlwifi: mvm: use CHECKSUM_COMPLETE (bsc#1187495).
- iwlwifi: mvm: utils: Fix some doc-rot (bsc#1187495).
- iwlwifi: pcie: avoid potential PNVM leaks (bsc#1187495).
- iwlwifi: pcie: do not disable interrupts for reg_lock (bsc#1187495).
- iwlwifi: pcie: fix context info freeing (git-fixes).
- iwlwifi: pcie: fix the xtal latency value for a few qu devices (bsc#1187495).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- iwlwifi: pcie: implement set_pnvm op (bsc#1187495).
- iwlwifi: pcie: make iwl_pcie_txq_update_byte_cnt_tbl bus independent (bsc#1187495).
- iwlwifi: pcie: properly set LTR workarounds on 22000 devices (bsc#1187495).
- iwlwifi: phy-ctxt: add new API VER 3 for phy context cmd (bsc#1187495).
- iwlwifi: pnvm: do not skip everything when not reloading (bsc#1187495).
- iwlwifi: pnvm: do not try to load after failures (bsc#1187495).
- iwlwifi: pnvm: increment the pointer before checking the TLV (bsc#1187495).
- iwlwifi: pnvm: set the PNVM again if it was already loaded (bsc#1187495).
- iwlwifi: provide gso_type to GSO packets (bsc#1187495).
- iwlwifi: queue: bail out on invalid freeing (bsc#1187495).
- iwlwifi: read and parse PNVM file (bsc#1187495).
- iwlwifi: regulatory: regulatory capabilities api change (bsc#1187495).
- iwlwifi: remove iwl_validate_sar_geo_profile() export (bsc#1187495).
- iwlwifi: remove wide_cmd_header field (bsc#1187495).
- iwlwifi: rs: Demote non-compliant kernel-doc headers (bsc#1187495).
- iwlwifi: rs: align to new TLC config command API (bsc#1187495).
- iwlwifi: rs: set RTS protection for all non legacy rates (bsc#1187495).
- iwlwifi: sta: defer ADDBA transmit in case reclaimed SN != next SN (bsc#1187495).
- iwlwifi: stats: add new api fields for statistics cmd/ntfy (bsc#1187495).
- iwlwifi: support REDUCE_TX_POWER_CMD version 6 (bsc#1187495).
- iwlwifi: support version 3 of GEO_TX_POWER_LIMIT (bsc#1187495).
- iwlwifi: support version 5 of the alive notification (bsc#1187495).
- iwlwifi: thermal: support new temperature measurement API (bsc#1187495).
- iwlwifi: update prph scratch structure to include PNVM data (bsc#1187495).
- iwlwifi: use correct group for alive notification (bsc#1187495).
- iwlwifi: wowlan: adapt to wowlan status API version 10 (bsc#1187495).
- iwlwifi: yoyo: add support for internal buffer allocation in D3 (bsc#1187495).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- ixgbevf: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).
- kABI compatibility fix for max98373_priv struct (git-fixes).
- kABI workaround for btintel symbol changes (bsc#1188893).
- kABI workaround for intel_th_driver (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kabi/severities: ignore kABI of iwlwifi symbols (bsc#1187495) iwlwifi driver consists of several modules and all exported symbols are internal uses. Let's ignore kABI checks of those.
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- kernel-binary.spec: Fix up usrmerge for non-modular kernels.
- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: class: The -ENOTSUPP should never be seen by user space (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- mac80211: consider per-CPU statistics if present (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- mac80211: reset profile_periodicity/ema_ap (git-fixes).
- mac80211_hwsim: add concurrent channels scanning support over virtio (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: fix fixed-rate tx status reporting (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: mt7915: fix IEEE80211_HE_PHY_CAP7_MAX_NC for station mode (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mvpp2: suppress warning (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net/sched: act_ct: remove and free nf_table callbacks (jsc#SLE-15172).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: fec_ptp: fix issue caused by refactor the fec_devtype (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: ipw2x00,iwlegacy,iwlwifi: Remove in_interrupt() from debug macros (bsc#1187495).
- net: iwlwifi: Remove in_interrupt() from tracing macro (bsc#1187495).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: netdevsim: use xso.real_dev instead of xso.dev in callback functions of struct xfrmdev_ops (bsc#1176447).
- net: phy: fix save wrong speed and duplex problem if autoneg is on (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: phy: realtek: add delay to fix RXC generation issue (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- netfilter: ctnetlink: suspicious RCU usage in ctnetlink_dump_helpinfo (bsc#1176447).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- prctl: PR_{G,S}ET_IO_FLUSHER to support controlling memory reclaim (bsc#1188752).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- rtw88: 8822c: fix lc calibration timing (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- scsi: ibmvfc: Fix command state accounting and stale response detection (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial: 8250_pci: Add support for new HPE serial device (git-fixes).
- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).
- serial: fsl_lpuart: remove RTSCTS handling from get_mctrl() (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- skbuff: Fix build with SKB extensions disabled (jsc#SLE-15172).
- skbuff: Release nfct refcount on napi stolen or re-used skbs (jsc#SLE-15172).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- thermal/drivers/int340x/processor_thermal: Fix tcc setting (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- thunderbolt: Bond lanes only when dual_link_port != NULL in alloc_dev_default() (git-fixes).
- timers: Fix get_next_timer_interrupt() with no timers pending (git-fixes)
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: Fix xfrm offload fallback fail case (bsc#1176447).
- xfrm: delete xfrm4_output_finish xfrm6_output_finish declarations (bsc#1176447).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
- xsk: Fix missing validation for skb and unaligned mode (jsc#SLE-13706).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187495">SUSE bug 1187495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188126">SUSE bug 1188126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188366">SUSE bug 1188366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188703">SUSE bug 1188703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188720">SUSE bug 1188720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188752">SUSE bug 1188752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188893">SUSE bug 1188893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627991" comment="cluster-md-kmp-64kb-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627900" comment="cluster-md-kmp-default-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627992" comment="cluster-md-kmp-preempt-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627993" comment="dlm-kmp-64kb-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627901" comment="dlm-kmp-default-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627994" comment="dlm-kmp-preempt-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629548" comment="dtb-al-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629549" comment="dtb-allwinner-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629550" comment="dtb-altera-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629551" comment="dtb-amd-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629552" comment="dtb-amlogic-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629553" comment="dtb-apm-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629554" comment="dtb-arm-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629555" comment="dtb-broadcom-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629556" comment="dtb-cavium-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629557" comment="dtb-exynos-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629558" comment="dtb-freescale-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629559" comment="dtb-hisilicon-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629560" comment="dtb-lg-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629561" comment="dtb-marvell-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629562" comment="dtb-mediatek-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629563" comment="dtb-nvidia-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629564" comment="dtb-qcom-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629565" comment="dtb-renesas-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629566" comment="dtb-rockchip-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629567" comment="dtb-socionext-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629568" comment="dtb-sprd-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629569" comment="dtb-xilinx-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629570" comment="dtb-zte-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627995" comment="gfs2-kmp-64kb-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627902" comment="gfs2-kmp-default-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627996" comment="gfs2-kmp-preempt-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627856" comment="kernel-64kb-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627857" comment="kernel-64kb-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627997" comment="kernel-64kb-extra-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627998" comment="kernel-64kb-livepatch-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627999" comment="kernel-64kb-optional-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628000" comment="kernel-debug-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628001" comment="kernel-debug-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628002" comment="kernel-debug-livepatch-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627858" comment="kernel-default-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627859" comment="kernel-default-base-5.3.18-59.19.1.18.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628003" comment="kernel-default-base-rebuild-5.3.18-59.19.1.18.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627860" comment="kernel-default-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628004" comment="kernel-default-extra-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628005" comment="kernel-default-livepatch-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628006" comment="kernel-default-livepatch-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628007" comment="kernel-default-optional-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627861" comment="kernel-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627873" comment="kernel-docs-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628008" comment="kernel-docs-html-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628009" comment="kernel-kvmsmall-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628010" comment="kernel-kvmsmall-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628011" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627862" comment="kernel-macros-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627874" comment="kernel-obs-build-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628012" comment="kernel-obs-qa-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627863" comment="kernel-preempt-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627875" comment="kernel-preempt-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628013" comment="kernel-preempt-extra-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628014" comment="kernel-preempt-livepatch-devel-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628015" comment="kernel-preempt-optional-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627876" comment="kernel-source-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628016" comment="kernel-source-vanilla-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627877" comment="kernel-syms-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627864" comment="kernel-zfcpdump-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628017" comment="kselftests-kmp-64kb-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628018" comment="kselftests-kmp-default-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628019" comment="kselftests-kmp-preempt-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628020" comment="ocfs2-kmp-64kb-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627903" comment="ocfs2-kmp-default-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628021" comment="ocfs2-kmp-preempt-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628022" comment="reiserfs-kmp-64kb-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627879" comment="reiserfs-kmp-default-5.3.18-59.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628023" comment="reiserfs-kmp-preempt-5.3.18-59.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52386" version="1" class="patch">
	<metadata>
		<title>Security update for c-ares (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4F2ZKNNMGENSNMAS5CDHA3CDDRAXF3AQ/" source="SUSE-SU"/>
		<description>
This update for c-ares fixes the following issues:

Version update to git snapshot 1.17.1+20200724:

- CVE-2021-3672: fixed missing input validation on hostnames returned by DNS servers (bsc#1188881)
- If ares_getaddrinfo() was terminated by an ares_destroy(), it would cause crash
- Crash in sortaddrinfo() if the list size equals 0 due to an unexpected DNS response
- Expand number of escaped characters in DNS replies as per RFC1035 5.1 to prevent spoofing
- Use unbuffered /dev/urandom for random data to prevent early startup performance issues
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630341" comment="c-ares-devel-1.17.1+20200724-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630554" comment="c-ares-utils-1.17.1+20200724-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630342" comment="libcares2-1.17.1+20200724-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630555" comment="libcares2-32bit-1.17.1+20200724-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52387" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626824" comment="libsndfile-devel-1.0.28-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626879" comment="libsndfile-progs-1.0.28-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626825" comment="libsndfile1-1.0.28-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626848" comment="libsndfile1-32bit-1.0.28-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52388" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189366" ref_url="https://bugzilla.suse.com/1189366" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:2773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPNPTNVZKXOGFF2VSHGYQYDLYCUQWFTH/" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- Fixes HAProxy vulnerabilities on H2 (bsc#1189366).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-18"/>
	<updated date="2021-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189366">SUSE bug 1189366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630857" comment="haproxy-2.0.14-11.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52389" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630560" comment="MozillaFirefox-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630651" comment="MozillaFirefox-branding-upstream-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630652" comment="MozillaFirefox-buildsymbols-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630561" comment="MozillaFirefox-devel-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630562" comment="MozillaFirefox-translations-common-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630563" comment="MozillaFirefox-translations-other-78.13.0-8.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52390" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1188906" ref_url="https://bugzilla.suse.com/1188906" source="BUGZILLA"/>
		<reference ref_id="1189162" ref_url="https://bugzilla.suse.com/1189162" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FPUQARVFSVTNWXPM6OPHZLDEEMVSSM3/" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

Update to go1.15.15:

- go#47473 net/http: panic due to racy read of persistConn after handler panic (CVE-2021-36221 bsc#1189162)
- go#47347 cmd/go: 'go list -f '{{.Stale}}'' stack overflow with cyclic imports
- go#47014 cmd/go: go mod vendor: open C:\Users\LICENSE: Access is denied.
- go#46927 cmd/compile: register conflict between external linker and duffzero on arm64
- go#46857 runtime: ppc64x binaries randomly segfault on linux 5.13rc6
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188906">SUSE bug 1188906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189162">SUSE bug 1189162</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630565" comment="go1.15-1.15.15-1.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630566" comment="go1.15-doc-1.15.15-1.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630567" comment="go1.15-race-1.15.15-1.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52391" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1189162" ref_url="https://bugzilla.suse.com/1189162" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QBLRS3I4ZUSJEMER3J6HA6RD4XDIQYHC/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to go1.16.7:

- go#47473 net/http: panic due to racy read of persistConn after handler panic (CVE-2021-36221 bsc#1189162)
- go#47348 cmd/go: 'go list -f '{{.Stale}}'' stack overflow with cyclic imports
- go#47332 time: Timer reset broken under heavy use since go1.16 timer optimizations added
- go#47289 cmd/link: build error with cgo in Windows, redefinition of go.map.zero
- go#47015 cmd/go: go mod vendor: open C:\Users\LICENSE: Access is denied.
- go#46928 cmd/compile: register conflict between external linker and duffzero on arm64
- go#46858 runtime: ppc64x binaries randomly segfault on linux 5.13rc6
- go#46551 cmd/go: unhelpful error message when running 'go install' on a replaced-but-not-required package
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189162">SUSE bug 1189162</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630568" comment="go1.16-1.16.7-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630569" comment="go1.16-doc-1.16.7-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630570" comment="go1.16-race-1.16.7-1.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52392" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180432" ref_url="https://bugzilla.suse.com/1180432" source="BUGZILLA"/>
		<reference ref_id="1180433" ref_url="https://bugzilla.suse.com/1180433" source="BUGZILLA"/>
		<reference ref_id="1180434" ref_url="https://bugzilla.suse.com/1180434" source="BUGZILLA"/>
		<reference ref_id="1180435" ref_url="https://bugzilla.suse.com/1180435" source="BUGZILLA"/>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504/" source="CVE"/>
		<reference ref_id="CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505/" source="CVE"/>
		<reference ref_id="CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- NULL pointer dereference in ESP (bsc#1180433, CVE-2020-35504) (bsc#1180434, CVE-2020-35505) (bsc#1180435, CVE-2020-35506)
- NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432, CVE-2020-35503)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630556" comment="qemu-s390-4.2.1-11.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52393" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMV7EBXEZS74TUNOO7AISIYY6S7T7TDO/" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628201" comment="fetchmail-6.3.26-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628202" comment="fetchmailconf-6.3.26-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52394" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188539" ref_url="https://bugzilla.suse.com/1188539" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36430" ref_url="https://www.suse.com/security/cve/CVE-2020-36430/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2792-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQ4DQBQAAUJIVKVW7IIROTEKRYDSFT2S/" source="SUSE-SU"/>
		<description>
This update for libass fixes the following issues:

- CVE-2020-36430: Fixed heap-based buffer overflow in decode_chars (bsc#1188539).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188539">SUSE bug 1188539</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36430/">CVE-2020-36430</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628040" comment="libass-devel-0.14.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628041" comment="libass9-0.14.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628196" comment="libass9-32bit-0.14.0-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52395" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627865" comment="libIlmImf-2_2-23-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628024" comment="libIlmImf-2_2-23-32bit-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627866" comment="libIlmImfUtil-2_2-23-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628025" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628026" comment="openexr-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627867" comment="openexr-devel-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628027" comment="openexr-doc-2.2.1-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52396" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1177523" ref_url="https://bugzilla.suse.com/1177523" source="BUGZILLA"/>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2794-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52SJCPNULPFJAYMPRPDX7QYNTBFA4SXP/" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177523">SUSE bug 1177523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627846" comment="aspell-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627847" comment="aspell-devel-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627987" comment="aspell-ispell-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627988" comment="aspell-spell-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627848" comment="libaspell15-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627989" comment="libaspell15-32bit-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627849" comment="libpspell15-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627990" comment="libpspell15-32bit-0.60.8-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52397" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188035" ref_url="https://bugzilla.suse.com/1188035" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21704" ref_url="https://www.suse.com/security/cve/CVE-2021-21704/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2795-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OI533FKAZPJKSHOKRDDHYZBMHCKP25U/" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21704: Fixed security issues in pdo_firebase module (bsc#1188035).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188035">SUSE bug 1188035</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21704/">CVE-2021-21704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627508" comment="php7-wddx-7.2.5-4.79.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52398" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627144" comment="java-1_8_0-openjdk-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627231" comment="java-1_8_0-openjdk-accessibility-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627145" comment="java-1_8_0-openjdk-demo-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627146" comment="java-1_8_0-openjdk-devel-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627147" comment="java-1_8_0-openjdk-headless-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627232" comment="java-1_8_0-openjdk-javadoc-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627233" comment="java-1_8_0-openjdk-src-1.8.0.302-3.55.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52399" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188571" ref_url="https://bugzilla.suse.com/1188571" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22SNDEWZFK4UZGGV35YI72FNLVIRJTIF/" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626699" comment="krb5-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626700" comment="krb5-32bit-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626701" comment="krb5-client-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626702" comment="krb5-devel-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626821" comment="krb5-devel-32bit-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626822" comment="krb5-mini-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626823" comment="krb5-mini-devel-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626716" comment="krb5-plugin-kdb-ldap-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626703" comment="krb5-plugin-preauth-otp-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626704" comment="krb5-plugin-preauth-pkinit-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626717" comment="krb5-server-1.16.3-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52400" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188151" ref_url="https://bugzilla.suse.com/1188151" source="BUGZILLA"/>
		<reference ref_id="1188455" ref_url="https://bugzilla.suse.com/1188455" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3652" ref_url="https://www.suse.com/security/cve/CVE-2021-3652/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E6YUB5M37IM7IMXZ65R3QTW6TPO6B3OS/" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- Update to 1.4.4.16
- CVE-2021-3652: Fixed crypt handling of locked accounts. (bsc#1188455)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188151">SUSE bug 1188151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188455">SUSE bug 1188455</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3652/">CVE-2021-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625995" comment="389-ds-1.4.4.16~git16.c1926dfc6-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625996" comment="389-ds-devel-1.4.4.16~git16.c1926dfc6-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626207" comment="389-ds-snmp-1.4.4.16~git16.c1926dfc6-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625997" comment="lib389-1.4.4.16~git16.c1926dfc6-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625998" comment="libsvrcore0-1.4.4.16~git16.c1926dfc6-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52401" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
		<description>
This update for libmspack fixes the following issues:

- CVE-2018-14681: Bad KWAJ file header extensions could cause a one or two byte overwrite. (bsc#1103032)
- CVE-2018-14682: There is an off-by-one error in the TOLOWER() macro for CHM decompression. (bsc#1103032)
- CVE-2018-14679: There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service. (bsc#1103032)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625976" comment="libmspack-devel-0.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625977" comment="libmspack0-0.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626204" comment="libmspack0-32bit-0.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626205" comment="mspack-tools-0.6-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52402" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1166028" ref_url="https://bugzilla.suse.com/1166028" source="BUGZILLA"/>
		<reference ref_id="1171962" ref_url="https://bugzilla.suse.com/1171962" source="BUGZILLA"/>
		<reference ref_id="1184994" ref_url="https://bugzilla.suse.com/1184994" source="BUGZILLA"/>
		<reference ref_id="1185972" ref_url="https://bugzilla.suse.com/1185972" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2809-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PFXYBJHAFZNV57EZ4VL2LC446RMO7HVT/" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- Updated to version 246.15
- CVE-2021-33910: Fixed a denial of service issue in systemd. (bsc#1188063)
- CVE-2020-13529: Fixed an issue that allows crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. (bsc#1185972)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166028">SUSE bug 1166028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171962">SUSE bug 1171962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184994">SUSE bug 1184994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185972">SUSE bug 1185972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626216" comment="libsystemd0-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626217" comment="libsystemd0-32bit-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626218" comment="libudev-devel-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626371" comment="libudev-devel-32bit-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626219" comment="libudev1-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626220" comment="libudev1-32bit-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626372" comment="nss-myhostname-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626373" comment="nss-myhostname-32bit-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626374" comment="nss-mymachines-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626375" comment="nss-mymachines-32bit-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626376" comment="nss-resolve-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626377" comment="nss-systemd-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626221" comment="systemd-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626222" comment="systemd-32bit-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626223" comment="systemd-container-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626224" comment="systemd-coredump-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626225" comment="systemd-devel-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626226" comment="systemd-doc-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626227" comment="systemd-journal-remote-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626228" comment="systemd-lang-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626378" comment="systemd-logger-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626379" comment="systemd-network-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626229" comment="systemd-sysvinit-246.15-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626230" comment="udev-246.15-7.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52403" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2810-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILND7MBTQAFIRZBI5CMERWHRUVEAKAOD/" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-12049: truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626210" comment="dbus-1-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626211" comment="dbus-1-devel-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626348" comment="dbus-1-devel-32bit-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626349" comment="dbus-1-devel-doc-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626212" comment="dbus-1-x11-1.12.2-8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626213" comment="libdbus-1-3-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626214" comment="libdbus-1-3-32bit-1.12.2-8.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52404" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184253" ref_url="https://bugzilla.suse.com/1184253" source="BUGZILLA"/>
		<reference ref_id="1187871" ref_url="https://bugzilla.suse.com/1187871" source="BUGZILLA"/>
		<reference ref_id="1188232" ref_url="https://bugzilla.suse.com/1188232" source="BUGZILLA"/>
		<reference ref_id="1188843" ref_url="https://bugzilla.suse.com/1188843" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631/" source="CVE"/>
		<reference ref_id="CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2812-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4QAQWSVV2PRNPOI4R3VBPRTRXS5NLQ5/" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2021-3631: fix SELinux label generation logic (bsc#1187871)
- CVE-2021-3667: Unlock object on ACL fail in storagePoolLookupByTargetPath (bsc#1188843)

Non-security issues fixed:

- virtlockd: Don't report error if lockspace exists (bsc#1184253)
- Don't forcibly remove '--listen' arg from /etc/sysconfig/libvirtd. Add '--timeout 120' if '--listen' is not specified. (bsc#1188232)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184253">SUSE bug 1184253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187871">SUSE bug 1187871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188232">SUSE bug 1188232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188843">SUSE bug 1188843</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628053" comment="libvirt-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628054" comment="libvirt-admin-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628055" comment="libvirt-bash-completion-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628056" comment="libvirt-client-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628057" comment="libvirt-daemon-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628058" comment="libvirt-daemon-config-network-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628059" comment="libvirt-daemon-config-nwfilter-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628060" comment="libvirt-daemon-driver-interface-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628061" comment="libvirt-daemon-driver-libxl-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628062" comment="libvirt-daemon-driver-lxc-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628063" comment="libvirt-daemon-driver-network-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628064" comment="libvirt-daemon-driver-nodedev-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628065" comment="libvirt-daemon-driver-nwfilter-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628066" comment="libvirt-daemon-driver-qemu-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628067" comment="libvirt-daemon-driver-secret-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628068" comment="libvirt-daemon-driver-storage-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628069" comment="libvirt-daemon-driver-storage-core-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628070" comment="libvirt-daemon-driver-storage-disk-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628185" comment="libvirt-daemon-driver-storage-gluster-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628071" comment="libvirt-daemon-driver-storage-iscsi-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628072" comment="libvirt-daemon-driver-storage-iscsi-direct-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628073" comment="libvirt-daemon-driver-storage-logical-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628074" comment="libvirt-daemon-driver-storage-mpath-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628075" comment="libvirt-daemon-driver-storage-rbd-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628076" comment="libvirt-daemon-driver-storage-scsi-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628077" comment="libvirt-daemon-hooks-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628078" comment="libvirt-daemon-lxc-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628079" comment="libvirt-daemon-qemu-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628080" comment="libvirt-daemon-xen-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628081" comment="libvirt-devel-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628186" comment="libvirt-devel-32bit-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628082" comment="libvirt-doc-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628039" comment="libvirt-libs-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628083" comment="libvirt-lock-sanlock-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628084" comment="libvirt-nss-7.1.0-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628187" comment="wireshark-plugin-libvirt-7.1.0-6.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52405" version="1" class="patch">
	<metadata>
		<title>Security update for aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1102408" ref_url="https://bugzilla.suse.com/1102408" source="BUGZILLA"/>
		<reference ref_id="1138715" ref_url="https://bugzilla.suse.com/1138715" source="BUGZILLA"/>
		<reference ref_id="1138746" ref_url="https://bugzilla.suse.com/1138746" source="BUGZILLA"/>
		<reference ref_id="1176389" ref_url="https://bugzilla.suse.com/1176389" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1182422" ref_url="https://bugzilla.suse.com/1182422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOZI5ZFPFR2BACIE74HUJWDXC2ZWXNGD/" source="SUSE-SU"/>
		<description>
This patch updates the Python AWS SDK stack in SLE 15:

General:

# aws-cli

- Version updated to upstream release v1.19.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-boto3

- Version updated to upstream release 1.17.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-botocore

- Version updated to upstream release 1.20.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-urllib3

- Version updated to upstream release 1.25.10
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-service_identity

- Added this new package to resolve runtime dependencies for other packages.
  Version: 18.1.0

# python-trustme

- Added this new package to resolve runtime dependencies for other packages.
  Version: 0.6.0

Security fixes:

# python-urllib3:
  
- CVE-2020-26137: urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated
  by inserting CR and LF control characters in the first argument of putrequest() (bsc#1177120)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102408">SUSE bug 1102408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138715">SUSE bug 1138715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138746">SUSE bug 1138746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176389">SUSE bug 1176389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182422">SUSE bug 1182422</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626957" comment="aws-cli-1.19.9-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626960" comment="python2-asn1crypto-0.24.0-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626954" comment="python2-boto3-1.17.9-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626955" comment="python2-botocore-1.20.9-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626961" comment="python2-cffi-1.13.2-3.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626962" comment="python2-cryptography-2.8-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626964" comment="python2-pyasn1-0.4.2-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626965" comment="python2-pycparser-2.17-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626966" comment="python2-urllib3-1.25.10-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626945" comment="python3-asn1crypto-0.24.0-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626946" comment="python3-boto3-1.17.9-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626947" comment="python3-botocore-1.20.9-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626948" comment="python3-cffi-1.13.2-3.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626949" comment="python3-cryptography-2.8-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626951" comment="python3-pyasn1-0.4.2-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626952" comment="python3-pycparser-2.17-3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52406" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNTTGRCRZBMWGGU4UK4PHVAAZAFABI2/" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631628" comment="libopenssl-1_0_0-devel-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631800" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631631" comment="libopenssl10-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631629" comment="libopenssl1_0_0-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631801" comment="libopenssl1_0_0-32bit-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631802" comment="libopenssl1_0_0-hmac-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631803" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631804" comment="libopenssl1_0_0-steam-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631805" comment="libopenssl1_0_0-steam-32bit-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631630" comment="openssl-1_0_0-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631806" comment="openssl-1_0_0-cavs-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631807" comment="openssl-1_0_0-doc-1.0.2p-3.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52407" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189520" ref_url="https://bugzilla.suse.com/1189520" source="BUGZILLA"/>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following security issues:

- CVE-2021-3711: A bug in the implementation of the SM2 decryption code
  could lead to buffer overflows. [bsc#1189520]

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189520">SUSE bug 1189520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631622" comment="libopenssl-1_1-devel-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631808" comment="libopenssl-1_1-devel-32bit-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631623" comment="libopenssl1_1-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631624" comment="libopenssl1_1-32bit-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631625" comment="libopenssl1_1-hmac-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631626" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631627" comment="openssl-1_1-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631809" comment="openssl-1_1-doc-1.1.1d-11.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52408" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189320" ref_url="https://bugzilla.suse.com/1189320" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDMCAWTQE3IIN6XVFE3IE2ZTUICRIDJI/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to version 10.2.40 [bsc#1189320]:

- fixes for the following security vulnerabilities: CVE-2021-2372 and CVE-2021-2389
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189320">SUSE bug 1189320</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631000" comment="libmysqld-devel-10.2.40-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631001" comment="libmysqld19-10.2.40-3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52409" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180014" ref_url="https://bugzilla.suse.com/1180014" source="BUGZILLA"/>
		<reference ref_id="1189320" ref_url="https://bugzilla.suse.com/1189320" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2837-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5E3JTT3QDMGM72JNHXWIG4BR4EZU4HJT/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to version 10.2.40 (bsc#1189320):

- fixes for the following security vulnerabilities: CVE-2021-2372 and CVE-2021-2389

In additon the follwing was changed:

- Increase NOFILE limit on service configuration (bsc#1180014)
  The default 'NOFILE' setting on mariadb service configuration is to low 
  and may cause instability on higher loads.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180014">SUSE bug 1180014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189320">SUSE bug 1189320</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630898" comment="mariadb-galera-10.4.21-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52410" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188438" ref_url="https://bugzilla.suse.com/1188438" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34429" ref_url="https://www.suse.com/security/cve/CVE-2021-34429/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BXMLXWW5ACU3IDNEEUVRZ3WYWHNGPZM/" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

- Update to version 9.4.43.v20210629
- CVE-2021-34429: URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. (bsc#1188438)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188438">SUSE bug 1188438</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-34429/">CVE-2021-34429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626350" comment="jetty-annotations-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626351" comment="jetty-client-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626352" comment="jetty-continuation-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626232" comment="jetty-http-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626233" comment="jetty-io-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626353" comment="jetty-jaas-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626354" comment="jetty-javax-websocket-client-impl-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626355" comment="jetty-javax-websocket-server-impl-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626356" comment="jetty-jmx-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626357" comment="jetty-jndi-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626358" comment="jetty-jsp-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626359" comment="jetty-minimal-javadoc-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626360" comment="jetty-openid-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626361" comment="jetty-plus-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626362" comment="jetty-proxy-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626234" comment="jetty-security-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626235" comment="jetty-server-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626236" comment="jetty-servlet-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626237" comment="jetty-util-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626238" comment="jetty-util-ajax-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626363" comment="jetty-webapp-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626364" comment="jetty-websocket-api-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626365" comment="jetty-websocket-client-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626366" comment="jetty-websocket-common-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626367" comment="jetty-websocket-javadoc-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626368" comment="jetty-websocket-server-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626369" comment="jetty-websocket-servlet-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626370" comment="jetty-xml-9.4.43-3.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52411" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180432" ref_url="https://bugzilla.suse.com/1180432" source="BUGZILLA"/>
		<reference ref_id="1180433" ref_url="https://bugzilla.suse.com/1180433" source="BUGZILLA"/>
		<reference ref_id="1180434" ref_url="https://bugzilla.suse.com/1180434" source="BUGZILLA"/>
		<reference ref_id="1180435" ref_url="https://bugzilla.suse.com/1180435" source="BUGZILLA"/>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1188299" ref_url="https://bugzilla.suse.com/1188299" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504/" source="CVE"/>
		<reference ref_id="CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505/" source="CVE"/>
		<reference ref_id="CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- NULL pointer dereference in ESP (bsc#1180433, CVE-2020-35504) (bsc#1180434, CVE-2020-35505) (bsc#1180435, CVE-2020-35506)
- NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432, CVE-2020-35503)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)

Non-security issues fixed:

- Use max host physical address if -cpu max is used (bsc#1188299)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-27"/>
	<updated date="2021-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188299">SUSE bug 1188299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630694" comment="qemu-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630760" comment="qemu-arm-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630761" comment="qemu-audio-alsa-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630762" comment="qemu-audio-pa-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630763" comment="qemu-audio-spice-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630699" comment="qemu-block-curl-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630764" comment="qemu-block-dmg-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630765" comment="qemu-block-gluster-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630700" comment="qemu-block-iscsi-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630766" comment="qemu-block-nfs-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630701" comment="qemu-block-rbd-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630702" comment="qemu-block-ssh-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630703" comment="qemu-chardev-baum-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630767" comment="qemu-chardev-spice-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630768" comment="qemu-extra-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630705" comment="qemu-guest-agent-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630769" comment="qemu-hw-display-qxl-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630770" comment="qemu-hw-display-virtio-gpu-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630771" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630772" comment="qemu-hw-display-virtio-vga-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630773" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630774" comment="qemu-hw-usb-redirect-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630775" comment="qemu-hw-usb-smartcard-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630712" comment="qemu-ipxe-1.0.0+-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630776" comment="qemu-ivshmem-tools-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630713" comment="qemu-ksm-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630714" comment="qemu-kvm-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630715" comment="qemu-lang-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630777" comment="qemu-microvm-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630778" comment="qemu-ppc-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630779" comment="qemu-s390x-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630718" comment="qemu-seabios-1.14.0_0_g155821a-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630719" comment="qemu-sgabios-8-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630720" comment="qemu-skiboot-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630653" comment="qemu-tools-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630721" comment="qemu-ui-curses-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630780" comment="qemu-ui-gtk-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630781" comment="qemu-ui-opengl-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630782" comment="qemu-ui-spice-app-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630783" comment="qemu-ui-spice-core-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630726" comment="qemu-vgabios-1.14.0_0_g155821a-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630784" comment="qemu-vhost-user-gpu-5.2.0-103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630785" comment="qemu-x86-5.2.0-103.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52412" version="1" class="patch">
	<metadata>
		<title>Security update for spectre-meltdown-checker (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189477" ref_url="https://bugzilla.suse.com/1189477" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
		<description>
This update for spectre-meltdown-checker fixes the following issues:

spectre-meltdown-checker was updated to version 0.44 (bsc#1189477)

- feat: add support for SRBDS related vulnerabilities
- feat: add zstd kernel decompression (#370)
- enh: arm: add experimental support for binary arm images
- enh: rsb filling: no longer need the 'strings' tool to check for kernel support in live mode
- fix: fwdb: remove Intel extract tempdir on exit
- fix: has_vmm: ignore kernel threads when looking for a hypervisor (fixes #278)
- fix: fwdb: use the commit date as the intel fwdb version
- fix: fwdb: update Intel's repository URL
- fix: arm64: CVE-2017-5753: kernels 4.19+ use a different nospec macro
- fix: on CPU parse info under FreeBSD
- chore: github: add check run on pull requests
- chore: fwdb: update to v165.20201021+i20200616
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-27"/>
	<updated date="2021-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189477">SUSE bug 1189477</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631131" comment="spectre-meltdown-checker-0.44-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52413" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189591" ref_url="https://bugzilla.suse.com/1189591" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCXMJ4INSB7EFEHMD7OOE6NXYQU2F77I/" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2020-36193: Fixed Archive_Tar directory traversal due to inadequate checking of symbolic links (bsc#1189591).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189591">SUSE bug 1189591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632140" comment="php7-wddx-7.2.5-4.82.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52414" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to version 78.13 (MFSA 2021-35, bsc#1188891)

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Thunderbird 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630899" comment="MozillaThunderbird-78.13.0-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630900" comment="MozillaThunderbird-translations-common-78.13.0-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630901" comment="MozillaThunderbird-translations-other-78.13.0-8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52415" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="1189368" ref_url="https://bugzilla.suse.com/1189368" source="BUGZILLA"/>
		<reference ref_id="1189369" ref_url="https://bugzilla.suse.com/1189369" source="BUGZILLA"/>
		<reference ref_id="1189370" ref_url="https://bugzilla.suse.com/1189370" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

Update to 12.22.5:

- CVE-2021-3672/CVE-2021-22931: Improper handling of untypical characters in domain names (bsc#1189370, bsc#1188881)
- CVE-2021-22940: Use after free on close http2 on stream canceling (bsc#1189368)
- CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (bsc#1189369)
- CVE-2021-22930: http2: fixes use after free on close http2 on stream canceling (bsc#1188917)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630851" comment="nodejs12-12.22.5-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630852" comment="nodejs12-devel-12.22.5-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630853" comment="nodejs12-docs-12.22.5-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630854" comment="npm12-12.22.5-4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52416" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot23 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187418" ref_url="https://bugzilla.suse.com/1187418" source="BUGZILLA"/>
		<reference ref_id="1187419" ref_url="https://bugzilla.suse.com/1187419" source="BUGZILLA"/>
		<reference ref_id="1187420" ref_url="https://bugzilla.suse.com/1187420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28200" ref_url="https://www.suse.com/security/cve/CVE-2020-28200/" source="CVE"/>
		<reference ref_id="CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLFYZS4WAYE6TU4PO3V2JUI7DPQEK73I/" source="SUSE-SU"/>
		<description>
This update for dovecot23 fixes the following issues:

Update dovecot to version 2.3.15 (jsc#SLE-19970):

Security issues fixed:

- CVE-2021-29157: Dovecot does not correctly escape kid and azp fields in
  JWT tokens. This may be used to supply attacker controlled keys to
  validate tokens, if attacker has local access. (bsc#1187418)
  Local attacker can login as any user and access their emails
- CVE-2021-33515:  On-path attacker could have injected plaintext commands
  before STARTTLS negotiation that would be executed after STARTTLS
  finished with the client. (bsc#1187419)
  Attacker can potentially steal user credentials and mails

* Disconnection log messages are now more standardized across services.
  They also always now start with 'Disconnected' prefix.
* Dovecot now depends on libsystemd for systemd integration.
* Removed support for Lua 5.2. Use version 5.1 or 5.3 instead.
* config: Some settings are now marked as 'hidden'. It's discouraged to
  change these settings. They will no longer be visible in doveconf
  output, except if they have been changed or if doveconf -s parameter
  is used. See https://doc.dovecot.org/settings/advanced/ for details.
* imap-compress: Compression level is now algorithm specific.
  See https://doc.dovecot.org/settings/plugin/compress-plugin/
* indexer-worker: Convert 'Indexed' info logs to an event named
  'indexer_worker_indexing_finished'. See
  https://doc.dovecot.org/admin_manual/list_of_events/#indexer-worker-indexing-finished
+ Add TSLv1.3 support to min_protocols.
+ Allow configuring ssl_cipher_suites. (for TLSv1.3+)
+ acl: Add acl_ignore_namespace setting which allows to entirely ignore
  ACLs for the listed namespaces.
+ imap: Support official RFC8970 preview/snippet syntax. Old methods of
  retrieving preview information via IMAP commands ('SNIPPET and PREVIEW
  with explicit algorithm selection') have been deprecated.
+ imapc: Support INDEXPVT for imapc storage to enable private
  message flags for cluster wide shared mailboxes.
+ lib-storage: Add new events: mail_opened, mail_expunge_requested,
  mail_expunged, mail_cache_lookup_finished. See
  https://doc.dovecot.org/admin_manual/list_of_events/#mail
+ zlib, imap-compression, fs-compress: Support compression levels that
  the algorithm supports. Before, we would allow hardcoded value between
  1 to 9 and would default to 6. Now we allow using per-algorithm value
  range and default to whatever default the algorithm specifies.
- *-login: Commands pipelined together with and just after the authenticate
  command cause these commands to be executed twice. This applies to all
  protocols that involve user login, which currently comprises of imap,
  pop3, submisision and managesieve.
- *-login: Processes are supposed to disconnect the oldest non-logged in
  connection when process_limit was reached. This didn't actually happen
  with the default 'high-security mode' (with service_count=1) where each
  connection is handled by a separate process.
- *-login: When login process reaches client/process limits, oldest
  client connections are disconnected. If one of these was still doing
  anvil lookup, this caused a crash. This could happen only if the login
  process limits were very low or if the server was overloaded.
- Fixed building with link time optimizations (-flto).
- auth: Userdb iteration with passwd driver does not always return all
  users with some nss drivers.
- dsync: Shared INBOX not synced when 'mail_shared_explicit_inbox' was
  disabled. If a user has a shared mailbox which is another user's INBOX,
  dsync didn't include the mailbox in syncing unless explicit naming is
  enabled with 'mail_shared_explicit_inbox' set to 'yes'.
- dsync: Shared namespaces were not synced with '-n' flag.
- dsync: Syncing shared INBOX failed if mail_attribute_dict was not set.
  If a user has a shared mailbox that is another user's INBOX, dsync
  failed to export the mailbox if mail attributes are disabled.
- fts-solr, fts-tika: Using both Solr FTS and Tika may have caused HTTP
  requests to assert-crash: Panic: file http-client-request.c: line 1232
  (http_client_request_send_more): assertion failed: (req-&gt;payload_input != NULL)
- fts-tika: 5xx errors returned by Tika server as indexing failures.
  However, Tika can return 5xx for some attachments every time.
  So the 5xx error should be retried once, but treated as success if it
  happens on the retry as well. v2.3 regression.
- fts-tika: v2.3.11 regression: Indexing messages with fts-tika may have
  resulted in Panic: file message-parser.c: line 802 (message_parser_deinit_from_parts):
  assertion failed: (ctx-&gt;nested_parts_count == 0 || i_stream_have_bytes_left(ctx-&gt;input))
- imap: SETMETADATA could not be used to unset metadata values.
  Instead NIL was handled as a 'NIL' string. v2.3.14 regression.
- imap: IMAP BINARY FETCH crashes at least on empty base64 body:
  Panic: file index-mail-binary.c: line 358 (blocks_count_lines):
  assertion failed: (block_count == 0 || block_idx+1 == block_count)
- imap: If IMAP client using the NOTIFY command was disconnected while
  sending FETCH notifications to the client, imap could crash with
  Panic: Trying to close mailbox INBOX with open transactions.
- imap: Using IMAP COMPRESS extension can cause IMAP connection to hang
  when IMAP commands are &gt;8 kB long.
- imapc: If remote server sent BYE but didn't immediately disconnect, it
  could cause infinite busy-loop.
- lib-index: Corrupted cache record size in dovecot.index.cache file
  could have caused a crash (segfault) when accessing it.
- lib-oauth2: JWT token time validation now works correctly with
  32-bit systems.
- lib-ssl-iostream: Checking hostnames against an SSL certificate was
  case-sensitive.
- lib-storage: Corrupted mime.parts in dovecot.index.cache may have
  resulted in Panic: file imap-bodystructure.c: line 206 (part_write_body):
  assertion failed: (text == ((part-&gt;flags &amp; MESSAGE_PART_FLAG_TEXT) != 0))
- lib-storage: Index rebuilding (e.g. via doveadm force-resync) didn't
  preserve the 'hdr-pop3-uidl' header. Because of this, the next pop3
  session could have accessed all of the emails' metadata to read their
  POP3 UIDL (opening dbox files).
- listescape: When using the listescape plugin and a shared namespace
  the plugin didn't work properly anymore resulting in errors like:
  'Invalid mailbox name: Name must not have '/' character.'
- lmtp: Connection crashes if connection gets disconnected due to
  multiple bad commands and the last bad command is BDAT.
- lmtp: The Dovecot-specific LMTP parameter XRCPTFORWARD was blindly
  forwarded by LMTP proxy without checking that the backend has support.
  This caused a command parameter error from the backend if it was
  running an older Dovecot release. This could only occur in more complex
  setups where the message was proxied twice; when the proxy generated
  the XRCPTFORWARD parameter itself the problem did not occur, so this
  only happened when it was forwarded.
- lmtp: The LMTP proxy crashes with a panic when the remote server
  replies with an error while the mail is still being forwarded through
  a DATA/BDAT command.
- lmtp: Username may have been missing from lmtp log line prefixes when
  it was performing autoexpunging.
- master: Dovecot would incorrectly fail with haproxy 2.0.14 service
  checks.
- master: Systemd service: Dovecot announces readiness for accepting
  connections earlier than it should. The following environment variables
  are now imported automatically and can be omitted from
  import_environment setting: NOTIFY_SOCKET LISTEN_FDS LISTEN_PID.
- master: service { process_min_avail } was launching processes too
  slowly when master was forking a lot of processes.
- util: Make the health-check.sh example script POSIX shell compatible.
* Added new aliases for some variables. Usage of the old ones is possible,
  but discouraged. (These were partially added already to v2.3.13.)
  See https://doc.dovecot.org/configuration_manual/config_file/config_variables/
  for more information.
* Optimize imap/pop3/submission/managesieve proxies to use less CPU at
  the cost of extra memory usage.
* Remove autocreate, expire, snarf and mail-filter plugins.
* Remove cydir storage driver.
* Remove XZ/LZMA write support. Read support will be removed in future release.
* doveadm -D: Add timestamps to debug output even when LOG_STDERR_TIMESTAMP
  environment variable is not set. Timestamp format is taken from
  log_timestamp setting.
* If BROKENCHAR or listescape plugin is used, the escaped folder names
  may be slightly different from before in some situations. This is
  unlikely to cause issues, although caching clients may redownload the
  folders.
* imapc: It now enables BROKENCHAR=~ by default to escape remote folder
  names if necessary. This also means that if there are any '~'
  characters in the remote folder names, they will be visible as '~7e'.
* imapc: When using local index files folder names were escaped on
  filesystem a bit differently. This affects only if there are folder
  names that actually require escaping, which isn't so common. The old
  style folders will be automatically deleted from filesystem.
* stats: Update exported metrics to be compliant with OpenMetrics standard.
+ doveadm: Add an optional '-p' parameter to metadata list command. If
  enabled, '/private', and '/shared' metadata prefixes will be prepended
  to the keys in the list output.
+ doveconf: Support environment variables in config files. See
  https://doc.dovecot.org/configuration_manual/config_file/config_file_syntax/#environment-variables
  for more details.
+ indexer-worker: Change indexer to disconnect from indexer-worker
  after each request. This allows service indexer-worker's service_count &amp;
  idle_kill settings to work. These can be used to restart indexer-worker
  processes once in a while to reduce their memory usage.
- auth: 'nodelay' with various authentication mechanisms such as apop
  and digest-md5 crashed AUTH process if authentication failed.
- auth: Auth lua script generating an error triggered an assertion
  failure: Panic: file db-lua.c: line 630 (auth_lua_call_password_verify):
  assertion failed: (lua_gettop(script-&gt;L) == 0).
- configure: Fix libunwind detection to work on other than x86_64 systems.
- doveadm-server: Process could crash if logging was done outside command
  handling. For example http-client could have done debug logging
  afterwards, resulting in either segfault or Panic:
  file http-client.c: line 642 (http_client_context_close):
  assertion failed: (cctx-&gt;clients_list == NULL).
- dsync: Folder name escaping with BROKENCHAR didn't work completely
  correctly. This especially caused problems with dsync-migrations using
  imapc where some of the remote folder names may not have been accessible.
- dsync: doveadm sync + imapc doesn't always sync all mails when doing
  an incremental sync (-1), which could lead to mail loss when it's used
  for migration. This happens only when GUIDs aren't used (i.e.
  imapc without imapc_features=guid-forced).
- fts-tika: When tika server returns error, some mails cause Panic:
  file message-parser.c: line 802 (message_parser_deinit_from_parts):
  assertion failed: (ctx-&gt;nested_parts_count == 0 || i_stream_have_bytes_left(ctx-&gt;input))
- lib-imap: imapc parsing illegal BODYSTRUCTUREs with NILs could have
  resulted in crashes. This exposed that Dovecot was wrongly accepting
  atoms in 'nstring' handling. Changed the IMAP parsing to be more
  strict about this now.
- lib-index: If dovecot.index.cache has corrupted message size, fetching
  BODY/BODYSTRUCTURE may cause assert-crash:
  Panic: file index-mail.c: line 1140 (index_mail_parse_body_finish):
  assertion failed: (mail-&gt;data.parts != NULL).
- lib-index: Minor error handling and race condition fixes related to
  rotating dovecot.index.log. These didn't usually cause problems,
  unless the log files were rotated rapidly.
- lib-lua: Lua scripts using coroutines or lua libraries using coroutines
  (e.g., cqueues) panicked.
- Message PREVIEW handled whitespace wrong so first space would get
  eaten from between words.
- FTS and message PREVIEW (snippet) parsed HTML &amp;entities case-sensitively.
- lib-mail: When max nested MIME parts were reached, IMAP BODYSTRUCTURE
  was written in a way that may have caused confusion for IMAP clients
  and also Dovecot itself when parsing it. The truncated part is now
  written out using application/octet-stream MIME type.
- lib-oauth2: HS512 and HS384 JWT token algorithms crash when you try to
  use them: Panic: file hmac.c: line 26 (hmac_init): assertion failed:
  (meth-&gt;context_size &lt;= MAC_MAX_CONTEXT_SIZE).
- event filters: NOT keyword did not have the correct associativity.
- Ignore ECONNRESET when closing socket. This avoids logging useless
  errors on systems like FreeBSD.
- event filters: event filter syntax error may lead to Panic:
  file event-filter.c: line 137 (event_filter_parse): assertion failed:
  (state.output == NULL)
- lib: timeval_cmp_margin() was broken on 32-bit systems. This could
  potentially have caused HTTP timeouts to be handled incorrectly.
- log: instance_name wasn't used as syslog ident by the log process.
- master: After a service reached process_limit and client_limit, it
  could have taken up to 1 second to realize that more client connections
  became available. During this time client connections could have been
  unnecessarily rejected and a warning logged:
  Warning: service(...): process_limit (...) reached, client connections are being dropped
- stats: Crash would occur when generating openmetrics data for metrics
  using aggregating functions.
- stats: Event filters comparing against empty strings crash the stats
  process.
* CVE-2020-24386: Specially crafted command can cause IMAP hibernate to
  allow logged in user to access other people's emails and filesystem
  information.
* Metric filter and global event filter variable syntax changed to a
  SQL-like format. See https://doc.dovecot.org/configuration_manual/event_filter/
* auth: Added new aliases for %{variables}. Usage of the old ones is
  possible, but discouraged.
* auth: Removed RPA auth mechanism, SKEY auth mechanism, NTLM auth
  mechanism and related password schemes.
* auth: Removed passdb-sia, passdb-vpopmail and userdb-vpopmail.
* auth: Removed postfix postmap socket
+ auth: Added new fields for auth server events. These fields are now
  also available for all auth events. See
  https://doc.dovecot.org/admin_manual/list_of_events/#authentication-server
  for details.
+ imap-hibernate: Added imap_client_hibernated, imap_client_unhibernated
  and imap_client_unhibernate_retried events. See
  https://doc.dovecot.org/admin_manual/list_of_events/ for details.
+ lib-index: Added new mail_index_recreated event. See
  https://doc.dovecot.org/admin_manual/list_of_events/#mail-index-recreated
+ lib-sql: Support TLS options for cassandra driver. This requires
  cpp-driver v2.15 (or later) to work reliably.
+ lib-storage: Missing $HasAttachment / $HasNoAttachment flags are now
  added to existing mails if mail_attachment_detection_option=add-flags
  and it can be done inexpensively.
+ login proxy: Added login_proxy_max_reconnects setting (default 3) to
  control how many reconnections are attempted.
+ login proxy: imap/pop3/submission/managesieve proxying now supports
  reconnection retrying on more than just connect() failure. Any error
  except a non-temporary authentication failure will result in reconnect
  attempts.
- auth: Lua passdb/userdb leaks stack elements per call, eventually
  causing the stack to become too deep and crashing the auth or
  auth-worker process.
- auth: SASL authentication PLAIN mechanism could be used to trigger
  read buffer overflow. However, this doesn't seem to be exploitable in
  any way.
- auth: v2.3.11 regression: GSSAPI authentication fails because dovecot
  disallows NUL bytes for it.
- dict: Process used too much CPU when iterating keys, because each key
  used a separate write() syscall.
- doveadm-server: Crash could occur if logging was done outside command
  handling. For example http-client could have done debug logging
  afterwards, resulting in either segfault or
  Panic: file http-client.c: line 642 (http_client_context_close):
  assertion failed: (cctx-&gt;clients_list == NULL).
- doveadm-server: v2.3.11 regression: Trying to connect to doveadm server
  process via starttls assert-crashed if there were no ssl=yes listeners:
  Panic: file master-service-ssl.c: line 22 (master_service_ssl_init):
  assertion failed: (service-&gt;ssl_ctx_initialized).
- fts-solr: HTTP requests may have assert-crashed:
  Panic: file http-client-request.c: line 1232 (http_client_request_send_more):
  assertion failed: (req-&gt;payload_input != NULL)
- imap: IMAP NOTIFY could crash with a segmentation fault due to a bad
  configuration that causes errors. Sending the error responses to the
  client can cause the segmentation fault. This can for example happen
  when several namespaces use the same mail storage location.
- imap: IMAP NOTIFY used on a shared namespace that doesn't actually
  exist (e.g. public namespace for a nonexistent user) can crash with a panic:
  Panic: Leaked view for index /tmp/home/asdf/mdbox/dovecot.list.index: Opened in (null):0
- imap: IMAP session can crash with QRESYNC extension if many changes
  are done before asking for expunged mails since last sync.
- imap: Process might hang indefinitely if client disconnects after
  sending some long-running commands pipelined, for example FETCH+LOGOUT.
- lib-compress: Mitigate crashes when configuring a not compiled in
  compression. Errors with compression configuration now distinguish
  between not supported and unknown.
- lib-compression: Using xz/lzma compression in v2.3.11 could have
  written truncated output in some situations. This would result in
  'Broken pipe' read errors when trying to read it back.
- lib-compression: zstd compression could have crashed in some situations:
  Panic: file ostream.c: line 287 (o_stream_sendv_int): assertion failed: (!stream-&gt;blocking)
- lib-dict: dict client could have crashed in some rare situations when
  iterating keys.
- lib-http: Fix several assert-crashes in HTTP client.
- lib-index: v2.3.11 regression: When mails were expunged at the same
  time as lots of new content was being saved to the cache (e.g. cache
  file was lost and is being re-filled) a deadlock could occur with
  dovecot.index.cache / dovecot.index.log.
- lib-index: v2.3.11 regression: dovecot.index.cache file was being
  purged (rewritten) too often when it had a field that hadn't been
  accessed for over 1 month, but less than 2 months. Every cache file
  change caused a purging in this situation.
- lib-mail: MIME parts were not returned correctly by Dovecot MIME parser.
  Regression caused by fixing CVE-2020-12100.
- lib-mail: When max nested MIME parts were reached, IMAP BODYSTRUCTURE
  was written in a way that may have caused confusion for both IMAP
  clients and Dovecot itself when parsing it. The truncated part is now
  written out using application/octet-stream MIME type.
- lib-mail: v2.3.11 regression: Mail delivery / parsing crashed when the
  10000th MIME part was message/rfc822 (or if parent was multipart/digest):
  Panic: file message-parser.c: line 167 (message_part_append):
  assertion failed: (ctx-&gt;total_parts_count &lt;= ctx-&gt;max_total_mime_parts).
- lib-oauth2: Dovecot incorrectly required oauth2 server introspection
  reply to contain username with invalid token.
- lib-ssl-iostream, lib-dcrypt: Fix building with OpenSSL that has
  deprecated APIs disabled.
- lib-storage: When mail's size is different from the cached one (in
  dovecot.index.cache or Maildir S=size in the filename), this is
  handled by logging 'Cached message size smaller/larger than expected'
  error. However, in some situations this also ended up crashing with:
  Panic: file istream.c: line 315 (i_stream_read_memarea):
  assertion failed: (old_size &lt;= _stream-&gt;pos - _stream-&gt;skip).
- lib-storage: v2.3 regression: Copying/moving mails was taking much more
  memory than before. This was mainly visible when copying/moving
  thousands of mails in a single transaction.
- lib-storage: v2.3.11 regression: Searching messages assert-crashed
  (without FTS): Panic: file message-parser.c: line 174 (message_part_finish):
  assertion failed: (ctx-&gt;nested_parts_count &gt; 0).
- lib: Dovecot v2.3 moved signal handlers around in ioloops,
  causing more CPU usage than in v2.2.
- lib: Fixed JSON parsing: '\' escape sequence may have wrongly resulted
  in error if it happened to be at read boundary. Any NUL characters and
  '\u0000' will now result in parsing error instead of silently
  truncating the data.
- lmtp, submission: Server may hang if SSL client connection disconnects
  during the delivery. If this happened repeated, it could have ended
  up reaching process_limit and preventing any further lmtp/submission
  deliveries.
- lmtp: Proxy does not always properly log TLS connection problems as
  errors; in some cases, only a debug message is logged if enabled.
- lmtp: The LMTP service can hang when commands are pipelined. This can
  particularly occur when one command in the middle of the pipeline fails.
  One example of this occurs for proxied LMTP transactions in which the
  final DATA or BDAT command is pipelined after a failing RCPT command.
- login-proxy: The login_source_ips setting has no effect, and therefore
  the proxy source IPs are not cycled through as they should be.
- master: Process was using 100% CPU in some situations when a broken
  service was being throttled.
- pop3-login: POP3 login would fail with 'Input buffer full' if the
  initial response for SASL was too long.
- stats: Crash would occur when generating openmetrics data for metrics
  using aggregating functions.

Update pigeonhole to version 0.5.15

* CVE-2020-28200: Sieve interpreter is not protected against abusive
  scripts that claim excessive resource usage. Fixed by limiting the
  user CPU time per single script execution and cumulatively over
  several script runs within a configurable timeout period. Sufficiently
  large CPU time usage is summed in the Sieve script binary and execution
  is blocked when the sum exceeds the limit within that time. The block
  is lifted when the script is updated after the resource usage times out.
  (bsc#1187420) Attacker can DoS the mail delivery system
  (jsc#PM-2746) ECO: Dovecot 2.3.15 version upgrade
* Disconnection log messages are now more standardized across services.
  They also always now start with 'Disconnected' prefix.
* managesieve: Commands pipelined together with and just after the
  authenticate command cause these commands to be executed twice.
* duplicate: The test was handled badly in a multiscript (sieve_before,
  sieve_after) scenario in which an earlier script in the sequence with
  a duplicate test succeeded, while a later script caused a runtime
  failure. In that case, the message is recorded for duplicate tracking,
  while the message may not actually have been delivered in the end.
* editheader: Sieve interpreter entered infinite loop at startup when
  the 'editheader' configuration listed an invalid header name. This
  problem can only be triggered by the administrator.
* relational: The Sieve relational extension can cause a segfault at
  compile time. This is triggered by invalid script syntax. The segfault
  happens when this match type is the last argument of the test command.
  This situation is not possible in a valid script; positional arguments
  are normally present after that, which would prevent the segfault.
* sieve: For some Sieve commands the provided mailbox name is not
  properly checked for UTF-8 validity, which can cause assert crashes at
  runtime when an invalid mailbox name is encountered. This can be
  caused by the user by writing a bad Sieve script involving the
  affected commands ('mailboxexists', 'specialuse_exists').
  This can be triggered by the remote sender only when the user has
  written a Sieve script that passes message content to one of the
  affected commands.
* sieve: Large sequences of 8-bit octets passed to certain Sieve
  commands that create or modify message headers that allow UTF-8 text
  (vacation, notify and addheader) can cause the delivery or IMAP
  process (when IMAPSieve is used) to enter a memory-consuming
  semi-infinite loop that ends when the process exceeds its memory
  limits. Logged in users can cause these hangs only for their own
  processes.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-31"/>
	<updated date="2021-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187418">SUSE bug 1187418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187419">SUSE bug 1187419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187420">SUSE bug 1187420</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28200/">CVE-2020-28200</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632141" comment="dovecot23-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632142" comment="dovecot23-backend-mysql-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632143" comment="dovecot23-backend-pgsql-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632144" comment="dovecot23-backend-sqlite-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632145" comment="dovecot23-devel-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632146" comment="dovecot23-fts-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632147" comment="dovecot23-fts-lucene-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632148" comment="dovecot23-fts-solr-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632149" comment="dovecot23-fts-squat-2.3.15-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52417" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184735" ref_url="https://bugzilla.suse.com/1184735" source="BUGZILLA"/>
		<reference ref_id="1184739" ref_url="https://bugzilla.suse.com/1184739" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3497" ref_url="https://www.suse.com/security/cve/CVE-2021-3497/" source="CVE"/>
		<reference ref_id="CVE-2021-3498" ref_url="https://www.suse.com/security/cve/CVE-2021-3498/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4IXFQFYFPMAJPYIAVGSDNJC7W6WWQID/" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2021-3498: Matroskademux: initialize track context out parameter to NULL before parsing (bsc#1184735).
- CVE-2021-3497: Matroskademux: Fix extraction of multichannel WavPack (bsc#1184739).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184735">SUSE bug 1184735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184739">SUSE bug 1184739</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3497/">CVE-2021-3497</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3498/">CVE-2021-3498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628037" comment="gstreamer-plugins-good-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628188" comment="gstreamer-plugins-good-32bit-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628189" comment="gstreamer-plugins-good-doc-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628190" comment="gstreamer-plugins-good-extra-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628191" comment="gstreamer-plugins-good-extra-32bit-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628192" comment="gstreamer-plugins-good-gtk-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628193" comment="gstreamer-plugins-good-jack-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628194" comment="gstreamer-plugins-good-jack-32bit-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628038" comment="gstreamer-plugins-good-lang-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628195" comment="gstreamer-plugins-good-qtqml-1.16.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52418" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1129714" ref_url="https://bugzilla.suse.com/1129714" source="BUGZILLA"/>
		<reference ref_id="1186849" ref_url="https://bugzilla.suse.com/1186849" source="BUGZILLA"/>
		<reference ref_id="1186859" ref_url="https://bugzilla.suse.com/1186859" source="BUGZILLA"/>
		<reference ref_id="1186861" ref_url="https://bugzilla.suse.com/1186861" source="BUGZILLA"/>
		<reference ref_id="1186863" ref_url="https://bugzilla.suse.com/1186863" source="BUGZILLA"/>
		<reference ref_id="1189142" ref_url="https://bugzilla.suse.com/1189142" source="BUGZILLA"/>
		<reference ref_id="1189348" ref_url="https://bugzilla.suse.com/1189348" source="BUGZILLA"/>
		<reference ref_id="1189350" ref_url="https://bugzilla.suse.com/1189350" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9721" ref_url="https://www.suse.com/security/cve/CVE-2019-9721/" source="CVE"/>
		<reference ref_id="CVE-2020-21688" ref_url="https://www.suse.com/security/cve/CVE-2020-21688/" source="CVE"/>
		<reference ref_id="CVE-2020-21697" ref_url="https://www.suse.com/security/cve/CVE-2020-21697/" source="CVE"/>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<reference ref_id="CVE-2020-22048" ref_url="https://www.suse.com/security/cve/CVE-2020-22048/" source="CVE"/>
		<reference ref_id="CVE-2020-22049" ref_url="https://www.suse.com/security/cve/CVE-2020-22049/" source="CVE"/>
		<reference ref_id="CVE-2020-22054" ref_url="https://www.suse.com/security/cve/CVE-2020-22054/" source="CVE"/>
		<reference ref_id="CVE-2021-38114" ref_url="https://www.suse.com/security/cve/CVE-2021-38114/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHYNSW2TAJSSTZPOYXQXGZDI6LYBWIT4/" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2019-9721: Fix denial of service in the subtitle decoder in handle_open_brace from libavcodec/htmlsubtitles.c (bsc#1129714).
- CVE-2020-22046: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the avpriv_float_dsp_allocl function in libavutil/float_dsp.c (bsc#1186849).
- CVE-2020-22048: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_frame_pool_get function in framepool.c (bsc#1186859).
- CVE-2020-22049: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the wtvfile_open_sector function in wtvdec.c (bsc#1186861).
- CVE-2020-22054: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the av_dict_set function in dict.c (bsc#1186863).
- CVE-2020-21688: Fixed a heap-use-after-free in the av_freep function in libavutil/mem.c (bsc#1189348).
- CVE-2020-21697: Fixed a heap-use-after-free in the mpeg_mux_write_packet function in libavformat/mpegenc.c (bsc#1189350).
- CVE-2021-38114: Fixed a not checked return value of the init_vlc function (bsc#1189142).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129714">SUSE bug 1129714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186849">SUSE bug 1186849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186859">SUSE bug 1186859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186861">SUSE bug 1186861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186863">SUSE bug 1186863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189142">SUSE bug 1189142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189348">SUSE bug 1189348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189350">SUSE bug 1189350</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9721/">CVE-2019-9721</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21688/">CVE-2020-21688</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21697/">CVE-2020-21697</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22048/">CVE-2020-22048</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22049/">CVE-2020-22049</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22054/">CVE-2020-22054</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38114/">CVE-2021-38114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631148" comment="ffmpeg-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631287" comment="ffmpeg-private-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631288" comment="libavcodec-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631132" comment="libavcodec57-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631289" comment="libavcodec57-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631290" comment="libavdevice-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631149" comment="libavdevice57-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631291" comment="libavdevice57-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631292" comment="libavfilter-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631150" comment="libavfilter6-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631293" comment="libavfilter6-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631294" comment="libavformat-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631133" comment="libavformat57-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631295" comment="libavformat57-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631145" comment="libavresample-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631146" comment="libavresample3-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631136" comment="libavresample3-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631137" comment="libavutil-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631138" comment="libavutil55-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631296" comment="libavutil55-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631139" comment="libpostproc-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631140" comment="libpostproc54-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631297" comment="libpostproc54-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631141" comment="libswresample-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631142" comment="libswresample2-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631298" comment="libswresample2-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631143" comment="libswscale-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631144" comment="libswscale4-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631299" comment="libswscale4-32bit-3.4.2-11.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52419" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176189" ref_url="https://bugzilla.suse.com/1176189" source="BUGZILLA"/>
		<reference ref_id="1179246" ref_url="https://bugzilla.suse.com/1179246" source="BUGZILLA"/>
		<reference ref_id="1183243" ref_url="https://bugzilla.suse.com/1183243" source="BUGZILLA"/>
		<reference ref_id="1183877" ref_url="https://bugzilla.suse.com/1183877" source="BUGZILLA"/>
		<reference ref_id="1185682" ref_url="https://bugzilla.suse.com/1185682" source="BUGZILLA"/>
		<reference ref_id="1186428" ref_url="https://bugzilla.suse.com/1186428" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187406" ref_url="https://bugzilla.suse.com/1187406" source="BUGZILLA"/>
		<reference ref_id="1188050" ref_url="https://bugzilla.suse.com/1188050" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189381" ref_url="https://bugzilla.suse.com/1189381" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28693" ref_url="https://www.suse.com/security/cve/CVE-2021-28693/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-28700" ref_url="https://www.suse.com/security/cve/CVE-2021-28700/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Update to Xen 4.13.3 general bug fix release (bsc#1027519).

Security issues fixed:

- CVE-2021-28693: xen/arm: Boot modules are not scrubbed (bsc#1186428)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-28700: No memory limit for dom0less domUs (XSA-383)(bsc#1189381).

Other issues fixed:

- Fixed 'Panic on CPU 0: IO-APIC + timer doesn't work!' (bsc#1180491)
- Fixed an issue with xencommons, where file format expecations by fillup did not allign (bsc#1185682)
- Fixed shell macro expansion in the spec file, so that ExecStart=
  in xendomains-wait-disks.service is created correctly (bsc#1183877)
- Upstream bug fixes (bsc#1027519)
- Fixed Xen SLES11SP4 guest hangs on cluster (bsc#1188050).
- xl monitoring process exits during xl save -p|-c keep the monitoring process running to cleanup the domU during shutdown (bsc#1176189).
- Dom0 hangs when pinning CPUs for dom0 with HVM guest (bsc#1179246).
- Some long deprecated commands were finally removed in qemu6. Adjust libxl to use supported commands (bsc#1183243).
- Update logrotate.conf, move global options into per-file sections to prevent globbering of global state (bsc#1187406).
- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176189">SUSE bug 1176189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179246">SUSE bug 1179246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183243">SUSE bug 1183243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183877">SUSE bug 1183877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185682">SUSE bug 1185682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186428">SUSE bug 1186428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187406">SUSE bug 1187406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188050">SUSE bug 1188050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189381">SUSE bug 1189381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28693/">CVE-2021-28693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28700/">CVE-2021-28700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632337" comment="xen-4.14.2_04-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632338" comment="xen-devel-4.14.2_04-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632339" comment="xen-doc-html-4.14.2_04-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632340" comment="xen-libs-4.14.2_04-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632341" comment="xen-libs-32bit-4.14.2_04-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632342" comment="xen-tools-4.14.2_04-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632343" comment="xen-tools-domU-4.14.2_04-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632254" comment="xen-tools-xendomains-wait-disk-4.14.2_04-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52420" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGZ4L5IPYNOJTWC7WZTAMPSFHIGKXQAE/" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629426" comment="libesmtp-1.0.6-150.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629427" comment="libesmtp-devel-1.0.6-150.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52421" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189320" ref_url="https://bugzilla.suse.com/1189320" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2939-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YQBCPA7OHC5QXXFY4FAUP2MEJ65S2SJ/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to 10.5.12 [bsc#1189320]:

- fixes for the following security vulnerabilities: CVE-2021-2372 and CVE-2021-2389
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189320">SUSE bug 1189320</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630845" comment="libmariadbd-devel-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630846" comment="libmariadbd19-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630847" comment="mariadb-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630902" comment="mariadb-bench-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630848" comment="mariadb-client-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630849" comment="mariadb-errormessages-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630903" comment="mariadb-rpm-macros-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630904" comment="mariadb-test-10.5.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630850" comment="mariadb-tools-10.5.12-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52422" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183735" ref_url="https://bugzilla.suse.com/1183735" source="BUGZILLA"/>
		<reference ref_id="1187120" ref_url="https://bugzilla.suse.com/1187120" source="BUGZILLA"/>
		<reference ref_id="1189492" ref_url="https://bugzilla.suse.com/1189492" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32JUFL2YE6SH6B4KF762VVSDUIQI7ZKU/" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

- CVE-2021-3621: Fixed shell command injection in sssctl via the logs-fetch and cache-expire subcommands (bsc#1189492).
- Add LDAPS support for the AD provider (bsc#1183735).
- Improve logs to record the reason why internal watchdog terminates a process (bsc#1187120).
- Fix watchdog not terminating tasks (bsc#1187120).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183735">SUSE bug 1183735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187120">SUSE bug 1187120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189492">SUSE bug 1189492</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631875" comment="libipa_hbac-devel-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631876" comment="libipa_hbac0-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631962" comment="libnfsidmap-sss-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631877" comment="libsss_certmap-devel-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631878" comment="libsss_certmap0-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631879" comment="libsss_idmap-devel-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631880" comment="libsss_idmap0-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631881" comment="libsss_nss_idmap-devel-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631882" comment="libsss_nss_idmap0-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631883" comment="libsss_simpleifp-devel-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631884" comment="libsss_simpleifp0-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631963" comment="python3-ipa_hbac-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631964" comment="python3-sss-murmur-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631965" comment="python3-sss_nss_idmap-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631885" comment="python3-sssd-config-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631886" comment="sssd-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631887" comment="sssd-ad-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631888" comment="sssd-common-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631889" comment="sssd-dbus-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631890" comment="sssd-ipa-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631891" comment="sssd-krb5-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631892" comment="sssd-krb5-common-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631893" comment="sssd-ldap-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631894" comment="sssd-proxy-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631895" comment="sssd-tools-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631966" comment="sssd-wbclient-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631967" comment="sssd-wbclient-devel-1.16.1-23.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631896" comment="sssd-winbind-idmap-1.16.1-23.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52423" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185476" ref_url="https://bugzilla.suse.com/1185476" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to jdk-11.0.12+7
- CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2388: Fixed a flaw inside the Hotspot component performed range check elimination. (bsc#1188566)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185476">SUSE bug 1185476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626380" comment="java-11-openjdk-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626649" comment="java-11-openjdk-accessibility-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626381" comment="java-11-openjdk-demo-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626382" comment="java-11-openjdk-devel-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626383" comment="java-11-openjdk-headless-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626424" comment="java-11-openjdk-javadoc-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626425" comment="java-11-openjdk-jmods-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626650" comment="java-11-openjdk-src-11.0.12.0-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52424" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="1189369" ref_url="https://bugzilla.suse.com/1189369" source="BUGZILLA"/>
		<reference ref_id="1189370" ref_url="https://bugzilla.suse.com/1189370" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

- CVE-2021-3672: Fixed missing input validation on hostnames (bsc#1188881).
- CVE-2021-22930: Fixed use after free on close http2 on stream canceling (bsc#1188917).
- CVE-2021-22939: Fixed incomplete validation of rejectUnauthorized parameter (bsc#1189369).
- CVE-2021-22931: Fixed improper handling of untypical characters in domain names (bsc#1189370).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631155" comment="nodejs10-10.24.1-1.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631156" comment="nodejs10-devel-10.24.1-1.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631157" comment="nodejs10-docs-10.24.1-1.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631158" comment="npm10-10.24.1-1.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52425" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189387" ref_url="https://bugzilla.suse.com/1189387" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33193" ref_url="https://www.suse.com/security/cve/CVE-2021-33193/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ML464OXXVITHCRNCGTP3DMIAYMJEHJEO/" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-33193: Fixed request splitting via HTTP/2 method injection and mod_proxy (bsc#1189387).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189387">SUSE bug 1189387</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33193/">CVE-2021-33193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631128" comment="apache2-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631152" comment="apache2-devel-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631153" comment="apache2-doc-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631151" comment="apache2-event-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631300" comment="apache2-example-pages-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631129" comment="apache2-prefork-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631130" comment="apache2-utils-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631154" comment="apache2-worker-2.4.43-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52426" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1159552" ref_url="https://bugzilla.suse.com/1159552" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGBVRVIJEOW5LG3NVS52NA3VNX37UM7D/" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2018-1311: Fixed use-after-free inside XML parser during the scanning of external DTDs (bsc#1159552).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159552">SUSE bug 1159552</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631810" comment="libxerces-c-3_1-3.1.4-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631870" comment="libxerces-c-3_1-32bit-3.1.4-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52427" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZPO3HVVYNS6WITBZKOQFXIVLJOK24MR/" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-07"/>
	<updated date="2021-09-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632506" comment="libopenssl-1_1-devel-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632512" comment="libopenssl-1_1-devel-32bit-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632507" comment="libopenssl1_1-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632508" comment="libopenssl1_1-32bit-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632509" comment="libopenssl1_1-hmac-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632510" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632511" comment="openssl-1_1-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632513" comment="openssl-1_1-doc-1.1.1d-11.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52428" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189720" ref_url="https://bugzilla.suse.com/1189720" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<reference ref_id="CVE-2021-33285" ref_url="https://www.suse.com/security/cve/CVE-2021-33285/" source="CVE"/>
		<reference ref_id="CVE-2021-33286" ref_url="https://www.suse.com/security/cve/CVE-2021-33286/" source="CVE"/>
		<reference ref_id="CVE-2021-33287" ref_url="https://www.suse.com/security/cve/CVE-2021-33287/" source="CVE"/>
		<reference ref_id="CVE-2021-33289" ref_url="https://www.suse.com/security/cve/CVE-2021-33289/" source="CVE"/>
		<reference ref_id="CVE-2021-35266" ref_url="https://www.suse.com/security/cve/CVE-2021-35266/" source="CVE"/>
		<reference ref_id="CVE-2021-35267" ref_url="https://www.suse.com/security/cve/CVE-2021-35267/" source="CVE"/>
		<reference ref_id="CVE-2021-35268" ref_url="https://www.suse.com/security/cve/CVE-2021-35268/" source="CVE"/>
		<reference ref_id="CVE-2021-35269" ref_url="https://www.suse.com/security/cve/CVE-2021-35269/" source="CVE"/>
		<reference ref_id="CVE-2021-39251" ref_url="https://www.suse.com/security/cve/CVE-2021-39251/" source="CVE"/>
		<reference ref_id="CVE-2021-39252" ref_url="https://www.suse.com/security/cve/CVE-2021-39252/" source="CVE"/>
		<reference ref_id="CVE-2021-39253" ref_url="https://www.suse.com/security/cve/CVE-2021-39253/" source="CVE"/>
		<reference ref_id="CVE-2021-39255" ref_url="https://www.suse.com/security/cve/CVE-2021-39255/" source="CVE"/>
		<reference ref_id="CVE-2021-39256" ref_url="https://www.suse.com/security/cve/CVE-2021-39256/" source="CVE"/>
		<reference ref_id="CVE-2021-39257" ref_url="https://www.suse.com/security/cve/CVE-2021-39257/" source="CVE"/>
		<reference ref_id="CVE-2021-39258" ref_url="https://www.suse.com/security/cve/CVE-2021-39258/" source="CVE"/>
		<reference ref_id="CVE-2021-39259" ref_url="https://www.suse.com/security/cve/CVE-2021-39259/" source="CVE"/>
		<reference ref_id="CVE-2021-39260" ref_url="https://www.suse.com/security/cve/CVE-2021-39260/" source="CVE"/>
		<reference ref_id="CVE-2021-39261" ref_url="https://www.suse.com/security/cve/CVE-2021-39261/" source="CVE"/>
		<reference ref_id="CVE-2021-39262" ref_url="https://www.suse.com/security/cve/CVE-2021-39262/" source="CVE"/>
		<reference ref_id="CVE-2021-39263" ref_url="https://www.suse.com/security/cve/CVE-2021-39263/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

Update to version 2021.8.22 (bsc#1189720):

* Fixed compile error when building with libfuse &lt; 2.8.0
* Fixed obsolete macros in configure.ac
* Signalled support of UTIME_OMIT to external libfuse2
* Fixed an improper macro usage in ntfscp.c
* Updated the repository change in the README
* Fixed vulnerability threats caused by maliciously tampered NTFS partitions
* Security fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287,
  CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268,
  CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253,
  CVE_2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257,
  CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261,
  CVE-2021-39262, CVE-2021-39263.

- Library soversion is now 89

* Changes in version 2017.3.23
* Delegated processing of special reparse points to external plugins
* Allowed kernel cacheing by lowntfs-3g when not using Posix ACLs
* Enabled fallback to read-only mount when the volume is hibernated
* Made a full check for whether an extended attribute is allowed
* Moved secaudit and usermap to ntfsprogs (now ntfssecaudit and ntfsusermap)
* Enabled encoding broken UTF-16 into broken UTF-8
* Autoconfigured selecting &lt;sys/sysmacros.h&gt; vs &lt;sys/mkdev&gt;
* Allowed using the full library API on systems without extended attributes support
* Fixed DISABLE_PLUGINS as the condition for not using plugins
* Corrected validation of multi sector transfer protected records
* Denied creating/removing files from $Extend
* Returned the size of locale encoded target as the size of symlinks
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-07"/>
	<updated date="2021-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189720">SUSE bug 1189720</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33285/">CVE-2021-33285</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33286/">CVE-2021-33286</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33287/">CVE-2021-33287</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33289/">CVE-2021-33289</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35266/">CVE-2021-35266</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35267/">CVE-2021-35267</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35268/">CVE-2021-35268</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35269/">CVE-2021-35269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39251/">CVE-2021-39251</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39252/">CVE-2021-39252</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39253/">CVE-2021-39253</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39255/">CVE-2021-39255</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39256/">CVE-2021-39256</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39257/">CVE-2021-39257</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39258/">CVE-2021-39258</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39259/">CVE-2021-39259</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39260/">CVE-2021-39260</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39261/">CVE-2021-39261</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39262/">CVE-2021-39262</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39263/">CVE-2021-39263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632558" comment="libntfs-3g-devel-2021.8.22-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632559" comment="libntfs-3g87-2021.8.22-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632560" comment="ntfs-3g-2021.8.22-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632561" comment="ntfsprogs-2021.8.22-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632562" comment="ntfsprogs-extra-2021.8.22-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52429" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189877" ref_url="https://bugzilla.suse.com/1189877" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40346" ref_url="https://www.suse.com/security/cve/CVE-2021-40346/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6TTUW6SSY2VZZGE3CPYLSNSIBVPT2RR/" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2021-40346: Fixed request smuggling vulnerability in HTX (bsc#1189877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-07"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189877">SUSE bug 1189877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40346/">CVE-2021-40346</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632571" comment="haproxy-2.0.14-11.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52430" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:2994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O65IINGUXDYQLSV7GD7SXFUKFY5WYUTA/" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632344" comment="libopenssl-1_0_0-devel-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632489" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632347" comment="libopenssl10-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632345" comment="libopenssl1_0_0-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632490" comment="libopenssl1_0_0-32bit-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632491" comment="libopenssl1_0_0-hmac-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632492" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632493" comment="libopenssl1_0_0-steam-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632494" comment="libopenssl1_0_0-steam-32bit-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632346" comment="openssl-1_0_0-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632495" comment="openssl-1_0_0-cavs-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632496" comment="openssl-1_0_0-doc-1.0.2p-3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52431" version="1" class="patch">
	<metadata>
		<title>Security update for libtpms (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189935" ref_url="https://bugzilla.suse.com/1189935" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3746" ref_url="https://www.suse.com/security/cve/CVE-2021-3746/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75RD2O2OFCMWPCMY5QMSZRNV5PG5BTS6/" source="SUSE-SU"/>
		<description>
This update for libtpms fixes the following issues:

- CVE-2021-3746: Fixed out-of-bounds access via specially crafted TPM 2 command packets (bsc#1189935).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189935">SUSE bug 1189935</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3746/">CVE-2021-3746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632569" comment="libtpms-devel-0.8.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632570" comment="libtpms0-0.8.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52432" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189497" ref_url="https://bugzilla.suse.com/1189497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30475" ref_url="https://www.suse.com/security/cve/CVE-2021-30475/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5ED4WHGOYBJI7SG4MTU3KVPDLBCN4U5/" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2021-30475: Fixed buffer overflow in aom_dsp/noise_model.c (bsc#1189497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189497">SUSE bug 1189497</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30475/">CVE-2021-30475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632554" comment="aom-tools-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632555" comment="libaom-devel-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632556" comment="libaom-devel-doc-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632524" comment="libaom0-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632557" comment="libaom0-32bit-1.0.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52433" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188375" ref_url="https://bugzilla.suse.com/1188375" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22235" ref_url="https://www.suse.com/security/cve/CVE-2021-22235/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2S3TY7NTSCEXTNC5OYYNCRDTT7MRPXP7/" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to Wireshark 3.4.7

- CVE-2021-22235: Fixed DNP dissector crash (bsc#1188375).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188375">SUSE bug 1188375</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22235/">CVE-2021-22235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632014" comment="libwireshark14-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632015" comment="libwiretap11-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632016" comment="libwsutil12-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632017" comment="wireshark-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632018" comment="wireshark-devel-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632019" comment="wireshark-ui-qt-3.4.7-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52434" version="1" class="patch">
	<metadata>
		<title>Security update for php7-pear (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189591" ref_url="https://bugzilla.suse.com/1189591" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXQPYU7Y2O7P5YZ73KTEOHBFQS2G55P3/" source="SUSE-SU"/>
		<description>
This update for php7-pear fixes the following issues:

- CVE-2020-36193: Fixed Archive_Tar directory traversal due to inadequate checking of symbolic links (bsc#1189591).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189591">SUSE bug 1189591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632020" comment="php7-pear-1.10.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632021" comment="php7-pecl-1.10.21-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52435" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_openidc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188638" ref_url="https://bugzilla.suse.com/1188638" source="BUGZILLA"/>
		<reference ref_id="1188639" ref_url="https://bugzilla.suse.com/1188639" source="BUGZILLA"/>
		<reference ref_id="1188848" ref_url="https://bugzilla.suse.com/1188848" source="BUGZILLA"/>
		<reference ref_id="1188849" ref_url="https://bugzilla.suse.com/1188849" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32785" ref_url="https://www.suse.com/security/cve/CVE-2021-32785/" source="CVE"/>
		<reference ref_id="CVE-2021-32786" ref_url="https://www.suse.com/security/cve/CVE-2021-32786/" source="CVE"/>
		<reference ref_id="CVE-2021-32791" ref_url="https://www.suse.com/security/cve/CVE-2021-32791/" source="CVE"/>
		<reference ref_id="CVE-2021-32792" ref_url="https://www.suse.com/security/cve/CVE-2021-32792/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54B4RYNP5L63X2FMX2QCVYB2LGLL42IY/" source="SUSE-SU"/>
		<description>
This update for apache2-mod_auth_openidc fixes the following issues:

- CVE-2021-32785: format string bug via hiredis (bsc#1188638)
- CVE-2021-32786: open redirect in logout functionality (bsc#1188639)
- CVE-2021-32791: Hardcoded static IV and AAD with a reused key in AES GCM encryption (bsc#1188849)
- CVE-2021-32792: XSS when using OIDCPreservePost On (bsc#1188848)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188638">SUSE bug 1188638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188639">SUSE bug 1188639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188848">SUSE bug 1188848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188849">SUSE bug 1188849</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32785/">CVE-2021-32785</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32786/">CVE-2021-32786</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32791/">CVE-2021-32791</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32792/">CVE-2021-32792</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626967" comment="apache2-mod_auth_openidc-2.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52436" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64NXCVRRUDYD4U65CYH2ROCOGMSYF3U/" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

Security issue fixed:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)

Also a hardening fix was added:

- Link as position independent executable (bsc#1184123)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-15"/>
	<updated date="2021-09-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632741" comment="ghostscript-9.52-155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632742" comment="ghostscript-devel-9.52-155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632743" comment="ghostscript-x11-9.52-155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632744" comment="libspectre-devel-0.2.8-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632745" comment="libspectre1-0.2.8-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52437" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WG6EJIK3ZOQTMMMAGVUCMM2QCK7CQQ77/" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631871" comment="libcroco-0.6.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631872" comment="libcroco-0_6-3-0.6.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631873" comment="libcroco-0_6-3-32bit-0.6.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631874" comment="libcroco-devel-0.6.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52438" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W4HJ2XF2SFYPRBAICENTSEBE5KO7OY2G/" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633453" comment="xen-4.14.2_06-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633454" comment="xen-devel-4.14.2_06-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633455" comment="xen-doc-html-4.14.2_06-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633456" comment="xen-libs-4.14.2_06-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633457" comment="xen-libs-32bit-4.14.2_06-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633458" comment="xen-tools-4.14.2_06-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633459" comment="xen-tools-domU-4.14.2_06-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633439" comment="xen-tools-xendomains-wait-disk-4.14.2_06-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52439" version="1" class="patch">
	<metadata>
		<title>Security update for grafana-piechart-panel (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172125" ref_url="https://bugzilla.suse.com/1172125" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13429" ref_url="https://www.suse.com/security/cve/CVE-2020-13429/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JN7UM2F5HQYAKPOO75CIJNTXDGDU6ZTJ/" source="SUSE-SU"/>
		<description>
This update for grafana-piechart-panel fixes the following issues:
	  
- CVE-2020-13429: Fixed XSS via the Values Header option in the piechart-panel (bsc#1172125).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172125">SUSE bug 1172125</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13429/">CVE-2020-13429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633661" comment="grafana-piechart-panel-1.6.1-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52440" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180100" ref_url="https://bugzilla.suse.com/1180100" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181006" ref_url="https://bugzilla.suse.com/1181006" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187483" ref_url="https://bugzilla.suse.com/1187483" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1187959" ref_url="https://bugzilla.suse.com/1187959" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188231" ref_url="https://bugzilla.suse.com/1188231" source="BUGZILLA"/>
		<reference ref_id="1188270" ref_url="https://bugzilla.suse.com/1188270" source="BUGZILLA"/>
		<reference ref_id="1188412" ref_url="https://bugzilla.suse.com/1188412" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188700" ref_url="https://bugzilla.suse.com/1188700" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189225" ref_url="https://bugzilla.suse.com/1189225" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189233" ref_url="https://bugzilla.suse.com/1189233" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189296" ref_url="https://bugzilla.suse.com/1189296" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189393" ref_url="https://bugzilla.suse.com/1189393" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189696" ref_url="https://bugzilla.suse.com/1189696" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189762" ref_url="https://bugzilla.suse.com/1189762" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189872" ref_url="https://bugzilla.suse.com/1189872" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190022" ref_url="https://bugzilla.suse.com/1190022" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190412" ref_url="https://bugzilla.suse.com/1190412" source="BUGZILLA"/>
		<reference ref_id="1190413" ref_url="https://bugzilla.suse.com/1190413" source="BUGZILLA"/>
		<reference ref_id="1190428" ref_url="https://bugzilla.suse.com/1190428" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38166" ref_url="https://www.suse.com/security/cve/CVE-2021-38166/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38206" ref_url="https://www.suse.com/security/cve/CVE-2021-38206/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="CVE-2021-38209" ref_url="https://www.suse.com/security/cve/CVE-2021-38209/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38166: Fixed an integer overflow and out-of-bounds write when many elements are placed in a single bucket in kernel/bpf/hashtab.c (bnc#1189233 ).
- CVE-2021-38209: Fixed allowed observation of changes in any net namespace via net/netfilter/nf_conntrack_standalone.c (bnc#1189393).
- CVE-2021-38206: Fixed NULL pointer dereference in the radiotap parser inside the mac80211 subsystem (bnc#1189296).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).
- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).

The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/hdmi: Add quirk to force pin connectivity on NUC10 (git-fixes).
- ALSA: hda/hdmi: fix max DP-MST dev_num for Intel TGL+ platforms (git-fixes).
- ALSA: hda/hdmi: let new platforms assign the pcm slot dynamically (git-fixes).
- ALSA: hda/realtek - Add ALC285 HP init procedure (git-fixes).
- ALSA: hda/realtek - Add type for ALC287 (git-fixes).
- ALSA: hda/realtek: Change device names for quirks to barebone names (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: Limit mic boost on HP ProBook 445 G8 (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/realtek: fix mute led of the HP Pavilion 15-eh1xxx series (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 650 G8 Notebook PC (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: hda: Fix hang during shutdown due to link reset (git-fixes).
- ALSA: hda: Release controller display power during shutdown/reboot (git-fixes).
- ALSA: pcm: Fix mmap breakage without explicit buffer setup (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Avoid unnecessary or invalid connector selection at resume (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Fix module resource and format selection (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix format selection for max98373 (git-fixes).
- ASoC: SOF: Intel: hda-ipc: fix reply size checking (git-fixes).
- ASoC: amd: Fix reference to PCM buffer address (git-fixes).
- ASoC: component: Remove misplaced prefix handling in pin control functions (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: mediatek: mt8183: Fix Unbalanced pm_runtime_enable in mt8183_afe_pcm_dev_probe (git-fixes).
- ASoC: rt5682: Adjust headset volume button threshold (git-fixes).
- ASoC: rt5682: Adjust headset volume button threshold again (git-fixes).
- ASoC: rt5682: Fix the issue of garbled recording after powerd_dbus_suspend (git-fixes).
- ASoC: ti: j721e-evm: Check for not initialized parent_clk_id (git-fixes).
- ASoC: ti: j721e-evm: Fix unbalanced domain activity tracking during startup (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: uniphier: Fix reference to PCM buffer address (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Avoid double printing SUSE specific flags in mod-&gt;taint (bsc#1190413).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: btusb: Fix a unspported condition to set available debug features (git-fixes).
- Bluetooth: btusb: check conditions before enabling USB ALT 3 for WBS (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: mgmt: Fix wrong opcode in the response for add_adv cmd (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: VMX: Extend VMXs #AC interceptor to handle split lock #AC in guest (bsc#1187959).
- KVM: nVMX: Handle split-lock #AC exceptions that happen in L2 (bsc#1187959).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: Emulate split-lock access as a write in emulator (bsc#1187959).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- RDMA/bnxt_re: Fix stats counters (bsc#1188231).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- bnxt_en: Validate vlan protocol ID on RX packets (jsc#SLE-15075).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189079).
- btrfs: add a trace class for dumping the current ENOSPC state (bsc#1135481).
- btrfs: add a trace point for reserve tickets (bsc#1135481).
- btrfs: adjust the flush trace point to include the source (bsc#1135481).
- btrfs: check reclaim_size in need_preemptive_reclaim (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix btrfs_calc_reclaim_metadata_size calculation (bsc#1135481).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: implement space clamping for preemptive flushing (bsc#1135481).
- btrfs: improve preemptive background space flushing (bsc#1135481).
- btrfs: introduce a FORCE_COMMIT_TRANS flush operation (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make flush_space take a enum btrfs_flush_state instead of int (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove FLUSH_DELAYED_REFS from data ENOSPC flushing (bsc#1135481).
- btrfs: rename need_do_async_reclaim (bsc#1135481).
- btrfs: rework btrfs_calc_reclaim_metadata_size (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: rip out btrfs_space_info::total_bytes_pinned (bsc#1135481).
- btrfs: rip the first_ticket_bytes logic from fail_all_tickets (bsc#1135481).
- btrfs: simplify the logic in need_preemptive_flushing (bsc#1135481).
- btrfs: tracepoints: convert flush states to using EM macros (bsc#1135481).
- btrfs: tracepoints: fix btrfs_trigger_flush symbolic string for flags (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- device-dax: Fix default return code of range_parse() (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: idxd: fix setup sequence for MSIXPERM table (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amd/display: Fix Dynamic bpp issue with 8K30 with Navi 1X (git-fixes).
- drm/amd/display: Fix comparison error in dcn21 DML (git-fixes).
- drm/amd/display: Fix max vstartup calculation for modes with borders (git-fixes).
- drm/amd/display: Remove invalid assert for ODM + MPC case (git-fixes).
- drm/amd/display: use GFP_ATOMIC in amdgpu_dm_irq_schedule_work (git-fixes).
- drm/amd/display: workaround for hard hang on HPD on native DP (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/amdgpu/display: fix DMUB firmware version info (git-fixes).
- drm/amdgpu/display: only enable aux backlight control for OLED panels (git-fixes).
- drm/amdgpu: do not enable baco on boco platforms in runpm (git-fixes).
- drm/amdgpu: fix the doorbell missing when in CGPG issue for renoir (git-fixes).
- drm/dp_mst: Fix return code on sideband message failure (git-fixes).
- drm/i915/dg1: gmbus pin mapping (bsc#1188700).
- drm/i915/dg1: provide port/phy mapping for vbt (bsc#1188700).
- drm/i915/gen9_bc: Add W/A for missing STRAP config on TGP PCH + CML combos (bsc#1188700).
- drm/i915/gen9_bc: Introduce HPD pin mappings for TGP PCH + CML combos (bsc#1188700).
- drm/i915/gen9_bc: Introduce TGP PCH DDC pin mappings (bsc#1188700).
- drm/i915/gen9_bc: Recognize TGP PCH + CML combos (bsc#1188700).
- drm/i915/rkl: new rkl ddc map for different PCH (bsc#1188700).
- drm/i915: Add VBT AUX CH H and I (bsc#1188700).
- drm/i915: Add VBT DVO ports H and I (bsc#1188700).
- drm/i915: Add more AUX CHs to the enum (bsc#1188700).
- drm/i915: Configure GEN11_{TBT,TC}_HOTPLUG_CTL for ports TC5/6 (bsc#1188700).
- drm/i915: Correct SFC_DONE register offset (git-fixes).
- drm/i915: Introduce HPD_PORT_TC&amp;lt;n&gt; (bsc#1188700).
- drm/i915: Move hpd_pin setup to encoder init (bsc#1188700).
- drm/i915: Nuke the redundant TC/TBT HPD bit defines (bsc#1188700).
- drm/i915: Only access SFC_DONE when media domain is not fused off (git-fixes).
- drm/meson: fix colour distortion from HDR set during vendor u-boot (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/msm: Fix error return code in msm_drm_init() (git-fixes).
- drm/nouveau/kms/nv50: workaround EFI GOP window channel format differences (git-fixes).
- drm/of: free the iterator object on failure (git-fixes).
- drm/of: free the right object (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm/prime: fix comment on PRIME Helpers (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fixup 'rpm: support gz and zst compression methods' (bsc#1190358, bsc#1190428).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: dfl: fme: Fix cpu hotplug issue in performance reporting (git-fixes).
- fpga: dfl: fme: Fix cpu hotplug issue in performance reporting (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/amd: Move Stoney Ridge check to detect_ivrs() (bsc#1189762).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- ionic: add handling of larger descriptors (jsc#SLE-16649).
- ionic: add new queue features to interface (jsc#SLE-16649).
- ionic: aggregate Tx byte counting calls (jsc#SLE-16649).
- ionic: block actions during fw reset (jsc#SLE-16649).
- ionic: change mtu after queues are stopped (jsc#SLE-16649).
- ionic: check for link after netdev registration (jsc#SLE-16649).
- ionic: code cleanup details (jsc#SLE-16649).
- ionic: fix sizeof usage (jsc#SLE-16649).
- ionic: fix unchecked reference (jsc#SLE-16649).
- ionic: fix up dim accounting for tx and rx (jsc#SLE-16649).
- ionic: generic tx skb mapping (jsc#SLE-16649).
- ionic: implement Rx page reuse (jsc#SLE-16649).
- ionic: make all rx_mode work threadsafe (jsc#SLE-16649).
- ionic: move rx_page_alloc and free (jsc#SLE-16649).
- ionic: optimize fastpath struct usage (jsc#SLE-16649).
- ionic: protect adminq from early destroy (jsc#SLE-16649).
- ionic: rebuild debugfs on qcq swap (jsc#SLE-16649).
- ionic: remove intr coalesce update from napi (jsc#SLE-16649).
- ionic: remove some unnecessary oom messages (jsc#SLE-16649).
- ionic: simplify TSO descriptor mapping (jsc#SLE-16649).
- ionic: simplify rx skb alloc (jsc#SLE-16649).
- ionic: simplify the intr_index use in txq_init (jsc#SLE-16649).
- ionic: simplify tx clean (jsc#SLE-16649).
- ionic: simplify use of completion types (jsc#SLE-16649).
- ionic: start queues before announcing link up (jsc#SLE-16649).
- ionic: stop watchdog when in broken state (jsc#SLE-16649).
- ionic: useful names for booleans (jsc#SLE-16649).
- iwlwifi: pnvm: accept multiple HW-type TLVs (git-fixes).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- iwlwifi: skip first element in the WTAS ACPI table (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841).
- leds: trigger: audio: Add an activate callback to ensure the initial brightness is set (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- lib: Add zstd support to decompress (bsc#1187483, jsc#SLE-18766).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- md: revert io stats accounting (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm/vmscan: fix infinite loop in drop_slab_node (VM Functionality, bsc#1189301).
- mm: fix memory_failure() handling of dax-namespace metadata (bsc#1189872).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- net/mlx5: Add ts_cqe_to_dest_cqn related bits (bsc#1188412)
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net/mlx5e: Add missing capability check for uplink follow (bsc#1188412)
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- net: usb: lan78xx: do not modify phy_device state concurrently (bsc#1188270)
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- perf/x86/amd: Do not touch the AMD64_EVENTSEL_HOSTONLY bit inside the guest (bsc#1189225).
- pinctrl: tigerlake: Fix GPIO mapping for newer version of software (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- post.sh: detect /usr mountpoint too
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/cacheinfo: Improve diagnostics about malformed cache lists (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Lookup cache by dt node and thread-group id (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Remove the redundant get_shared_cpu_map() (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Use name@unit instead of full DT path in debug messages (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes).
- powerpc/smp: Make some symbols static (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Use existing L2 cache_map cpumask to find L3 cache siblings (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed.
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm/kernel-source.rpmlintrc: ignore new include/config files In 5.13, since 0e0345b77ac4, config files have no longer .h suffix. Adapt the zero-length check. Based on Martin Liska's change.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: mpt3sas: Fix ReplyPostFree pool allocation (bsc#1181006).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: 8250_pci: Avoid irq sharing for MSI(-X) interrupts (git-fixes).
- serial: 8250_pci: Enumerate Elkhart Lake UARTs via dedicated driver (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- usr: Add support for zstd compressed initramfs (bsc#1187483, jsc#SLE-18766).
- virt_wifi: fix error on connect (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/sev: Make sure IRQs are disabled while GHCB is active (jsc#SLE-14337).
- x86/sev: Split up runtime #VC handler for correct state tracking (jsc#SLE-14337).
- x86/sev: Use 'SEV: ' prefix for messages from sev.c (jsc#SLE-14337).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- x86/split_lock: Provide handle_guest_split_lock() (bsc#1187959).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180100">SUSE bug 1180100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181006">SUSE bug 1181006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187483">SUSE bug 1187483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187959">SUSE bug 1187959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188231">SUSE bug 1188231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188270">SUSE bug 1188270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188412">SUSE bug 1188412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188700">SUSE bug 1188700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189225">SUSE bug 1189225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189233">SUSE bug 1189233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189296">SUSE bug 1189296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189393">SUSE bug 1189393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189696">SUSE bug 1189696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189762">SUSE bug 1189762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189872">SUSE bug 1189872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190022">SUSE bug 1190022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190412">SUSE bug 1190412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190413">SUSE bug 1190413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190428">SUSE bug 1190428</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38166/">CVE-2021-38166</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38206/">CVE-2021-38206</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38209/">CVE-2021-38209</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633191" comment="cluster-md-kmp-azure-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633192" comment="dlm-kmp-azure-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633193" comment="gfs2-kmp-azure-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632940" comment="kernel-azure-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632941" comment="kernel-azure-devel-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633194" comment="kernel-azure-extra-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633195" comment="kernel-azure-livepatch-devel-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633196" comment="kernel-azure-optional-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632942" comment="kernel-devel-azure-5.3.18-38.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632943" comment="kernel-source-azure-5.3.18-38.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632944" comment="kernel-syms-azure-5.3.18-38.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633197" comment="kselftests-kmp-azure-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633198" comment="ocfs2-kmp-azure-5.3.18-38.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633199" comment="reiserfs-kmp-azure-5.3.18-38.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52441" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182830" ref_url="https://bugzilla.suse.com/1182830" source="BUGZILLA"/>
		<reference ref_id="1183572" ref_url="https://bugzilla.suse.com/1183572" source="BUGZILLA"/>
		<reference ref_id="1183574" ref_url="https://bugzilla.suse.com/1183574" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="1189875" ref_url="https://bugzilla.suse.com/1189875" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20277: Fixed an out of bounds read in ldb_handler_fold (bsc#1183574).
- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- CVE-2020-27840: Fixed an unauthenticated remote heap corruption via bad DNs (bsc#1183572).

- Spec file fixes around systemd and requires (bsc#1182830)
- Fix dependency problem upgrading from libndr0 to libndr1 (bsc#1189875)
- Fix dependency problem upgrading from libsmbldap0 to libsmbldap2 (bsc#1189875)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182830">SUSE bug 1182830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189875">SUSE bug 1189875</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633335" comment="ctdb-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633402" comment="ctdb-pcp-pmda-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633403" comment="ctdb-tests-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633207" comment="libdcerpc-binding0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633208" comment="libdcerpc-binding0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633209" comment="libdcerpc-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633210" comment="libdcerpc-samr-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633211" comment="libdcerpc-samr0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633404" comment="libdcerpc-samr0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633212" comment="libdcerpc0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633213" comment="libdcerpc0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633214" comment="libndr-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633215" comment="libndr-krb5pac-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633216" comment="libndr-krb5pac0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633217" comment="libndr-krb5pac0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633218" comment="libndr-nbt-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633219" comment="libndr-nbt0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633220" comment="libndr-nbt0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633221" comment="libndr-standard-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633222" comment="libndr-standard0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633223" comment="libndr-standard0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633224" comment="libndr1-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633225" comment="libndr1-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633226" comment="libnetapi-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633405" comment="libnetapi-devel-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633227" comment="libnetapi0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633228" comment="libnetapi0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633229" comment="libsamba-credentials-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633230" comment="libsamba-credentials0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633231" comment="libsamba-credentials0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633232" comment="libsamba-errors-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633233" comment="libsamba-errors0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633234" comment="libsamba-errors0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633235" comment="libsamba-hostconfig-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633236" comment="libsamba-hostconfig0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633237" comment="libsamba-hostconfig0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633238" comment="libsamba-passdb-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633239" comment="libsamba-passdb0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633240" comment="libsamba-passdb0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633241" comment="libsamba-policy-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633242" comment="libsamba-policy-python3-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633243" comment="libsamba-policy0-python3-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633406" comment="libsamba-policy0-python3-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633244" comment="libsamba-util-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633245" comment="libsamba-util0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633246" comment="libsamba-util0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633247" comment="libsamdb-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633248" comment="libsamdb0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633249" comment="libsamdb0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633250" comment="libsmbclient-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633251" comment="libsmbclient0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633407" comment="libsmbclient0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633252" comment="libsmbconf-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633253" comment="libsmbconf0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633254" comment="libsmbconf0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633255" comment="libsmbldap-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633256" comment="libsmbldap2-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633257" comment="libsmbldap2-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633258" comment="libtevent-util-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633259" comment="libtevent-util0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633260" comment="libtevent-util0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633261" comment="libwbclient-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633262" comment="libwbclient0-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633263" comment="libwbclient0-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633264" comment="samba-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633315" comment="samba-ad-dc-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633408" comment="samba-ad-dc-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633265" comment="samba-ceph-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633266" comment="samba-client-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633409" comment="samba-client-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633267" comment="samba-core-devel-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633410" comment="samba-doc-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633268" comment="samba-dsdb-modules-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633269" comment="samba-libs-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633270" comment="samba-libs-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633271" comment="samba-libs-python3-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633411" comment="samba-libs-python3-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633272" comment="samba-python3-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633412" comment="samba-test-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633273" comment="samba-winbind-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633274" comment="samba-winbind-32bit-4.13.6+git.211.555d60b24ba-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52442" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189724" ref_url="https://bugzilla.suse.com/1189724" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38171" ref_url="https://www.suse.com/security/cve/CVE-2021-38171/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQYGWX5BP3LA5ULPF6C7O7URBPXWRNFJ/" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-38171: Fixed adts_decode_extradata in libavformat/adtsenc.c to check the init_get_bits return value (bsc#1189724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189724">SUSE bug 1189724</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38171/">CVE-2021-38171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633307" comment="ffmpeg-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633415" comment="ffmpeg-private-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633416" comment="libavcodec-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633282" comment="libavcodec57-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633417" comment="libavcodec57-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633418" comment="libavdevice-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633308" comment="libavdevice57-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633419" comment="libavdevice57-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633420" comment="libavfilter-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633309" comment="libavfilter6-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633421" comment="libavfilter6-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633422" comment="libavformat-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633283" comment="libavformat57-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633423" comment="libavformat57-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633295" comment="libavresample-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633296" comment="libavresample3-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633286" comment="libavresample3-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633287" comment="libavutil-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633288" comment="libavutil55-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633424" comment="libavutil55-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633289" comment="libpostproc-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633290" comment="libpostproc54-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633425" comment="libpostproc54-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633291" comment="libswresample-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633292" comment="libswresample2-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633426" comment="libswresample2-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633293" comment="libswscale-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633294" comment="libswscale4-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633427" comment="libswscale4-32bit-3.4.2-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52443" version="1" class="patch">
	<metadata>
		<title>Security update for grilo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189839" ref_url="https://bugzilla.suse.com/1189839" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39365" ref_url="https://www.suse.com/security/cve/CVE-2021-39365/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GPSQYWLYZXIWWGB3O5ZPKMPADF4ZWBO/" source="SUSE-SU"/>
		<description>
This update for grilo fixes the following issues:

- CVE-2021-39365: Fixed missing TLS certificate verification (bsc#1189839).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189839">SUSE bug 1189839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39365/">CVE-2021-39365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633275" comment="grilo-devel-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633361" comment="grilo-lang-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633414" comment="grilo-tools-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633276" comment="libgrilo-0_3-0-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633277" comment="libgrlnet-0_3-0-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633278" comment="libgrlpls-0_3-0-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633279" comment="typelib-1_0-Grl-0_3-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633280" comment="typelib-1_0-GrlNet-0_3-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633281" comment="typelib-1_0-GrlPls-0_3-0.3.12-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52444" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189060" ref_url="https://bugzilla.suse.com/1189060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FC5F3EO3ROUN3SV32U3TNFWTKZ6B6TA/" source="SUSE-SU"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3622: Fixed stack overflow due to recursive call of _get_children() (bsc#1189060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189060">SUSE bug 1189060</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632621" comment="hivex-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632563" comment="hivex-devel-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632622" comment="hivex-lang-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632564" comment="libhivex0-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632566" comment="ocaml-hivex-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632567" comment="ocaml-hivex-devel-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632565" comment="perl-Win-Hivex-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632623" comment="python-hivex-1.3.14-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52445" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQJH6H27YAC2H2WM75ZCWCXIEK3AXNV3/" source="SUSE-SU"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Fixed messageLength validation field of incoming messages (bsc#1187646).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632568" comment="linuxptp-3.1.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52446" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180100" ref_url="https://bugzilla.suse.com/1180100" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181006" ref_url="https://bugzilla.suse.com/1181006" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187483" ref_url="https://bugzilla.suse.com/1187483" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1187959" ref_url="https://bugzilla.suse.com/1187959" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188231" ref_url="https://bugzilla.suse.com/1188231" source="BUGZILLA"/>
		<reference ref_id="1188270" ref_url="https://bugzilla.suse.com/1188270" source="BUGZILLA"/>
		<reference ref_id="1188412" ref_url="https://bugzilla.suse.com/1188412" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188700" ref_url="https://bugzilla.suse.com/1188700" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189225" ref_url="https://bugzilla.suse.com/1189225" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189233" ref_url="https://bugzilla.suse.com/1189233" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189296" ref_url="https://bugzilla.suse.com/1189296" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189393" ref_url="https://bugzilla.suse.com/1189393" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189762" ref_url="https://bugzilla.suse.com/1189762" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189872" ref_url="https://bugzilla.suse.com/1189872" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190022" ref_url="https://bugzilla.suse.com/1190022" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190412" ref_url="https://bugzilla.suse.com/1190412" source="BUGZILLA"/>
		<reference ref_id="1190413" ref_url="https://bugzilla.suse.com/1190413" source="BUGZILLA"/>
		<reference ref_id="1190428" ref_url="https://bugzilla.suse.com/1190428" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38166" ref_url="https://www.suse.com/security/cve/CVE-2021-38166/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38206" ref_url="https://www.suse.com/security/cve/CVE-2021-38206/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="CVE-2021-38209" ref_url="https://www.suse.com/security/cve/CVE-2021-38209/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38166: Fixed an integer overflow and out-of-bounds write when many elements are placed in a single bucket in kernel/bpf/hashtab.c (bnc#1189233 ).
- CVE-2021-38209: Fixed allowed observation of changes in any net namespace via net/netfilter/nf_conntrack_standalone.c (bnc#1189393).
- CVE-2021-38206: Fixed NULL pointer dereference in the radiotap parser inside the mac80211 subsystem (bnc#1189296).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).
- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).

The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/hdmi: Add quirk to force pin connectivity on NUC10 (git-fixes).
- ALSA: hda/hdmi: fix max DP-MST dev_num for Intel TGL+ platforms (git-fixes).
- ALSA: hda/hdmi: let new platforms assign the pcm slot dynamically (git-fixes).
- ALSA: hda/realtek - Add ALC285 HP init procedure (git-fixes).
- ALSA: hda/realtek - Add type for ALC287 (git-fixes).
- ALSA: hda/realtek: Change device names for quirks to barebone names (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: Limit mic boost on HP ProBook 445 G8 (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/realtek: fix mute led of the HP Pavilion 15-eh1xxx series (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 650 G8 Notebook PC (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: hda: Fix hang during shutdown due to link reset (git-fixes).
- ALSA: hda: Release controller display power during shutdown/reboot (git-fixes).
- ALSA: pcm: Fix mmap breakage without explicit buffer setup (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Avoid unnecessary or invalid connector selection at resume (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Fix module resource and format selection (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix format selection for max98373 (git-fixes).
- ASoC: SOF: Intel: hda-ipc: fix reply size checking (git-fixes).
- ASoC: amd: Fix reference to PCM buffer address (git-fixes).
- ASoC: component: Remove misplaced prefix handling in pin control functions (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: mediatek: mt8183: Fix Unbalanced pm_runtime_enable in mt8183_afe_pcm_dev_probe (git-fixes).
- ASoC: rt5682: Adjust headset volume button threshold (git-fixes).
- ASoC: rt5682: Adjust headset volume button threshold again (git-fixes).
- ASoC: rt5682: Fix the issue of garbled recording after powerd_dbus_suspend (git-fixes).
- ASoC: ti: j721e-evm: Check for not initialized parent_clk_id (git-fixes).
- ASoC: ti: j721e-evm: Fix unbalanced domain activity tracking during startup (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: uniphier: Fix reference to PCM buffer address (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Avoid double printing SUSE specific flags in mod-&gt;taint (bsc#1190413).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: btusb: Fix a unspported condition to set available debug features (git-fixes).
- Bluetooth: btusb: check conditions before enabling USB ALT 3 for WBS (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: mgmt: Fix wrong opcode in the response for add_adv cmd (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Drop two intel_int0002_vgpio patches that cause Oops (bsc#1190412)
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: VMX: Extend VMXs #AC interceptor to handle split lock #AC in guest (bsc#1187959).
- KVM: nVMX: Handle split-lock #AC exceptions that happen in L2 (bsc#1187959).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: Emulate split-lock access as a write in emulator (bsc#1187959).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- RDMA/bnxt_re: Fix stats counters (bsc#1188231).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: improve error response to over-size gss credential (bsc#1190022).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- bnxt_en: Validate vlan protocol ID on RX packets (jsc#SLE-15075).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: add a trace class for dumping the current ENOSPC state (bsc#1135481).
- btrfs: add a trace point for reserve tickets (bsc#1135481).
- btrfs: adjust the flush trace point to include the source (bsc#1135481).
- btrfs: check reclaim_size in need_preemptive_reclaim (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix btrfs_calc_reclaim_metadata_size calculation (bsc#1135481).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: implement space clamping for preemptive flushing (bsc#1135481).
- btrfs: improve preemptive background space flushing (bsc#1135481).
- btrfs: introduce a FORCE_COMMIT_TRANS flush operation (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make flush_space take a enum btrfs_flush_state instead of int (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove FLUSH_DELAYED_REFS from data ENOSPC flushing (bsc#1135481).
- btrfs: rename need_do_async_reclaim (bsc#1135481).
- btrfs: rework btrfs_calc_reclaim_metadata_size (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: rip out btrfs_space_info::total_bytes_pinned (bsc#1135481).
- btrfs: rip the first_ticket_bytes logic from fail_all_tickets (bsc#1135481).
- btrfs: simplify the logic in need_preemptive_flushing (bsc#1135481).
- btrfs: tracepoints: convert flush states to using EM macros (bsc#1135481).
- btrfs: tracepoints: fix btrfs_trigger_flush symbolic string for flags (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543) 
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- device-dax: Fix default return code of range_parse() (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: idxd: fix setup sequence for MSIXPERM table (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amd/display: Fix Dynamic bpp issue with 8K30 with Navi 1X (git-fixes).
- drm/amd/display: Fix comparison error in dcn21 DML (git-fixes).
- drm/amd/display: Fix max vstartup calculation for modes with borders (git-fixes).
- drm/amd/display: Remove invalid assert for ODM + MPC case (git-fixes).
- drm/amd/display: use GFP_ATOMIC in amdgpu_dm_irq_schedule_work (git-fixes).
- drm/amd/display: workaround for hard hang on HPD on native DP (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/amdgpu/display: fix DMUB firmware version info (git-fixes).
- drm/amdgpu/display: only enable aux backlight control for OLED panels (git-fixes).
- drm/amdgpu: do not enable baco on boco platforms in runpm (git-fixes).
- drm/amdgpu: fix the doorbell missing when in CGPG issue for renoir (git-fixes).
- drm/dp_mst: Fix return code on sideband message failure (git-fixes).
- drm/i915/dg1: gmbus pin mapping (bsc#1188700).
- drm/i915/dg1: provide port/phy mapping for vbt (bsc#1188700).
- drm/i915/gen9_bc: Add W/A for missing STRAP config on TGP PCH + CML combos (bsc#1188700).
- drm/i915/gen9_bc: Introduce HPD pin mappings for TGP PCH + CML combos (bsc#1188700).
- drm/i915/gen9_bc: Introduce TGP PCH DDC pin mappings (bsc#1188700).
- drm/i915/gen9_bc: Recognize TGP PCH + CML combos (bsc#1188700).
- drm/i915/rkl: new rkl ddc map for different PCH (bsc#1188700).
- drm/i915: Add VBT AUX CH H and I (bsc#1188700).
- drm/i915: Add VBT DVO ports H and I (bsc#1188700).
- drm/i915: Add more AUX CHs to the enum (bsc#1188700).
- drm/i915: Configure GEN11_{TBT,TC}_HOTPLUG_CTL for ports TC5/6 (bsc#1188700).
- drm/i915: Correct SFC_DONE register offset (git-fixes).
- drm/i915: Introduce HPD_PORT_TC&amp;lt;n&gt; (bsc#1188700).
- drm/i915: Move hpd_pin setup to encoder init (bsc#1188700).
- drm/i915: Nuke the redundant TC/TBT HPD bit defines (bsc#1188700).
- drm/i915: Only access SFC_DONE when media domain is not fused off (git-fixes).
- drm/meson: fix colour distortion from HDR set during vendor u-boot (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/msm: Fix error return code in msm_drm_init() (git-fixes).
- drm/nouveau/kms/nv50: workaround EFI GOP window channel format differences (git-fixes).
- drm/of: free the iterator object on failure (git-fixes).
- drm/of: free the right object (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm/prime: fix comment on PRIME Helpers (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fixup 'rpm: support gz and zst compression methods' (bsc#1190358, bsc#1190428).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: dfl: fme: Fix cpu hotplug issue in performance reporting (git-fixes).
- fpga: dfl: fme: Fix cpu hotplug issue in performance reporting (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/amd: Move Stoney Ridge check to detect_ivrs() (bsc#1189762).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- ionic: add handling of larger descriptors (jsc#SLE-16649).
- ionic: add new queue features to interface (jsc#SLE-16649).
- ionic: aggregate Tx byte counting calls (jsc#SLE-16649).
- ionic: block actions during fw reset (jsc#SLE-16649).
- ionic: change mtu after queues are stopped (jsc#SLE-16649).
- ionic: check for link after netdev registration (jsc#SLE-16649).
- ionic: code cleanup details (jsc#SLE-16649).
- ionic: fix sizeof usage (jsc#SLE-16649).
- ionic: fix unchecked reference (jsc#SLE-16649).
- ionic: fix up dim accounting for tx and rx (jsc#SLE-16649).
- ionic: generic tx skb mapping (jsc#SLE-16649).
- ionic: implement Rx page reuse (jsc#SLE-16649).
- ionic: make all rx_mode work threadsafe (jsc#SLE-16649).
- ionic: move rx_page_alloc and free (jsc#SLE-16649).
- ionic: optimize fastpath struct usage (jsc#SLE-16649).
- ionic: protect adminq from early destroy (jsc#SLE-16649).
- ionic: rebuild debugfs on qcq swap (jsc#SLE-16649).
- ionic: remove intr coalesce update from napi (jsc#SLE-16649).
- ionic: remove some unnecessary oom messages (jsc#SLE-16649).
- ionic: simplify TSO descriptor mapping (jsc#SLE-16649).
- ionic: simplify rx skb alloc (jsc#SLE-16649).
- ionic: simplify the intr_index use in txq_init (jsc#SLE-16649).
- ionic: simplify tx clean (jsc#SLE-16649).
- ionic: simplify use of completion types (jsc#SLE-16649).
- ionic: start queues before announcing link up (jsc#SLE-16649).
- ionic: stop watchdog when in broken state (jsc#SLE-16649).
- ionic: useful names for booleans (jsc#SLE-16649).
- iwlwifi: pnvm: accept multiple HW-type TLVs (git-fixes).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- iwlwifi: skip first element in the WTAS ACPI table (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841).
- leds: trigger: audio: Add an activate callback to ensure the initial brightness is set (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- lib: Add zstd support to decompress (bsc#1187483, jsc#SLE-18766).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- md: revert io stats accounting (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm/vmscan: fix infinite loop in drop_slab_node (VM Functionality, bsc#1189301).
- mm: fix memory_failure() handling of dax-namespace metadata (bsc#1189872).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- net/mlx5: Add ts_cqe_to_dest_cqn related bits (bsc#1188412)
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net/mlx5e: Add missing capability check for uplink follow (bsc#1188412)
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- net: usb: lan78xx: do not modify phy_device state concurrently (bsc#1188270)
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- perf/x86/amd: Do not touch the AMD64_EVENTSEL_HOSTONLY bit inside the guest (bsc#1189225).
- pinctrl: tigerlake: Fix GPIO mapping for newer version of software (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- post.sh: detect /usr mountpoint too
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/cacheinfo: Improve diagnostics about malformed cache lists (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Lookup cache by dt node and thread-group id (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Remove the redundant get_shared_cpu_map() (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/cacheinfo: Use name@unit instead of full DT path in debug messages (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes). This changes a GPL symbol to general symbol which is kABI change but not kABI break.
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes).
- powerpc/smp: Make some symbols static (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Use existing L2 cache_map cpumask to find L3 cache siblings (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed.
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm/kernel-source.rpmlintrc: ignore new include/config files In 5.13, since 0e0345b77ac4, config files have no longer .h suffix. Adapt the zero-length check. Based on Martin Liska's change.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: mpt3sas: Fix ReplyPostFree pool allocation (bsc#1181006).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: 8250_pci: Avoid irq sharing for MSI(-X) interrupts (git-fixes).
- serial: 8250_pci: Enumerate Elkhart Lake UARTs via dedicated driver (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- usr: Add support for zstd compressed initramfs (bsc#1187483, jsc#SLE-18766).
- virt_wifi: fix error on connect (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/sev: Make sure IRQs are disabled while GHCB is active (jsc#SLE-14337).
- x86/sev: Split up runtime #VC handler for correct state tracking (jsc#SLE-14337).
- x86/sev: Use 'SEV: ' prefix for messages from sev.c (jsc#SLE-14337).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- x86/split_lock: Provide handle_guest_split_lock() (bsc#1187959).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180100">SUSE bug 1180100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181006">SUSE bug 1181006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187483">SUSE bug 1187483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187959">SUSE bug 1187959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188231">SUSE bug 1188231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188270">SUSE bug 1188270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188412">SUSE bug 1188412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188700">SUSE bug 1188700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189225">SUSE bug 1189225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189233">SUSE bug 1189233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189296">SUSE bug 1189296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189393">SUSE bug 1189393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189762">SUSE bug 1189762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189872">SUSE bug 1189872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190022">SUSE bug 1190022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190412">SUSE bug 1190412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190413">SUSE bug 1190413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190428">SUSE bug 1190428</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38166/">CVE-2021-38166</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38206/">CVE-2021-38206</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38209/">CVE-2021-38209</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633135" comment="cluster-md-kmp-64kb-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632945" comment="cluster-md-kmp-default-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633136" comment="cluster-md-kmp-preempt-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633137" comment="dlm-kmp-64kb-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632946" comment="dlm-kmp-default-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633138" comment="dlm-kmp-preempt-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633139" comment="dtb-al-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633140" comment="dtb-allwinner-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633141" comment="dtb-altera-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633142" comment="dtb-amd-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633143" comment="dtb-amlogic-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633144" comment="dtb-apm-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633145" comment="dtb-arm-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633146" comment="dtb-broadcom-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633147" comment="dtb-cavium-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633148" comment="dtb-exynos-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633149" comment="dtb-freescale-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633150" comment="dtb-hisilicon-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633151" comment="dtb-lg-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633152" comment="dtb-marvell-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633153" comment="dtb-mediatek-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633154" comment="dtb-nvidia-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633155" comment="dtb-qcom-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633156" comment="dtb-renesas-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633157" comment="dtb-rockchip-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633158" comment="dtb-socionext-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633159" comment="dtb-sprd-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633160" comment="dtb-xilinx-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633161" comment="dtb-zte-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633162" comment="gfs2-kmp-64kb-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632947" comment="gfs2-kmp-default-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633163" comment="gfs2-kmp-preempt-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632922" comment="kernel-64kb-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632923" comment="kernel-64kb-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633164" comment="kernel-64kb-extra-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633165" comment="kernel-64kb-livepatch-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633166" comment="kernel-64kb-optional-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633167" comment="kernel-debug-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633168" comment="kernel-debug-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633169" comment="kernel-debug-livepatch-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632924" comment="kernel-default-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632925" comment="kernel-default-base-5.3.18-59.24.1.18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633170" comment="kernel-default-base-rebuild-5.3.18-59.24.1.18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632926" comment="kernel-default-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633171" comment="kernel-default-extra-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633172" comment="kernel-default-livepatch-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633173" comment="kernel-default-livepatch-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633174" comment="kernel-default-optional-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632927" comment="kernel-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632931" comment="kernel-docs-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633175" comment="kernel-docs-html-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633176" comment="kernel-kvmsmall-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633177" comment="kernel-kvmsmall-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633178" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632928" comment="kernel-macros-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632932" comment="kernel-obs-build-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633179" comment="kernel-obs-qa-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632929" comment="kernel-preempt-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632933" comment="kernel-preempt-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633180" comment="kernel-preempt-extra-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633181" comment="kernel-preempt-livepatch-devel-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633182" comment="kernel-preempt-optional-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632934" comment="kernel-source-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633183" comment="kernel-source-vanilla-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632935" comment="kernel-syms-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632930" comment="kernel-zfcpdump-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633184" comment="kselftests-kmp-64kb-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633185" comment="kselftests-kmp-default-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633186" comment="kselftests-kmp-preempt-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633187" comment="ocfs2-kmp-64kb-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632948" comment="ocfs2-kmp-default-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633188" comment="ocfs2-kmp-preempt-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633189" comment="reiserfs-kmp-64kb-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632936" comment="reiserfs-kmp-default-5.3.18-59.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633190" comment="reiserfs-kmp-preempt-5.3.18-59.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52447" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="1189368" ref_url="https://bugzilla.suse.com/1189368" source="BUGZILLA"/>
		<reference ref_id="1189369" ref_url="https://bugzilla.suse.com/1189369" source="BUGZILLA"/>
		<reference ref_id="1189370" ref_url="https://bugzilla.suse.com/1189370" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-3672: Fixed missing input validation on hostnames (bsc#1188881).
- CVE-2021-22931: Fixed improper handling of untypical characters in domain names (bsc#1189370).
- CVE-2021-22940: Use after free on close http2 on stream canceling (bsc#1189368)
- CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (bsc#1189369)
- CVE-2021-22930: Fixed use after free on close http2 on stream canceling (bsc#1188917). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633327" comment="nodejs14-14.17.5-5.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633328" comment="nodejs14-devel-14.17.5-5.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633329" comment="nodejs14-docs-14.17.5-5.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633330" comment="npm14-14.17.5-5.15.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52448" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190400" ref_url="https://bugzilla.suse.com/1190400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40812" ref_url="https://www.suse.com/security/cve/CVE-2021-40812/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCVD7RYV2TSOLINPDAIY7P7Q4OSCOREN/" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

- CVE-2021-40812: Fixed out-of-bounds read caused by the lack of certain gdGetBuf and gdPutBuf return value checks (bsc#1190400).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190400">SUSE bug 1190400</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40812/">CVE-2021-40812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633466" comment="gd-2.2.5-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633464" comment="gd-devel-2.2.5-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633463" comment="libgd3-2.2.5-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633477" comment="libgd3-32bit-2.2.5-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52449" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184222" ref_url="https://bugzilla.suse.com/1184222" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:3244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5AJVQHCUMK7J3JDSTOVI22XABIMBIMGX/" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

- Template generation allows external parameters to override placeholders (bsc#1184222)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-28"/>
	<updated date="2021-09-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1184222">SUSE bug 1184222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626293" comment="libshibsp-lite8-3.1.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626294" comment="libshibsp9-3.1.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626295" comment="shibboleth-sp-3.1.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626296" comment="shibboleth-sp-devel-3.1.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52450" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCFOPHTCYLOVNMVIHXDFWZ2NNKEOKROF/" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632667" comment="libecpg6-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632713" comment="libecpg6-32bit-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632654" comment="libpq5-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632655" comment="libpq5-32bit-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632656" comment="postgresql13-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632668" comment="postgresql13-contrib-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632669" comment="postgresql13-devel-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632670" comment="postgresql13-docs-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632714" comment="postgresql13-llvmjit-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632671" comment="postgresql13-plperl-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632672" comment="postgresql13-plpython-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632673" comment="postgresql13-pltcl-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632674" comment="postgresql13-server-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632675" comment="postgresql13-server-devel-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632666" comment="postgresql13-test-13.4-5.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52451" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKQBP2PRAEJOFAWUWOWJ6PIS2W2H7IA2/" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632657" comment="postgresql12-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632658" comment="postgresql12-contrib-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632659" comment="postgresql12-devel-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632660" comment="postgresql12-docs-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632715" comment="postgresql12-llvmjit-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632661" comment="postgresql12-plperl-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632662" comment="postgresql12-plpython-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632663" comment="postgresql12-pltcl-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632664" comment="postgresql12-server-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632665" comment="postgresql12-server-devel-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632716" comment="postgresql12-test-12.8-8.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52452" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYMYANBGPUFKQ7SIIB3PZLAAR35QYXOR/" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-33574: Fixed use __pthread_attr_copy in mq_notify (bsc#1186489).
- CVE-2021-35942: Fixed wordexp handle overflow in positional parameter number (bsc#1187911).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-08"/>
	<updated date="2021-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634556" comment="glibc-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634557" comment="glibc-32bit-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634558" comment="glibc-devel-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634573" comment="glibc-devel-32bit-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634574" comment="glibc-devel-static-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634821" comment="glibc-devel-static-32bit-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634559" comment="glibc-extra-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634822" comment="glibc-html-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634560" comment="glibc-i18ndata-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634561" comment="glibc-info-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634562" comment="glibc-lang-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634563" comment="glibc-locale-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634564" comment="glibc-locale-base-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634565" comment="glibc-locale-base-32bit-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634566" comment="glibc-profile-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634823" comment="glibc-profile-32bit-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634575" comment="glibc-utils-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634824" comment="glibc-utils-32bit-2.31-9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634567" comment="nscd-2.31-9.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52453" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1190589" ref_url="https://bugzilla.suse.com/1190589" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39293" ref_url="https://www.suse.com/security/cve/CVE-2021-39293/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EY52N4KALEDKULS6YHUPW2C7OJTGHTS/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- Update to go 1.16.8
- CVE-2021-39293: Fixed a buffer overflow issue in preallocation check that can cause OOM panic. (bas#)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190589">SUSE bug 1190589</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39293/">CVE-2021-39293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634431" comment="go1.16-1.16.8-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634432" comment="go1.16-doc-1.16.8-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634433" comment="go1.16-race-1.16.8-1.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52454" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186761" ref_url="https://bugzilla.suse.com/1186761" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22042" ref_url="https://www.suse.com/security/cve/CVE-2020-22042/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AYA6VEHMLTAF6FDL4C6CPC73YV5SVJY/" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-22042: Fixed a denial of service vulnerability led by a memory leak in the link_filter_inouts function in libavfilter/graphparser.c. (bsc#1186761)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186761">SUSE bug 1186761</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22042/">CVE-2020-22042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634434" comment="ffmpeg-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634529" comment="ffmpeg-private-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634530" comment="libavcodec-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634415" comment="libavcodec57-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634531" comment="libavcodec57-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634532" comment="libavdevice-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634435" comment="libavdevice57-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634533" comment="libavdevice57-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634534" comment="libavfilter-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634436" comment="libavfilter6-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634535" comment="libavfilter6-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634536" comment="libavformat-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634416" comment="libavformat57-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634537" comment="libavformat57-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634428" comment="libavresample-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634429" comment="libavresample3-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634419" comment="libavresample3-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634420" comment="libavutil-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634421" comment="libavutil55-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634538" comment="libavutil55-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634422" comment="libpostproc-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634423" comment="libpostproc54-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634539" comment="libpostproc54-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634424" comment="libswresample-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634425" comment="libswresample2-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634540" comment="libswresample2-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634426" comment="libswscale-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634427" comment="libswscale4-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634541" comment="libswscale4-32bit-3.4.2-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52455" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4WV4L3BNHGJFK3NT7YVDUR6UNHPAFSZC/" source="SUSE-SU"/>
		<description>

nodejs8 was updated to fix the following security issues:

- CVE-2021-22930: http2: fixes use after free on close in stream canceling (bsc#1188917)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634437" comment="nodejs8-8.17.0-10.15.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634438" comment="nodejs8-devel-8.17.0-10.15.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634439" comment="nodejs8-docs-8.17.0-10.15.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634440" comment="npm8-8.17.0-10.15.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52456" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJISG4GC22MLBYTQB5THWN4V2IFZC7P/" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633973" comment="curl-7.66.0-4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633974" comment="libcurl-devel-7.66.0-4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634041" comment="libcurl-devel-32bit-7.66.0-4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633975" comment="libcurl4-7.66.0-4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633976" comment="libcurl4-32bit-7.66.0-4.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52457" version="1" class="patch">
	<metadata>
		<title>Security update for libcryptopp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1015243" ref_url="https://bugzilla.suse.com/1015243" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9939" ref_url="https://www.suse.com/security/cve/CVE-2016-9939/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OT7AMKZYZG3NMSSJK4GVQCGFPLIGSKD5/" source="SUSE-SU"/>
		<description>
This update for libcryptopp fixes the following issues:

- CVE-2016-9939: Fixed potential DoS in Crypto++ (libcryptopp) ASN.1 parser (bsc#1015243).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015243">SUSE bug 1015243</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9939/">CVE-2016-9939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633461" comment="libcryptopp-devel-5.6.5-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633462" comment="libcryptopp5_6_5-5.6.5-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633656" comment="libcryptopp5_6_5-32bit-5.6.5-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52458" version="1" class="patch">
	<metadata>
		<title>Security update for rabbitmq-server (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185075" ref_url="https://bugzilla.suse.com/1185075" source="BUGZILLA"/>
		<reference ref_id="1186203" ref_url="https://bugzilla.suse.com/1186203" source="BUGZILLA"/>
		<reference ref_id="1187818" ref_url="https://bugzilla.suse.com/1187818" source="BUGZILLA"/>
		<reference ref_id="1187819" ref_url="https://bugzilla.suse.com/1187819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22116" ref_url="https://www.suse.com/security/cve/CVE-2021-22116/" source="CVE"/>
		<reference ref_id="CVE-2021-32718" ref_url="https://www.suse.com/security/cve/CVE-2021-32718/" source="CVE"/>
		<reference ref_id="CVE-2021-32719" ref_url="https://www.suse.com/security/cve/CVE-2021-32719/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NL4I6R5WB6N3LAJGL2UC3TXXGKBNRLE/" source="SUSE-SU"/>
		<description>
This update for rabbitmq-server fixes the following issues:

- CVE-2021-32718: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI (bsc#1187818).
- CVE-2021-32719: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin (bsc#1187819).
- CVE-2021-22116: Fixed improper input validation may lead to DoS (bsc#1186203).

- Use /run instead of /var/run in tmpfiles.d configuration (bsc#1185075).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-09"/>
	<updated date="2021-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185075">SUSE bug 1185075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186203">SUSE bug 1186203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187818">SUSE bug 1187818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187819">SUSE bug 1187819</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22116/">CVE-2021-22116</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32718/">CVE-2021-32718</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32719/">CVE-2021-32719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632237" comment="erlang-rabbitmq-client-3.8.11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632238" comment="rabbitmq-server-3.8.11-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632239" comment="rabbitmq-server-plugins-3.8.11-3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52459" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.2.0 ESR.

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes
 MFSA 2021-45 (bsc#1191332)
* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Data race in crossbeam-deque

  https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw)
   
* CVE-2021-38500 (bmo#1725854, bmo#1728321)
  Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15,
  and Firefox ESR 91.2
* CVE-2021-38501 (bmo#1685354, bmo#1715755, bmo#1723176)
  Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox Extended Support Release 91.0.1 ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-11"/>
	<updated date="2021-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633413" comment="rust-cbindgen-0.19.0-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52460" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185550" ref_url="https://bugzilla.suse.com/1185550" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189257" ref_url="https://bugzilla.suse.com/1189257" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190138" ref_url="https://bugzilla.suse.com/1190138" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190544" ref_url="https://bugzilla.suse.com/1190544" source="BUGZILLA"/>
		<reference ref_id="1190561" ref_url="https://bugzilla.suse.com/1190561" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: Intel: Fix platform ID matching (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: rt5682: Implement remove callback (git-fixes).
- ASoC: rt5682: Properly turn off regulators if wrong device ID (git-fixes).
- ASoC: rt5682: Remove unused variable in rt5682_i2c_remove() (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- backlight: pwm_bl: Improve bootloader/kernel device handover (git-fixes).
- bareudp: Fix invalid read beyond skb's linear data (jsc#SLE-15172).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Fix asic.rev in devlink dev info command (jsc#SLE-16649).
- bnxt_en: fix stored FW_PSID version masks (jsc#SLE-16649).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- bpf, samples: Add missing mprog-disable to xdp_redirect_cpu's optstring (git-fixes).
- bpf: Fix ringbuf helper function compatibility (git-fixes).
- bpftool: Add sock_release help info for cgroup attach/prog load command (bsc#1177028).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cpuidle: pseries: Do not cap the CEDE0 latency in fixup_cede0_latency() (bsc#1185550 ltc#192610 git-fixes jsc#SLE-18128).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- devlink: Clear whole devlink_flash_notify struct (bsc#1176447).
- dma-buf: DMABUF_MOVE_NOTIFY should depend on DMA_SHARED_BUFFER (git-fixes).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/ast: Fix missing conversions to managed API (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/i915: Allow the sysadmin to override security mitigations (git-fixes).
- drm/i915/rkl: Remove require_force_probe protection (bsc#1189257).
- drm/ingenic: Switch IPU plane to type OVERLAY (git-fixes).
- drm/mgag200: Select clock in PLL update functions (git-fixes).
- drm/msm/mdp4: move HW revision detection to earlier phase (git-fixes).
- drm/msm/mdp4: refactor HW revision detection into read_mdp_hw_revision (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- drm/pl111: depend on CONFIG_VEXPRESS_CONFIG (git-fixes).
- drm/rockchip: cdn-dp-core: Make cdn_dp_core_resume __maybe_unused (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/mce_amd: Do not load edac_mce_amd module on guests (bsc#1190138).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- enetc: Fix uninitialized struct dim_sample field usage (git-fixes).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- i40e: improve locking of mac_filter_hash (jsc#SLE-13701).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- IB/hfi1: Indicate DMA wait when txq is queued for wakeup (jsc#SLE-13208).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: do not abort devlink info if board identifier can't be found (jsc#SLE-12878).
- ice: do not remove netdev-&gt;dev_addr from uc sync list (git-fixes).
- ice: Prevent probing virtual functions (git-fixes).
- igc: Use num_tx_queues when iterating over tx_ring queue (jsc#SLE-13533).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ionic: drop useless check of PCI driver data validity (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi Add support for ax201 in Samsung Galaxy Book Flex2 Alpha (git-fixes).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- libbpf: Fix removal of inner map in bpf_object__create_map (git-fixes).
- libbpf: Fix the possible memory leak on error (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- misc: sram: Only map reserved areas in Tegra SYSRAM (git-fixes).
- misc: sram: use devm_platform_ioremap_resource_wc() (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- mmc: sdhci: Fix issue with uninitialized dma_slave_config (git-fixes).
- net: ethernet: ti: cpsw: fix min eth packet size for non-switch use-cases (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix missing return value in mlx5_devlink_eswitch_inline_mode_set() (jsc#SLE-15172).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme-multipath: revalidate paths during rescan (bsc#1187211).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- optee: Fix memory leak when failing to register shm pages (git-fixes).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: of: Do not fail devm_pci_alloc_host_bridge() on missing 'ranges' (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- phy: tegra: xusb: Fix dangling pointer on probe failure (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/numa: Consider the max NUMA node for migratable LPAR (bsc#1190544 ltc#194520).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- RDMA/hns: Fix QP's resp incomplete assignment (jsc#SLE-14777).
- RDMA/mlx5: Delay emptying a cache entry when a new MR is added to it recently (jsc#SLE-15175).
- RDMA/mlx5: Delete not-available udata check (jsc#SLE-15175).
- RDMA/rtrs: Remove a useless kfree() (jsc#SLE-15176).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sch_cake: fix srchost/dsthost hashing mode (bsc#1176447).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- scsi/fc: kABI fixes for new ELS_EDC, ELS_RDP definition (bsc#1171688 bsc#1174003 bsc#1190576).
- selftests/bpf: Define string const as global for test_sysctl_prog.c (git-fixes).
- selftests/bpf: Fix bpf-iter-tcp4 test to print correctly the dest IP (git-fixes).
- selftests/bpf: Fix test_sysctl_loop{1, 2} failure due to clang change (git-fixes).
- selftests/bpf: Whitelist test_progs.h from .gitignore (git-fixes).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tools: bpf: Fix error in 'make -C tools/ bpf_install' (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1190561).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/asm: Fix SETZ size enqcmds() build failure (bsc#1178134).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185550">SUSE bug 1185550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189257">SUSE bug 1189257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190138">SUSE bug 1190138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190544">SUSE bug 1190544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190561">SUSE bug 1190561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651954" comment="cluster-md-kmp-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651955" comment="dlm-kmp-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651956" comment="gfs2-kmp-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651675" comment="kernel-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651676" comment="kernel-azure-devel-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651957" comment="kernel-azure-extra-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651958" comment="kernel-azure-livepatch-devel-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651959" comment="kernel-azure-optional-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651677" comment="kernel-devel-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651678" comment="kernel-source-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651679" comment="kernel-syms-azure-5.3.18-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651960" comment="kselftests-kmp-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651961" comment="ocfs2-kmp-azure-5.3.18-38.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651962" comment="reiserfs-kmp-azure-5.3.18-38.25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52461" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1134353" ref_url="https://bugzilla.suse.com/1134353" source="BUGZILLA"/>
		<reference ref_id="1171962" ref_url="https://bugzilla.suse.com/1171962" source="BUGZILLA"/>
		<reference ref_id="1184994" ref_url="https://bugzilla.suse.com/1184994" source="BUGZILLA"/>
		<reference ref_id="1188018" ref_url="https://bugzilla.suse.com/1188018" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188291" ref_url="https://bugzilla.suse.com/1188291" source="BUGZILLA"/>
		<reference ref_id="1188713" ref_url="https://bugzilla.suse.com/1188713" source="BUGZILLA"/>
		<reference ref_id="1189480" ref_url="https://bugzilla.suse.com/1189480" source="BUGZILLA"/>
		<reference ref_id="1190234" ref_url="https://bugzilla.suse.com/1190234" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCSKB4ZMNVGFIMLLPPNFDQMFKY7DLL4L/" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed use of strdupa() on a path (bsc#1188063).

- logind: terminate cleanly on SIGTERM/SIGINT (bsc#1188018).
- Adopting BFQ to control I/O (jsc#SLE-21032, bsc#1134353).
- Rules weren't applied to dm devices (multipath) (bsc#1188713).
- Ignore obsolete 'elevator' kernel parameter (bsc#1184994, bsc#1190234).
- Make sure the versions of both udev and systemd packages are always the same (bsc#1189480).
- Avoid error message when udev is updated due to udev being already active when the sockets are started again (bsc#1188291).
- Allow the systemd sysusers config files to be overriden during system installation (bsc#1171962).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134353">SUSE bug 1134353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171962">SUSE bug 1171962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184994">SUSE bug 1184994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188018">SUSE bug 1188018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188291">SUSE bug 1188291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188713">SUSE bug 1188713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189480">SUSE bug 1189480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190234">SUSE bug 1190234</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634050" comment="systemd-bash-completion-234-24.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52462" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186799" ref_url="https://bugzilla.suse.com/1186799" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30474" ref_url="https://www.suse.com/security/cve/CVE-2021-30474/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6VFR2SEGRR5ORYTWSFNBKWUUVDDXFEW/" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2021-30474: Fixed use-after-free in aom_dsp/grain_table.c (bsc#1186799).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1186799">SUSE bug 1186799</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30474/">CVE-2021-30474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633657" comment="aom-tools-1.0.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633658" comment="libaom-devel-1.0.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633659" comment="libaom-devel-doc-1.0.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633465" comment="libaom0-1.0.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633660" comment="libaom0-32bit-1.0.0-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52463" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634056" comment="libjavascriptcoregtk-4_0-18-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634411" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634057" comment="libwebkit2gtk-4_0-37-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634412" comment="libwebkit2gtk-4_0-37-32bit-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634058" comment="libwebkit2gtk3-lang-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634060" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634061" comment="typelib-1_0-WebKit2-4_0-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634062" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634413" comment="webkit-jsc-4-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634059" comment="webkit2gtk-4_0-injected-bundles-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634063" comment="webkit2gtk3-devel-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634414" comment="webkit2gtk3-minibrowser-2.32.4-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52464" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184783" ref_url="https://bugzilla.suse.com/1184783" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBFMOSZDI3WFGNU3EM54DUBD3HAM2LEV/" source="SUSE-SU"/>
		<description>
This update for libqt5-qtsvg fixes the following issues:

- CVE-2021-3481: Fixed an out of bounds read in function QRadialFetchSimd from crafted svg file. (bsc#1184783)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184783">SUSE bug 1184783</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634554" comment="libQt5Svg5-5.12.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634829" comment="libQt5Svg5-32bit-5.12.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634555" comment="libqt5-qtsvg-devel-5.12.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634830" comment="libqt5-qtsvg-devel-32bit-5.12.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634831" comment="libqt5-qtsvg-examples-5.12.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634568" comment="libqt5-qtsvg-private-headers-devel-5.12.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52465" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185550" ref_url="https://bugzilla.suse.com/1185550" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189257" ref_url="https://bugzilla.suse.com/1189257" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190138" ref_url="https://bugzilla.suse.com/1190138" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190544" ref_url="https://bugzilla.suse.com/1190544" source="BUGZILLA"/>
		<reference ref_id="1190561" ref_url="https://bugzilla.suse.com/1190561" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)
- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: Intel: Fix platform ID matching (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: rt5682: Implement remove callback (git-fixes).
- ASoC: rt5682: Properly turn off regulators if wrong device ID (git-fixes).
- ASoC: rt5682: Remove unused variable in rt5682_i2c_remove() (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- backlight: pwm_bl: Improve bootloader/kernel device handover (git-fixes).
- bareudp: Fix invalid read beyond skb's linear data (jsc#SLE-15172).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Fix asic.rev in devlink dev info command (jsc#SLE-16649).
- bnxt_en: fix stored FW_PSID version masks (jsc#SLE-16649).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- bpf, samples: Add missing mprog-disable to xdp_redirect_cpu's optstring (git-fixes).
- bpf: Fix ringbuf helper function compatibility (git-fixes).
- bpftool: Add sock_release help info for cgroup attach/prog load command (bsc#1177028).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cpuidle: pseries: Do not cap the CEDE0 latency in fixup_cede0_latency() (bsc#1185550 ltc#192610 git-fixes jsc#SLE-18128).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- devlink: Clear whole devlink_flash_notify struct (bsc#1176447).
- dma-buf: DMABUF_MOVE_NOTIFY should depend on DMA_SHARED_BUFFER (git-fixes).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/ast: Fix missing conversions to managed API (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/i915: Allow the sysadmin to override security mitigations (git-fixes).
- drm/i915/rkl: Remove require_force_probe protection (bsc#1189257).
- drm/ingenic: Switch IPU plane to type OVERLAY (git-fixes).
- drm/mgag200: Select clock in PLL update functions (git-fixes).
- drm/msm/mdp4: move HW revision detection to earlier phase (git-fixes).
- drm/msm/mdp4: refactor HW revision detection into read_mdp_hw_revision (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- drm/pl111: depend on CONFIG_VEXPRESS_CONFIG (git-fixes).
- drm/rockchip: cdn-dp-core: Make cdn_dp_core_resume __maybe_unused (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/mce_amd: Do not load edac_mce_amd module on guests (bsc#1190138).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- enetc: Fix uninitialized struct dim_sample field usage (git-fixes).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- i40e: improve locking of mac_filter_hash (jsc#SLE-13701).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- IB/hfi1: Indicate DMA wait when txq is queued for wakeup (jsc#SLE-13208).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: do not abort devlink info if board identifier can't be found (jsc#SLE-12878).
- ice: do not remove netdev-&gt;dev_addr from uc sync list (git-fixes).
- ice: Prevent probing virtual functions (git-fixes).
- igc: Use num_tx_queues when iterating over tx_ring queue (jsc#SLE-13533).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ionic: drop useless check of PCI driver data validity (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi Add support for ax201 in Samsung Galaxy Book Flex2 Alpha (git-fixes).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- libbpf: Fix removal of inner map in bpf_object__create_map (git-fixes).
- libbpf: Fix the possible memory leak on error (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- misc: sram: Only map reserved areas in Tegra SYSRAM (git-fixes).
- misc: sram: use devm_platform_ioremap_resource_wc() (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- mmc: sdhci: Fix issue with uninitialized dma_slave_config (git-fixes).
- net: ethernet: ti: cpsw: fix min eth packet size for non-switch use-cases (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix missing return value in mlx5_devlink_eswitch_inline_mode_set() (jsc#SLE-15172).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme-multipath: revalidate paths during rescan (bsc#1187211).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- optee: Fix memory leak when failing to register shm pages (git-fixes).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: of: Do not fail devm_pci_alloc_host_bridge() on missing 'ranges' (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- phy: tegra: xusb: Fix dangling pointer on probe failure (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/numa: Consider the max NUMA node for migratable LPAR (bsc#1190544 ltc#194520).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- RDMA/hns: Fix QP's resp incomplete assignment (jsc#SLE-14777).
- RDMA/mlx5: Delay emptying a cache entry when a new MR is added to it recently (jsc#SLE-15175).
- RDMA/mlx5: Delete not-available udata check (jsc#SLE-15175).
- RDMA/rtrs: Remove a useless kfree() (jsc#SLE-15176).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sch_cake: fix srchost/dsthost hashing mode (bsc#1176447).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- scsi/fc: kABI fixes for new ELS_EDC, ELS_RDP definition (bsc#1171688 bsc#1174003 bsc#1190576).
- selftests/bpf: Define string const as global for test_sysctl_prog.c (git-fixes).
- selftests/bpf: Fix bpf-iter-tcp4 test to print correctly the dest IP (git-fixes).
- selftests/bpf: Fix test_sysctl_loop{1, 2} failure due to clang change (git-fixes).
- selftests/bpf: Whitelist test_progs.h from .gitignore (git-fixes).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tools: bpf: Fix error in 'make -C tools/ bpf_install' (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1190561).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/asm: Fix SETZ size enqcmds() build failure (bsc#1178134).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185550">SUSE bug 1185550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189257">SUSE bug 1189257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190138">SUSE bug 1190138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190544">SUSE bug 1190544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190561">SUSE bug 1190561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651963" comment="cluster-md-kmp-64kb-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651715" comment="cluster-md-kmp-default-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651964" comment="cluster-md-kmp-preempt-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651965" comment="dlm-kmp-64kb-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651716" comment="dlm-kmp-default-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651966" comment="dlm-kmp-preempt-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651967" comment="dtb-al-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651968" comment="dtb-allwinner-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651969" comment="dtb-altera-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651970" comment="dtb-amd-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651971" comment="dtb-amlogic-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651972" comment="dtb-apm-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651973" comment="dtb-arm-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651974" comment="dtb-broadcom-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651975" comment="dtb-cavium-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651976" comment="dtb-exynos-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651977" comment="dtb-freescale-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651978" comment="dtb-hisilicon-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651979" comment="dtb-lg-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651980" comment="dtb-marvell-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651981" comment="dtb-mediatek-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651982" comment="dtb-nvidia-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651983" comment="dtb-qcom-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651984" comment="dtb-renesas-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651985" comment="dtb-rockchip-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651986" comment="dtb-socionext-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651987" comment="dtb-sprd-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651988" comment="dtb-xilinx-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651989" comment="dtb-zte-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651990" comment="gfs2-kmp-64kb-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651717" comment="gfs2-kmp-default-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651991" comment="gfs2-kmp-preempt-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651628" comment="kernel-64kb-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651629" comment="kernel-64kb-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651992" comment="kernel-64kb-extra-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651993" comment="kernel-64kb-livepatch-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651994" comment="kernel-64kb-optional-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651995" comment="kernel-debug-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651996" comment="kernel-debug-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651997" comment="kernel-debug-livepatch-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651630" comment="kernel-default-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651631" comment="kernel-default-base-5.3.18-59.27.1.18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651998" comment="kernel-default-base-rebuild-5.3.18-59.27.1.18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651632" comment="kernel-default-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651999" comment="kernel-default-extra-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652000" comment="kernel-default-livepatch-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652001" comment="kernel-default-livepatch-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652002" comment="kernel-default-optional-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651633" comment="kernel-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651660" comment="kernel-docs-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652003" comment="kernel-docs-html-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652004" comment="kernel-kvmsmall-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652005" comment="kernel-kvmsmall-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652006" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651634" comment="kernel-macros-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651661" comment="kernel-obs-build-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652007" comment="kernel-obs-qa-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651635" comment="kernel-preempt-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651662" comment="kernel-preempt-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652008" comment="kernel-preempt-extra-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652009" comment="kernel-preempt-livepatch-devel-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652010" comment="kernel-preempt-optional-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651663" comment="kernel-source-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652011" comment="kernel-source-vanilla-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651664" comment="kernel-syms-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651636" comment="kernel-zfcpdump-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652012" comment="kselftests-kmp-64kb-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652013" comment="kselftests-kmp-default-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652014" comment="kselftests-kmp-preempt-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652015" comment="ocfs2-kmp-64kb-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651718" comment="ocfs2-kmp-default-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652016" comment="ocfs2-kmp-preempt-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652017" comment="reiserfs-kmp-64kb-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651665" comment="reiserfs-kmp-default-5.3.18-59.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652018" comment="reiserfs-kmp-preempt-5.3.18-59.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52466" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183659" ref_url="https://bugzilla.suse.com/1183659" source="BUGZILLA"/>
		<reference ref_id="1185299" ref_url="https://bugzilla.suse.com/1185299" source="BUGZILLA"/>
		<reference ref_id="1187670" ref_url="https://bugzilla.suse.com/1187670" source="BUGZILLA"/>
		<reference ref_id="1188548" ref_url="https://bugzilla.suse.com/1188548" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:3445-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAZ7Q6SIGPUY3S4AEODOSAFRBJHEPSOM/" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

Security issues fixed:

- PGP hardening changes (bsc#1185299)

Maintaince issues fixed:

- Fixed zstd detection (bsc#1187670)
- Added ndb rofs support (bsc#1188548)
- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183659">SUSE bug 1183659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185299">SUSE bug 1185299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187670">SUSE bug 1187670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188548">SUSE bug 1188548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651684" comment="python2-rpm-4.14.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651624" comment="python3-rpm-4.14.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651625" comment="rpm-4.14.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651626" comment="rpm-32bit-4.14.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651659" comment="rpm-build-4.14.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651627" comment="rpm-devel-4.14.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651674" comment="rpm-ndb-4.14.3-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651953" comment="rpm-ndb-32bit-4.14.3-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52467" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652107" comment="kmod-compat-25-6.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52468" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.2.0 ESR.

Release 91.2.0 ESR:

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332):

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Release 91.1.0 ESR:

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Release 91.0.1esr ESR:

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-16"/>
	<updated date="2021-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651642" comment="MozillaFirefox-91.2.0-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651643" comment="MozillaFirefox-branding-SLE-91-9.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651938" comment="MozillaFirefox-branding-upstream-91.2.0-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651644" comment="MozillaFirefox-devel-91.2.0-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651645" comment="MozillaFirefox-translations-common-91.2.0-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651646" comment="MozillaFirefox-translations-other-91.2.0-8.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52469" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189929" ref_url="https://bugzilla.suse.com/1189929" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LN5FUC4TZVB7GKLTDOBR7UQD6W4262A/" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2021-37750: Fixed KDC null pointer dereference via a FAST inner body that lacks a server field (bsc#1189929).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189929">SUSE bug 1189929</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632226" comment="krb5-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632227" comment="krb5-32bit-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632228" comment="krb5-client-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632229" comment="krb5-devel-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632240" comment="krb5-devel-32bit-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632232" comment="krb5-plugin-kdb-ldap-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632230" comment="krb5-plugin-preauth-otp-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632231" comment="krb5-plugin-preauth-pkinit-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632233" comment="krb5-server-1.16.3-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52470" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191367" ref_url="https://bugzilla.suse.com/1191367" source="BUGZILLA"/>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41990" ref_url="https://www.suse.com/security/cve/CVE-2021-41990/" source="CVE"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3467-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

A feature was added:

- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)

Security issues fixed:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191367">SUSE bug 1191367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41990/">CVE-2021-41990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652739" comment="strongswan-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652740" comment="strongswan-doc-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652741" comment="strongswan-hmac-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652742" comment="strongswan-ipsec-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652743" comment="strongswan-libs0-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652862" comment="strongswan-mysql-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652763" comment="strongswan-nm-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652863" comment="strongswan-sqlite-5.8.2-11.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52471" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191507" ref_url="https://bugzilla.suse.com/1191507" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3472-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXL4FA3WICXGFNYWHOG3GKOXZERBN6TL/" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

- Update to version 1.10.5:
- CVE-2021-41133: Fixed a bug that could lead to sandbox bypass via recent VFS-manipulating syscalls. (bsc#1191507)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191507">SUSE bug 1191507</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651649" comment="flatpak-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651650" comment="flatpak-devel-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651651" comment="flatpak-zsh-completion-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651652" comment="libflatpak0-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651653" comment="system-user-flatpak-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651654" comment="typelib-1_0-Flatpak-1_0-1.10.5-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52472" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLPFQQ775XYJFXYC4GI3EPDN5KR7OLG7/" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2021-37600: Fixed an integer overflow which could lead to a buffer overflow in get_sem_elements() in sys-utils/ipcutils.c. (bsc#1188921)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651400" comment="libblkid-devel-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651463" comment="libblkid-devel-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651401" comment="libblkid-devel-static-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651402" comment="libblkid1-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651403" comment="libblkid1-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651404" comment="libfdisk-devel-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651464" comment="libfdisk-devel-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651465" comment="libfdisk-devel-static-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651405" comment="libfdisk1-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651466" comment="libfdisk1-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651406" comment="libmount-devel-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651467" comment="libmount-devel-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651468" comment="libmount-devel-static-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651407" comment="libmount1-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651408" comment="libmount1-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651409" comment="libsmartcols-devel-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651469" comment="libsmartcols-devel-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651470" comment="libsmartcols-devel-static-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651410" comment="libsmartcols1-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651471" comment="libsmartcols1-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651411" comment="libuuid-devel-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651472" comment="libuuid-devel-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651412" comment="libuuid-devel-static-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651413" comment="libuuid1-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651414" comment="libuuid1-32bit-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651473" comment="python3-libmount-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651415" comment="util-linux-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651416" comment="util-linux-lang-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651417" comment="util-linux-systemd-2.36.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651420" comment="uuidd-2.36.2-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52473" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189798" ref_url="https://bugzilla.suse.com/1189798" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39139" ref_url="https://www.suse.com/security/cve/CVE-2021-39139/" source="CVE"/>
		<reference ref_id="CVE-2021-39140" ref_url="https://www.suse.com/security/cve/CVE-2021-39140/" source="CVE"/>
		<reference ref_id="CVE-2021-39141" ref_url="https://www.suse.com/security/cve/CVE-2021-39141/" source="CVE"/>
		<reference ref_id="CVE-2021-39144" ref_url="https://www.suse.com/security/cve/CVE-2021-39144/" source="CVE"/>
		<reference ref_id="CVE-2021-39145" ref_url="https://www.suse.com/security/cve/CVE-2021-39145/" source="CVE"/>
		<reference ref_id="CVE-2021-39146" ref_url="https://www.suse.com/security/cve/CVE-2021-39146/" source="CVE"/>
		<reference ref_id="CVE-2021-39147" ref_url="https://www.suse.com/security/cve/CVE-2021-39147/" source="CVE"/>
		<reference ref_id="CVE-2021-39148" ref_url="https://www.suse.com/security/cve/CVE-2021-39148/" source="CVE"/>
		<reference ref_id="CVE-2021-39149" ref_url="https://www.suse.com/security/cve/CVE-2021-39149/" source="CVE"/>
		<reference ref_id="CVE-2021-39150" ref_url="https://www.suse.com/security/cve/CVE-2021-39150/" source="CVE"/>
		<reference ref_id="CVE-2021-39151" ref_url="https://www.suse.com/security/cve/CVE-2021-39151/" source="CVE"/>
		<reference ref_id="CVE-2021-39152" ref_url="https://www.suse.com/security/cve/CVE-2021-39152/" source="CVE"/>
		<reference ref_id="CVE-2021-39153" ref_url="https://www.suse.com/security/cve/CVE-2021-39153/" source="CVE"/>
		<reference ref_id="CVE-2021-39154" ref_url="https://www.suse.com/security/cve/CVE-2021-39154/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:

- Upgrade to 1.4.18
- CVE-2021-39139: Fixed an issue that allowed an attacker to execute arbitrary code execution by manipulating the processed input stream with type information. (bsc#1189798)
- CVE-2021-39140: Fixed an issue that allowed an attacker to execute a DoS attack by manipulating the processed input stream. (bsc#1189798)
- CVE-2021-39141: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39144: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39145: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39146: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39147: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39148: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39149: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39150: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)
- CVE-2021-39151: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39152: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)
- CVE-2021-39153: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39154: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39139/">CVE-2021-39139</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39140/">CVE-2021-39140</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39141/">CVE-2021-39141</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39144/">CVE-2021-39144</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39145/">CVE-2021-39145</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39146/">CVE-2021-39146</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39147/">CVE-2021-39147</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39148/">CVE-2021-39148</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39149/">CVE-2021-39149</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39150/">CVE-2021-39150</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39151/">CVE-2021-39151</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39152/">CVE-2021-39152</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39153/">CVE-2021-39153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39154/">CVE-2021-39154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634572" comment="xstream-1.4.18-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634826" comment="xstream-benchmark-1.4.18-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634827" comment="xstream-javadoc-1.4.18-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634828" comment="xstream-parent-1.4.18-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52474" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189403" ref_url="https://bugzilla.suse.com/1189403" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28116" ref_url="https://www.suse.com/security/cve/CVE-2021-28116/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZT7QFDJXMSX6NXIB2FSSHOCTFVNNNMF/" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Update to version 4.17:

- CVE-2021-28116: Fixed a out-of-bounds read in the WCCP protocol (bsc#1189403).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189403">SUSE bug 1189403</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28116/">CVE-2021-28116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651418" comment="squid-4.17-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52475" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1191468" ref_url="https://bugzilla.suse.com/1191468" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIM34IG35JY2VQO7SG7B6CIKK6WJCG7Y/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to go1.16.9

- CVE-2021-38297: misc/wasm, cmd/link: do not let command line args overwrite global data (bsc#1191468)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191468">SUSE bug 1191468</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651656" comment="go1.16-1.16.9-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651657" comment="go1.16-doc-1.16.9-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651658" comment="go1.16-race-1.16.9-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52476" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1191468" ref_url="https://bugzilla.suse.com/1191468" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVHY4MCTZUSRMWV4B3OCMV5DMLSKQYES/" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to go1.17.2

- CVE-2021-38297: misc/wasm, cmd/link: do not let command line args overwrite global data (bsc#1191468)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191468">SUSE bug 1191468</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652189" comment="go1.17-1.17.2-1.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652190" comment="go1.17-doc-1.17.2-1.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652130" comment="go1.17-race-1.17.2-1.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52477" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6W7MZS6RUFRYSZTBDYHTA2EBBSY2QJ/" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651614" comment="libpython2_7-1_0-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651939" comment="libpython2_7-1_0-32bit-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651615" comment="python-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651940" comment="python-32bit-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651616" comment="python-base-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651941" comment="python-base-32bit-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651680" comment="python-curses-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651942" comment="python-demo-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651681" comment="python-devel-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651943" comment="python-doc-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651944" comment="python-doc-pdf-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651682" comment="python-gdbm-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651945" comment="python-idle-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651647" comment="python-tk-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651683" comment="python-xml-2.7.18-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52478" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IZOG455BIMQ6NKBIPOWITV4SHIG5YT7/" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652201" comment="libncurses5-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652202" comment="libncurses5-32bit-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652191" comment="libncurses6-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652192" comment="libncurses6-32bit-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652193" comment="ncurses-devel-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652200" comment="ncurses-devel-32bit-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652194" comment="ncurses-utils-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652203" comment="ncurses5-devel-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652303" comment="ncurses5-devel-32bit-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652195" comment="tack-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652196" comment="terminfo-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652197" comment="terminfo-base-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652198" comment="terminfo-iterm-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652199" comment="terminfo-screen-6.1-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52479" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190069" ref_url="https://bugzilla.suse.com/1190069" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3493-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSSYZRBZ642QLUIU2C7RUKT5PKPXQPKZ/" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-39272: Fix failure to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. (bsc#1190069)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651617" comment="fetchmail-6.3.26-20.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651648" comment="fetchmailconf-6.3.26-20.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52480" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker, runc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1102408" ref_url="https://bugzilla.suse.com/1102408" source="BUGZILLA"/>
		<reference ref_id="1185405" ref_url="https://bugzilla.suse.com/1185405" source="BUGZILLA"/>
		<reference ref_id="1187704" ref_url="https://bugzilla.suse.com/1187704" source="BUGZILLA"/>
		<reference ref_id="1188282" ref_url="https://bugzilla.suse.com/1188282" source="BUGZILLA"/>
		<reference ref_id="1190826" ref_url="https://bugzilla.suse.com/1190826" source="BUGZILLA"/>
		<reference ref_id="1191015" ref_url="https://bugzilla.suse.com/1191015" source="BUGZILLA"/>
		<reference ref_id="1191121" ref_url="https://bugzilla.suse.com/1191121" source="BUGZILLA"/>
		<reference ref_id="1191334" ref_url="https://bugzilla.suse.com/1191334" source="BUGZILLA"/>
		<reference ref_id="1191355" ref_url="https://bugzilla.suse.com/1191355" source="BUGZILLA"/>
		<reference ref_id="1191434" ref_url="https://bugzilla.suse.com/1191434" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<reference ref_id="CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089/" source="CVE"/>
		<reference ref_id="CVE-2021-41091" ref_url="https://www.suse.com/security/cve/CVE-2021-41091/" source="CVE"/>
		<reference ref_id="CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092/" source="CVE"/>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<description>
This update for containerd, docker, runc fixes the following issues:

Docker was updated to 20.10.9-ce. (bsc#1191355)

See upstream changelog in the packaged
  /usr/share/doc/packages/docker/CHANGELOG.md. 

  CVE-2021-41092 CVE-2021-41089 CVE-2021-41091 CVE-2021-41103

container was updated to v1.4.11, to fix CVE-2021-41103. bsc#1191355

- CVE-2021-32760: Fixed that a archive package allows chmod of file outside of unpack target directory (bsc#1188282)

- Install systemd service file as well (bsc#1190826)

Update to runc v1.0.2. Upstream changelog is available from

  https://github.com/opencontainers/runc/releases/tag/v1.0.2

* Fixed a failure to set CPU quota period in some cases on cgroup v1.
* Fixed the inability to start a container with the 'adding seccomp filter
  rule for syscall ...' error, caused by redundant seccomp rules (i.e. those
  that has action equal to the default one). Such redundant rules are now
  skipped.
* Made release builds reproducible from now on.
* Fixed a rare debug log race in runc init, which can result in occasional
  harmful 'failed to decode ...' errors from runc run or exec.
* Fixed the check in cgroup v1 systemd manager if a container needs to be
  frozen before Set, and add a setting to skip such freeze unconditionally.
  The previous fix for that issue, done in runc 1.0.1, was not working.

Update to runc v1.0.1. Upstream changelog is available from

https://github.com/opencontainers/runc/releases/tag/v1.0.1

* Fixed occasional runc exec/run failure ('interrupted system call') on an
  Azure volume.
* Fixed 'unable to find groups ... token too long' error with /etc/group
  containing lines longer than 64K characters.
* cgroup/systemd/v1: fix leaving cgroup frozen after Set if a parent cgroup is
  frozen. This is a regression in 1.0.0, not affecting runc itself but some
  of libcontainer users (e.g Kubernetes).
* cgroupv2: bpf: Ignore inaccessible existing programs in case of
  permission error when handling replacement of existing bpf cgroup
  programs. This fixes a regression in 1.0.0, where some SELinux
  policies would block runc from being able to run entirely.
* cgroup/systemd/v2: don't freeze cgroup on Set.
* cgroup/systemd/v1: avoid unnecessary freeze on Set.
- fix issues with runc under openSUSE MicroOS's SELinux policy. bsc#1187704

Update to runc v1.0.0. Upstream changelog is available from

https://github.com/opencontainers/runc/releases/tag/v1.0.0

! The usage of relative paths for mountpoints will now produce a warning
  (such configurations are outside of the spec, and in future runc will
  produce an error when given such configurations).
* cgroupv2: devices: rework the filter generation to produce consistent
  results with cgroupv1, and always clobber any existing eBPF
  program(s) to fix runc update and avoid leaking eBPF programs
  (resulting in errors when managing containers).
* cgroupv2: correctly convert 'number of IOs' statistics in a
  cgroupv1-compatible way.
* cgroupv2: support larger than 32-bit IO statistics on 32-bit architectures.
* cgroupv2: wait for freeze to finish before returning from the freezing
  code, optimize the method for checking whether a cgroup is frozen.
* cgroups/systemd: fixed 'retry on dbus disconnect' logic introduced in rc94
* cgroups/systemd: fixed returning 'unit already exists' error from a systemd
  cgroup manager (regression in rc94)
+ cgroupv2: support SkipDevices with systemd driver
+ cgroup/systemd: return, not ignore, stop unit error from Destroy
+ Make 'runc --version' output sane even when built with go get or
  otherwise outside of our build scripts.
+ cgroups: set SkipDevices during runc update (so we don't modify
  cgroups at all during runc update).
+ cgroup1: blkio: support BFQ weights.
+ cgroupv2: set per-device io weights if BFQ IO scheduler is available.

Update to runc v1.0.0~rc95. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95

This release of runc contains a fix for CVE-2021-30465, and users are
strongly recommended to update (especially if you are providing
semi-limited access to spawn containers to untrusted users). (bsc#1185405)

Update to runc v1.0.0~rc94. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc94

Breaking Changes:
* cgroupv1: kernel memory limits are now always ignored, as kmemcg has
  been effectively deprecated by the kernel. Users should make use of regular
  memory cgroup controls.

Regression Fixes:

* seccomp: fix 32-bit compilation errors
* runc init: fix a hang caused by deadlock in seccomp/ebpf loading code
* runc start: fix 'chdir to cwd: permission denied' for some setups
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-25"/>
	<updated date="2021-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102408">SUSE bug 1102408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185405">SUSE bug 1185405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187704">SUSE bug 1187704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188282">SUSE bug 1188282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190826">SUSE bug 1190826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191015">SUSE bug 1191015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191121">SUSE bug 1191121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191334">SUSE bug 1191334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191434">SUSE bug 1191434</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41091/">CVE-2021-41091</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651637" comment="containerd-1.4.11-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651946" comment="containerd-ctr-1.4.11-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651638" comment="docker-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651639" comment="docker-bash-completion-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651641" comment="docker-fish-completion-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651947" comment="docker-kubic-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651948" comment="docker-kubic-bash-completion-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651949" comment="docker-kubic-fish-completion-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651950" comment="docker-kubic-kubeadm-criconfig-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651951" comment="docker-kubic-zsh-completion-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651952" comment="docker-zsh-completion-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651640" comment="runc-1.0.2-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52481" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186756" ref_url="https://bugzilla.suse.com/1186756" source="BUGZILLA"/>
		<reference ref_id="1187852" ref_url="https://bugzilla.suse.com/1187852" source="BUGZILLA"/>
		<reference ref_id="1189166" ref_url="https://bugzilla.suse.com/1189166" source="BUGZILLA"/>
		<reference ref_id="1190718" ref_url="https://bugzilla.suse.com/1190718" source="BUGZILLA"/>
		<reference ref_id="1190719" ref_url="https://bugzilla.suse.com/1190719" source="BUGZILLA"/>
		<reference ref_id="1190722" ref_url="https://bugzilla.suse.com/1190722" source="BUGZILLA"/>
		<reference ref_id="1190723" ref_url="https://bugzilla.suse.com/1190723" source="BUGZILLA"/>
		<reference ref_id="1190726" ref_url="https://bugzilla.suse.com/1190726" source="BUGZILLA"/>
		<reference ref_id="1190729" ref_url="https://bugzilla.suse.com/1190729" source="BUGZILLA"/>
		<reference ref_id="1190733" ref_url="https://bugzilla.suse.com/1190733" source="BUGZILLA"/>
		<reference ref_id="1190734" ref_url="https://bugzilla.suse.com/1190734" source="BUGZILLA"/>
		<reference ref_id="1190735" ref_url="https://bugzilla.suse.com/1190735" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-20891" ref_url="https://www.suse.com/security/cve/CVE-2020-20891/" source="CVE"/>
		<reference ref_id="CVE-2020-20892" ref_url="https://www.suse.com/security/cve/CVE-2020-20892/" source="CVE"/>
		<reference ref_id="CVE-2020-20895" ref_url="https://www.suse.com/security/cve/CVE-2020-20895/" source="CVE"/>
		<reference ref_id="CVE-2020-20896" ref_url="https://www.suse.com/security/cve/CVE-2020-20896/" source="CVE"/>
		<reference ref_id="CVE-2020-20899" ref_url="https://www.suse.com/security/cve/CVE-2020-20899/" source="CVE"/>
		<reference ref_id="CVE-2020-20902" ref_url="https://www.suse.com/security/cve/CVE-2020-20902/" source="CVE"/>
		<reference ref_id="CVE-2020-22037" ref_url="https://www.suse.com/security/cve/CVE-2020-22037/" source="CVE"/>
		<reference ref_id="CVE-2020-35965" ref_url="https://www.suse.com/security/cve/CVE-2020-35965/" source="CVE"/>
		<reference ref_id="CVE-2021-3566" ref_url="https://www.suse.com/security/cve/CVE-2021-3566/" source="CVE"/>
		<reference ref_id="CVE-2021-38092" ref_url="https://www.suse.com/security/cve/CVE-2021-38092/" source="CVE"/>
		<reference ref_id="CVE-2021-38093" ref_url="https://www.suse.com/security/cve/CVE-2021-38093/" source="CVE"/>
		<reference ref_id="CVE-2021-38094" ref_url="https://www.suse.com/security/cve/CVE-2021-38094/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3521-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HVCB2YATP2LRWUBIGFYZQUFV52VSFT2B/" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-3566: Fixed information leak (bsc#1189166).
- CVE-2021-38093: Fixed integer overflow vulnerability in filter_robert() (bsc#1190734)
- CVE-2021-38092: Fixed integer overflow vulnerability in filter_prewitt() (bsc#1190733)
- CVE-2021-38094: Fixed integer overflow vulnerability in filter_sobel() (bsc#1190735)
- CVE-2020-22037: Fixed denial of service vulnerability caused by memory leak in avcodec_alloc_context3() (bsc#1186756)
- CVE-2020-35965: Fixed out-of-bounds write in decode_frame() (bsc#1187852)
- CVE-2020-20892: Fixed an issue with filter_frame() (bsc#1190719)
- CVE-2020-20891: Fixed a buffer overflow vulnerability in config_input() (bsc#1190718)
- CVE-2020-20895: Fixed a buffer overflow vulnerability in function filter_vertically_##name (bsc#1190722)
- CVE-2020-20896: Fixed an issue with latm_write_packet() (bsc#1190723)
- CVE-2020-20899: Fixed a buffer overflow vulnerability in config_props() (bsc#1190726)
- CVE-2020-20902: Fixed an out-of-bounds read vulnerabilit long_term_filter() (bsc#1190729)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186756">SUSE bug 1186756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187852">SUSE bug 1187852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189166">SUSE bug 1189166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190718">SUSE bug 1190718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190719">SUSE bug 1190719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190722">SUSE bug 1190722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190723">SUSE bug 1190723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190726">SUSE bug 1190726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190729">SUSE bug 1190729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190733">SUSE bug 1190733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190734">SUSE bug 1190734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190735">SUSE bug 1190735</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20891/">CVE-2020-20891</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20892/">CVE-2020-20892</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20895/">CVE-2020-20895</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20896/">CVE-2020-20896</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20899/">CVE-2020-20899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20902/">CVE-2020-20902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22037/">CVE-2020-22037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35965/">CVE-2020-35965</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3566/">CVE-2021-3566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38092/">CVE-2021-38092</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38093/">CVE-2021-38093</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38094/">CVE-2021-38094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652760" comment="ffmpeg-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652849" comment="ffmpeg-private-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652850" comment="libavcodec-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652744" comment="libavcodec57-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652851" comment="libavcodec57-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652852" comment="libavdevice-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652761" comment="libavdevice57-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652853" comment="libavdevice57-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652854" comment="libavfilter-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652762" comment="libavfilter6-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652855" comment="libavfilter6-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652856" comment="libavformat-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652745" comment="libavformat57-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652857" comment="libavformat57-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652757" comment="libavresample-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652758" comment="libavresample3-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652748" comment="libavresample3-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652749" comment="libavutil-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652750" comment="libavutil55-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652858" comment="libavutil55-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652751" comment="libpostproc-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652752" comment="libpostproc54-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652859" comment="libpostproc54-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652753" comment="libswresample-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652754" comment="libswresample2-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652860" comment="libswresample2-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652755" comment="libswscale-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652756" comment="libswscale4-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652861" comment="libswscale4-32bit-3.4.2-11.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52482" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190702" ref_url="https://bugzilla.suse.com/1190702" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-36160" ref_url="https://www.suse.com/security/cve/CVE-2021-36160/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190702">SUSE bug 1190702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36160/">CVE-2021-36160</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652736" comment="apache2-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652765" comment="apache2-devel-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652766" comment="apache2-doc-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652764" comment="apache2-event-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652848" comment="apache2-example-pages-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652737" comment="apache2-prefork-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652738" comment="apache2-utils-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652767" comment="apache2-worker-2.4.43-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52483" version="1" class="patch">
	<metadata>
		<title>Security update for wireguard-tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191224" ref_url="https://bugzilla.suse.com/1191224" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:3527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTPTQFTATYBE3SKCYJKI5IPIYV55PFQW/" source="SUSE-SU"/>
		<description>
This update for wireguard-tools fixes the following issues:

- Removed world-readable permissions from /etc/wireguard (bsc#1191224)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191224">SUSE bug 1191224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652624" comment="wireguard-tools-1.0.20200827-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52484" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652864" comment="libpcre1-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652865" comment="libpcre1-32bit-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652866" comment="libpcre16-0-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652913" comment="libpcre16-0-32bit-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652867" comment="libpcrecpp0-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652868" comment="libpcrecpp0-32bit-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652869" comment="libpcreposix0-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652914" comment="libpcreposix0-32bit-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652870" comment="pcre-devel-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652915" comment="pcre-devel-static-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652916" comment="pcre-doc-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652871" comment="pcre-tools-8.45-20.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52485" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1173646" ref_url="https://bugzilla.suse.com/1173646" source="BUGZILLA"/>
		<reference ref_id="1180914" ref_url="https://bugzilla.suse.com/1180914" source="BUGZILLA"/>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14312" ref_url="https://www.suse.com/security/cve/CVE-2020-14312/" source="CVE"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DP73HQCB6UNPUB54KPOZEMBUQDVN6M6/" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Update to version 2.86

- CVE-2021-3448: fixed outgoing port used when --server is used with an interface name. (bsc#1183709)
- CVE-2020-14312: Set --local-service by default (bsc#1173646).
- Open inotify socket only when used (bsc#1180914).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173646">SUSE bug 1173646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180914">SUSE bug 1180914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14312/">CVE-2020-14312</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653308" comment="dnsmasq-2.86-7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653374" comment="dnsmasq-utils-2.86-7.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52486" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652734" comment="busybox-1.26.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652735" comment="busybox-static-1.26.2-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52487" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7B4SF25YMDBZ6THNOFMFVVX33VAXGND/" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

-  CVE-2021-21996: Exclude the full path of a download URL to prevent injection of malicious code. (bsc#1190265)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651618" comment="python3-salt-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651619" comment="salt-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651706" comment="salt-api-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651620" comment="salt-bash-completion-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651707" comment="salt-cloud-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651621" comment="salt-doc-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651708" comment="salt-fish-completion-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651709" comment="salt-master-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651622" comment="salt-minion-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651710" comment="salt-proxy-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651711" comment="salt-ssh-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651712" comment="salt-standalone-formulas-configuration-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651713" comment="salt-syndic-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651714" comment="salt-transactional-update-3002.2-50.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651623" comment="salt-zsh-completion-3002.2-50.1.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52488" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653583" comment="transfig-3.2.8b-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52489" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAIZQAAKIJLME5Z3MKND2JGJ5CQPRYZD/" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653649" comment="libjavascriptcoregtk-4_0-18-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653708" comment="libjavascriptcoregtk-4_0-18-32bit-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653650" comment="libwebkit2gtk-4_0-37-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653709" comment="libwebkit2gtk-4_0-37-32bit-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653651" comment="libwebkit2gtk3-lang-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653653" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653654" comment="typelib-1_0-WebKit2-4_0-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653655" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653710" comment="webkit-jsc-4-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653652" comment="webkit2gtk-4_0-injected-bundles-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653656" comment="webkit2gtk3-devel-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653711" comment="webkit2gtk3-minibrowser-2.32.4-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52490" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189234" ref_url="https://bugzilla.suse.com/1189234" source="BUGZILLA"/>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="1190425" ref_url="https://bugzilla.suse.com/1190425" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VSD5Q5DPWCTYJNLRUS2DHTA3G6VDKLMV/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3713: Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702)
- CVE-2021-3748: Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938)

Non-security issues fixed:

- Add transfer length item in block limits page of scsi vpd (bsc#1190425)
- Fix qemu crash while deleting xen-block (bsc#1189234)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189234">SUSE bug 1189234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190425">SUSE bug 1190425</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653096" comment="qemu-s390-4.2.1-11.31.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52491" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189234" ref_url="https://bugzilla.suse.com/1189234" source="BUGZILLA"/>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="1190425" ref_url="https://bugzilla.suse.com/1190425" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POCCYWA7A3O442ZTZU3JW7O7VFGCLOEA/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3713: Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702)
- CVE-2021-3748: Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938)

Non-security issues fixed:

- Add transfer length item in block limits page of scsi vpd (bsc#1190425)
- Fix qemu crash while deleting xen-block (bsc#1189234)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189234">SUSE bug 1189234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190425">SUSE bug 1190425</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652954" comment="qemu-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653068" comment="qemu-arm-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653069" comment="qemu-audio-alsa-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653070" comment="qemu-audio-pa-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653071" comment="qemu-audio-spice-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652959" comment="qemu-block-curl-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653072" comment="qemu-block-dmg-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653073" comment="qemu-block-gluster-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652960" comment="qemu-block-iscsi-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653074" comment="qemu-block-nfs-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652961" comment="qemu-block-rbd-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652962" comment="qemu-block-ssh-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652963" comment="qemu-chardev-baum-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653075" comment="qemu-chardev-spice-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653076" comment="qemu-extra-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652965" comment="qemu-guest-agent-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653077" comment="qemu-hw-display-qxl-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653078" comment="qemu-hw-display-virtio-gpu-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653079" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653080" comment="qemu-hw-display-virtio-vga-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653081" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653082" comment="qemu-hw-usb-redirect-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653083" comment="qemu-hw-usb-smartcard-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652972" comment="qemu-ipxe-1.0.0+-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653084" comment="qemu-ivshmem-tools-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652973" comment="qemu-ksm-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652974" comment="qemu-kvm-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652975" comment="qemu-lang-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653085" comment="qemu-linux-user-5.2.0-106.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653086" comment="qemu-microvm-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653087" comment="qemu-ppc-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653088" comment="qemu-s390x-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652978" comment="qemu-seabios-1.14.0_0_g155821a-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652979" comment="qemu-sgabios-8-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652980" comment="qemu-skiboot-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653089" comment="qemu-testsuite-5.2.0-106.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652931" comment="qemu-tools-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652981" comment="qemu-ui-curses-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653090" comment="qemu-ui-gtk-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653091" comment="qemu-ui-opengl-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653092" comment="qemu-ui-spice-app-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653093" comment="qemu-ui-spice-core-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652986" comment="qemu-vgabios-1.14.0_0_g155821a-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653094" comment="qemu-vhost-user-gpu-5.2.0-106.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653095" comment="qemu-x86-5.2.0-106.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52492" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

Update to OpenJDK 8u312 build 07 with OpenJ9 0.29.0 virtual machine including
Oracle July 2021 and October 2021 CPU changes

- CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder on Windows (bsc#1185056).
- CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
- CVE-2021-2341: Fixed flaw inside the FtpClient (bsc#1188564).
- CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files (bsc#1188565).
- CVE-2021-2388: Fixed flaw inside the Hotspot component performed range check elimination (bsc#1188566).
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653986" comment="java-1_8_0-openj9-1.8.0.312-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653987" comment="java-1_8_0-openj9-accessibility-1.8.0.312-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653988" comment="java-1_8_0-openj9-demo-1.8.0.312-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653989" comment="java-1_8_0-openj9-devel-1.8.0.312-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653990" comment="java-1_8_0-openj9-headless-1.8.0.312-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653991" comment="java-1_8_0-openj9-javadoc-1.8.0.312-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653992" comment="java-1_8_0-openj9-src-1.8.0.312-3.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52493" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.

* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

New features in the Assembler:

- General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

- X86/x86_64:

   * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
     Locker instructions. 
   * Support non-absolute segment values for lcall and ljmp.
   * Add {disp16} pseudo prefix to x86 assembler.
   * Configure with --enable-x86-used-note by default for Linux/x86.

-  ARM/AArch64:

   * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
     Cortex-R82, Neoverse V1, and Neoverse N2 cores.
   * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
     Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
     Stack Recorder Extension) and BRBE (Branch Record Buffer
     Extension) system registers.
   * Add support for Armv8-R and Armv8.7-A ISA extensions.
   * Add support for DSB memory nXS barrier, WFET and WFIT
     instruction for Armv8.7.
   * Add support for +csre feature for -march. Add CSR PDEC
     instruction for CSRE feature in AArch64.
   * Add support for +flagm feature for -march in Armv8.4 AArch64.
   * Add support for +ls64 feature for -march in Armv8.7
     AArch64. Add atomic 64-byte load/store instructions for this
     feature. 
   * Add support for +pauth (Pointer Authentication) feature for
     -march in AArch64.

New features in the Linker:

  * Add --error-handling-script=&lt;NAME&gt; command line option to allow
    a helper script to be invoked when an undefined symbol or a
    missing library is encountered.  This option can be suppressed
    via the configure time switch: --enable-error-handling-script=no.
  * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
    x86-64-{baseline|v[234]} ISA level as needed.
  * Add -z unique-symbol to avoid duplicated local symbol names.
  * The creation of PE format DLLs now defaults to using a more
    secure set of DLL characteristics.
  * The linker now deduplicates the types in .ctf sections.  The new 
     command-line option --ctf-share-types describes how to do this:
     its default value, share-unconflicted, produces the most compact
     output.
  * The linker now omits the 'variable section' from .ctf sections
    by default, saving space.  This is almost certainly what you
    want unless you are working on a project that has its own
    analogue of symbol tables that are not reflected in the ELF
    symtabs.

New features in other binary tools:

  * The ar tool's previously unused l modifier is now used for
    specifying dependencies of a static library. The arguments of
    this option (or --record-libdeps long form option) will be
    stored verbatim in the __.LIBDEP member of the archive, which
    the linker may read at link time.
  * Readelf can now display the contents of LTO symbol table
    sections when asked to do so via the --lto-syms command line
    option.
  * Readelf now accepts the -C command line option to enable the
    demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
    --no-demangle, --recurse-limit and --no-recurse-limit options
    are also now availale.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653451" comment="binutils-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653452" comment="binutils-devel-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653455" comment="binutils-devel-32bit-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653458" comment="binutils-gold-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653456" comment="bpftrace-0.11.4-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653457" comment="bpftrace-tools-0.11.4-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653562" comment="cross-aarch64-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653563" comment="cross-arm-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653564" comment="cross-avr-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653565" comment="cross-epiphany-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653566" comment="cross-hppa-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653567" comment="cross-hppa64-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653568" comment="cross-i386-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653569" comment="cross-ia64-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653570" comment="cross-m68k-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653571" comment="cross-mips-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653572" comment="cross-ppc-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653573" comment="cross-ppc64-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653574" comment="cross-ppc64le-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653575" comment="cross-riscv64-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653576" comment="cross-rx-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653577" comment="cross-s390-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653578" comment="cross-s390x-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653579" comment="cross-sparc-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653580" comment="cross-sparc64-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653581" comment="cross-spu-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653582" comment="cross-x86_64-binutils-2.37-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653453" comment="libctf-nobfd0-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653454" comment="libctf0-2.37-7.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52494" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1177902" ref_url="https://bugzilla.suse.com/1177902" source="BUGZILLA"/>
		<reference ref_id="1183247" ref_url="https://bugzilla.suse.com/1183247" source="BUGZILLA"/>
		<reference ref_id="1186398" ref_url="https://bugzilla.suse.com/1186398" source="BUGZILLA"/>
		<reference ref_id="1190420" ref_url="https://bugzilla.suse.com/1190420" source="BUGZILLA"/>
		<reference ref_id="1190493" ref_url="https://bugzilla.suse.com/1190493" source="BUGZILLA"/>
		<reference ref_id="1190693" ref_url="https://bugzilla.suse.com/1190693" source="BUGZILLA"/>
		<reference ref_id="1190695" ref_url="https://bugzilla.suse.com/1190695" source="BUGZILLA"/>
		<reference ref_id="1190917" ref_url="https://bugzilla.suse.com/1190917" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:3619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YROR7Q2F5L7HCPWJPZFCNFGJZQAUVXAZ/" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- lxc: controller: Fix container launch on cgroup v1. (bsc#1183247)
- supportconfig: Use systemctl command 'is-active' instead of 'is-enabled' when checking if libvirtd is active.
- qemu: Do not report error in the logs when processing monitor IO. (bsc#1190917)
- spec: Fix an issue when package update hangs (bsc#1177902, bsc#1190693)
- spec: Don't add '--timeout' argument to '/etc/sysconfig/libvirtd' when running in traditional mode without socket activation. (bsc#1190695)
- libxl: Improve reporting of 'die_id' in capabilities. (bsc#1190493)
- libxl: Fix driver reload. (bsc#1190420)
- qemu: Set label on virtual host network device when hotplugging. (bsc#1186398)
- supportconfig: When checking for installed hypervisor drivers,
  use the libvirtr-daemon-driver-&lt;hypervisor&gt; package instead of
  libvirt-daemon-&lt;hypervisor&gt;. The latter are not required packages
  for a functioning hypervisor driver.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-05"/>
	<updated date="2021-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177902">SUSE bug 1177902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183247">SUSE bug 1183247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186398">SUSE bug 1186398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190420">SUSE bug 1190420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190493">SUSE bug 1190493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190693">SUSE bug 1190693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190695">SUSE bug 1190695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190917">SUSE bug 1190917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653586" comment="libvirt-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653587" comment="libvirt-admin-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653588" comment="libvirt-bash-completion-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653589" comment="libvirt-client-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653590" comment="libvirt-daemon-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653591" comment="libvirt-daemon-config-network-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653592" comment="libvirt-daemon-config-nwfilter-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653593" comment="libvirt-daemon-driver-interface-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653594" comment="libvirt-daemon-driver-libxl-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653595" comment="libvirt-daemon-driver-lxc-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653596" comment="libvirt-daemon-driver-network-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653597" comment="libvirt-daemon-driver-nodedev-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653598" comment="libvirt-daemon-driver-nwfilter-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653599" comment="libvirt-daemon-driver-qemu-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653600" comment="libvirt-daemon-driver-secret-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653601" comment="libvirt-daemon-driver-storage-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653602" comment="libvirt-daemon-driver-storage-core-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653603" comment="libvirt-daemon-driver-storage-disk-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653642" comment="libvirt-daemon-driver-storage-gluster-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653604" comment="libvirt-daemon-driver-storage-iscsi-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653605" comment="libvirt-daemon-driver-storage-iscsi-direct-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653606" comment="libvirt-daemon-driver-storage-logical-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653607" comment="libvirt-daemon-driver-storage-mpath-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653608" comment="libvirt-daemon-driver-storage-rbd-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653609" comment="libvirt-daemon-driver-storage-scsi-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653610" comment="libvirt-daemon-hooks-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653611" comment="libvirt-daemon-lxc-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653612" comment="libvirt-daemon-qemu-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653613" comment="libvirt-daemon-xen-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653614" comment="libvirt-devel-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653643" comment="libvirt-devel-32bit-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653615" comment="libvirt-doc-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653585" comment="libvirt-libs-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653616" comment="libvirt-lock-sanlock-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653617" comment="libvirt-nss-7.1.0-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653644" comment="wireshark-plugin-libvirt-7.1.0-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52495" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord-5_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182169" ref_url="https://bugzilla.suse.com/1182169" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22880" ref_url="https://www.suse.com/security/cve/CVE-2021-22880/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3634-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSBBYVVTCKLFKYMF7OEIC2G2QUWN6ERM/" source="SUSE-SU"/>
		<description>
This update for rubygem-activerecord-5_1 fixes the following issues:

- CVE-2021-22880: Fixed possible DoS vector in PostgreSQL money type (bsc#1182169).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182169">SUSE bug 1182169</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22880/">CVE-2021-22880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652336" comment="ruby2.5-rubygem-activerecord-5_1-5.1.4-5.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52496" version="1" class="patch">
	<metadata>
		<title>Security update for tinyxml (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191576" ref_url="https://bugzilla.suse.com/1191576" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42260" ref_url="https://www.suse.com/security/cve/CVE-2021-42260/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MO2YQSAKB3PM3TWSYUR2JCZND3ENJVZ/" source="SUSE-SU"/>
		<description>
This update for tinyxml fixes the following issues:

- CVE-2021-42260: Fixed an infinite loop for inputs containing the sequence 0xEF0x00 (bsc#1191576)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1191576">SUSE bug 1191576</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42260/">CVE-2021-42260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654658" comment="libtinyxml0-2.6.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654659" comment="tinyxml-devel-2.6.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654660" comment="tinyxml-docs-2.6.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52497" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1176914" ref_url="https://bugzilla.suse.com/1176914" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1180100" ref_url="https://bugzilla.suse.com/1180100" source="BUGZILLA"/>
		<reference ref_id="1181147" ref_url="https://bugzilla.suse.com/1181147" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190801" ref_url="https://bugzilla.suse.com/1190801" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191645" ref_url="https://bugzilla.suse.com/1191645" source="BUGZILLA"/>
		<reference ref_id="1191663" ref_url="https://bugzilla.suse.com/1191663" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191867" ref_url="https://bugzilla.suse.com/1191867" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192074" ref_url="https://bugzilla.suse.com/1192074" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34866" ref_url="https://www.suse.com/security/cve/CVE-2021-34866/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-34866: Fixed eBPF Type Confusion Privilege Escalation Vulnerability (bsc#1191645).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: NFIT: Use fallback node id when numa info in NFIT table is incorrect (git-fixes).
- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda - Enable headphone mic on Dell Latitude laptops with ALC3254 (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang PHxTxX1 (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell Precision 5560 laptop (git-fixes).
- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo 13s Gen2 (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda/realtek: Quirks to enable speaker output for Lenovo Legion 7i 15IMHG05, Yoga 7i 14ITL5/15ITL5, and 13s Gen2 laptops (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: hda: intel: Allow repeatedly probing on codec configuration errors (bsc#1190801).
- ALSA: pcm: Workaround for a wrong offset in SYNC_PTR compat ioctl (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: Intel: Skylake: Fix module configuration for KPB and MIXER (git-fixes).
- ASoC: Intel: Skylake: Fix passing loadable flag for module (git-fixes).
- ASoC: Intel: bytcr_rt5640: Move 'Platform Clock' routes to the maps for the matching in-/output (git-fixes).
- ASoC: Intel: sof_sdw: tag SoundWire BEs as non-atomic (git-fixes).
- ASoC: SOF: imx: imx8: Bar index is only valid for IRAM and SRAM types (git-fixes).
- ASoC: SOF: imx: imx8m: Bar index is only valid for IRAM and SRAM types (git-fixes).
- ASoC: SOF: loader: release_firmware() on load failure to avoid batching (git-fixes).
- ASoC: atmel: ATMEL drivers do not need HAS_DMA (git-fixes).
- ASoC: dapm: use component prefix when checking widget names (git-fixes).
- ASoC: fsl_spdif: register platform component before registering cpu dai (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- Configure mpi3mr as currently unsupported (jsc#SLE-18120)
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Fix copy_tofrom_guest routines (jsc#SLE-12936 git-fixes).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (git-fixes).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails (git-fixes).
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (git-fixes).
- PM / devfreq: rk3399_dmc: Fix spelling typo (git-fixes).
- PM / devfreq: rk3399_dmc: Remove unneeded semicolon (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr.ss_family (bsc#1181147).
- RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure (bsc#1181147).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: make bnxt_free_skbs() safe to call after bnxt_free_mem() (jsc#SLE-16649).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix OOB read when printing XDP link fdinfo (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: correct bridge/4addr mode check (git-fixes).
- cfg80211: fix management registrations locking (git-fixes).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- cpuidle: pseries: Mark pseries_idle_proble() as __init (jsc#SLE-13614 bsc#1176914 ltc#186394 git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: correct initial cp_hqd_quantum for gfx9 (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read (git-fixes).
- drm/i915: Fix syncmap memory leak (bsc#1152489) Backporting notes: 	* context changes in intel_timeline_fini()
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Avoid potential overflow in timeout_to_jiffies() (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/nouveau/kms/nv50-: fix file release memory leak (git-fixes).
- drm/nouveau/kms/tu102-: delay enabling cursor until after assign_windows (git-fixes).
- drm/nouveau: avoid a use-after-free when BO init fails (bsc#1152472)
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- drm/panfrost: Make sure MMU context lifetime is not bound to (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix HDMI PHY clock setup (git-fixes).
- e1000e: Drop patch to avoid regressions until real fix is available (bsc#1191663).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- gpio: pca953x: Improve bias setting (git-fixes).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- ice: fix getting UDP tunnel entry (jsc#SLE-12878).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- iwlwifi: pcie: add configuration of a Wi-Fi adapter on Dell XPS 15 (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kABI workaround for HD-audio probe retry changes (bsc#1190801).
- kABI workaround for cfg80211 mgmt_registration_lock changes (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). 
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/mlx5: E-Switch, Fix double allocation of acl flow counter (jsc#SLE-15172).
- net/mlx5e: IPSEC RX, enable checksum complete (jsc#SLE-15172).
- net/mlx5e: RX, Avoid possible data corruption when relaxed ordering and LRO combined (jsc#SLE-15172).
- net/sched: ets: fix crash when flipping from 'strict' to 'quantum' (bsc#1176774).
- net: batman-adv: fix error handling (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: check queue id range before using (jsc#SLE-14777).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: Drop fragmented ndisc packets assembled in netfilter (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value (bsc#1176447).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/mellanox: mlxreg-io: Fix read access of n-bytes size attributes (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- platform/x86: intel_scu_ipc: Fix busy loop expiry time (git-fixes).
- powerpc/64s: Fix entry flush patching w/strict RWX &amp; hash (jsc#SLE-13847 git-fixes).
- powerpc/64s: Fix stf mitigation patching w/strict RWX &amp; hash (jsc#SLE-13847 git-fixes).
- powerpc/64s: Remove irq mask workaround in accumulate_stolen_time() (jsc#SLE-9246 git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib/code-patching: Do not use struct 'ppc_inst' for runnable code in tests (jsc#SLE-13847 git-fixes).
- powerpc/lib/code-patching: Make instr_is_branch_to_addr() static (jsc#SLE-13847 git-fixes).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/numa: Update cpu_cpu_map on CPU online/offline (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/smp: Cache CPU to chip lookup (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Enable CACHE domain for shared processor (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Fix a crash while booting kvm guest with nr_cpus=2 (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Fold cpu_die() into its only caller (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Set numa node before updating mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Update cpu_core_map on all PowerPc systems (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/uprobes: Validation for prefixed instruction (jsc#SLE-13847 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- powerpc: Do not dereference code as 'struct ppc_inst' (uprobe, code-patching, feature-fixups) (jsc#SLE-13847 git-fixes).
- powerpc: Do not use 'struct ppc_inst' to reference instruction location (jsc#SLE-13847 git-fixes).
- powerpc: Move arch_cpu_idle_dead() into smp.c (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: ibmvfc: Fix up duplicate response detection (bsc#1191867 ltc#194757).
- scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim (git-fixes).
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: mpi3mr: Add EEDP DIF DIX support (jsc#SLE-18120).
- scsi: mpi3mr: Add bios_param SCSI host template hook (jsc#SLE-18120).
- scsi: mpi3mr: Add change queue depth support (jsc#SLE-18120).
- scsi: mpi3mr: Add event handling debug prints (jsc#SLE-18120).
- scsi: mpi3mr: Add mpi30 Rev-R headers and Kconfig (jsc#SLE-18120).
- scsi: mpi3mr: Add support for DSN secure firmware check (jsc#SLE-18120).
- scsi: mpi3mr: Add support for PCIe device event handling (jsc#SLE-18120).
- scsi: mpi3mr: Add support for PM suspend and resume (jsc#SLE-18120).
- scsi: mpi3mr: Add support for device add/remove event handling (jsc#SLE-18120).
- scsi: mpi3mr: Add support for internal watchdog thread (jsc#SLE-18120).
- scsi: mpi3mr: Add support for queue command processing (jsc#SLE-18120).
- scsi: mpi3mr: Add support for recovering controller (jsc#SLE-18120).
- scsi: mpi3mr: Add support for threaded ISR (jsc#SLE-18120).
- scsi: mpi3mr: Add support for timestamp sync with firmware (jsc#SLE-18120).
- scsi: mpi3mr: Additional event handling (jsc#SLE-18120).
- scsi: mpi3mr: Allow certain commands during pci-remove hook (jsc#SLE-18120).
- scsi: mpi3mr: Base driver code (jsc#SLE-18120).
- scsi: mpi3mr: Complete support for soft reset (jsc#SLE-18120).
- scsi: mpi3mr: Create operational request and reply queue pair (jsc#SLE-18120).
- scsi: mpi3mr: Fix error handling in mpi3mr_setup_isr() (git-fixes).
- scsi: mpi3mr: Fix missing unlock on error (git-fixes).
- scsi: mpi3mr: Hardware workaround for UNMAP commands to NVMe drives (jsc#SLE-18120).
- scsi: mpi3mr: Implement SCSI error handler hooks (jsc#SLE-18120).
- scsi: mpi3mr: Print IOC info for debugging (jsc#SLE-18120).
- scsi: mpi3mr: Print pending host I/Os for debugging (jsc#SLE-18120).
- scsi: mpi3mr: Set up IRQs in resume path (jsc#SLE-18120).
- scsi: mpi3mr: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (jsc#SLE-18120).
- scsi: mpi3mr: Use the proper SCSI midlayer interfaces for PI (jsc#SLE-18120).
- scsi: mpi3mr: Wait for pending I/O completions upon detection of VD I/O timeout (jsc#SLE-18120).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- scsi: target: Fix the pgr/alua_support_store functions (git-fixes).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle (git-fixes).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- x86/sev: Return an error on a returned non-zero SW_EXITINFO1[31:0] (bsc#1178134).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006). 
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix I_DONTCACHE (bsc#1192074).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176914">SUSE bug 1176914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180100">SUSE bug 1180100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181147">SUSE bug 1181147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190801">SUSE bug 1190801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191645">SUSE bug 1191645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191663">SUSE bug 1191663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191867">SUSE bug 1191867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192074">SUSE bug 1192074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34866/">CVE-2021-34866</cve>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654534" comment="cluster-md-kmp-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654535" comment="dlm-kmp-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654536" comment="gfs2-kmp-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654340" comment="kernel-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654341" comment="kernel-azure-devel-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654537" comment="kernel-azure-extra-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654538" comment="kernel-azure-livepatch-devel-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654539" comment="kernel-azure-optional-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654342" comment="kernel-devel-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654343" comment="kernel-source-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654344" comment="kernel-syms-azure-5.3.18-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654540" comment="kselftests-kmp-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654541" comment="ocfs2-kmp-azure-5.3.18-38.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654542" comment="reiserfs-kmp-azure-5.3.18-38.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52498" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6GNK27D6NPRSWPQWFJADKDTOHPOGY6C/" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).
- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654299" comment="binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654300" comment="binutils-devel-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654320" comment="binutils-devel-32bit-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654334" comment="binutils-gold-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654543" comment="cross-aarch64-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654544" comment="cross-arm-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654545" comment="cross-avr-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654546" comment="cross-epiphany-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654547" comment="cross-hppa-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654548" comment="cross-hppa64-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654549" comment="cross-i386-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654550" comment="cross-ia64-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654551" comment="cross-m68k-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654552" comment="cross-mips-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654553" comment="cross-ppc-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654554" comment="cross-ppc64-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654555" comment="cross-ppc64le-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654556" comment="cross-riscv64-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654557" comment="cross-rx-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654558" comment="cross-s390-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654559" comment="cross-s390x-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654560" comment="cross-sparc-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654561" comment="cross-sparc64-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654562" comment="cross-spu-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654563" comment="cross-x86_64-binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654301" comment="libctf-nobfd0-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654302" comment="libctf0-2.37-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52499" version="1" class="patch">
	<metadata>
		<title>Security update for samba and ldb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192214" ref_url="https://bugzilla.suse.com/1192214" source="BUGZILLA"/>
		<reference ref_id="1192215" ref_url="https://bugzilla.suse.com/1192215" source="BUGZILLA"/>
		<reference ref_id="1192246" ref_url="https://bugzilla.suse.com/1192246" source="BUGZILLA"/>
		<reference ref_id="1192247" ref_url="https://bugzilla.suse.com/1192247" source="BUGZILLA"/>
		<reference ref_id="1192283" ref_url="https://bugzilla.suse.com/1192283" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="1192505" ref_url="https://bugzilla.suse.com/1192505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2020-25718" ref_url="https://www.suse.com/security/cve/CVE-2020-25718/" source="CVE"/>
		<reference ref_id="CVE-2020-25719" ref_url="https://www.suse.com/security/cve/CVE-2020-25719/" source="CVE"/>
		<reference ref_id="CVE-2020-25721" ref_url="https://www.suse.com/security/cve/CVE-2020-25721/" source="CVE"/>
		<reference ref_id="CVE-2020-25722" ref_url="https://www.suse.com/security/cve/CVE-2020-25722/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="CVE-2021-3738" ref_url="https://www.suse.com/security/cve/CVE-2021-3738/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<description>
This update for samba and ldb fixes the following issues:

- CVE-2020-25718: Fixed that an RODC can issue (forge) administrator tickets to other servers (bsc#1192246).
- CVE-2021-3738: Fixed crash in dsdb stack (bsc#1192215).
- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
- CVE-2020-25719: Fixed AD DC Username based races when no PAC is given (bsc#1192247).
- CVE-2020-25722: Fixed AD DC UPN vs samAccountName not checked (top-level bug for AD DC validation issues) (bsc#1192283).
- CVE-2021-23192: Fixed dcerpc requests to don't check all fragments against the first auth_state (bsc#1192214).
- CVE-2020-25721: Fixed fill in the new HAS_SAM_NAME_AND_SID values (bsc#1192505).

Samba was updated to 4.13.13

* rodc_rwdc test flaps;(bso#14868).
* Backport bronze bit fixes, tests, and selftest improvements;
  (bso#14881).
* Provide a fix for MS CVE-2020-17049 in Samba [SECURITY]
  'Bronze bit' S4U2Proxy Constrained Delegation bypass in Samba
  with embedded Heimdal;(bso#14642).
* Python ldb.msg_diff() memory handling failure;(bso#14836).
* 'in' operator on ldb.Message is case sensitive;(bso#14845).
* Fix Samba support for UF_NO_AUTH_DATA_REQUIRED;(bso#14871).
* Allow special chars like '@' in samAccountName when generating
  the salt;(bso#14874).
* Fix transit path validation;(bso#12998).
* Prepare to operate with MIT krb5 &gt;= 1.20;(bso#14870).
* rpcclient NetFileEnum and net rpc file both cause lock order
  violation: brlock.tdb, share_entries.tdb;(bso#14645).
* Python ldb.msg_diff() memory handling failure;(bso#14836).
* Release LDB 2.3.1 for Samba 4.14.9;(bso#14848).

Samba was updated to 4.13.12:

* Address a signifcant performance regression in database access
  in the AD DC since Samba 4.12;(bso#14806).
* Fix performance regression in lsa_LookupSids3/LookupNames4
  since Samba 4.9 by using an explicit database handle cache;
  (bso#14807).
* An unuthenticated user can crash the AD DC KDC by omitting the
  server name in a TGS-REQ;(bso#14817).
* Address flapping samba_tool_drs_showrepl test;(bso#14818).
* Address flapping dsdb_schema_attributes test;(bso#14819).
* An unuthenticated user can crash the AD DC KDC by omitting the
  server name in a TGS-REQ;(bso#14817).
* Fix CTDB flag/status update race conditions(bso#14784).

Samba was updated to 4.13.11:

* smbd: panic on force-close share during offload write; (bso#14769).
* Fix returned attributes on fake quota file handle and avoid
  hitting the VFS;(bso#14731).
* smbd: 'deadtime' parameter doesn't work anymore;(bso#14783).
* net conf list crashes when run as normal user;(bso#14787).
* Work around special SMB2 READ response behavior of NetApp Ontap
  7.3.7;(bso#14607).
* Start the SMB encryption as soon as possible;(bso#14793).
* Winbind should not start if the socket path for the privileged
  pipe is too long;(bso#14792).

ldb was updated to 2.2.2:

+ CVE-2020-25718: samba: An RODC can issue (forge) administrator tickets to other servers; (bsc#1192246); (bso#14558)
+ CVE-2021-3738: samba: crash in dsdb stack; (bsc#1192215);(bso#14848)

Release ldb 2.2.2

+ Corrected python behaviour for 'in' for LDAP attributes contained as part of ldb.Message;(bso#14845).
+ Fix memory handling in ldb.msg_diff Corrected python docstrings;(bso#14836)
+ Backport bronze bit fixes, tests, and selftest improvements; (bso#14881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192214">SUSE bug 1192214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192215">SUSE bug 1192215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192246">SUSE bug 1192246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192247">SUSE bug 1192247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192283">SUSE bug 1192283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192505">SUSE bug 1192505</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25718/">CVE-2020-25718</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25719/">CVE-2020-25719</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25721/">CVE-2020-25721</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25722/">CVE-2020-25722</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3738/">CVE-2021-3738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654904" comment="ctdb-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655346" comment="ctdb-pcp-pmda-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655347" comment="ctdb-tests-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654738" comment="ldb-tools-2.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654739" comment="libdcerpc-binding0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654740" comment="libdcerpc-binding0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655348" comment="libdcerpc-binding0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654741" comment="libdcerpc-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654742" comment="libdcerpc-samr-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654743" comment="libdcerpc-samr0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655349" comment="libdcerpc-samr0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655350" comment="libdcerpc-samr0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654744" comment="libdcerpc0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654745" comment="libdcerpc0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655351" comment="libdcerpc0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654746" comment="libldb-devel-2.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654747" comment="libldb2-2.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654748" comment="libldb2-32bit-2.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654749" comment="libndr-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654750" comment="libndr-krb5pac-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654751" comment="libndr-krb5pac0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654752" comment="libndr-krb5pac0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655352" comment="libndr-krb5pac0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654753" comment="libndr-nbt-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654754" comment="libndr-nbt0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654755" comment="libndr-nbt0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655353" comment="libndr-nbt0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654756" comment="libndr-standard-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654757" comment="libndr-standard0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654758" comment="libndr-standard0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655354" comment="libndr-standard0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654759" comment="libndr1-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654760" comment="libndr1-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655355" comment="libndr1-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654761" comment="libnetapi-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655356" comment="libnetapi-devel-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655357" comment="libnetapi-devel-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654762" comment="libnetapi0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654763" comment="libnetapi0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655358" comment="libnetapi0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654764" comment="libsamba-credentials-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654765" comment="libsamba-credentials0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654766" comment="libsamba-credentials0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655359" comment="libsamba-credentials0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654767" comment="libsamba-errors-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654768" comment="libsamba-errors0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654769" comment="libsamba-errors0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655360" comment="libsamba-errors0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654770" comment="libsamba-hostconfig-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654771" comment="libsamba-hostconfig0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654772" comment="libsamba-hostconfig0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655361" comment="libsamba-hostconfig0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654773" comment="libsamba-passdb-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654774" comment="libsamba-passdb0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654775" comment="libsamba-passdb0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655362" comment="libsamba-passdb0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654776" comment="libsamba-policy-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654777" comment="libsamba-policy-python3-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654778" comment="libsamba-policy0-python3-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655363" comment="libsamba-policy0-python3-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655364" comment="libsamba-policy0-python3-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654779" comment="libsamba-util-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654780" comment="libsamba-util0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654781" comment="libsamba-util0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655365" comment="libsamba-util0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654782" comment="libsamdb-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654783" comment="libsamdb0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654784" comment="libsamdb0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655366" comment="libsamdb0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654785" comment="libsmbclient-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654786" comment="libsmbclient0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655367" comment="libsmbclient0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655368" comment="libsmbclient0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654787" comment="libsmbconf-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654788" comment="libsmbconf0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654789" comment="libsmbconf0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655369" comment="libsmbconf0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654790" comment="libsmbldap-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654791" comment="libsmbldap2-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654792" comment="libsmbldap2-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655370" comment="libsmbldap2-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654793" comment="libtevent-util-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654794" comment="libtevent-util0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654795" comment="libtevent-util0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655371" comment="libtevent-util0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654796" comment="libwbclient-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654797" comment="libwbclient0-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654798" comment="libwbclient0-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655372" comment="libwbclient0-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654799" comment="python3-ldb-2.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655373" comment="python3-ldb-32bit-2.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654800" comment="python3-ldb-devel-2.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654801" comment="samba-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654815" comment="samba-ad-dc-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655374" comment="samba-ad-dc-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655375" comment="samba-ad-dc-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654802" comment="samba-ceph-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654803" comment="samba-client-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655376" comment="samba-client-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655377" comment="samba-client-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654804" comment="samba-core-devel-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655378" comment="samba-doc-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654805" comment="samba-dsdb-modules-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654806" comment="samba-gpupdate-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654807" comment="samba-ldb-ldap-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654808" comment="samba-libs-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654809" comment="samba-libs-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655379" comment="samba-libs-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654810" comment="samba-libs-python3-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655380" comment="samba-libs-python3-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655381" comment="samba-libs-python3-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654811" comment="samba-python3-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655382" comment="samba-test-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654812" comment="samba-winbind-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654813" comment="samba-winbind-32bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655383" comment="samba-winbind-64bit-4.13.13+git.528.140935f8d6a-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52500" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192214" ref_url="https://bugzilla.suse.com/1192214" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
- CVE-2021-23192: Fixed dcerpc requests to don't check all fragments against the first auth_state (bsc#1192214).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192214">SUSE bug 1192214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654687" comment="libndr0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654688" comment="libndr0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52501" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192601" ref_url="https://bugzilla.suse.com/1192601" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJMHDQABDOOUGOYNHF2X56XA57GXYYSN/" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- Fix regression introduced by CVE-2020-25717 patches, winbindd
  does not start when 'allow trusted domains' is off; (bso#14899);
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-15"/>
	<updated date="2021-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192601">SUSE bug 1192601</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655923" comment="ctdb-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656159" comment="ctdb-pcp-pmda-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656160" comment="ctdb-tests-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655815" comment="libdcerpc-binding0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655816" comment="libdcerpc-binding0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656161" comment="libdcerpc-binding0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655817" comment="libdcerpc-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655818" comment="libdcerpc-samr-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655819" comment="libdcerpc-samr0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656162" comment="libdcerpc-samr0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656163" comment="libdcerpc-samr0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655820" comment="libdcerpc0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655821" comment="libdcerpc0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656164" comment="libdcerpc0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655822" comment="libndr-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655823" comment="libndr-krb5pac-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655824" comment="libndr-krb5pac0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655825" comment="libndr-krb5pac0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656165" comment="libndr-krb5pac0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655826" comment="libndr-nbt-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655827" comment="libndr-nbt0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655828" comment="libndr-nbt0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656166" comment="libndr-nbt0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655829" comment="libndr-standard-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655830" comment="libndr-standard0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655831" comment="libndr-standard0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656167" comment="libndr-standard0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655832" comment="libndr1-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655833" comment="libndr1-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656168" comment="libndr1-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655834" comment="libnetapi-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656169" comment="libnetapi-devel-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656170" comment="libnetapi-devel-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655835" comment="libnetapi0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655836" comment="libnetapi0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656171" comment="libnetapi0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655837" comment="libsamba-credentials-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655838" comment="libsamba-credentials0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655839" comment="libsamba-credentials0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656172" comment="libsamba-credentials0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655840" comment="libsamba-errors-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655841" comment="libsamba-errors0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655842" comment="libsamba-errors0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656173" comment="libsamba-errors0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655843" comment="libsamba-hostconfig-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655844" comment="libsamba-hostconfig0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655845" comment="libsamba-hostconfig0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656174" comment="libsamba-hostconfig0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655846" comment="libsamba-passdb-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655847" comment="libsamba-passdb0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655848" comment="libsamba-passdb0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656175" comment="libsamba-passdb0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655849" comment="libsamba-policy-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655850" comment="libsamba-policy-python3-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655851" comment="libsamba-policy0-python3-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656176" comment="libsamba-policy0-python3-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656177" comment="libsamba-policy0-python3-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655852" comment="libsamba-util-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655853" comment="libsamba-util0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655854" comment="libsamba-util0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656178" comment="libsamba-util0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655855" comment="libsamdb-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655856" comment="libsamdb0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655857" comment="libsamdb0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656179" comment="libsamdb0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655858" comment="libsmbclient-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655859" comment="libsmbclient0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656180" comment="libsmbclient0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656181" comment="libsmbclient0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655860" comment="libsmbconf-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655861" comment="libsmbconf0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655862" comment="libsmbconf0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656182" comment="libsmbconf0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655863" comment="libsmbldap-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655864" comment="libsmbldap2-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655865" comment="libsmbldap2-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656183" comment="libsmbldap2-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655866" comment="libtevent-util-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655867" comment="libtevent-util0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655868" comment="libtevent-util0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656184" comment="libtevent-util0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655869" comment="libwbclient-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655870" comment="libwbclient0-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655871" comment="libwbclient0-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656185" comment="libwbclient0-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655872" comment="samba-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655897" comment="samba-ad-dc-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656186" comment="samba-ad-dc-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656187" comment="samba-ad-dc-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655873" comment="samba-ceph-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655874" comment="samba-client-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656188" comment="samba-client-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656189" comment="samba-client-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655875" comment="samba-core-devel-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656190" comment="samba-doc-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655876" comment="samba-dsdb-modules-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655877" comment="samba-gpupdate-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655878" comment="samba-ldb-ldap-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655879" comment="samba-libs-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655880" comment="samba-libs-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656191" comment="samba-libs-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655881" comment="samba-libs-python3-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656192" comment="samba-libs-python3-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656193" comment="samba-libs-python3-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655882" comment="samba-python3-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656194" comment="samba-test-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655883" comment="samba-winbind-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655884" comment="samba-winbind-32bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656195" comment="samba-winbind-64bit-4.13.13+git.531.903f5c0ccdc-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52502" version="1" class="patch">
	<metadata>
		<title>Security update for drbd-utils (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1185132" ref_url="https://bugzilla.suse.com/1185132" source="BUGZILLA"/>
		<reference ref_id="1189363" ref_url="https://bugzilla.suse.com/1189363" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:3665-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTZPTDVSROTODVKJ22XXXS3E33HLFZPE/" source="SUSE-SU"/>
		<description>
This update for drbd-utils fixes the following issues:

- make all binaries position independent (basc#1185132).
- Upgrade to 9.0.18 (bsc#1189363)
 * build: remove rpm related targets
 * drbdsetup,v84: fix minor compile warnings
 * systemd: resource specific activation
 * systemd: drbd-reactor promoter templates
 * doc: fix maximum ping timeout
 * doc: add man pages for the systemd templates
 * drbdadm,v9: fix dstate for diskless volumes
 * build/release: use lbvers.py
 * drbd-attr: don't leak fd to drbdsetup
 * doc: various fixes and additions
 * drbdsetup,events2,v9: add backing_device
 * build,Debian: rm dh-systemd dependency
 * drbdsetup,events2,v9: fix --poll regression
 * drbdmeta: fix bug with ALs with small final extents
 * build,Debian: rm mail recommends
 * drbdsetup,events2,v9: allow --poll without --now
 * drbdsetup,invalidate: allow bitmap based resync after verify
 * drbdadm,sh-ll-dev: change output to 'none' if diskless
 * drbdadm,v9: allow set-gi in single node clusters
 * drbsetup,events2,v9: diff(erential) output
 * drbsetup,events2,v9: add --full output
 * v9: allow resource rename, also in drbdmon
 * drbdadm,v9: allow c-max-rate to be disabled
 * New drbd-attr Pacemaker RA
 * events2: handle mixed initial state and multicast events
 * events2: fix regression to always print resync done
- Prepare '/usr' merge. (bsc#1029961)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185132">SUSE bug 1185132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189363">SUSE bug 1189363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653315" comment="drbd-utils-9.18.0-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52503" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

Update to 11.0.13+8 (October 2021 CPU)

- CVE-2021-35550, bsc#1191901: Update the default enabled cipher suites preference
- CVE-2021-35565, bsc#1191909: com.sun.net.HttpsServer spins on TLS session close
- CVE-2021-35556, bsc#1191910: Richer Text Editors
- CVE-2021-35559, bsc#1191911: Enhanced style for RTF kit
- CVE-2021-35561, bsc#1191912: Better hashing support
- CVE-2021-35564, bsc#1191913: Improve Keystore integrity
- CVE-2021-35567, bsc#1191903: More Constrained Delegation
- CVE-2021-35578, bsc#1191904: Improve TLS client handshaking
- CVE-2021-35586, bsc#1191914: Better BMP support
- CVE-2021-35603, bsc#1191906: Better session identification
- Improve Stream handling for SSL
- Improve requests of certificates
- Correct certificate requests
- Enhance DTLS client handshake
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653309" comment="java-11-openjdk-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653375" comment="java-11-openjdk-accessibility-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653310" comment="java-11-openjdk-demo-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653311" comment="java-11-openjdk-devel-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653312" comment="java-11-openjdk-headless-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653313" comment="java-11-openjdk-javadoc-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653314" comment="java-11-openjdk-jmods-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653376" comment="java-11-openjdk-src-11.0.13.0-3.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52504" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188278" ref_url="https://bugzilla.suse.com/1188278" source="BUGZILLA"/>
		<reference ref_id="1188279" ref_url="https://bugzilla.suse.com/1188279" source="BUGZILLA"/>
		<reference ref_id="1190558" ref_url="https://bugzilla.suse.com/1190558" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037/" source="CVE"/>
		<reference ref_id="CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JSV3IQW2IZ4TG73GE2HYEJN52YYLT3T/" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-30640: Escape parameters in JNDI Realm queries (bsc#1188279).
- CVE-2021-33037: Process T-E header from both HTTP 1.0 and HTTP 1.1. clients (bsc#1188278).
- CVE-2021-41079: Fixed a denial of service caused by an unexpected TLS packet (bsc#1190558).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188278">SUSE bug 1188278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188279">SUSE bug 1188279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190558">SUSE bug 1190558</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653657" comment="tomcat-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653658" comment="tomcat-admin-webapps-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653712" comment="tomcat-docs-webapp-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653659" comment="tomcat-el-3_0-api-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653713" comment="tomcat-embed-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653714" comment="tomcat-javadoc-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653660" comment="tomcat-jsp-2_3-api-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653715" comment="tomcat-jsvc-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653661" comment="tomcat-lib-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653662" comment="tomcat-servlet-4_0-api-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653663" comment="tomcat-webapps-9.0.36-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52505" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYEHJEQQ7LEL2T775B7QLR3IFR6LJGLZ/" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655340" comment="libsamba-policy-python-devel-4.9.5+git.471.5edbe3dcae7-3.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655341" comment="libsamba-policy0-4.9.5+git.471.5edbe3dcae7-3.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655342" comment="libsamba-policy0-32bit-4.9.5+git.471.5edbe3dcae7-3.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655343" comment="samba-libs-python-4.9.5+git.471.5edbe3dcae7-3.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655344" comment="samba-libs-python-32bit-4.9.5+git.471.5edbe3dcae7-3.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655345" comment="samba-python-4.9.5+git.471.5edbe3dcae7-3.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52506" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1089118" ref_url="https://bugzilla.suse.com/1089118" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1176914" ref_url="https://bugzilla.suse.com/1176914" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1180100" ref_url="https://bugzilla.suse.com/1180100" source="BUGZILLA"/>
		<reference ref_id="1180749" ref_url="https://bugzilla.suse.com/1180749" source="BUGZILLA"/>
		<reference ref_id="1181147" ref_url="https://bugzilla.suse.com/1181147" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190801" ref_url="https://bugzilla.suse.com/1190801" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191645" ref_url="https://bugzilla.suse.com/1191645" source="BUGZILLA"/>
		<reference ref_id="1191663" ref_url="https://bugzilla.suse.com/1191663" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191867" ref_url="https://bugzilla.suse.com/1191867" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192074" ref_url="https://bugzilla.suse.com/1192074" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192288" ref_url="https://bugzilla.suse.com/1192288" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34866" ref_url="https://www.suse.com/security/cve/CVE-2021-34866/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<description>


The following security bugs were fixed:

- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).
- CVE-2021-34866: Fixed eBPF Type Confusion Privilege Escalation Vulnerability (bsc#1191645).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).

The following non-security bugs were fixed:

- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ACPI: NFIT: Use fallback node id when numa info in NFIT table is incorrect (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: hda - Enable headphone mic on Dell Latitude laptops with ALC3254 (git-fixes).
- ALSA: hda: intel: Allow repeatedly probing on codec configuration errors (bsc#1190801).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang PHxTxX1 (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell Precision 5560 laptop (git-fixes).
- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo 13s Gen2 (git-fixes).
- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14 (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda/realtek: Quirks to enable speaker output for Lenovo Legion 7i 15IMHG05, Yoga 7i 14ITL5/15ITL5, and 13s Gen2 laptops (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: hda: Use position buffer for SKL+ again (git-fixes).
- ALSA: pcm: Workaround for a wrong offset in SYNC_PTR compat ioctl (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: uapi: Fix a C++ style comment in asound.h (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: atmel: ATMEL drivers do not need HAS_DMA (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: dapm: use component prefix when checking widget names (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: fsl_spdif: register platform component before registering cpu dai (git-fixes).
- ASoC: Intel: bytcr_rt5640: Move 'Platform Clock' routes to the maps for the matching in-/output (git-fixes).
- ASoC: Intel: Skylake: Fix module configuration for KPB and MIXER (git-fixes).
- ASoC: Intel: Skylake: Fix passing loadable flag for module (git-fixes).
- ASoC: Intel: sof_sdw: tag SoundWire BEs as non-atomic (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ASoC: SOF: imx: imx8: Bar index is only valid for IRAM and SRAM types (git-fixes).
- ASoC: SOF: imx: imx8m: Bar index is only valid for IRAM and SRAM types (git-fixes).
- ASoC: SOF: loader: release_firmware() on load failure to avoid batching (git-fixes).
- ASoC: SOF: topology: do not power down primary core during topology removal (git-fixes).
- ASoC: topology: Fix stub for snd_soc_tplg_component_remove() (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath10k: sdio: Add missing BH locking around napi_schdule() (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bnxt_en: make bnxt_free_skbs() safe to call after bnxt_free_mem() (jsc#SLE-16649).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix OOB read when printing XDP link fdinfo (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: correct bridge/4addr mode check (git-fixes).
- cfg80211: fix management registrations locking (git-fixes).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- Configure mpi3mr as currently unsupported (jsc#SLE-18120)
- cpuidle: pseries: Mark pseries_idle_proble() as __init (jsc#SLE-13614 bsc#1176914 ltc#186394 git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: correct initial cp_hqd_quantum for gfx9 (git-fixes).
- drm/amdgpu/display: add quirk handling for stutter mode (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/amdgpu/gmc6: fix DMA mask from 44 to 40 bits (git-fixes).
- drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read (git-fixes).
- drm/i915: Fix syncmap memory leak (bsc#1152489) Backporting notes: 	* context changes in intel_timeline_fini()
- drm/msm: Avoid potential overflow in timeout_to_jiffies() (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm/msm: potential error pointer dereference in init() (git-fixes).
- drm/msm: uninitialized variable in msm_gem_import() (git-fixes).
- drm/nouveau: avoid a use-after-free when BO init fails (bsc#1152472)
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/nouveau/kms/nv50-: fix file release memory leak (git-fixes).
- drm/nouveau/kms/tu102-: delay enabling cursor until after assign_windows (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- drm/panfrost: Make sure MMU context lifetime is not bound to (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix HDMI PHY clock setup (git-fixes).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/ttm: stop calling tt_swapin in vm_access (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- e1000e: Drop patch to avoid regressions until real fix is available (bsc#1191663).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- EDAC/amd64: Set proper family type for Family 19h Models 20h-2Fh (bsc#1192288).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: fix gve_get_stats() (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- hso: fix bailout in error case of probe (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- ice: fix getting UDP tunnel entry (jsc#SLE-12878).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- iwlwifi: mvm: fix some kerneldoc issues (git-fixes).
- iwlwifi: pcie: add configuration of a Wi-Fi adapter on Dell XPS 15 (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kABI workaround for cfg80211 mgmt_registration_lock changes (git-fixes).
- kABI workaround for HD-audio probe retry changes (bsc#1190801).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). 
- KVM: PPC: Book3S HV: Fix copy_tofrom_guest routines (jsc#SLE-12936 git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- mt76: mt7615: fix endianness warning in mt7615_mac_write_txwi (git-fixes).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mt76: mt7915: fix muar_idx in mt7915_mcu_alloc_sta_req() (git-fixes).
- mt76: mt7915: fix possible infinite loop release semaphore (git-fixes).
- mt76: mt7915: fix sta_rec_wtbl tag len (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- netfilter: Drop fragmented ndisc packets assembled in netfilter (git-fixes).
- netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value (bsc#1176447).
- net: hns3: check queue id range before using (jsc#SLE-14777).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5e: IPSEC RX, enable checksum complete (jsc#SLE-15172).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5e: RX, Avoid possible data corruption when relaxed ordering and LRO combined (jsc#SLE-15172).
- net/mlx5: E-Switch, Fix double allocation of acl flow counter (jsc#SLE-15172).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/sched: ets: fix crash when flipping from 'strict' to 'quantum' (bsc#1176774).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nfs: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself. (bsc#1191628 bsc#1192549).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- nvme: add command id quirk for apple controllers (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/mellanox: mlxreg-io: Fix read access of n-bytes size attributes (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- platform/x86: intel_scu_ipc: Fix busy loop expiry time (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (git-fixes).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails (git-fixes).
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (git-fixes).
- PM / devfreq: rk3399_dmc: Fix spelling typo (git-fixes).
- PM / devfreq: rk3399_dmc: Remove unneeded semicolon (git-fixes).
- PM: sleep: Do not let 'syscore' devices runtime-suspend during system transitions (git-fixes).
- powerpc/64s: Fix entry flush patching w/strict RWX &amp; hash (jsc#SLE-13847 git-fixes).
- powerpc/64s: Fix stf mitigation patching w/strict RWX &amp; hash (jsc#SLE-13847 git-fixes).
- powerpc/64s: Remove irq mask workaround in accumulate_stolen_time() (jsc#SLE-9246 git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc: Do not dereference code as 'struct ppc_inst' (uprobe, code-patching, feature-fixups) (jsc#SLE-13847 git-fixes).
- powerpc: Do not use 'struct ppc_inst' to reference instruction location (jsc#SLE-13847 git-fixes).
- powerpc/lib/code-patching: Do not use struct 'ppc_inst' for runnable code in tests (jsc#SLE-13847 git-fixes).
- powerpc/lib/code-patching: Make instr_is_branch_to_addr() static (jsc#SLE-13847 git-fixes).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc: Move arch_cpu_idle_dead() into smp.c (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/numa: Update cpu_cpu_map on CPU online/offline (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/smp: Cache CPU to chip lookup (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Enable CACHE domain for shared processor (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Fix a crash while booting kvm guest with nr_cpus=2 (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Fold cpu_die() into its only caller (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Set numa node before updating mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/smp: Update cpu_core_map on all PowerPc systems (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).
- powerpc/uprobes: Validation for prefixed instruction (jsc#SLE-13847 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr.ss_family (bsc#1181147).
- RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure (bsc#1181147).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- scsi: ibmvfc: Fix up duplicate response detection (bsc#1191867 ltc#194757).
- scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim (git-fixes).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: mpi3mr: Add bios_param SCSI host template hook (jsc#SLE-18120).
- scsi: mpi3mr: Add change queue depth support (jsc#SLE-18120).
- scsi: mpi3mr: Add EEDP DIF DIX support (jsc#SLE-18120).
- scsi: mpi3mr: Add event handling debug prints (jsc#SLE-18120).
- scsi: mpi3mr: Additional event handling (jsc#SLE-18120).
- scsi: mpi3mr: Add mpi30 Rev-R headers and Kconfig (jsc#SLE-18120).
- scsi: mpi3mr: Add support for device add/remove event handling (jsc#SLE-18120).
- scsi: mpi3mr: Add support for DSN secure firmware check (jsc#SLE-18120).
- scsi: mpi3mr: Add support for internal watchdog thread (jsc#SLE-18120).
- scsi: mpi3mr: Add support for PCIe device event handling (jsc#SLE-18120).
- scsi: mpi3mr: Add support for PM suspend and resume (jsc#SLE-18120).
- scsi: mpi3mr: Add support for queue command processing (jsc#SLE-18120).
- scsi: mpi3mr: Add support for recovering controller (jsc#SLE-18120).
- scsi: mpi3mr: Add support for threaded ISR (jsc#SLE-18120).
- scsi: mpi3mr: Add support for timestamp sync with firmware (jsc#SLE-18120).
- scsi: mpi3mr: Allow certain commands during pci-remove hook (jsc#SLE-18120).
- scsi: mpi3mr: Base driver code (jsc#SLE-18120).
- scsi: mpi3mr: Complete support for soft reset (jsc#SLE-18120).
- scsi: mpi3mr: Create operational request and reply queue pair (jsc#SLE-18120).
- scsi: mpi3mr: Fix error handling in mpi3mr_setup_isr() (git-fixes).
- scsi: mpi3mr: Fix missing unlock on error (git-fixes).
- scsi: mpi3mr: Hardware workaround for UNMAP commands to NVMe drives (jsc#SLE-18120).
- scsi: mpi3mr: Implement SCSI error handler hooks (jsc#SLE-18120).
- scsi: mpi3mr: Print IOC info for debugging (jsc#SLE-18120).
- scsi: mpi3mr: Print pending host I/Os for debugging (jsc#SLE-18120).
- scsi: mpi3mr: Set up IRQs in resume path (jsc#SLE-18120).
- scsi: mpi3mr: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (jsc#SLE-18120).
- scsi: mpi3mr: Use the proper SCSI midlayer interfaces for PI (jsc#SLE-18120).
- scsi: mpi3mr: Wait for pending I/O completions upon detection of VD I/O timeout (jsc#SLE-18120).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: target: Fix the pgr/alua_support_store functions (git-fixes).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- Update patch reference for AMDGPU fix (bsc#1180749)
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle (git-fixes).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- x86/sev: Return an error on a returned non-zero SW_EXITINFO1[31:0] (bsc#1178134).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006). 
- xfs: fix I_DONTCACHE (bsc#1192074).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089118">SUSE bug 1089118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176914">SUSE bug 1176914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180100">SUSE bug 1180100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180749">SUSE bug 1180749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181147">SUSE bug 1181147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190801">SUSE bug 1190801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191645">SUSE bug 1191645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191663">SUSE bug 1191663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191867">SUSE bug 1191867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192074">SUSE bug 1192074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192288">SUSE bug 1192288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34866/">CVE-2021-34866</cve>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655744" comment="cluster-md-kmp-64kb-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655425" comment="cluster-md-kmp-default-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655745" comment="cluster-md-kmp-preempt-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655746" comment="dlm-kmp-64kb-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655426" comment="dlm-kmp-default-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655747" comment="dlm-kmp-preempt-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655748" comment="dtb-al-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655749" comment="dtb-allwinner-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655750" comment="dtb-altera-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655751" comment="dtb-amd-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655752" comment="dtb-amlogic-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655753" comment="dtb-apm-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655754" comment="dtb-arm-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655755" comment="dtb-broadcom-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655756" comment="dtb-cavium-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655757" comment="dtb-exynos-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655758" comment="dtb-freescale-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655759" comment="dtb-hisilicon-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655760" comment="dtb-lg-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655761" comment="dtb-marvell-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655762" comment="dtb-mediatek-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655763" comment="dtb-nvidia-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655764" comment="dtb-qcom-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655765" comment="dtb-renesas-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655766" comment="dtb-rockchip-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655767" comment="dtb-socionext-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655768" comment="dtb-sprd-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655769" comment="dtb-xilinx-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655770" comment="dtb-zte-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655771" comment="gfs2-kmp-64kb-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655427" comment="gfs2-kmp-default-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655772" comment="gfs2-kmp-preempt-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655406" comment="kernel-64kb-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655407" comment="kernel-64kb-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655773" comment="kernel-64kb-extra-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655774" comment="kernel-64kb-livepatch-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655775" comment="kernel-64kb-optional-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655776" comment="kernel-debug-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655777" comment="kernel-debug-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655778" comment="kernel-debug-livepatch-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655408" comment="kernel-default-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655409" comment="kernel-default-base-5.3.18-59.34.1.18.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655779" comment="kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655410" comment="kernel-default-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655780" comment="kernel-default-extra-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655781" comment="kernel-default-livepatch-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655782" comment="kernel-default-livepatch-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655783" comment="kernel-default-optional-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655411" comment="kernel-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655415" comment="kernel-docs-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655784" comment="kernel-docs-html-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655785" comment="kernel-kvmsmall-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655786" comment="kernel-kvmsmall-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655787" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655412" comment="kernel-macros-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655416" comment="kernel-obs-build-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655788" comment="kernel-obs-qa-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655413" comment="kernel-preempt-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655417" comment="kernel-preempt-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655789" comment="kernel-preempt-extra-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655790" comment="kernel-preempt-livepatch-devel-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655791" comment="kernel-preempt-optional-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655418" comment="kernel-source-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655792" comment="kernel-source-vanilla-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655419" comment="kernel-syms-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655414" comment="kernel-zfcpdump-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655793" comment="kselftests-kmp-64kb-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655794" comment="kselftests-kmp-default-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655795" comment="kselftests-kmp-preempt-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655796" comment="ocfs2-kmp-64kb-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655428" comment="ocfs2-kmp-default-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655797" comment="ocfs2-kmp-preempt-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655798" comment="reiserfs-kmp-64kb-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655420" comment="reiserfs-kmp-default-5.3.18-59.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655799" comment="reiserfs-kmp-preempt-5.3.18-59.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52507" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654090" comment="MozillaFirefox-91.3.0-152.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654257" comment="MozillaFirefox-branding-upstream-91.3.0-152.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654091" comment="MozillaFirefox-devel-91.3.0-152.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654092" comment="MozillaFirefox-translations-common-91.3.0-152.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654093" comment="MozillaFirefox-translations-other-91.3.0-152.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52508" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY3TDIO4JWN2U76KHSAM3F7JGOFA3VEQ/" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656735" comment="postgresql12-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656740" comment="postgresql12-contrib-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656741" comment="postgresql12-devel-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656742" comment="postgresql12-docs-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656750" comment="postgresql12-llvmjit-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656743" comment="postgresql12-plperl-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656744" comment="postgresql12-plpython-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656745" comment="postgresql12-pltcl-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656746" comment="postgresql12-server-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656747" comment="postgresql12-server-devel-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656751" comment="postgresql12-test-12.9-8.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52509" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191782" ref_url="https://bugzilla.suse.com/1191782" source="BUGZILLA"/>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNALH7TSYYNMSZ7EMUEZ2S7IBYAU75OE/" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

- Let rpmlint ignore shlib-policy-name-error (boo#1191782).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191782">SUSE bug 1191782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656466" comment="libecpg6-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656729" comment="libecpg6-32bit-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656417" comment="libpq5-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656418" comment="libpq5-32bit-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656419" comment="postgresql14-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656467" comment="postgresql14-contrib-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656468" comment="postgresql14-devel-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656730" comment="postgresql14-devel-mini-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656469" comment="postgresql14-docs-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656462" comment="postgresql14-llvmjit-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656470" comment="postgresql14-plperl-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656471" comment="postgresql14-plpython-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656472" comment="postgresql14-pltcl-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656473" comment="postgresql14-server-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656474" comment="postgresql14-server-devel-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656463" comment="postgresql14-test-14.1-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52510" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKUQ4NBJFXX6V3DRII3AKLC2VO5WMZJB/" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655814" comment="postgresql13-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655905" comment="postgresql13-contrib-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655906" comment="postgresql13-devel-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655907" comment="postgresql13-docs-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655895" comment="postgresql13-llvmjit-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655908" comment="postgresql13-plperl-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655909" comment="postgresql13-plpython-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655910" comment="postgresql13-pltcl-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655911" comment="postgresql13-server-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655912" comment="postgresql13-server-devel-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655896" comment="postgresql13-test-13.5-5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52511" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656976" comment="java-1_8_0-openjdk-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657152" comment="java-1_8_0-openjdk-accessibility-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656977" comment="java-1_8_0-openjdk-demo-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656978" comment="java-1_8_0-openjdk-devel-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656979" comment="java-1_8_0-openjdk-headless-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657153" comment="java-1_8_0-openjdk-javadoc-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657154" comment="java-1_8_0-openjdk-src-1.8.0.312-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52512" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191299" ref_url="https://bugzilla.suse.com/1191299" source="BUGZILLA"/>
		<reference ref_id="1191300" ref_url="https://bugzilla.suse.com/1191300" source="BUGZILLA"/>
		<reference ref_id="1191302" ref_url="https://bugzilla.suse.com/1191302" source="BUGZILLA"/>
		<reference ref_id="1191303" ref_url="https://bugzilla.suse.com/1191303" source="BUGZILLA"/>
		<reference ref_id="1191304" ref_url="https://bugzilla.suse.com/1191304" source="BUGZILLA"/>
		<reference ref_id="1191305" ref_url="https://bugzilla.suse.com/1191305" source="BUGZILLA"/>
		<reference ref_id="1191306" ref_url="https://bugzilla.suse.com/1191306" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32626" ref_url="https://www.suse.com/security/cve/CVE-2021-32626/" source="CVE"/>
		<reference ref_id="CVE-2021-32627" ref_url="https://www.suse.com/security/cve/CVE-2021-32627/" source="CVE"/>
		<reference ref_id="CVE-2021-32628" ref_url="https://www.suse.com/security/cve/CVE-2021-32628/" source="CVE"/>
		<reference ref_id="CVE-2021-32672" ref_url="https://www.suse.com/security/cve/CVE-2021-32672/" source="CVE"/>
		<reference ref_id="CVE-2021-32675" ref_url="https://www.suse.com/security/cve/CVE-2021-32675/" source="CVE"/>
		<reference ref_id="CVE-2021-32687" ref_url="https://www.suse.com/security/cve/CVE-2021-32687/" source="CVE"/>
		<reference ref_id="CVE-2021-32762" ref_url="https://www.suse.com/security/cve/CVE-2021-32762/" source="CVE"/>
		<reference ref_id="CVE-2021-41099" ref_url="https://www.suse.com/security/cve/CVE-2021-41099/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3772-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTFIHYYQFTTATMKJQIWNX7F7WKXQXYDB/" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:
	  
- CVE-2021-32627: Fixed integer to heap buffer overflows with streams (bsc#1191305).
- CVE-2021-32628: Fixed integer to heap buffer overflows handling ziplist-encoded data types (bsc#1191305).
- CVE-2021-32687: Fixed integer to heap buffer overflow with intsets (bsc#1191302).
- CVE-2021-32762: Fixed integer to heap buffer overflow issue in redis-cli and redis-sentinel (bsc#1191300).
- CVE-2021-32626: Fixed heap buffer overflow caused by specially crafted Lua scripts (bsc#1191306).
- CVE-2021-32672: Fixed random heap reading issue with Lua Debugger (bsc#1191304).
- CVE-2021-32675: Fixed Denial Of Service when processing RESP request payloads with a large number of elements on many connections (bsc#1191303).
- CVE-2021-41099: Fixed integer to heap buffer overflow handling certain string commands and network payloads (bsc#1191299).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191299">SUSE bug 1191299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191300">SUSE bug 1191300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191302">SUSE bug 1191302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191303">SUSE bug 1191303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191304">SUSE bug 1191304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191305">SUSE bug 1191305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191306">SUSE bug 1191306</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32626/">CVE-2021-32626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32627/">CVE-2021-32627</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32628/">CVE-2021-32628</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32672/">CVE-2021-32672</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32675/">CVE-2021-32675</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32687/">CVE-2021-32687</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32762/">CVE-2021-32762</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41099/">CVE-2021-41099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655898" comment="redis-6.0.14-6.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52513" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J67T6X7DSN2PDCNE3ENLU6MB6USV53JZ/" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654258" comment="bind-devel-32bit-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654259" comment="libbind9-1600-32bit-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654260" comment="libdns1605-32bit-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654261" comment="libirs1601-32bit-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654262" comment="libisc1606-32bit-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654263" comment="libisccc1600-32bit-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654264" comment="libisccfg1600-32bit-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654265" comment="libns1604-32bit-9.16.6-12.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52514" version="1" class="patch">
	<metadata>
		<title>Security update for netcdf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191856" ref_url="https://bugzilla.suse.com/1191856" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20005" ref_url="https://www.suse.com/security/cve/CVE-2019-20005/" source="CVE"/>
		<reference ref_id="CVE-2019-20006" ref_url="https://www.suse.com/security/cve/CVE-2019-20006/" source="CVE"/>
		<reference ref_id="CVE-2019-20007" ref_url="https://www.suse.com/security/cve/CVE-2019-20007/" source="CVE"/>
		<reference ref_id="CVE-2019-20198" ref_url="https://www.suse.com/security/cve/CVE-2019-20198/" source="CVE"/>
		<reference ref_id="CVE-2019-20199" ref_url="https://www.suse.com/security/cve/CVE-2019-20199/" source="CVE"/>
		<reference ref_id="CVE-2019-20200" ref_url="https://www.suse.com/security/cve/CVE-2019-20200/" source="CVE"/>
		<reference ref_id="CVE-2019-20201" ref_url="https://www.suse.com/security/cve/CVE-2019-20201/" source="CVE"/>
		<reference ref_id="CVE-2019-20202" ref_url="https://www.suse.com/security/cve/CVE-2019-20202/" source="CVE"/>
		<reference ref_id="CVE-2021-26220" ref_url="https://www.suse.com/security/cve/CVE-2021-26220/" source="CVE"/>
		<reference ref_id="CVE-2021-26221" ref_url="https://www.suse.com/security/cve/CVE-2021-26221/" source="CVE"/>
		<reference ref_id="CVE-2021-26222" ref_url="https://www.suse.com/security/cve/CVE-2021-26222/" source="CVE"/>
		<reference ref_id="CVE-2021-30485" ref_url="https://www.suse.com/security/cve/CVE-2021-30485/" source="CVE"/>
		<reference ref_id="CVE-2021-31229" ref_url="https://www.suse.com/security/cve/CVE-2021-31229/" source="CVE"/>
		<reference ref_id="CVE-2021-31347" ref_url="https://www.suse.com/security/cve/CVE-2021-31347/" source="CVE"/>
		<reference ref_id="CVE-2021-31348" ref_url="https://www.suse.com/security/cve/CVE-2021-31348/" source="CVE"/>
		<reference ref_id="CVE-2021-31598" ref_url="https://www.suse.com/security/cve/CVE-2021-31598/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DM4S3HXSBD3QQY6J6J2S4KVWTO63OS7U/" source="SUSE-SU"/>
		<description>
This update for netcdf fixes the following issues:

- Fixed multiple vulnerabilities in ezXML:
    CVE-2019-20007, CVE-2019-20006, CVE-2019-20201, CVE-2019-20202,
    CVE-2019-20199, CVE-2019-20200, CVE-2019-20198, CVE-2021-26221,
    CVE-2021-26222, CVE-2021-30485, CVE-2021-31229, CVE-2021-31347,
    CVE-2021-31348, CVE-2021-31598 (bsc#1191856)
   Note:
   * CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23
     not relevant for netcdf: code isn't used.
   * CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14
     Issue cannot be reproduced and no patch is available upstream.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-25"/>
	<updated date="2021-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20005/">CVE-2019-20005</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20006/">CVE-2019-20006</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20007/">CVE-2019-20007</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20198/">CVE-2019-20198</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20199/">CVE-2019-20199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20200/">CVE-2019-20200</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20201/">CVE-2019-20201</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20202/">CVE-2019-20202</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26220/">CVE-2021-26220</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26221/">CVE-2021-26221</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26222/">CVE-2021-26222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30485/">CVE-2021-30485</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31229/">CVE-2021-31229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31347/">CVE-2021-31347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31348/">CVE-2021-31348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31598/">CVE-2021-31598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658012" comment="libnetcdf13-4.6.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658013" comment="libnetcdf13-32bit-4.6.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658014" comment="libnetcdf13-openmpi-4.6.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658015" comment="libnetcdf13-openmpi-32bit-4.6.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658016" comment="netcdf-openmpi-4.6.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658017" comment="netcdf-openmpi-devel-4.6.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658018" comment="netcdf-openmpi-devel-data-4.6.1-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658019" comment="netcdf-openmpi-devel-static-4.6.1-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52515" version="1" class="patch">
	<metadata>
		<title>Security update for netcdf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191856" ref_url="https://bugzilla.suse.com/1191856" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20005" ref_url="https://www.suse.com/security/cve/CVE-2019-20005/" source="CVE"/>
		<reference ref_id="CVE-2019-20006" ref_url="https://www.suse.com/security/cve/CVE-2019-20006/" source="CVE"/>
		<reference ref_id="CVE-2019-20007" ref_url="https://www.suse.com/security/cve/CVE-2019-20007/" source="CVE"/>
		<reference ref_id="CVE-2019-20198" ref_url="https://www.suse.com/security/cve/CVE-2019-20198/" source="CVE"/>
		<reference ref_id="CVE-2019-20199" ref_url="https://www.suse.com/security/cve/CVE-2019-20199/" source="CVE"/>
		<reference ref_id="CVE-2019-20200" ref_url="https://www.suse.com/security/cve/CVE-2019-20200/" source="CVE"/>
		<reference ref_id="CVE-2019-20201" ref_url="https://www.suse.com/security/cve/CVE-2019-20201/" source="CVE"/>
		<reference ref_id="CVE-2019-20202" ref_url="https://www.suse.com/security/cve/CVE-2019-20202/" source="CVE"/>
		<reference ref_id="CVE-2021-26220" ref_url="https://www.suse.com/security/cve/CVE-2021-26220/" source="CVE"/>
		<reference ref_id="CVE-2021-26221" ref_url="https://www.suse.com/security/cve/CVE-2021-26221/" source="CVE"/>
		<reference ref_id="CVE-2021-26222" ref_url="https://www.suse.com/security/cve/CVE-2021-26222/" source="CVE"/>
		<reference ref_id="CVE-2021-30485" ref_url="https://www.suse.com/security/cve/CVE-2021-30485/" source="CVE"/>
		<reference ref_id="CVE-2021-31229" ref_url="https://www.suse.com/security/cve/CVE-2021-31229/" source="CVE"/>
		<reference ref_id="CVE-2021-31347" ref_url="https://www.suse.com/security/cve/CVE-2021-31347/" source="CVE"/>
		<reference ref_id="CVE-2021-31348" ref_url="https://www.suse.com/security/cve/CVE-2021-31348/" source="CVE"/>
		<reference ref_id="CVE-2021-31598" ref_url="https://www.suse.com/security/cve/CVE-2021-31598/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLIABFAMSFMQHHJZHXO7ZW2B6USV456X/" source="SUSE-SU"/>
		<description>
This update for netcdf fixes the following issues:

- Fixed multiple vulnerabilities in ezXML:
    CVE-2019-20007, CVE-2019-20006, CVE-2019-20201, CVE-2019-20202,
    CVE-2019-20199, CVE-2019-20200, CVE-2019-20198, CVE-2021-26221,
    CVE-2021-26222, CVE-2021-30485, CVE-2021-31229, CVE-2021-31347,
    CVE-2021-31348, CVE-2021-31598 (bsc#1191856)
   Note:
   * CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23
     not relevant for netcdf: code isn't used.
   * CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14
     Issue cannot be reproduced and no patch is available upstream.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-25"/>
	<updated date="2021-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20005/">CVE-2019-20005</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20006/">CVE-2019-20006</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20007/">CVE-2019-20007</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20198/">CVE-2019-20198</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20199/">CVE-2019-20199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20200/">CVE-2019-20200</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20201/">CVE-2019-20201</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20202/">CVE-2019-20202</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26220/">CVE-2021-26220</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26221/">CVE-2021-26221</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26222/">CVE-2021-26222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30485/">CVE-2021-30485</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31229/">CVE-2021-31229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31347/">CVE-2021-31347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31348/">CVE-2021-31348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31598/">CVE-2021-31598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657621" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657622" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657623" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657624" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657625" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657626" comment="netcdf_4_7_3-gnu-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657627" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657628" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657629" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657630" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657631" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657632" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657633" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657634" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657635" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657636" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657637" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657638" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657639" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657640" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-3.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52516" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1180749" ref_url="https://bugzilla.suse.com/1180749" source="BUGZILLA"/>
		<reference ref_id="1184924" ref_url="https://bugzilla.suse.com/1184924" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192217" ref_url="https://bugzilla.suse.com/1192217" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192288" ref_url="https://bugzilla.suse.com/1192288" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192375" ref_url="https://bugzilla.suse.com/1192375" source="BUGZILLA"/>
		<reference ref_id="1192473" ref_url="https://bugzilla.suse.com/1192473" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192758" ref_url="https://bugzilla.suse.com/1192758" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP3 kernel for Azure was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: fix general protection fault in azx_runtime_idle (git-fixes).
- ALSA: hda: Free card instance properly at probe errors (git-fixes).
- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14 (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: hda: Use position buffer for SKL+ again (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: uapi: Fix a C++ style comment in asound.h (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add minimal-mute notion in dB mapping table (bsc#1192375).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink (bsc#1192375).
- ALSA: usb-audio: Use int for dB map values (bsc#1192375).
- ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE (bsc#1192473).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ASoC: SOF: topology: do not power down primary core during topology removal (git-fixes).
- ASoC: topology: Fix stub for snd_soc_tplg_component_remove() (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath10k: sdio: Add missing BH locking around napi_schdule() (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- blacklist.conf: 5c9d706f6133 ('bpf: Fix BPF_LSM kconfig symbol dependency') Not needed since 30897832d8b9 ('bpf: Allow local storage to be used from LSM programs') is not backported.
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22574)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22574).
- bpf: Fix BPF_JIT kconfig symbol dependency (git-fixes jsc#SLE-22574).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- bpf, kconfig: Add consolidated menu entry for bpf with core options (jsc#SLE-22574).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu/display: add quirk handling for stutter mode (git-fixes).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/amdgpu/gmc6: fix DMA mask from 44 to 40 bits (git-fixes).
- drm/i915: Introduce intel_hpd_hotplug_irqs() (bsc#1192758).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm/msm: potential error pointer dereference in init() (git-fixes).
- drm/msm: uninitialized variable in msm_gem_import() (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/ttm: stop calling tt_swapin in vm_access (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/amd64: Set proper family type for Family 19h Models 20h-2Fh (bsc#1192288).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- Eradicate Patch-mainline: No The pre-commit check can reject this deprecated tag then.
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- gpio/rockchip: add driver for rockchip gpio (bsc#1192217).
- gpio/rockchip: drop irq_gc_lock/irq_gc_unlock for irq set type (bsc#1192217).
- gpio/rockchip: extended debounce support is only available on v2 (bsc#1192217).
- gpio/rockchip: fetch deferred output settings on probe (bsc#1192217).
- gpio/rockchip: fix get_direction value handling (bsc#1192217).
- gpio/rockchip: support next version gpio controller (bsc#1192217).
- gpio/rockchip: use struct rockchip_gpio_regs for gpio controller (bsc#1192217).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: fix gve_get_stats() (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- iwlwifi: mvm: fix some kerneldoc issues (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- Move upstreamed sound fix into sorted section
- mt76: mt7615: fix endianness warning in mt7615_mac_write_txwi (git-fixes).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mt76: mt7915: fix muar_idx in mt7915_mcu_alloc_sta_req() (git-fixes).
- mt76: mt7915: fix possible infinite loop release semaphore (git-fixes).
- mt76: mt7915: fix sta_rec_wtbl tag len (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- net/smc: Correct smc link connection counter in case of smc client (git-fixes).
- net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- pinctrl: pinctrl-rockchip: Fix a bunch of kerneldoc misdemeanours (bsc#1192217).
- pinctrl/rockchip: add a queue for deferred pin output settings on probe (bsc#1192217).
- pinctrl/rockchip: add pinctrl device to gpio bank struct (bsc#1192217).
- pinctrl: rockchip: add rk3308 SoC support (bsc#1192217).
- pinctrl: rockchip: add support for rk3568 (bsc#1192217).
- pinctrl/rockchip: always enable clock for gpio controller (bsc#1192217).
- pinctrl: rockchip: clear int status when driver probed (bsc#1192217).
- pinctrl: rockchip: create irq mapping in gpio_to_irq (bsc#1192217).
- pinctrl: rockchip: do coding style for mux route struct (bsc#1192217).
- pinctrl/rockchip: drop the gpio related codes (bsc#1192217).
- pinctrl: rockchip: enable gpio pclk for rockchip_gpio_to_irq (bsc#1192217).
- pinctrl: rockchip: make driver be tristate module (bsc#1192217).
- pinctrl: rockchip: Replace HTTP links with HTTPS ones (bsc#1192217).
- pinctrl: rockchip: return ENOMEM instead of EINVAL if allocation fails (bsc#1192217).
- pinctrl/rockchip: separate struct rockchip_pin_bank to a head file (bsc#1192217).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- PM: sleep: Do not let 'syscore' devices runtime-suspend during system transitions (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (bsc#1184924)
- README.BRANCH: Add Oscar Salvador as SLE15-SP3 maintainer
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/dasd: fix use after free in dasd path handling (git-fixes).
- s390/pci: fix use after free of zpci_dev (git-fixes).
- s390/pci: fix zpci_zdev_put() on reserve (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- s390/topology: clear thread/group maps for offline cpus (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- Update patches.suse/NFS-Do-uncached-readdir-when-we-re-seeking-a-cookie-.patch (bsc#1191628 bsc#1192549). dir_cookie is a pointer to the cookie in older kernels, not the cookie itself.
- Update patch reference for AMDGPU fix (bsc#1180749)
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- USB: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- USB: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-25"/>
	<updated date="2021-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180749">SUSE bug 1180749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184924">SUSE bug 1184924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192217">SUSE bug 1192217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192288">SUSE bug 1192288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192375">SUSE bug 1192375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192473">SUSE bug 1192473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192758">SUSE bug 1192758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657647" comment="cluster-md-kmp-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657648" comment="dlm-kmp-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657649" comment="gfs2-kmp-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657494" comment="kernel-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657495" comment="kernel-azure-devel-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657650" comment="kernel-azure-extra-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657651" comment="kernel-azure-livepatch-devel-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657652" comment="kernel-azure-optional-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657496" comment="kernel-devel-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657497" comment="kernel-source-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657498" comment="kernel-syms-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657653" comment="kselftests-kmp-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657654" comment="ocfs2-kmp-azure-5.3.18-38.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657655" comment="reiserfs-kmp-azure-5.3.18-38.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52517" version="1" class="patch">
	<metadata>
		<title>Security update for netcdf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191856" ref_url="https://bugzilla.suse.com/1191856" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20005" ref_url="https://www.suse.com/security/cve/CVE-2019-20005/" source="CVE"/>
		<reference ref_id="CVE-2019-20006" ref_url="https://www.suse.com/security/cve/CVE-2019-20006/" source="CVE"/>
		<reference ref_id="CVE-2019-20007" ref_url="https://www.suse.com/security/cve/CVE-2019-20007/" source="CVE"/>
		<reference ref_id="CVE-2019-20198" ref_url="https://www.suse.com/security/cve/CVE-2019-20198/" source="CVE"/>
		<reference ref_id="CVE-2019-20199" ref_url="https://www.suse.com/security/cve/CVE-2019-20199/" source="CVE"/>
		<reference ref_id="CVE-2019-20200" ref_url="https://www.suse.com/security/cve/CVE-2019-20200/" source="CVE"/>
		<reference ref_id="CVE-2019-20201" ref_url="https://www.suse.com/security/cve/CVE-2019-20201/" source="CVE"/>
		<reference ref_id="CVE-2019-20202" ref_url="https://www.suse.com/security/cve/CVE-2019-20202/" source="CVE"/>
		<reference ref_id="CVE-2021-26220" ref_url="https://www.suse.com/security/cve/CVE-2021-26220/" source="CVE"/>
		<reference ref_id="CVE-2021-26221" ref_url="https://www.suse.com/security/cve/CVE-2021-26221/" source="CVE"/>
		<reference ref_id="CVE-2021-26222" ref_url="https://www.suse.com/security/cve/CVE-2021-26222/" source="CVE"/>
		<reference ref_id="CVE-2021-30485" ref_url="https://www.suse.com/security/cve/CVE-2021-30485/" source="CVE"/>
		<reference ref_id="CVE-2021-31229" ref_url="https://www.suse.com/security/cve/CVE-2021-31229/" source="CVE"/>
		<reference ref_id="CVE-2021-31347" ref_url="https://www.suse.com/security/cve/CVE-2021-31347/" source="CVE"/>
		<reference ref_id="CVE-2021-31348" ref_url="https://www.suse.com/security/cve/CVE-2021-31348/" source="CVE"/>
		<reference ref_id="CVE-2021-31598" ref_url="https://www.suse.com/security/cve/CVE-2021-31598/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNULBT7RBXXDXTGAFBIJZ4GX5T4OWM7O/" source="SUSE-SU"/>
		<description>
This update for netcdf fixes the following issues:

- Fixed multiple vulnerabilities in ezXML:
    CVE-2019-20007, CVE-2019-20006, CVE-2019-20201, CVE-2019-20202,
    CVE-2019-20199, CVE-2019-20200, CVE-2019-20198, CVE-2021-26221,
    CVE-2021-26222, CVE-2021-30485, CVE-2021-31229, CVE-2021-31347,
    CVE-2021-31348, CVE-2021-31598 (bsc#1191856)
   Note:
   * CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23
     not relevant for netcdf: code isn't used.
   * CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14
     Issue cannot be reproduced and no patch is available upstream.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-30"/>
	<updated date="2021-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20005/">CVE-2019-20005</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20006/">CVE-2019-20006</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20007/">CVE-2019-20007</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20198/">CVE-2019-20198</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20199/">CVE-2019-20199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20200/">CVE-2019-20200</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20201/">CVE-2019-20201</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20202/">CVE-2019-20202</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26220/">CVE-2021-26220</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26221/">CVE-2021-26221</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26222/">CVE-2021-26222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30485/">CVE-2021-30485</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31229/">CVE-2021-31229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31347/">CVE-2021-31347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31348/">CVE-2021-31348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31598/">CVE-2021-31598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657988" comment="libnetcdf-gnu-openmpi1-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657989" comment="libnetcdf_4_6_1-gnu-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657990" comment="libnetcdf_4_6_1-gnu-mpich-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657991" comment="libnetcdf_4_6_1-gnu-mvapich2-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657992" comment="libnetcdf_4_6_1-gnu-openmpi1-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657993" comment="libnetcdf_4_6_1-gnu-openmpi2-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657994" comment="netcdf-gnu-openmpi1-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657995" comment="netcdf-gnu-openmpi1-hpc-devel-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657996" comment="netcdf_4_6_1-gnu-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657997" comment="netcdf_4_6_1-gnu-hpc-devel-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657998" comment="netcdf_4_6_1-gnu-hpc-devel-data-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657999" comment="netcdf_4_6_1-gnu-hpc-devel-static-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658000" comment="netcdf_4_6_1-gnu-mpich-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658001" comment="netcdf_4_6_1-gnu-mpich-hpc-devel-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658002" comment="netcdf_4_6_1-gnu-mpich-hpc-devel-static-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658003" comment="netcdf_4_6_1-gnu-mvapich2-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658004" comment="netcdf_4_6_1-gnu-mvapich2-hpc-devel-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658005" comment="netcdf_4_6_1-gnu-mvapich2-hpc-devel-static-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658006" comment="netcdf_4_6_1-gnu-openmpi1-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658007" comment="netcdf_4_6_1-gnu-openmpi1-hpc-devel-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658008" comment="netcdf_4_6_1-gnu-openmpi1-hpc-devel-static-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658009" comment="netcdf_4_6_1-gnu-openmpi2-hpc-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658010" comment="netcdf_4_6_1-gnu-openmpi2-hpc-devel-4.6.1-10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658011" comment="netcdf_4_6_1-gnu-openmpi2-hpc-devel-static-4.6.1-10.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52518" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1192377" ref_url="https://bugzilla.suse.com/1192377" source="BUGZILLA"/>
		<reference ref_id="1192378" ref_url="https://bugzilla.suse.com/1192378" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771/" source="CVE"/>
		<reference ref_id="CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DRORBGLIRSYNYTIE3EARJHAXYB2X5YQ3/" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Security update go1.17.3 (released 2021-11-04) (bsc#1190649).

- CVE-2021-41771: Fixed invalid dynamic symbol table command that could have caused panic (bsc#1192377).
- CVE-2021-41772: Fixed panic on (*Reader).Open (bsc#1192378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192377">SUSE bug 1192377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192378">SUSE bug 1192378</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654656" comment="go1.17-1.17.3-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654657" comment="go1.17-doc-1.17.3-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654578" comment="go1.17-race-1.17.3-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52519" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1192377" ref_url="https://bugzilla.suse.com/1192377" source="BUGZILLA"/>
		<reference ref_id="1192378" ref_url="https://bugzilla.suse.com/1192378" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771/" source="CVE"/>
		<reference ref_id="CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHZ4EPZFI4C6TOOTOETZZVUOYMZB3YGR/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Security update go1.16.10 (released 2021-11-04) (bsc#1182345).

- CVE-2021-41771: Fixed invalid dynamic symbol table command that could have caused panic (bsc#1192377).
- CVE-2021-41772: Fixed panic on (*Reader).Open (bsc#1192378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192377">SUSE bug 1192377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192378">SUSE bug 1192378</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654573" comment="go1.16-1.16.10-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654574" comment="go1.16-doc-1.16.10-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654575" comment="go1.16-race-1.16.10-1.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52520" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192497" ref_url="https://bugzilla.suse.com/1192497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35604" ref_url="https://www.suse.com/security/cve/CVE-2021-35604/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DXXQH7GP4QGEFOQUT66NP25P4I5OQYPK/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.5.13:
- CVE-2021-35604: Fixed InnoDB vulnerability that allowed an high privileged attacker with network access via multiple protocols to compromise MySQL (bsc#1192497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192497">SUSE bug 1192497</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-35604/">CVE-2021-35604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655913" comment="libmariadbd-devel-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655914" comment="libmariadbd19-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655915" comment="mariadb-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656156" comment="mariadb-bench-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655916" comment="mariadb-client-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655917" comment="mariadb-errormessages-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656157" comment="mariadb-rpm-macros-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656158" comment="mariadb-test-10.5.13-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655918" comment="mariadb-tools-10.5.13-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52521" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657430" comment="libruby2_5-2_5-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657431" comment="ruby2.5-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657432" comment="ruby2.5-devel-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657433" comment="ruby2.5-devel-extra-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657641" comment="ruby2.5-doc-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657642" comment="ruby2.5-doc-ri-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657434" comment="ruby2.5-stdlib-2.5.9-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52522" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pygments (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184812" ref_url="https://bugzilla.suse.com/1184812" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3839-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRWPXQ63T5F7TBOHNMOYC2M33UFGF4XO/" source="SUSE-SU"/>
		<description>
This update for python-Pygments fixes the following issues:

- CVE-2021-27291: Fixed ReDoS via crafted malicious input (bsc#1184812).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184812">SUSE bug 1184812</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657682" comment="python3-Pygments-2.6.1-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52523" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pygments (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184812" ref_url="https://bugzilla.suse.com/1184812" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y2LPAJNM32W4DEWWWLTSSKXRXVTPDXJQ/" source="SUSE-SU"/>
		<description>
This update for python-Pygments fixes the following issues:

- CVE-2021-27291: Fixed ReDoS via crafted malicious input (bsc#1184812).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184812">SUSE bug 1184812</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658099" comment="python2-Pygments-2.2.0-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52524" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192498" ref_url="https://bugzilla.suse.com/1192498" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3933" ref_url="https://www.suse.com/security/cve/CVE-2021-3933/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZ2PO5L23Z2LRC3XFHTL6XCTSPVECICH/" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
- CVE-2021-3933: Fixed integer-overflow in Imf_3_1:bytesPerDeepLineTable (bsc#1192498).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192498">SUSE bug 1192498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3933/">CVE-2021-3933</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656737" comment="libIlmImf-2_2-23-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656889" comment="libIlmImf-2_2-23-32bit-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656738" comment="libIlmImfUtil-2_2-23-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656890" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656891" comment="openexr-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656739" comment="openexr-devel-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656892" comment="openexr-doc-2.2.1-3.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52525" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1092945" ref_url="https://bugzilla.suse.com/1092945" source="BUGZILLA"/>
		<reference ref_id="1102531" ref_url="https://bugzilla.suse.com/1102531" source="BUGZILLA"/>
		<reference ref_id="1107597" ref_url="https://bugzilla.suse.com/1107597" source="BUGZILLA"/>
		<reference ref_id="1114966" ref_url="https://bugzilla.suse.com/1114966" source="BUGZILLA"/>
		<reference ref_id="1115185" ref_url="https://bugzilla.suse.com/1115185" source="BUGZILLA"/>
		<reference ref_id="1115186" ref_url="https://bugzilla.suse.com/1115186" source="BUGZILLA"/>
		<reference ref_id="1115187" ref_url="https://bugzilla.suse.com/1115187" source="BUGZILLA"/>
		<reference ref_id="1115626" ref_url="https://bugzilla.suse.com/1115626" source="BUGZILLA"/>
		<reference ref_id="1120495" ref_url="https://bugzilla.suse.com/1120495" source="BUGZILLA"/>
		<reference ref_id="1120496" ref_url="https://bugzilla.suse.com/1120496" source="BUGZILLA"/>
		<reference ref_id="1120939" ref_url="https://bugzilla.suse.com/1120939" source="BUGZILLA"/>
		<reference ref_id="1120956" ref_url="https://bugzilla.suse.com/1120956" source="BUGZILLA"/>
		<reference ref_id="1124150" ref_url="https://bugzilla.suse.com/1124150" source="BUGZILLA"/>
		<reference ref_id="1127329" ref_url="https://bugzilla.suse.com/1127329" source="BUGZILLA"/>
		<reference ref_id="1129202" ref_url="https://bugzilla.suse.com/1129202" source="BUGZILLA"/>
		<reference ref_id="1130229" ref_url="https://bugzilla.suse.com/1130229" source="BUGZILLA"/>
		<reference ref_id="1131696" ref_url="https://bugzilla.suse.com/1131696" source="BUGZILLA"/>
		<reference ref_id="1131722" ref_url="https://bugzilla.suse.com/1131722" source="BUGZILLA"/>
		<reference ref_id="1142465" ref_url="https://bugzilla.suse.com/1142465" source="BUGZILLA"/>
		<reference ref_id="1143950" ref_url="https://bugzilla.suse.com/1143950" source="BUGZILLA"/>
		<reference ref_id="1179163" ref_url="https://bugzilla.suse.com/1179163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18267" ref_url="https://www.suse.com/security/cve/CVE-2017-18267/" source="CVE"/>
		<reference ref_id="CVE-2018-13988" ref_url="https://www.suse.com/security/cve/CVE-2018-13988/" source="CVE"/>
		<reference ref_id="CVE-2018-16646" ref_url="https://www.suse.com/security/cve/CVE-2018-16646/" source="CVE"/>
		<reference ref_id="CVE-2018-18897" ref_url="https://www.suse.com/security/cve/CVE-2018-18897/" source="CVE"/>
		<reference ref_id="CVE-2018-19058" ref_url="https://www.suse.com/security/cve/CVE-2018-19058/" source="CVE"/>
		<reference ref_id="CVE-2018-19059" ref_url="https://www.suse.com/security/cve/CVE-2018-19059/" source="CVE"/>
		<reference ref_id="CVE-2018-19060" ref_url="https://www.suse.com/security/cve/CVE-2018-19060/" source="CVE"/>
		<reference ref_id="CVE-2018-19149" ref_url="https://www.suse.com/security/cve/CVE-2018-19149/" source="CVE"/>
		<reference ref_id="CVE-2018-20481" ref_url="https://www.suse.com/security/cve/CVE-2018-20481/" source="CVE"/>
		<reference ref_id="CVE-2018-20551" ref_url="https://www.suse.com/security/cve/CVE-2018-20551/" source="CVE"/>
		<reference ref_id="CVE-2018-20650" ref_url="https://www.suse.com/security/cve/CVE-2018-20650/" source="CVE"/>
		<reference ref_id="CVE-2018-20662" ref_url="https://www.suse.com/security/cve/CVE-2018-20662/" source="CVE"/>
		<reference ref_id="CVE-2019-10871" ref_url="https://www.suse.com/security/cve/CVE-2019-10871/" source="CVE"/>
		<reference ref_id="CVE-2019-10872" ref_url="https://www.suse.com/security/cve/CVE-2019-10872/" source="CVE"/>
		<reference ref_id="CVE-2019-14494" ref_url="https://www.suse.com/security/cve/CVE-2019-14494/" source="CVE"/>
		<reference ref_id="CVE-2019-7310" ref_url="https://www.suse.com/security/cve/CVE-2019-7310/" source="CVE"/>
		<reference ref_id="CVE-2019-9200" ref_url="https://www.suse.com/security/cve/CVE-2019-9200/" source="CVE"/>
		<reference ref_id="CVE-2019-9631" ref_url="https://www.suse.com/security/cve/CVE-2019-9631/" source="CVE"/>
		<reference ref_id="CVE-2019-9903" ref_url="https://www.suse.com/security/cve/CVE-2019-9903/" source="CVE"/>
		<reference ref_id="CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959/" source="CVE"/>
		<reference ref_id="CVE-2020-27778" ref_url="https://www.suse.com/security/cve/CVE-2020-27778/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-18267: Fixed an infinite recursion that would allow remote attackers to cause a denial of service (bsc#1092945).
- CVE-2018-13988: Added an improper implementation check which otherwise could allow buffer overflows, memory corruption, and denial of service (bsc#1102531).
- CVE-2018-16646: Fixed an infinite recursion which could allow a denial-of-service attack via a specially crafted PDF file (bsc#1107597).
- CVE-2018-18897: Fixed a memory leak (bsc#1114966).
- CVE-2018-19058: Fixed a bug which could allow a denial-of-service attack via a specially crafted PDF file (bsc#1115187).
- CVE-2018-19059: Fixed an out-of-bounds read access which could allow a denial-of-service attack (bsc#1115186).
- CVE-2018-19060: Fixed a NULL pointer dereference which could allow a denial-of-service attack (bsc#1115185).
- CVE-2018-19149: Fixed a NULL pointer dereference which could allow a denial-of-service attack (bsc#1115626).
- CVE-2018-20481: Fixed a NULL pointer dereference while handling unallocated XRef entries which could allow a denial-of-service attack (bsc#1120495).
- CVE-2018-20551: Fixed a reachable assertion which could allow a denial-of-service attack through specially crafted PDF files (bsc#1120496).
- CVE-2018-20650: Fixed a reachable assertion which could allow denial-of-service through specially crafted PDF files (bsc#1120939).
- CVE-2018-20662: Fixed a bug which could potentially crash the running process by SIGABRT resulting in a denial-of-service attack through a specially crafted PDF file (bsc#1120956).
- CVE-2019-10871: Fixed a heap-based buffer  over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc (bsc#1131696).
- CVE-2019-10872: Fixed a heap-based buffer over-read in the function Splash::blitTransparent at splash/Splash.cc (bsc#1131722).
- CVE-2019-14494: Fixed a divide-by-zero error in the function SplashOutputDev::tilingPatternFill (bsc#1143950).
- CVE-2019-7310: Fixed a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) that allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document (bsc#1124150).
- CVE-2019-9200: Fixed a heap-based buffer underwrite which could allow denial-of-service attack through a specially crafted PDF file (bsc#1127329)
- CVE-2019-9631: Fixed a heap-based buffer over-read  in the CairoRescaleBox.cc downsample_row_box_filter function (bsc#1129202).
- CVE-2019-9903: Fixed excessive stack consumption in the Dict::find() method, which can be triggered by passing a crafted pdf file to the pdfunite binary (bsc#1130229).
- CVE-2019-9959: Fixed integer overflow that made it possible to allocate a large memory chunk on the heap with a size controlled by an attacker (bsc#1142465).
- CVE-2020-27778: Fixed buffer overflow vulnerability in pdftohtml (bsc#1179163).
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092945">SUSE bug 1092945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102531">SUSE bug 1102531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107597">SUSE bug 1107597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114966">SUSE bug 1114966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115185">SUSE bug 1115185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115186">SUSE bug 1115186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115187">SUSE bug 1115187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115626">SUSE bug 1115626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120495">SUSE bug 1120495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120496">SUSE bug 1120496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120939">SUSE bug 1120939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120956">SUSE bug 1120956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124150">SUSE bug 1124150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127329">SUSE bug 1127329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129202">SUSE bug 1129202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130229">SUSE bug 1130229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131696">SUSE bug 1131696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131722">SUSE bug 1131722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142465">SUSE bug 1142465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143950">SUSE bug 1143950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179163">SUSE bug 1179163</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18267/">CVE-2017-18267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13988/">CVE-2018-13988</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16646/">CVE-2018-16646</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18897/">CVE-2018-18897</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19058/">CVE-2018-19058</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19059/">CVE-2018-19059</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19060/">CVE-2018-19060</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19149/">CVE-2018-19149</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20481/">CVE-2018-20481</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20551/">CVE-2018-20551</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20650/">CVE-2018-20650</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20662/">CVE-2018-20662</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10871/">CVE-2019-10871</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10872/">CVE-2019-10872</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14494/">CVE-2019-14494</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7310/">CVE-2019-7310</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9200/">CVE-2019-9200</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9631/">CVE-2019-9631</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9903/">CVE-2019-9903</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27778/">CVE-2020-27778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658129" comment="libpoppler73-0.62.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658240" comment="libpoppler73-32bit-0.62.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52526" version="1" class="patch">
	<metadata>
		<title>Security update for python-sqlparse (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190741" ref_url="https://bugzilla.suse.com/1190741" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32839" ref_url="https://www.suse.com/security/cve/CVE-2021-32839/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3857-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IYCTMYSALFWYSEWJYEO6WJYBAK6J5D4X/" source="SUSE-SU"/>
		<description>
This update for python-sqlparse fixes the following issues:

- CVE-2021-32839: Fixed ReDoS via regular expression in StripComments filter (bsc#1190741).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190741">SUSE bug 1190741</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32839/">CVE-2021-32839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656736" comment="python3-sqlparse-0.4.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52527" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3JTMWLYWFOOWVMDAUX2VBB5ZULOV3LY/" source="SUSE-SU"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656414" comment="libspeex1-1.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656461" comment="libspeex1-32bit-1.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656727" comment="speex-1.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656415" comment="speex-devel-1.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52528" version="1" class="patch">
	<metadata>
		<title>Security update for netcdf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191856" ref_url="https://bugzilla.suse.com/1191856" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20005" ref_url="https://www.suse.com/security/cve/CVE-2019-20005/" source="CVE"/>
		<reference ref_id="CVE-2019-20006" ref_url="https://www.suse.com/security/cve/CVE-2019-20006/" source="CVE"/>
		<reference ref_id="CVE-2019-20007" ref_url="https://www.suse.com/security/cve/CVE-2019-20007/" source="CVE"/>
		<reference ref_id="CVE-2019-20198" ref_url="https://www.suse.com/security/cve/CVE-2019-20198/" source="CVE"/>
		<reference ref_id="CVE-2019-20199" ref_url="https://www.suse.com/security/cve/CVE-2019-20199/" source="CVE"/>
		<reference ref_id="CVE-2019-20200" ref_url="https://www.suse.com/security/cve/CVE-2019-20200/" source="CVE"/>
		<reference ref_id="CVE-2019-20201" ref_url="https://www.suse.com/security/cve/CVE-2019-20201/" source="CVE"/>
		<reference ref_id="CVE-2019-20202" ref_url="https://www.suse.com/security/cve/CVE-2019-20202/" source="CVE"/>
		<reference ref_id="CVE-2021-26220" ref_url="https://www.suse.com/security/cve/CVE-2021-26220/" source="CVE"/>
		<reference ref_id="CVE-2021-26221" ref_url="https://www.suse.com/security/cve/CVE-2021-26221/" source="CVE"/>
		<reference ref_id="CVE-2021-26222" ref_url="https://www.suse.com/security/cve/CVE-2021-26222/" source="CVE"/>
		<reference ref_id="CVE-2021-30485" ref_url="https://www.suse.com/security/cve/CVE-2021-30485/" source="CVE"/>
		<reference ref_id="CVE-2021-31229" ref_url="https://www.suse.com/security/cve/CVE-2021-31229/" source="CVE"/>
		<reference ref_id="CVE-2021-31347" ref_url="https://www.suse.com/security/cve/CVE-2021-31347/" source="CVE"/>
		<reference ref_id="CVE-2021-31348" ref_url="https://www.suse.com/security/cve/CVE-2021-31348/" source="CVE"/>
		<reference ref_id="CVE-2021-31598" ref_url="https://www.suse.com/security/cve/CVE-2021-31598/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRUN6AONIMN6NUO34LRB46EYI53X2XBI/" source="SUSE-SU"/>
		<description>
This update for netcdf fixes the following issues:

- Fixed multiple vulnerabilities in ezXML:
    CVE-2019-20007, CVE-2019-20006, CVE-2019-20201, CVE-2019-20202,
    CVE-2019-20199, CVE-2019-20200, CVE-2019-20198, CVE-2021-26221,
    CVE-2021-26222, CVE-2021-30485, CVE-2021-31229, CVE-2021-31347,
    CVE-2021-31348, CVE-2021-31598 (bsc#1191856)
   Note:
   * CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23
     not relevant for netcdf: code isn't used.
   * CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14
     Issue cannot be reproduced and no patch is available upstream.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-02"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20005/">CVE-2019-20005</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20006/">CVE-2019-20006</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20007/">CVE-2019-20007</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20198/">CVE-2019-20198</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20199/">CVE-2019-20199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20200/">CVE-2019-20200</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20201/">CVE-2019-20201</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20202/">CVE-2019-20202</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26220/">CVE-2021-26220</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26221/">CVE-2021-26221</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26222/">CVE-2021-26222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30485/">CVE-2021-30485</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31229/">CVE-2021-31229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31347/">CVE-2021-31347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31348/">CVE-2021-31348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31598/">CVE-2021-31598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657935" comment="libnetcdf-gnu-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657936" comment="libnetcdf-gnu-mpich-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657937" comment="libnetcdf-gnu-mvapich2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657938" comment="libnetcdf-gnu-openmpi2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657939" comment="libnetcdf-gnu-openmpi3-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657940" comment="libnetcdf-gnu-openmpi4-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657941" comment="libnetcdf18-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657942" comment="libnetcdf18-32bit-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657943" comment="libnetcdf18-openmpi2-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657944" comment="libnetcdf18-openmpi2-32bit-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657945" comment="libnetcdf18-openmpi3-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657946" comment="libnetcdf18-openmpi3-32bit-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657947" comment="libnetcdf18-openmpi4-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657948" comment="libnetcdf18-openmpi4-32bit-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657949" comment="libnetcdf_4_7_4-gnu-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657950" comment="libnetcdf_4_7_4-gnu-mpich-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657951" comment="libnetcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657952" comment="libnetcdf_4_7_4-gnu-openmpi2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657953" comment="libnetcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657954" comment="libnetcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657955" comment="netcdf-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657956" comment="netcdf-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657957" comment="netcdf-devel-data-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657958" comment="netcdf-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657698" comment="netcdf-gnu-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657699" comment="netcdf-gnu-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657700" comment="netcdf-gnu-mpich-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657701" comment="netcdf-gnu-mpich-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657702" comment="netcdf-gnu-mvapich2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657703" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657959" comment="netcdf-gnu-openmpi2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657960" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657704" comment="netcdf-gnu-openmpi3-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657705" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657706" comment="netcdf-gnu-openmpi4-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657707" comment="netcdf-gnu-openmpi4-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657961" comment="netcdf-openmpi2-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657962" comment="netcdf-openmpi2-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657963" comment="netcdf-openmpi2-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657964" comment="netcdf-openmpi3-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657965" comment="netcdf-openmpi3-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657966" comment="netcdf-openmpi3-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657967" comment="netcdf-openmpi4-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657968" comment="netcdf-openmpi4-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657969" comment="netcdf-openmpi4-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657970" comment="netcdf_4_7_4-gnu-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657971" comment="netcdf_4_7_4-gnu-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657972" comment="netcdf_4_7_4-gnu-hpc-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657973" comment="netcdf_4_7_4-gnu-mpich-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657974" comment="netcdf_4_7_4-gnu-mpich-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657975" comment="netcdf_4_7_4-gnu-mpich-hpc-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657976" comment="netcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657977" comment="netcdf_4_7_4-gnu-mvapich2-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657978" comment="netcdf_4_7_4-gnu-mvapich2-hpc-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657979" comment="netcdf_4_7_4-gnu-openmpi2-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657980" comment="netcdf_4_7_4-gnu-openmpi2-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657981" comment="netcdf_4_7_4-gnu-openmpi2-hpc-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657982" comment="netcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657983" comment="netcdf_4_7_4-gnu-openmpi3-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657984" comment="netcdf_4_7_4-gnu-openmpi3-hpc-devel-static-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657985" comment="netcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657986" comment="netcdf_4_7_4-gnu-openmpi4-hpc-devel-4.7.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657987" comment="netcdf_4_7_4-gnu-openmpi4-hpc-devel-static-4.7.4-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52529" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNTYOXRXVCTEGNIBJB3F6WZPD4CNOQI7/" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-02"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657441" comment="libjavascriptcoregtk-4_0-18-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657643" comment="libjavascriptcoregtk-4_0-18-32bit-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657442" comment="libwebkit2gtk-4_0-37-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657644" comment="libwebkit2gtk-4_0-37-32bit-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657443" comment="libwebkit2gtk3-lang-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657446" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657447" comment="typelib-1_0-WebKit2-4_0-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657448" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657645" comment="webkit-jsc-4-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657444" comment="webkit2gtk-4_0-injected-bundles-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657449" comment="webkit2gtk3-devel-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657646" comment="webkit2gtk3-minibrowser-2.34.1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52530" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1108488" ref_url="https://bugzilla.suse.com/1108488" source="BUGZILLA"/>
		<reference ref_id="1129735" ref_url="https://bugzilla.suse.com/1129735" source="BUGZILLA"/>
		<reference ref_id="1129898" ref_url="https://bugzilla.suse.com/1129898" source="BUGZILLA"/>
		<reference ref_id="1133374" ref_url="https://bugzilla.suse.com/1133374" source="BUGZILLA"/>
		<reference ref_id="1136513" ref_url="https://bugzilla.suse.com/1136513" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1176724" ref_url="https://bugzilla.suse.com/1176724" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1186078" ref_url="https://bugzilla.suse.com/1186078" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189846" ref_url="https://bugzilla.suse.com/1189846" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190276" ref_url="https://bugzilla.suse.com/1190276" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190601" ref_url="https://bugzilla.suse.com/1190601" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191457" ref_url="https://bugzilla.suse.com/1191457" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191888" ref_url="https://bugzilla.suse.com/1191888" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192379" ref_url="https://bugzilla.suse.com/1192379" source="BUGZILLA"/>
		<reference ref_id="1192400" ref_url="https://bugzilla.suse.com/1192400" source="BUGZILLA"/>
		<reference ref_id="1192775" ref_url="https://bugzilla.suse.com/1192775" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-9517" ref_url="https://www.suse.com/security/cve/CVE-2018-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-3874" ref_url="https://www.suse.com/security/cve/CVE-2019-3874/" source="CVE"/>
		<reference ref_id="CVE-2019-3900" ref_url="https://www.suse.com/security/cve/CVE-2019-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).
- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).
- CVE-2021-42252: An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes (bnc#1190479).
- CVE-2021-41864: prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2021-3759: Unaccounted ipc objects could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).
- CVE-2021-3752: Fixed a use after free vulnerability in the bluetooth module. (bsc#1190023)
- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2020-12770: An issue was discovered in the Linux kernel sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040 (bnc#1171420).
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario (bnc#1133374).
- CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. (bnc#1129898).
- CVE-2018-9517: In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108488).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in the tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#0 bnc#1177666 bnc#1181158).
- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).
- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).
- CVE-2021-22543: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bnc#1186482 bnc#1190276).
- CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05 (bnc#1188062 bnc#1188063).

The following non-security bugs were fixed:

- Add arch-dependent support markers in supported.conf (bsc#1186672) 
- Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1191888).
- config: disable unprivileged BPF by default (jsc#SLE-22913)
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).
- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).
- hisax: fix spectre issues (bsc#1192802).
- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).
- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).
- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- kernel-binary.spec: Fix up usrmerge for non-modular kernels.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).
- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).
- media: wl128x: get rid of a potential spectre issue (bsc#1192802).
- memcg: enable accounting for file lock caches (bsc#1190115).
- mm/memory.c: do_fault: avoid usage of stale vm_area_struct (bsc#1136513).
- mpt3sas: fix spectre issues (bsc#1192802).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- objtool: Do not fail on missing symbol table (bsc#1192379).
- osst: fix spectre issue in osst_verify_frame (bsc#1192802).
- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).
- ovl: filter of trusted xattr results in audit (bsc#1189846).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).
- ovl: initialize error in ovl_copy_xattr (bsc#1189846).
- ovl: relax WARN_ON() on rename to self (bsc#1189846).
- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
- Revert 'memcg: enable accounting for file lock caches (bsc#1190115).' This reverts commit 912b4421a3e9bb9f0ef1aadc64a436666259bd4d. It's effectively upstream commit 3754707bcc3e190e5dadc978d172b61e809cb3bd applied to kernel-source (to avoid proliferation of patches). Make a note in blacklist.conf too.
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
- scripts/git_sort/git_sort.py: add bpf git repo
- scripts/git_sort/git_sort.py: Update nvme repositories
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1191349).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349 bsc#1191457).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1191349 bsc#1191457).
- scsi: target: avoid using lun_tg_pt_gp after unlock (bsc#1186078).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).
- target: core: Fix sense key for invalid XCOPY request (bsc#1186078).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- Use /usr/lib/modules as module dir when usermerge is active in the target distro.
- UsrMerge the kernel (boo#1184804)
- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-02"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108488">SUSE bug 1108488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129898">SUSE bug 1129898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133374">SUSE bug 1133374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136513">SUSE bug 1136513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186078">SUSE bug 1186078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189846">SUSE bug 1189846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190601">SUSE bug 1190601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191457">SUSE bug 1191457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191888">SUSE bug 1191888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192379">SUSE bug 1192379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192400">SUSE bug 1192400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9517/">CVE-2018-9517</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3874/">CVE-2019-3874</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3900/">CVE-2019-3900</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658245" comment="kernel-debug-base-4.12.14-197.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658155" comment="kernel-default-man-4.12.14-197.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658246" comment="kernel-kvmsmall-base-4.12.14-197.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658247" comment="kernel-vanilla-4.12.14-197.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658248" comment="kernel-vanilla-base-4.12.14-197.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658249" comment="kernel-vanilla-devel-4.12.14-197.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658250" comment="kernel-vanilla-livepatch-devel-4.12.14-197.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658251" comment="kernel-zfcpdump-man-4.12.14-197.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52531" version="1" class="patch">
	<metadata>
		<title>Security update for aaa_base (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1162581" ref_url="https://bugzilla.suse.com/1162581" source="BUGZILLA"/>
		<reference ref_id="1174504" ref_url="https://bugzilla.suse.com/1174504" source="BUGZILLA"/>
		<reference ref_id="1191563" ref_url="https://bugzilla.suse.com/1191563" source="BUGZILLA"/>
		<reference ref_id="1192248" ref_url="https://bugzilla.suse.com/1192248" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:3899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVYY6IZTLL4KOZ3MJ4J7BKIFJA2XZFIU/" source="SUSE-SU"/>
		<description>
This update for aaa_base fixes the following issues:

- Allowed ping and ICMP commands without CAP_NET_RAW (bsc#1174504).
- Add $HOME/.local/bin to PATH, if it exists (bsc#1192248).
- Fixed get_kernel_version.c to work also for recent kernels on the s390/X platform (bsc#1191563).
- Support xz compressed kernel (bsc#1162581)   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-03"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162581">SUSE bug 1162581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174504">SUSE bug 1174504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191563">SUSE bug 1191563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192248">SUSE bug 1192248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658779" comment="aaa_base-84.87+git20180409.04c9dae-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658780" comment="aaa_base-extras-84.87+git20180409.04c9dae-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658789" comment="aaa_base-malloccheck-84.87+git20180409.04c9dae-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658863" comment="aaa_base-wsl-84.87+git20180409.04c9dae-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52532" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZRKUBO5D2JZTQ5VCQBSEGXEMFC4D5FB/" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659026" comment="libfreebl3-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659027" comment="libfreebl3-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659028" comment="libfreebl3-hmac-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659029" comment="libfreebl3-hmac-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659030" comment="libsoftokn3-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659031" comment="libsoftokn3-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659032" comment="libsoftokn3-hmac-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659033" comment="libsoftokn3-hmac-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659034" comment="mozilla-nss-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659035" comment="mozilla-nss-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659036" comment="mozilla-nss-certs-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659037" comment="mozilla-nss-certs-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659038" comment="mozilla-nss-devel-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659039" comment="mozilla-nss-sysinit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659231" comment="mozilla-nss-sysinit-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659040" comment="mozilla-nss-tools-3.68.1-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52533" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192830" ref_url="https://bugzilla.suse.com/1192830" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39920" ref_url="https://www.suse.com/security/cve/CVE-2021-39920/" source="CVE"/>
		<reference ref_id="CVE-2021-39921" ref_url="https://www.suse.com/security/cve/CVE-2021-39921/" source="CVE"/>
		<reference ref_id="CVE-2021-39922" ref_url="https://www.suse.com/security/cve/CVE-2021-39922/" source="CVE"/>
		<reference ref_id="CVE-2021-39924" ref_url="https://www.suse.com/security/cve/CVE-2021-39924/" source="CVE"/>
		<reference ref_id="CVE-2021-39925" ref_url="https://www.suse.com/security/cve/CVE-2021-39925/" source="CVE"/>
		<reference ref_id="CVE-2021-39926" ref_url="https://www.suse.com/security/cve/CVE-2021-39926/" source="CVE"/>
		<reference ref_id="CVE-2021-39928" ref_url="https://www.suse.com/security/cve/CVE-2021-39928/" source="CVE"/>
		<reference ref_id="CVE-2021-39929" ref_url="https://www.suse.com/security/cve/CVE-2021-39929/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AUQBQMT4O7Y26OSAOSJT4MNYT4MQ6ME/" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to Wireshark 3.4.10:
- CVE-2021-39920: IPPUSB dissector crash (bsc#1192830).
- CVE-2021-39921: Modbus dissector crash (bsc#1192830).
- CVE-2021-39922: C12.22 dissector crash (bsc#1192830).
- CVE-2021-39924: Bluetooth DHT dissector large loop (bsc#1192830).
- CVE-2021-39925: Bluetooth SDP dissector crash (bsc#1192830).
- CVE-2021-39926: Bluetooth HCI_ISO dissector crash (bsc#1192830).
- CVE-2021-39928: IEEE 802.11 dissector crash (bsc#1192830).
- CVE-2021-39929: Bluetooth DHT dissector crash (bsc#1192830).      
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39920/">CVE-2021-39920</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39921/">CVE-2021-39921</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39922/">CVE-2021-39922</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39924/">CVE-2021-39924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39925/">CVE-2021-39925</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39926/">CVE-2021-39926</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39928/">CVE-2021-39928</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39929/">CVE-2021-39929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658079" comment="libwireshark14-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658080" comment="libwiretap11-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658081" comment="libwsutil12-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658082" comment="wireshark-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658091" comment="wireshark-devel-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658092" comment="wireshark-ui-qt-3.4.10-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52534" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190053" ref_url="https://bugzilla.suse.com/1190053" source="BUGZILLA"/>
		<reference ref_id="1190054" ref_url="https://bugzilla.suse.com/1190054" source="BUGZILLA"/>
		<reference ref_id="1190055" ref_url="https://bugzilla.suse.com/1190055" source="BUGZILLA"/>
		<reference ref_id="1190056" ref_url="https://bugzilla.suse.com/1190056" source="BUGZILLA"/>
		<reference ref_id="1190057" ref_url="https://bugzilla.suse.com/1190057" source="BUGZILLA"/>
		<reference ref_id="1191601" ref_url="https://bugzilla.suse.com/1191601" source="BUGZILLA"/>
		<reference ref_id="1191602" ref_url="https://bugzilla.suse.com/1191602" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701/" source="CVE"/>
		<reference ref_id="CVE-2021-37712" ref_url="https://www.suse.com/security/cve/CVE-2021-37712/" source="CVE"/>
		<reference ref_id="CVE-2021-37713" ref_url="https://www.suse.com/security/cve/CVE-2021-37713/" source="CVE"/>
		<reference ref_id="CVE-2021-39134" ref_url="https://www.suse.com/security/cve/CVE-2021-39134/" source="CVE"/>
		<reference ref_id="CVE-2021-39135" ref_url="https://www.suse.com/security/cve/CVE-2021-39135/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).
- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).
- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057). 
- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056). 
- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055). 
- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054). 
- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190053">SUSE bug 1190053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190054">SUSE bug 1190054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190055">SUSE bug 1190055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190056">SUSE bug 1190056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190057">SUSE bug 1190057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191601">SUSE bug 1191601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191602">SUSE bug 1191602</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37712/">CVE-2021-37712</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37713/">CVE-2021-37713</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39134/">CVE-2021-39134</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39135/">CVE-2021-39135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658598" comment="nodejs12-12.22.7-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658599" comment="nodejs12-devel-12.22.7-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658600" comment="nodejs12-docs-12.22.7-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658601" comment="npm12-12.22.7-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52535" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1184924" ref_url="https://bugzilla.suse.com/1184924" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192217" ref_url="https://bugzilla.suse.com/1192217" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192375" ref_url="https://bugzilla.suse.com/1192375" source="BUGZILLA"/>
		<reference ref_id="1192473" ref_url="https://bugzilla.suse.com/1192473" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192758" ref_url="https://bugzilla.suse.com/1192758" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045 ).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: fix general protection fault in azx_runtime_idle (git-fixes).
- ALSA: hda: Free card instance properly at probe errors (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add minimal-mute notion in dB mapping table (bsc#1192375).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink (bsc#1192375).
- ALSA: usb-audio: Use int for dB map values (bsc#1192375).
- ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE (bsc#1192473).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22574)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22574).
- bpf: Fix BPF_JIT kconfig symbol dependency (git-fixes jsc#SLE-22574).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- bpf, kconfig: Add consolidated menu entry for bpf with core options (jsc#SLE-22574).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573) Backport of mainline commit 8a03e56b253e ('bpf: Disallow unprivileged bpf by default') only changes kconfig default, used e.g. for 'make oldconfig' when the config option is missing, but does not update our kernel configs used for build. Update also these to make sure unprivileged BPF is really disabled by default.
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- drm/i915: Introduce intel_hpd_hotplug_irqs() (bsc#1192758).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- Eradicate Patch-mainline: No The pre-commit check can reject this deprecated tag then.
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- Fix problem with missing installkernel on Tumbleweed.
- fuse: fix page stealing (bsc#1192718).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- gpio/rockchip: add driver for rockchip gpio (bsc#1192217).
- gpio/rockchip: drop irq_gc_lock/irq_gc_unlock for irq set type (bsc#1192217).
- gpio/rockchip: extended debounce support is only available on v2 (bsc#1192217).
- gpio/rockchip: fetch deferred output settings on probe (bsc#1192217).
- gpio/rockchip: fix get_direction value handling (bsc#1192217).
- gpio/rockchip: support next version gpio controller (bsc#1192217).
- gpio/rockchip: use struct rockchip_gpio_regs for gpio controller (bsc#1192217).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- Move upstreamed sound fix into sorted section
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- net/smc: Correct smc link connection counter in case of smc client (git-fixes).
- net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work (git-fixes).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- pinctrl: pinctrl-rockchip: Fix a bunch of kerneldoc misdemeanours (bsc#1192217).
- pinctrl/rockchip: add a queue for deferred pin output settings on probe (bsc#1192217).
- pinctrl/rockchip: add pinctrl device to gpio bank struct (bsc#1192217).
- pinctrl: rockchip: add rk3308 SoC support (bsc#1192217).
- pinctrl: rockchip: add support for rk3568 (bsc#1192217).
- pinctrl/rockchip: always enable clock for gpio controller (bsc#1192217).
- pinctrl: rockchip: clear int status when driver probed (bsc#1192217).
- pinctrl: rockchip: create irq mapping in gpio_to_irq (bsc#1192217).
- pinctrl: rockchip: do coding style for mux route struct (bsc#1192217).
- pinctrl/rockchip: drop the gpio related codes (bsc#1192217).
- pinctrl: rockchip: enable gpio pclk for rockchip_gpio_to_irq (bsc#1192217).
- pinctrl: rockchip: make driver be tristate module (bsc#1192217).
- pinctrl: rockchip: Replace HTTP links with HTTPS ones (bsc#1192217).
- pinctrl: rockchip: return ENOMEM instead of EINVAL if allocation fails (bsc#1192217).
- pinctrl/rockchip: separate struct rockchip_pin_bank to a head file (bsc#1192217).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033-battery: Change voltage values to 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (bsc#1184924)
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- s390/dasd: fix use after free in dasd path handling (git-fixes).
- s390/pci: fix use after free of zpci_dev (git-fixes).
- s390/pci: fix zpci_zdev_put() on reserve (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- s390/topology: clear thread/group maps for offline cpus (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- Update config files: pull BPF configs together
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- USB: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- USB: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184924">SUSE bug 1184924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192217">SUSE bug 1192217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192375">SUSE bug 1192375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192473">SUSE bug 1192473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192758">SUSE bug 1192758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658020" comment="cluster-md-kmp-64kb-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657757" comment="cluster-md-kmp-default-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658021" comment="cluster-md-kmp-preempt-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658022" comment="dlm-kmp-64kb-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657758" comment="dlm-kmp-default-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658023" comment="dlm-kmp-preempt-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658024" comment="dtb-al-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658025" comment="dtb-allwinner-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658026" comment="dtb-altera-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658027" comment="dtb-amd-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658028" comment="dtb-amlogic-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658029" comment="dtb-apm-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658030" comment="dtb-arm-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658031" comment="dtb-broadcom-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658032" comment="dtb-cavium-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658033" comment="dtb-exynos-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658034" comment="dtb-freescale-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658035" comment="dtb-hisilicon-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658036" comment="dtb-lg-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658037" comment="dtb-marvell-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658038" comment="dtb-mediatek-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658039" comment="dtb-nvidia-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658040" comment="dtb-qcom-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658041" comment="dtb-renesas-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658042" comment="dtb-rockchip-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658043" comment="dtb-socionext-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658044" comment="dtb-sprd-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658045" comment="dtb-xilinx-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658046" comment="dtb-zte-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658047" comment="gfs2-kmp-64kb-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657759" comment="gfs2-kmp-default-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658048" comment="gfs2-kmp-preempt-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657673" comment="kernel-64kb-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657674" comment="kernel-64kb-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658049" comment="kernel-64kb-extra-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658050" comment="kernel-64kb-livepatch-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658051" comment="kernel-64kb-optional-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658052" comment="kernel-debug-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658053" comment="kernel-debug-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658054" comment="kernel-debug-livepatch-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657675" comment="kernel-default-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657676" comment="kernel-default-base-5.3.18-59.37.2.18.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658055" comment="kernel-default-base-rebuild-5.3.18-59.37.2.18.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657677" comment="kernel-default-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658056" comment="kernel-default-extra-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658057" comment="kernel-default-livepatch-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658058" comment="kernel-default-livepatch-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658059" comment="kernel-default-optional-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657678" comment="kernel-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657683" comment="kernel-docs-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658060" comment="kernel-docs-html-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658061" comment="kernel-kvmsmall-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658062" comment="kernel-kvmsmall-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658063" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657679" comment="kernel-macros-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657684" comment="kernel-obs-build-5.3.18-59.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658064" comment="kernel-obs-qa-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657680" comment="kernel-preempt-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657685" comment="kernel-preempt-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658065" comment="kernel-preempt-extra-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658066" comment="kernel-preempt-livepatch-devel-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658067" comment="kernel-preempt-optional-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657686" comment="kernel-source-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658068" comment="kernel-source-vanilla-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657687" comment="kernel-syms-5.3.18-59.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657681" comment="kernel-zfcpdump-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658069" comment="kselftests-kmp-64kb-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658070" comment="kselftests-kmp-default-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658071" comment="kselftests-kmp-preempt-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658072" comment="ocfs2-kmp-64kb-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657760" comment="ocfs2-kmp-default-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658073" comment="ocfs2-kmp-preempt-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658074" comment="reiserfs-kmp-64kb-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657723" comment="reiserfs-kmp-default-5.3.18-59.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658075" comment="reiserfs-kmp-preempt-5.3.18-59.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52536" version="1" class="patch">
	<metadata>
		<title>Security update for brotli (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175825" ref_url="https://bugzilla.suse.com/1175825" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBYPFIZJBUFNGB65ETC2USVDXZRAANZW/" source="SUSE-SU"/>
		<description>
This update for brotli fixes the following issues:

- CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB (bsc#1175825).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175825">SUSE bug 1175825</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658749" comment="brotli-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658531" comment="libbrotli-devel-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658532" comment="libbrotlicommon1-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658750" comment="libbrotlicommon1-32bit-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658533" comment="libbrotlidec1-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658751" comment="libbrotlidec1-32bit-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658534" comment="libbrotlienc1-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658752" comment="libbrotlienc1-32bit-1.0.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52537" version="1" class="patch">
	<metadata>
		<title>Recommended update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175508" ref_url="https://bugzilla.suse.com/1175508" source="BUGZILLA"/>
		<reference ref_id="1192050" ref_url="https://bugzilla.suse.com/1192050" source="BUGZILLA"/>
		<reference ref_id="1193041" ref_url="https://bugzilla.suse.com/1193041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D5SCXUGIHHCMMDJ4KQPRDMJZB4DQFEII/" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21703: Fixed local privilege escalation via PHP-FPM (bsc#1192050).
- CVE-2021-21707: Fixed special character breaks path in xml parsing (bsc#1193041).

- Added patch to prevent memory access violation in php7 when running test suite (bsc#1175508)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175508">SUSE bug 1175508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192050">SUSE bug 1192050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193041">SUSE bug 1193041</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658547" comment="apache2-mod_php7-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658548" comment="php7-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658549" comment="php7-bcmath-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658550" comment="php7-bz2-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658551" comment="php7-calendar-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658552" comment="php7-ctype-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658553" comment="php7-curl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658554" comment="php7-dba-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658555" comment="php7-devel-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658556" comment="php7-dom-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658537" comment="php7-embed-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658557" comment="php7-enchant-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658558" comment="php7-exif-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658559" comment="php7-fastcgi-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658560" comment="php7-fileinfo-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658738" comment="php7-firebird-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658561" comment="php7-fpm-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658562" comment="php7-ftp-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658563" comment="php7-gd-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658564" comment="php7-gettext-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658565" comment="php7-gmp-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658566" comment="php7-iconv-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658567" comment="php7-intl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658568" comment="php7-json-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658569" comment="php7-ldap-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658570" comment="php7-mbstring-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658571" comment="php7-mysql-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658572" comment="php7-odbc-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658573" comment="php7-opcache-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658574" comment="php7-openssl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658575" comment="php7-pcntl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658576" comment="php7-pdo-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658577" comment="php7-pgsql-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658578" comment="php7-phar-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658579" comment="php7-posix-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658580" comment="php7-readline-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658581" comment="php7-shmop-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658582" comment="php7-snmp-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658583" comment="php7-soap-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658584" comment="php7-sockets-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658585" comment="php7-sodium-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658586" comment="php7-sqlite-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658587" comment="php7-sysvmsg-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658588" comment="php7-sysvsem-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658589" comment="php7-sysvshm-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658739" comment="php7-test-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658590" comment="php7-tidy-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658591" comment="php7-tokenizer-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658592" comment="php7-xmlreader-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658593" comment="php7-xmlrpc-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658594" comment="php7-xmlwriter-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658595" comment="php7-xsl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658596" comment="php7-zip-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658597" comment="php7-zlib-7.4.6-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52538" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3944-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WJQDO7GLZV6KOOPFA2ZGLO6YGORWTRO/" source="SUSE-SU"/>
		<description>
This update for glib-networking fixes the following issues:

Update to version 2.62.4: 

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658878" comment="glib-networking-2.62.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658914" comment="glib-networking-32bit-2.62.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658879" comment="glib-networking-lang-2.62.4-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52539" version="1" class="patch">
	<metadata>
		<title>Security update for python-Babel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185768" ref_url="https://bugzilla.suse.com/1185768" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3M6C27L6BK2YIQKO3YT5OHAJOGRYCEHB/" source="SUSE-SU"/>
		<description>
This update for python-Babel fixes the following issues:

- CVE-2021-42771: Fixed relative path traversal that may lead to arbitrary locale files loading and arbitrary code execution (bsc#1185768).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185768">SUSE bug 1185768</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658747" comment="python-Babel-doc-2.8.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658538" comment="python2-Babel-2.8.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658530" comment="python3-Babel-2.8.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658748" comment="python3-Babel-doc-2.8.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52540" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R45QGO5IGOQU6FDWBSNSZHXXXTFJHN5O/" source="SUSE-SU"/>
		<description>
This update for gmp fixes the following issues:
    
- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656938" comment="gmp-devel-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656942" comment="gmp-devel-32bit-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656939" comment="libgmp10-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656940" comment="libgmp10-32bit-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656941" comment="libgmpxx4-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656943" comment="libgmpxx4-32bit-6.1.2-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52541" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:3949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWRGQAGUXWDOZZKVASVCLFW6ENGTUHUL/" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656934" comment="clamav-0.103.4-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656935" comment="clamav-devel-0.103.4-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656936" comment="libclamav9-0.103.4-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656937" comment="libfreshclam2-0.103.4-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52542" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BEK24NI33V77MMNQQN72LO2RGAF23X76/" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658283" comment="openssh-8.4p1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658289" comment="openssh-askpass-gnome-8.4p1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658458" comment="openssh-cavs-8.4p1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658284" comment="openssh-clients-8.4p1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658285" comment="openssh-common-8.4p1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658286" comment="openssh-fips-8.4p1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658287" comment="openssh-helpers-8.4p1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658288" comment="openssh-server-8.4p1-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52543" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190053" ref_url="https://bugzilla.suse.com/1190053" source="BUGZILLA"/>
		<reference ref_id="1190054" ref_url="https://bugzilla.suse.com/1190054" source="BUGZILLA"/>
		<reference ref_id="1190055" ref_url="https://bugzilla.suse.com/1190055" source="BUGZILLA"/>
		<reference ref_id="1190056" ref_url="https://bugzilla.suse.com/1190056" source="BUGZILLA"/>
		<reference ref_id="1190057" ref_url="https://bugzilla.suse.com/1190057" source="BUGZILLA"/>
		<reference ref_id="1191601" ref_url="https://bugzilla.suse.com/1191601" source="BUGZILLA"/>
		<reference ref_id="1191602" ref_url="https://bugzilla.suse.com/1191602" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701/" source="CVE"/>
		<reference ref_id="CVE-2021-37712" ref_url="https://www.suse.com/security/cve/CVE-2021-37712/" source="CVE"/>
		<reference ref_id="CVE-2021-37713" ref_url="https://www.suse.com/security/cve/CVE-2021-37713/" source="CVE"/>
		<reference ref_id="CVE-2021-39134" ref_url="https://www.suse.com/security/cve/CVE-2021-39134/" source="CVE"/>
		<reference ref_id="CVE-2021-39135" ref_url="https://www.suse.com/security/cve/CVE-2021-39135/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

nodejs14 was updated to 14.18.1:

* deps: update llhttp to 2.1.4

  - HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)
  - HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)

Changes in 14.18.0:

  * buffer:

    + introduce Blob
    + add base64url encoding option

  * child_process:

    + allow options.cwd receive a URL
    + add timeout to spawn and fork
    + allow promisified exec to be cancel
    + add 'overlapped' stdio flag

  * dns: add 'tries' option to Resolve options
  * fs:

    + allow empty string for temp directory prefix
    + allow no-params fsPromises fileHandle read
    + add support for async iterators to fsPromises.writeFile

  * http2: add support for sensitive headers
  * process: add 'worker' event
  * tls: allow reading data into a static buffer
  * worker: add setEnvironmentData/getEnvironmentData

Changes in 14.17.6

  * deps: upgrade npm to 6.14.15 which fixes a number of
    security issues
    (bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,
     bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,
     bsc#1190053, CVE-2021-39135)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-07"/>
	<updated date="2021-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190053">SUSE bug 1190053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190054">SUSE bug 1190054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190055">SUSE bug 1190055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190056">SUSE bug 1190056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190057">SUSE bug 1190057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191601">SUSE bug 1191601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191602">SUSE bug 1191602</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37712/">CVE-2021-37712</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37713/">CVE-2021-37713</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39134/">CVE-2021-39134</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39135/">CVE-2021-39135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658791" comment="nodejs14-14.18.1-15.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658792" comment="nodejs14-devel-14.18.1-15.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658793" comment="nodejs14-docs-14.18.1-15.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658794" comment="npm14-14.18.1-15.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52544" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1191363" ref_url="https://bugzilla.suse.com/1191363" source="BUGZILLA"/>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28702" ref_url="https://www.suse.com/security/cve/CVE-2021-28702/" source="CVE"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28702: Fixed PCI devices with RMRRs not deassigned correctly (XSA-386) (bsc#1191363).
- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).

- Update to Xen 4.14.3 bug fix release (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-07"/>
	<updated date="2021-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191363">SUSE bug 1191363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28702/">CVE-2021-28702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658740" comment="xen-4.14.3_04-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658741" comment="xen-devel-4.14.3_04-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658742" comment="xen-doc-html-4.14.3_04-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658743" comment="xen-libs-4.14.3_04-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658744" comment="xen-libs-32bit-4.14.3_04-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658745" comment="xen-tools-4.14.3_04-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658746" comment="xen-tools-domU-4.14.3_04-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658546" comment="xen-tools-xendomains-wait-disk-4.14.3_04-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52545" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659329" comment="MozillaFirefox-91.4.0-152.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659372" comment="MozillaFirefox-branding-upstream-91.4.0-152.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659330" comment="MozillaFirefox-devel-91.4.0-152.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659331" comment="MozillaFirefox-translations-common-91.4.0-152.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659332" comment="MozillaFirefox-translations-other-91.4.0-152.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52546" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3996-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJDAKFUPFUQCL6CS2YBK2EAJXXFEXMKK/" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed division by zero caused by processing crafted file (bsc#1181836).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659295" comment="ImageMagick-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659296" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659297" comment="ImageMagick-config-7-upstream-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659298" comment="ImageMagick-devel-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659317" comment="ImageMagick-devel-32bit-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659318" comment="ImageMagick-doc-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659319" comment="ImageMagick-extra-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659299" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659320" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659300" comment="libMagick++-devel-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659321" comment="libMagick++-devel-32bit-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659301" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659322" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659302" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659323" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659304" comment="perl-PerlMagick-7.0.7.34-10.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52547" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193611" ref_url="https://bugzilla.suse.com/1193611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:3999-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KJHAK7MUO47JBMMPGGMJ3EKQX3P7TAO/" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-44228: Fix a remote code execution vulnerability that existed in the
  LDAP JNDI parser. [bsc#1193611, CVE-2021-44228]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193611">SUSE bug 1193611</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659581" comment="log4j-2.13.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659582" comment="log4j-javadoc-2.13.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659583" comment="log4j-jcl-2.13.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659584" comment="log4j-slf4j-2.13.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52548" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4001-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BN7ZQZP5LV6NPIUJPUMF2NJNETRO5VW/" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659041" comment="python2-pip-20.0.2-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659025" comment="python3-pip-20.0.2-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52549" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DE4FAITJGXBINDGLYSFS5X56QIHQLF3Q/" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659272" comment="python2-pip-wheel-10.0.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659246" comment="python3-pip-wheel-10.0.1-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52550" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1152964" ref_url="https://bugzilla.suse.com/1152964" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="1190069" ref_url="https://bugzilla.suse.com/1190069" source="BUGZILLA"/>
		<reference ref_id="1190896" ref_url="https://bugzilla.suse.com/1190896" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEYREAP5E4PNL4UXB7R6OYSFSQ5VNFHB/" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed DoS or information disclosure in some configurations (bsc#1188875).
- CVE-2021-39272: Fixed STARTTLS session encryption bypassing (fetchmail-SA-2021-02) (bsc#1190069).

- Update to 6.4.22 (bsc#1152964, jsc#SLE-18159, jsc#SLE-17903, jsc#SLE-18059)
- Remove all python2 dependencies (bsc#1190896).
- De-hardcode /usr/lib path for launch executable (bsc#1174075).
- Added hardening to systemd service(s) (bsc#1181400).
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1152964">SUSE bug 1152964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190896">SUSE bug 1190896</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657429" comment="fetchmail-6.4.22-20.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657445" comment="fetchmailconf-6.4.22-20.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52551" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUBO5HPHOHRDPB6KNAQYGJRQBBZVFI6Z/" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656416" comment="postgresql10-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656420" comment="postgresql10-contrib-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656465" comment="postgresql10-docs-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656422" comment="postgresql10-plperl-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656423" comment="postgresql10-plpython-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656424" comment="postgresql10-pltcl-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656425" comment="postgresql10-server-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656728" comment="postgresql10-test-10.19-8.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52552" version="1" class="patch">
	<metadata>
		<title>Security update for icu.691 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1158955" ref_url="https://bugzilla.suse.com/1158955" source="BUGZILLA"/>
		<reference ref_id="1159131" ref_url="https://bugzilla.suse.com/1159131" source="BUGZILLA"/>
		<reference ref_id="1161007" ref_url="https://bugzilla.suse.com/1161007" source="BUGZILLA"/>
		<reference ref_id="1162882" ref_url="https://bugzilla.suse.com/1162882" source="BUGZILLA"/>
		<reference ref_id="1167603" ref_url="https://bugzilla.suse.com/1167603" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1182645" ref_url="https://bugzilla.suse.com/1182645" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:4063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6RFJJGOGAP5YKMLXG2AX5Q3DJQF46QIT/" source="SUSE-SU"/>
		<description>
This update for icu.691 fixes the following issues:


- Renamed package from icu 69.1 for SUSE:SLE-15-SP3:Update. (jsc#SLE-17893)
- Fix undefined behaviour in 'ComplexUnitsConverter::applyRounder'

- Update to release 69.1
  - For Norwegian, 'no' is back to being the canonical code, with
    'nb' treated as equivalent. This aligns handling of Norwegian
    with other macro language codes.
  - Binary prefixes in measurement units (KiB, MiB, etc.)
  - Time zone offsets from local time with new APIs.
- Don't disable testsuite under 'qemu-linux-user'
- Fixed an issue when ICU test on 'aarch64 fails. (bsc#1182645)
- Drop 'SUSE_ASNEEDED' as the issue was in binutils. (bsc#1182252)
- Fix 'pthread' dependency issue. (bsc#1182252)

- Update to release 68.2
  - Fix memory problem in 'FormattedStringBuilder'
  - Fix assertion when 'setKeywordValue w/' long value.
  - Fix UBSan breakage on 8bit of rbbi
  - fix int32_t overflow in listFormat
  - Fix memory handling in MemoryPool::operator=()
  - Fix memory leak in AliasReplacer

- Add back icu.keyring.
- Update to release 68.1
  - PluralRules selection for ranges of numbers
  - Locale ID canonicalization now conforms to the CLDR spec including edge cases
  - DateIntervalFormat supports output options such as capitalization
  - Measurement units are normalized in skeleton string output
  - Time zone data (tzdata) version 2020d

- Add the provides for libicu to Make .Net core can install successfully. (bsc#1167603, bsc#1161007) 
- Update to version 67.1
  - Unicode 13 (ICU-20893, same as in ICU 66)
    - Total of 5930 new characters
    - 4 new scripts
    - 55 new emoji characters, plus additional new sequences
    - New CJK extension, first characters in plane 3: U+30000..U+3134A
    - New language at Modern coverage: Nigerian Pidgin
    - New languages at Basic coverage: Fulah (Adlam), Maithili,
      Manipuri, Santali, Sindhi (Devanagari), Sundanese
    - Region containment: EU no longer includes GB
    - Unicode 13 root collation data and Chinese data for collation and transliteration
  - DateTimePatternGenerator now obeys the 'hc' preference in the locale identifier
  - Various other improvements for ECMA-402 conformance
  - Number skeletons have a new 'concise' form that can be used in MessageFormat strings
  - Currency formatting options for formal and other currency display name variants
  - ListFormatter: new public API to select the style &amp; type
  - ListFormatter now selects the proper “and”/“or” form for Spanish &amp; Hebrew.
  - Locale ID canonicalization upgraded to implement the complete CLDR spec.
  - LocaleMatcher: New option to ignore one-way matches
  - acceptLanguage() reimplemented via LocaleMatcher
  - Data build tool: tzdbNames.res moved from the 'zone_tree' category to the 'zone_supplemental' category
  - Fixed uses of u8'literals' broken by the C++20 introduction of the incompatible char8_t type
  - and added a few API overloads to reduce the need for reinterpret_cast.
  - Support for manipulating CLDR 37 unit identifiers in MeasureUnit.

- Drop icu-versioning. (bsc#1159131)
- Update to version 66.1
  - Unicode 13 support
  - Fix uses of u8'literals' broken by C++20 introduction of incompatible char8_t type.

- Fixed an issue when Qt apps can't handle non-ASCII filesystem path. ([bsc#1162882)
- Remove '/usr/lib(64)/icu/current'. (bsc#1158955)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158955">SUSE bug 1158955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159131">SUSE bug 1159131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161007">SUSE bug 1161007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162882">SUSE bug 1162882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167603">SUSE bug 1167603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182645">SUSE bug 1182645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659289" comment="icu.691-69.1-7.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659290" comment="icu.691-devel-69.1-7.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659291" comment="icu.691-doc-69.1-7.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659292" comment="libicu69-69.1-7.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659293" comment="libicu69-bedata-69.1-7.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659294" comment="libicu69-ledata-69.1-7.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52553" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDLLTDD27WXQ6WFOOCQT3PBFXVFGSQA5/" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
	  
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659799" comment="xorg-x11-server-1.20.3-22.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659800" comment="xorg-x11-server-extra-1.20.3-22.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659807" comment="xorg-x11-server-sdk-1.20.3-22.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659947" comment="xorg-x11-server-source-1.20.3-22.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659948" comment="xorg-x11-server-wayland-1.20.3-22.5.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52554" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193611" ref_url="https://bugzilla.suse.com/1193611" source="BUGZILLA"/>
		<reference ref_id="1193743" ref_url="https://bugzilla.suse.com/1193743" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<reference ref_id="CVE-2021-45046" ref_url="https://www.suse.com/security/cve/CVE-2021-45046/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDZ2MV2SSNKVN4EVV5AQ3HGQ2G4U2JHS/" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

CVE-2021-44228: The previously published fix by upstream turned out to be
incomplete. Therefore, upstream has recommended disabling JNDI support in log4j
by default to be completely sure that this vulnerability cannot be exploited.

This update implements that recommendation and disables JNDI support by
default. [bsc#1193611, CVE-2021-44228]

CVE-2021-45046: A Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack 
is also fixed by disabling JNDI support by default (bsc#1193743)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-15"/>
	<updated date="2021-12-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193611">SUSE bug 1193611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193743">SUSE bug 1193743</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45046/">CVE-2021-45046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659949" comment="log4j-2.13.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659950" comment="log4j-javadoc-2.13.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659951" comment="log4j-jcl-2.13.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659952" comment="log4j-slf4j-2.13.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52555" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180125" ref_url="https://bugzilla.suse.com/1180125" source="BUGZILLA"/>
		<reference ref_id="1183374" ref_url="https://bugzilla.suse.com/1183374" source="BUGZILLA"/>
		<reference ref_id="1183858" ref_url="https://bugzilla.suse.com/1183858" source="BUGZILLA"/>
		<reference ref_id="1185588" ref_url="https://bugzilla.suse.com/1185588" source="BUGZILLA"/>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYXM7YGLJSNOU4FYI3M2QXACCQ4SO3AE/" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3426: Fixed information disclosure via pydoc (bsc#1183374).
- CVE-2021-3733: Fixed infinitely reading potential HTTP headers after a 100 Continue status response from the server (bsc#1189241).
- CVE-2021-3737: Fixed ReDoS in urllib.request (bsc#1189287).

- We do not require python-rpm-macros package (bsc#1180125).
- Use versioned python-Sphinx to avoid dependency on other version of Python (bsc#1183858).
- Stop providing 'python' symbol, which means python2 currently (bsc#1185588).
- Modify Lib/ensurepip/__init__.py to contain the same version numbers as are in reality the ones in the bundled wheels (bsc#1187668).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-16"/>
	<updated date="2021-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180125">SUSE bug 1180125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183858">SUSE bug 1183858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185588">SUSE bug 1185588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658781" comment="libpython3_6m1_0-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658864" comment="libpython3_6m1_0-32bit-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658782" comment="python3-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658783" comment="python3-base-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658784" comment="python3-curses-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658785" comment="python3-dbm-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658786" comment="python3-devel-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658865" comment="python3-doc-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658866" comment="python3-doc-devhelp-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658787" comment="python3-idle-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658867" comment="python3-testsuite-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658788" comment="python3-tk-3.6.15-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658790" comment="python3-tools-3.6.15-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52556" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193743" ref_url="https://bugzilla.suse.com/1193743" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<reference ref_id="CVE-2021-45046" ref_url="https://www.suse.com/security/cve/CVE-2021-45046/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PCJYMTCVZUNMRYAU55HAMIA6VB3BO7SY/" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

- Previously published fixes for log4jshell turned out to be incomplete.
  Upstream has followed up on the original patch for CVE-2021-44228 with
  several additional changes (LOG4J2-3198, LOG4J2-3201, LOG4J2-3208, and
  LOG4J2-3211) that are included in this update. Since the totality of
  those patches is pretty much equivalent to an update to the latest
  version of log4j, we did update the package's tarball from version
  2.13.0 to 2.16.0 instead of trying to apply those patches to the old
  version. This change brings in a new dependency on 'jakarta-servlet'
  and a version update of 'disruptor'. [bsc#1193743, CVE-2021-45046]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-16"/>
	<updated date="2021-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193743">SUSE bug 1193743</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45046/">CVE-2021-45046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660163" comment="disruptor-3.4.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660164" comment="disruptor-javadoc-3.4.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660165" comment="jakarta-servlet-5.0.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660166" comment="jakarta-servlet-javadoc-5.0.0-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660167" comment="log4j-2.16.0-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660168" comment="log4j-javadoc-2.16.0-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660169" comment="log4j-jcl-2.16.0-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660170" comment="log4j-slf4j-2.16.0-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52557" version="1" class="patch">
	<metadata>
		<title>Security update for logback (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193795" ref_url="https://bugzilla.suse.com/1193795" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44228" ref_url="https://www.suse.com/security/cve/CVE-2021-44228/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GICANZVVUJZMKRG5INZ4A2FGAEWOEJQD/" source="SUSE-SU"/>
		<description>
This update for logback fixes the following issues:

Upgrade to version 1.2.8

+ In response to log4Shell/CVE-2021-44228, all JNDI lookup code in logback
  has been disabled until further notice. This impacts
  ContextJNDISelector and insertFromJNDI element in
  configuration files.
+ Also in response to log4Shell/CVE-2021-44228, all database (JDBC) related
  code in the project has been removed with no replacement.
+ Note that the vulnerability mentioned in LOGBACK-1591 requires
  write access to logback's configuration file as a
  prerequisite. The log4Shell/CVE-2021-44228 and LOGBACK-1591
  are of different severity levels. A successful RCE requires
  all of the following conditions to be met:
  - write access to logback.xml
  - use of versions lower then 1.2.8
  - reloading of poisoned configuration data, which implies
    application restart or scan='true' set prior to attack
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193795">SUSE bug 1193795</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44228/">CVE-2021-44228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660219" comment="logback-1.2.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660220" comment="logback-access-1.2.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660221" comment="logback-examples-1.2.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660222" comment="logback-javadoc-1.2.8-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52558" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTBP7J2BY2P4Y4VVPTAERSBRBHRHKIDZ/" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660101" comment="log4j-manual-1.2.17-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52559" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U355AEBE4AWYTPUPBMC3XAO6XBTWFRBL/" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660087" comment="log4j12-1.2.17-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660089" comment="log4j12-javadoc-1.2.17-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660090" comment="log4j12-manual-1.2.17-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52560" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193887" ref_url="https://bugzilla.suse.com/1193887" source="BUGZILLA"/>
		<reference ref_id="1193888" ref_url="https://bugzilla.suse.com/1193888" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45105" ref_url="https://www.suse.com/security/cve/CVE-2021-45105/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NGNGOILLVCJD7VSJJU7BEDG6ERFOONG6/" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- Update to 2.17.0
- CVE-2021-45105: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation. (bsc#1193887, bsc#1193888)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193887">SUSE bug 1193887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193888">SUSE bug 1193888</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45105/">CVE-2021-45105</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660997" comment="log4j-2.17.0-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660998" comment="log4j-javadoc-2.17.0-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660999" comment="log4j-jcl-2.17.0-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661000" comment="log4j-slf4j-2.17.0-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52561" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-21"/>
	<updated date="2021-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660281" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660282" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660283" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660995" comment="xorg-x11-server-source-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660996" comment="xorg-x11-server-wayland-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52562" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182863" ref_url="https://bugzilla.suse.com/1182863" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190244" ref_url="https://bugzilla.suse.com/1190244" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="CVE-2021-38502" ref_url="https://www.suse.com/security/cve/CVE-2021-38502/" source="CVE"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="CVE-2021-40529" ref_url="https://www.suse.com/security/cve/CVE-2021-40529/" source="CVE"/>
		<reference ref_id="CVE-2021-43528" ref_url="https://www.suse.com/security/cve/CVE-2021-43528/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Update to version 91.4 MFSA 2021-54 (bsc#1193485)
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- CVE-2021-43528: JavaScript unexpectedly enabled for the composition area

- Update to version 91.3.2
- CVE-2021-40529: Fixed ElGamal implementation could allow plaintext recovery (bsc#1190244)

- Update to version 91.3 MFSA 2021-50 (bsc#1192250)
- CVE-2021-38503: Fixed iframe sandbox rules did not apply to XSLT stylesheets
- CVE-2021-38504: Fixed use-after-free in file picker dialog
- CVE-2021-38505: Fixed Windows 10 Cloud Clipboard may have recorded sensitive user data
- CVE-2021-38506: Fixed Thunderbird could be coaxed into going into fullscreen mode without notification or warning
- CVE-2021-38507: Fixed opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
- CVE-2021-38508: Fixed permission Prompt could be overlaid, resulting in user confusion and potential spoofing
- CVE-2021-38509: Fixed Javascript alert box could have been spoofed onto an arbitrary domain
- CVE-2021-38510: Fixed Download Protections were bypassed by .inetloc files on Mac OS
- Fixed plain text reformatting regression (bsc#1182863)

- Update to version 91.2 MFSA 2021-47 (bsc#1191332)
- CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
- CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
- CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
- CVE-2021-32810: Data race in crossbeam-deque
- CVE-2021-38493: Memory safety bugs fixed in Thunderbird 78.14 and Thunderbird 91.1
- CVE-2021-38496: Use-after-free in MessageTask
- CVE-2021-38497: Validation message could have been overlaid on another origin
- CVE-2021-38498: Use-after-free of nsLanguageAtomService object
- CVE-2021-38500: Memory safety bugs fixed in Thunderbird 91.2
- CVE-2021-38501: Memory safety bugs fixed in Thunderbird 91.2
- CVE-2021-38502: Downgrade attack on SMTP STARTTLS connections

- Update to version 91.1.0 MFSA 2021-41 (bsc#1190269)
- CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
- CVE-2021-38495: Memory safety bugs fixed in Thunderbird 91.1

- Update to version 91.0.1 MFSA 2021-37 (bsc#1189547)
- CVE-2021-29991: Header Splitting possible with HTTP/3 Responses
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182863">SUSE bug 1182863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190244">SUSE bug 1190244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38502/">CVE-2021-38502</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40529/">CVE-2021-40529</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43528/">CVE-2021-43528</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660160" comment="MozillaThunderbird-91.4.0-8.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660161" comment="MozillaThunderbird-translations-common-91.4.0-8.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660162" comment="MozillaThunderbird-translations-other-91.4.0-8.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52563" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183137" ref_url="https://bugzilla.suse.com/1183137" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28041" ref_url="https://www.suse.com/security/cve/CVE-2021-28041/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YUBQLVRKYJRPQIBMWLSE4P7CEU335GGW/" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-28041: Fixed double free in ssh-agent (bsc#1183137).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183137">SUSE bug 1183137</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28041/">CVE-2021-28041</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659374" comment="openssh-8.4p1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659380" comment="openssh-askpass-gnome-8.4p1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659580" comment="openssh-cavs-8.4p1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659375" comment="openssh-clients-8.4p1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659376" comment="openssh-common-8.4p1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659377" comment="openssh-fips-8.4p1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659378" comment="openssh-helpers-8.4p1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659379" comment="openssh-server-8.4p1-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52564" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWY3OJFF4O6KAVNTWISEXMD7X5Y2XL6I/" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659793" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659795" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659808" comment="p11-kit-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659796" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659797" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659944" comment="p11-kit-nss-trust-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659798" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52565" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOMQPXAJ4U3LE4RVZJYCTCHSVMZXVS6Z/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659804" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659805" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659806" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52566" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193356" ref_url="https://bugzilla.suse.com/1193356" source="BUGZILLA"/>
		<reference ref_id="1193365" ref_url="https://bugzilla.suse.com/1193365" source="BUGZILLA"/>
		<reference ref_id="1193366" ref_url="https://bugzilla.suse.com/1193366" source="BUGZILLA"/>
		<reference ref_id="1193369" ref_url="https://bugzilla.suse.com/1193369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36129" ref_url="https://www.suse.com/security/cve/CVE-2020-36129/" source="CVE"/>
		<reference ref_id="CVE-2020-36130" ref_url="https://www.suse.com/security/cve/CVE-2020-36130/" source="CVE"/>
		<reference ref_id="CVE-2020-36131" ref_url="https://www.suse.com/security/cve/CVE-2020-36131/" source="CVE"/>
		<reference ref_id="CVE-2020-36135" ref_url="https://www.suse.com/security/cve/CVE-2020-36135/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CU5I3APCIYTJ5MCNA4TTKLC2PLKDGKU/" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2020-36129: Fixed stack buffer overflow via the component src/aom_image.c (bsc#1193356).
- CVE-2020-36131: Fixed stack buffer overflow via the component stats/rate_hist.c (bsc#1193365).
- CVE-2020-36135: Fixed NULL pointer dereference via the component rate_hist.c (bsc#1193366).
- CVE-2020-36130: Fixed NULL pointer dereference via the component av1/av1_dx_iface.c (bsc#1193369).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193356">SUSE bug 1193356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193365">SUSE bug 1193365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193366">SUSE bug 1193366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193369">SUSE bug 1193369</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36129/">CVE-2020-36129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36130/">CVE-2020-36130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36131/">CVE-2020-36131</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36135/">CVE-2020-36135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659324" comment="aom-tools-1.0.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659325" comment="libaom-devel-1.0.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659326" comment="libaom-devel-doc-1.0.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659303" comment="libaom0-1.0.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659327" comment="libaom0-32bit-1.0.0-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52567" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193436" ref_url="https://bugzilla.suse.com/1193436" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6DD7LA7CG2OYZJT2SOA3MHVO7GOW3ANO/" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

Update to runc v1.0.3. 
    
* CVE-2021-43784: Fixed a potential vulnerability related to the internal usage
  of netlink, which is believed to not be exploitable with any released versions of runc (bsc#1193436)
* Fixed inability to start a container with read-write bind mount of a read-only fuse host mount.
* Fixed inability to start when read-only /dev in set in spec.
* Fixed not removing sub-cgroups upon container delete, when rootless cgroup
  v2 is used with older systemd.
* Fixed returning error from GetStats when hugetlb is unsupported (which
  causes excessive logging for kubernetes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193436">SUSE bug 1193436</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659247" comment="runc-1.0.3-27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52568" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSVRDOAVYBVEWAKYWYYNOIQSYE4FHHAJ/" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659945" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659946" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659803" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52569" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1174504" ref_url="https://bugzilla.suse.com/1174504" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2021:4192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FID3SSV5OLDMECWDA753FLD5OC6YLAUG/" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- Update to version 20181225:
  * drop ping capabilities in favor of ICMP_PROTO sockets (bsc#1174504)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-28"/>
	<updated date="2021-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174504">SUSE bug 1174504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661025" comment="permissions-20181225-23.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661026" comment="permissions-zypp-plugin-20181225-23.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52570" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194127" ref_url="https://bugzilla.suse.com/1194127" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44832" ref_url="https://www.suse.com/security/cve/CVE-2021-44832/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD3TW7GD6PF3ZSKL2TJG3Z462FFFLJND/" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-44832: Fixes a remote code execution via JDBC Appender (bsc#1194127)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-30"/>
	<updated date="2021-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194127">SUSE bug 1194127</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44832/">CVE-2021-44832</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662427" comment="log4j-2.17.0-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662428" comment="log4j-javadoc-2.17.0-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662429" comment="log4j-jcl-2.17.0-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662430" comment="log4j-slf4j-2.17.0-4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52571" version="1" class="patch">
	<metadata>
		<title>Security update for gegl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194045" ref_url="https://bugzilla.suse.com/1194045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3NMUTGIH3QYFBHM25LC7HLI7HKVOYCU/" source="SUSE-SU"/>
		<description>
This update for gegl fixes the following issues:

- CVE-2021-45463: fixed shell expansion via crafted pathname in the ImageMagick convert fallback (bsc#1194045).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-31"/>
	<updated date="2021-12-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194045">SUSE bug 1194045</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661886" comment="gegl-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661887" comment="gegl-0_4-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661861" comment="gegl-0_4-lang-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661888" comment="gegl-devel-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661889" comment="gegl-doc-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661890" comment="libgegl-0_4-0-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661891" comment="libgegl-0_4-0-32bit-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661892" comment="typelib-1_0-Gegl-0_4-0.4.16-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52572" version="1" class="patch">
	<metadata>
		<title>Security update for gegl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194045" ref_url="https://bugzilla.suse.com/1194045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2021:4210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RX6HXJTBZCMRDZYVM6S3UTQCHL44WX35/" source="SUSE-SU"/>
		<description>
This update for gegl fixes the following issues:

- CVE-2021-45463: fixed shell expansion via crafted pathname in the ImageMagick convert fallback (bsc#1194045).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-31"/>
	<updated date="2021-12-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194045">SUSE bug 1194045</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661882" comment="gegl-0_3-0.3.34-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661883" comment="gegl-0_3-lang-0.3.34-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661884" comment="libgegl-0_3-0-0.3.34-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661885" comment="typelib-1_0-Gegl-0_3-0.3.34-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52573" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673897" comment="java-1_8_0-ibm-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674190" comment="java-1_8_0-ibm-32bit-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673898" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674191" comment="java-1_8_0-ibm-demo-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673899" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674192" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673900" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674193" comment="java-1_8_0-ibm-src-1.8.0_sr7.5-150000.3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52574" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2QBY77RLVCXQT27JK26OJ53P6OZQP34S/" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676844" comment="openvpn-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676845" comment="openvpn-auth-pam-plugin-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676846" comment="openvpn-devel-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676902" comment="openvpn-down-root-plugin-2.4.3-150000.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52575" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673667" comment="apache2-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673674" comment="apache2-devel-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673675" comment="apache2-doc-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673673" comment="apache2-event-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674181" comment="apache2-example-pages-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673668" comment="apache2-prefork-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673669" comment="apache2-utils-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673676" comment="apache2-worker-2.4.51-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52576" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1179439" ref_url="https://bugzilla.suse.com/1179439" source="BUGZILLA"/>
		<reference ref_id="1181147" ref_url="https://bugzilla.suse.com/1181147" source="BUGZILLA"/>
		<reference ref_id="1191428" ref_url="https://bugzilla.suse.com/1191428" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195211" ref_url="https://bugzilla.suse.com/1195211" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196299" ref_url="https://bugzilla.suse.com/1196299" source="BUGZILLA"/>
		<reference ref_id="1196301" ref_url="https://bugzilla.suse.com/1196301" source="BUGZILLA"/>
		<reference ref_id="1196433" ref_url="https://bugzilla.suse.com/1196433" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196472" ref_url="https://bugzilla.suse.com/1196472" source="BUGZILLA"/>
		<reference ref_id="1196627" ref_url="https://bugzilla.suse.com/1196627" source="BUGZILLA"/>
		<reference ref_id="1196723" ref_url="https://bugzilla.suse.com/1196723" source="BUGZILLA"/>
		<reference ref_id="1196779" ref_url="https://bugzilla.suse.com/1196779" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196866" ref_url="https://bugzilla.suse.com/1196866" source="BUGZILLA"/>
		<reference ref_id="1196868" ref_url="https://bugzilla.suse.com/1196868" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25636" ref_url="https://www.suse.com/security/cve/CVE-2022-25636/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).

The following non-security bugs were fixed:

- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP &amp; AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- mac80211: fix forwarded mesh frames AC &amp; queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179439">SUSE bug 1179439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181147">SUSE bug 1181147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191428">SUSE bug 1191428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195211">SUSE bug 1195211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196299">SUSE bug 1196299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196301">SUSE bug 1196301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196433">SUSE bug 1196433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196472">SUSE bug 1196472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196627">SUSE bug 1196627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196723">SUSE bug 1196723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196779">SUSE bug 1196779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196866">SUSE bug 1196866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196868">SUSE bug 1196868</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25636/">CVE-2022-25636</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674172" comment="cluster-md-kmp-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674173" comment="dlm-kmp-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674174" comment="gfs2-kmp-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673538" comment="kernel-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673539" comment="kernel-azure-devel-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674175" comment="kernel-azure-extra-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674176" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674177" comment="kernel-azure-optional-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673540" comment="kernel-devel-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673541" comment="kernel-source-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673542" comment="kernel-syms-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674178" comment="kselftests-kmp-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674179" comment="ocfs2-kmp-azure-5.3.18-150300.38.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674180" comment="reiserfs-kmp-azure-5.3.18-150300.38.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52577" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1179439" ref_url="https://bugzilla.suse.com/1179439" source="BUGZILLA"/>
		<reference ref_id="1181147" ref_url="https://bugzilla.suse.com/1181147" source="BUGZILLA"/>
		<reference ref_id="1191428" ref_url="https://bugzilla.suse.com/1191428" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195211" ref_url="https://bugzilla.suse.com/1195211" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196130" ref_url="https://bugzilla.suse.com/1196130" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196299" ref_url="https://bugzilla.suse.com/1196299" source="BUGZILLA"/>
		<reference ref_id="1196301" ref_url="https://bugzilla.suse.com/1196301" source="BUGZILLA"/>
		<reference ref_id="1196433" ref_url="https://bugzilla.suse.com/1196433" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196472" ref_url="https://bugzilla.suse.com/1196472" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196627" ref_url="https://bugzilla.suse.com/1196627" source="BUGZILLA"/>
		<reference ref_id="1196723" ref_url="https://bugzilla.suse.com/1196723" source="BUGZILLA"/>
		<reference ref_id="1196779" ref_url="https://bugzilla.suse.com/1196779" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196866" ref_url="https://bugzilla.suse.com/1196866" source="BUGZILLA"/>
		<reference ref_id="1196868" ref_url="https://bugzilla.suse.com/1196868" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2021-45402" ref_url="https://www.suse.com/security/cve/CVE-2021-45402/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25636" ref_url="https://www.suse.com/security/cve/CVE-2022-25636/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload (bsc#1196299).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd(). (bsc#1196155)
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
- CVE-2021-39657: Fixed an information leak in the Universal Flash Storage subsystem (bsc#1193864).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from heap memory via crafted frame lengths from a device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)

The following non-security bugs were fixed:

- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- EDAC/altera: Fix deferred probing (bsc#1178134).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- Hand over the maintainership to SLE15-SP3 maintainers
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes).
- IB/hfi1: Fix early init panic (git-fixes).
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes).
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (bsc#1181147).
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes).
- RDMA/cma: Remove open coding of overflow checking for private_data_len (git-fixes).
- RDMA/core: Do not infoleak GRH fields (git-fixes).
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes).
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes).
- RDMA/hns: Validate the pkey index (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/rtrs-clt: Fix possible double free in error case (jsc#SLE-15176).
- RDMA/rxe: Fix a typo in opcode name (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/uverbs: Check for null return of kmalloc_array (git-fixes).
- RDMA/uverbs: Remove the unnecessary assignment (git-fixes).
- Revert 'USB: serial: ch341: add new Product ID for CH341A' (git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- USB: gadget: validate endpoint index for xilinx udc (git-fixes).
- USB: gadget: validate interface OS descriptor requests (git-fixes).
- USB: hub: Clean up use of port initialization schemes and retries (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- blk-mq: do not free tags if the tag_set is used by other device in queue initialztion (bsc#1193787).
- bnxt_en: Fix active FEC reporting to ethtool (jsc#SLE-16649).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- build initrd without systemd This reduces the size of the initrd by over 25%, which improves startup time of the virtual machine by 0.5-0.6s on very fast machines, more on slower ones.
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- constraints: Also adjust disk requirement for x86 and s390.
- constraints: Increase disk space for aarch64
- cpufreq: schedutil: Use kobject release() method to free (git-fixes)
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
- dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/edid: Always set RGB444 (git-fixes).
- drm/i915/dg1: Wait for pcode/uncore handshake at startup (bsc#1195211).
- drm/i915/gen11+: Only load DRAM information from pcode (bsc#1195211).
- drm/i915: Nuke not needed members of dram_info (bsc#1195211).
- drm/i915: Remove memory frequency calculation (bsc#1195211).
- drm/i915: Rename is_16gb_dimm to wm_lv_0_adjust_needed (bsc#1195211).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix incorrect loading of i_blocks for large files (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- fix rpm build warning tumbleweed rpm is adding these warnings to the log: It's not recommended to have unversioned Obsoletes: Obsoletes:   microcode_ctl
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gpio: rockchip: Reset int_bothedge when changing trigger (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- gtp: remove useless rcu_read_lock() (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- iavf: Fix missing check for running netdev (git-fixes).
- ice: initialize local variable 'tlv' (jsc#SLE-12878).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP &amp; AIN_BUFM bits (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- kernel-binary.spec.in: Move 20-kernel-default-extra.conf to the correctr directory (bsc#1195051).
- kernel-binary.spec: Also exclude the kernel signing key from devel package. There is a check in OBS that fails when it is included. Also the key is not reproducible. Fixes: bb988d4625a3 ('kernel-binary: Do not include sourcedir in certificate path.')
- kernel-binary.spec: Do not use the default certificate path (bsc#1194943). Using the the default path is broken since Linux 5.17
- kernel-binary: Do not include sourcedir in certificate path. The certs macro runs before build directory is set up so it creates the aggregate of supplied certificates in the source directory. Using this file directly as the certificate in kernel config works but embeds the source directory path in the kernel config. To avoid this symlink the certificate to the build directory and use relative path to refer to it. Also fabricate a certificate in the same location in build directory when none is provided.
- kernel-obs-build: include 9p (boo#1195353) To be able to share files between host and the qemu vm of the build script, the 9p and 9p_virtio kernel modules need to be included in the initrd of kernel-obs-build.
- mac80211: fix forwarded mesh frames AC &amp; queue selection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mask out added spinlock in rndis_params (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5e: Fix modify header actions memory leak (git-fixes).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (jsc#SLE-15172).
- net/sched: act_ct: Fix flow table lookup after ct clear or switching zones (jsc#SLE-15172).
- net: dsa: mv88e6xxx: MV88E6097 does not support jumbo configuration (git-fixes).
- net: ethernet: ti: cpsw: disable PTPv1 hw timestamping advertisement (git-fixes).
- net: fix up skbs delta_truesize in UDP GRO frag_list (bsc#1176447).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net: sfc: Replace in_interrupt() usage (git-fixes).
- net: tipc: validate domain record count on input (bsc#1195254).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1176447).
- netsec: ignore 'phy-mode' device property on ACPI systems (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme-rdma: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme-tcp: fix possible use-after-free in transport error_recovery work (git-fixes).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). Update config files.
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/mm: Remove dcache flush from memory remove (bsc#1196433 ltc#196449).
- powerpc/powernv/memtrace: Fix dcache flushing (bsc#1196433 ltc#196449).
- powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
- rpm/*.spec.in: Use https:// urls
- rpm/arch-symbols,guards,*driver: Replace Novell with SUSE.
- rpm/check-for-config-changes: Ignore PAHOLE_VERSION.
- rpm/kernel-docs.spec.in: use %%license for license declarations Limited to SLE15+ to avoid compatibility nightmares.
- rpm/kernel-source.spec.in: call fdupes per subpackage It is a waste of time to do a global fdupes when we have subpackages.
- rpm: SC2006: Use $(...) notation instead of legacy backticked `...`.
- sched/core: Mitigate race (git-fixes)
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: smartpqi: Add PCI IDs (bsc#1196627).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (bsc#1176774).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- tracing: Fix return value of __setup handlers (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).
- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).
- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).
- usb: dwc2: use well defined macros for power_down (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- usb: hub: Fix locking issues with address0_mutex (git-fixes).
- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
- vrf: Fix fast path output packet handling with async Netfilter rules (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179439">SUSE bug 1179439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181147">SUSE bug 1181147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191428">SUSE bug 1191428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195211">SUSE bug 1195211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196130">SUSE bug 1196130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196299">SUSE bug 1196299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196301">SUSE bug 1196301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196433">SUSE bug 1196433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196472">SUSE bug 1196472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196627">SUSE bug 1196627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196723">SUSE bug 1196723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196779">SUSE bug 1196779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196866">SUSE bug 1196866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196868">SUSE bug 1196868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45402/">CVE-2021-45402</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25636/">CVE-2022-25636</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676747" comment="cluster-md-kmp-64kb-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676730" comment="cluster-md-kmp-default-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676748" comment="cluster-md-kmp-preempt-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676749" comment="dlm-kmp-64kb-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676731" comment="dlm-kmp-default-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676750" comment="dlm-kmp-preempt-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676751" comment="dtb-al-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676752" comment="dtb-allwinner-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676753" comment="dtb-altera-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676754" comment="dtb-amd-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676755" comment="dtb-amlogic-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676756" comment="dtb-apm-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676757" comment="dtb-arm-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676758" comment="dtb-broadcom-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676759" comment="dtb-cavium-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676760" comment="dtb-exynos-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676761" comment="dtb-freescale-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676762" comment="dtb-hisilicon-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676763" comment="dtb-lg-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676764" comment="dtb-marvell-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676765" comment="dtb-mediatek-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676766" comment="dtb-nvidia-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676767" comment="dtb-qcom-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676768" comment="dtb-renesas-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676769" comment="dtb-rockchip-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676770" comment="dtb-socionext-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676771" comment="dtb-sprd-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676772" comment="dtb-xilinx-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676773" comment="dtb-zte-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676774" comment="gfs2-kmp-64kb-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676732" comment="gfs2-kmp-default-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676775" comment="gfs2-kmp-preempt-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676702" comment="kernel-64kb-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676703" comment="kernel-64kb-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676776" comment="kernel-64kb-extra-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676777" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676778" comment="kernel-64kb-optional-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676779" comment="kernel-debug-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676780" comment="kernel-debug-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676781" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676704" comment="kernel-default-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676705" comment="kernel-default-base-5.3.18-150300.59.60.4.150300.18.37.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676782" comment="kernel-default-base-rebuild-5.3.18-150300.59.60.4.150300.18.37.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676706" comment="kernel-default-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676783" comment="kernel-default-extra-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676784" comment="kernel-default-livepatch-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676785" comment="kernel-default-livepatch-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676786" comment="kernel-default-optional-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676707" comment="kernel-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676713" comment="kernel-docs-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676787" comment="kernel-docs-html-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676788" comment="kernel-kvmsmall-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676789" comment="kernel-kvmsmall-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676790" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676708" comment="kernel-macros-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676714" comment="kernel-obs-build-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676791" comment="kernel-obs-qa-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676709" comment="kernel-preempt-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676715" comment="kernel-preempt-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676792" comment="kernel-preempt-extra-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676793" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676794" comment="kernel-preempt-optional-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676716" comment="kernel-source-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676795" comment="kernel-source-vanilla-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676717" comment="kernel-syms-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676710" comment="kernel-zfcpdump-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676796" comment="kselftests-kmp-64kb-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676797" comment="kselftests-kmp-default-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676798" comment="kselftests-kmp-preempt-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676799" comment="ocfs2-kmp-64kb-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676733" comment="ocfs2-kmp-default-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676800" comment="ocfs2-kmp-preempt-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676801" comment="reiserfs-kmp-64kb-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676722" comment="reiserfs-kmp-default-5.3.18-150300.59.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676802" comment="reiserfs-kmp-preempt-5.3.18-150300.59.60.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52578" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCAJV7QU7NXYUTY7OMBOV6LAES2X326R/" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP (bsc#1181201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663285" comment="libSDL2-2_0-0-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663287" comment="libSDL2-2_0-0-32bit-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663286" comment="libSDL2-devel-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663449" comment="libSDL2-devel-32bit-2.0.8-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52579" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195258" ref_url="https://bugzilla.suse.com/1195258" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIWUQWCBEUJG4GQZ33E3U56DPOPU6GGL/" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195258">SUSE bug 1195258</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672746" comment="libprotobuf-lite20-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674131" comment="libprotobuf-lite20-32bit-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672747" comment="libprotobuf20-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674132" comment="libprotobuf20-32bit-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672748" comment="libprotoc20-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674133" comment="libprotoc20-32bit-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672749" comment="protobuf-devel-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672818" comment="protobuf-java-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674134" comment="protobuf-source-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672750" comment="python2-protobuf-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672751" comment="python3-protobuf-3.9.2-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52580" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197417" ref_url="https://bugzilla.suse.com/1197417" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6VBWD2MJTOPNB6DMK7CF6TQJ4N7ZFUD/" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
- CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677211" comment="python3-salt-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677212" comment="salt-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677253" comment="salt-api-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677213" comment="salt-bash-completion-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677254" comment="salt-cloud-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677214" comment="salt-doc-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677255" comment="salt-fish-completion-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677256" comment="salt-master-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677215" comment="salt-minion-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677257" comment="salt-proxy-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677258" comment="salt-ssh-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677259" comment="salt-standalone-formulas-configuration-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677260" comment="salt-syndic-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677265" comment="salt-transactional-update-3002.2-150300.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677216" comment="salt-zsh-completion-3002.2-150300.53.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52581" version="1" class="patch">
	<metadata>
		<title>Security update for jawn (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194358" ref_url="https://bugzilla.suse.com/1194358" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21653" ref_url="https://www.suse.com/security/cve/CVE-2022-21653/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBUO7H3LKGBHC4SODDIXNRMKJH3PIZ7M/" source="SUSE-SU"/>
		<description>
This update for jawn fixes the following issues:

- CVE-2022-21653: Fixed DoS caused by a hash collision in SimpleFacade and MutableFacade (bsc#1194358).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194358">SUSE bug 1194358</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21653/">CVE-2022-21653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664020" comment="jawn-ast-0.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664021" comment="jawn-json4s-0.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664022" comment="jawn-parser-0.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664023" comment="jawn-util-0.14.1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52582" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3IAWI5KYTN2PXEFZY7OU7STBINLC3H6/" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676990" comment="libminizip1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677065" comment="libminizip1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676991" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676992" comment="libz1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676993" comment="minizip-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676994" comment="zlib-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676996" comment="zlib-devel-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676995" comment="zlib-devel-static-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677066" comment="zlib-devel-static-32bit-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52583" version="1" class="patch">
	<metadata>
		<title>Security update for python2-numpy (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193907" ref_url="https://bugzilla.suse.com/1193907" source="BUGZILLA"/>
		<reference ref_id="1193911" ref_url="https://bugzilla.suse.com/1193911" source="BUGZILLA"/>
		<reference ref_id="1193913" ref_url="https://bugzilla.suse.com/1193913" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<reference ref_id="CVE-2021-41495" ref_url="https://www.suse.com/security/cve/CVE-2021-41495/" source="CVE"/>
		<reference ref_id="CVE-2021-41496" ref_url="https://www.suse.com/security/cve/CVE-2021-41496/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVU5XH7TX2TXVVZCKS7DIEBNEJKYZTSK/" source="SUSE-SU"/>
		<description>
This update for python2-numpy fixes the following issues:

- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).
- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).
- CVE-2021-41495: Fixed Null Pointer Dereference in numpy.sort due to missing return value validation (bsc#1193911).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193907">SUSE bug 1193907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193911">SUSE bug 1193911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193913">SUSE bug 1193913</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41495/">CVE-2021-41495</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41496/">CVE-2021-41496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677251" comment="python2-numpy-1.16.5-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677252" comment="python2-numpy-devel-1.16.5-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677866" comment="python2-numpy-gnu-hpc-1.16.5-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677867" comment="python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677868" comment="python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677869" comment="python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52584" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186938" ref_url="https://bugzilla.suse.com/1186938" source="BUGZILLA"/>
		<reference ref_id="1188662" ref_url="https://bugzilla.suse.com/1188662" source="BUGZILLA"/>
		<reference ref_id="1192953" ref_url="https://bugzilla.suse.com/1192953" source="BUGZILLA"/>
		<reference ref_id="1195786" ref_url="https://bugzilla.suse.com/1195786" source="BUGZILLA"/>
		<reference ref_id="1196333" ref_url="https://bugzilla.suse.com/1196333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066/" source="CVE"/>
		<reference ref_id="CVE-2021-0071" ref_url="https://www.suse.com/security/cve/CVE-2021-0071/" source="CVE"/>
		<reference ref_id="CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072/" source="CVE"/>
		<reference ref_id="CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076/" source="CVE"/>
		<reference ref_id="CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161/" source="CVE"/>
		<reference ref_id="CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164/" source="CVE"/>
		<reference ref_id="CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165/" source="CVE"/>
		<reference ref_id="CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166/" source="CVE"/>
		<reference ref_id="CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168/" source="CVE"/>
		<reference ref_id="CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170/" source="CVE"/>
		<reference ref_id="CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172/" source="CVE"/>
		<reference ref_id="CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173/" source="CVE"/>
		<reference ref_id="CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174/" source="CVE"/>
		<reference ref_id="CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175/" source="CVE"/>
		<reference ref_id="CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176/" source="CVE"/>
		<reference ref_id="CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

Update Intel Wireless firmware for 9xxx (INTEL-SA-00539, bsc#1196333):

CVE-2021-0161: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2021-0164: Improper access control in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0165: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0066: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0166: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2021-0168: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2021-0170: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2021-0172: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0173: Improper Validation of Consistency within input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0174: Improper Use of Validation Framework in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0175: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0076: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access.
CVE-2021-0176: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access.
CVE-2021-0183: Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0072: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable information disclosure via local access.
CVE-2021-0071: Improper input validation in firmware for some Intel PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.


Update Intel Bluetooth firmware (INTEL-SA-00604,bsc#1195786):

- CVE-2021-33139: Improper conditions check in firmware for some Intel Wireless Bluetooth and Killer Bluetooth products before may allow an authenticated user to potentially enable denial of service via adjacent access.
- CVE-2021-33155: Improper input validation in firmware for some Intel Wireless Bluetooth and Killer Bluetooth products before may allow an authenticated user to potentially enable denial of service via adjacent access. 


Bug fixes:

- Updated the AMD SEV firmware (bsc#1186938)
- Reduced the LZMA2 dictionary size (bsc#1188662)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186938">SUSE bug 1186938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188662">SUSE bug 1188662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192953">SUSE bug 1192953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0071/">CVE-2021-0071</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671003" comment="kernel-firmware-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671024" comment="kernel-firmware-all-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671025" comment="kernel-firmware-amdgpu-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671026" comment="kernel-firmware-ath10k-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671027" comment="kernel-firmware-ath11k-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671028" comment="kernel-firmware-atheros-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671029" comment="kernel-firmware-bluetooth-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671030" comment="kernel-firmware-bnx2-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671004" comment="kernel-firmware-brcm-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671031" comment="kernel-firmware-chelsio-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671032" comment="kernel-firmware-dpaa2-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671033" comment="kernel-firmware-i915-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671034" comment="kernel-firmware-intel-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671035" comment="kernel-firmware-iwlwifi-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671036" comment="kernel-firmware-liquidio-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671037" comment="kernel-firmware-marvell-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671038" comment="kernel-firmware-media-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671039" comment="kernel-firmware-mediatek-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671040" comment="kernel-firmware-mellanox-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671041" comment="kernel-firmware-mwifiex-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671042" comment="kernel-firmware-network-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671043" comment="kernel-firmware-nfp-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671044" comment="kernel-firmware-nvidia-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671045" comment="kernel-firmware-platform-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671046" comment="kernel-firmware-prestera-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671047" comment="kernel-firmware-qlogic-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671048" comment="kernel-firmware-radeon-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671049" comment="kernel-firmware-realtek-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671050" comment="kernel-firmware-serial-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671051" comment="kernel-firmware-sound-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671052" comment="kernel-firmware-ti-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671053" comment="kernel-firmware-ueagle-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671054" comment="kernel-firmware-usb-network-20210208-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671005" comment="ucode-amd-20210208-150300.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52585" version="1" class="patch">
	<metadata>
		<title>Security update for yaml-cpp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1121227" ref_url="https://bugzilla.suse.com/1121227" source="BUGZILLA"/>
		<reference ref_id="1121230" ref_url="https://bugzilla.suse.com/1121230" source="BUGZILLA"/>
		<reference ref_id="1122004" ref_url="https://bugzilla.suse.com/1122004" source="BUGZILLA"/>
		<reference ref_id="1122021" ref_url="https://bugzilla.suse.com/1122021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20573" ref_url="https://www.suse.com/security/cve/CVE-2018-20573/" source="CVE"/>
		<reference ref_id="CVE-2018-20574" ref_url="https://www.suse.com/security/cve/CVE-2018-20574/" source="CVE"/>
		<reference ref_id="CVE-2019-6285" ref_url="https://www.suse.com/security/cve/CVE-2019-6285/" source="CVE"/>
		<reference ref_id="CVE-2019-6292" ref_url="https://www.suse.com/security/cve/CVE-2019-6292/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5JRSH3JEFDRI2LLKIUVXRRMZJAO5ZPH/" source="SUSE-SU"/>
		<description>
This update for yaml-cpp fixes the following issues:

- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).
- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).
- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).
- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121227">SUSE bug 1121227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121230">SUSE bug 1121230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122004">SUSE bug 1122004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122021">SUSE bug 1122021</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20573/">CVE-2018-20573</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20574/">CVE-2018-20574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6285/">CVE-2019-6285</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6292/">CVE-2019-6292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671370" comment="libyaml-cpp0_6-0.6.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671380" comment="yaml-cpp-devel-0.6.1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52586" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662459" comment="java-1_8_0-ibm-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662537" comment="java-1_8_0-ibm-32bit-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662460" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662538" comment="java-1_8_0-ibm-demo-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662461" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662539" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662462" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662540" comment="java-1_8_0-ibm-src-1.8.0_sr7.0-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52587" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175619" ref_url="https://bugzilla.suse.com/1175619" source="BUGZILLA"/>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULIK4RFHGHTVVWROQ6NTBBB4JWOGWYD6/" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-0391: Fixed URL sanitization containing ASCII newline and tabs in urlparse (bsc#1195396).
- CVE-2021-4189: Fixed ftplib not to trust the PASV response (bsc#1194146).
- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175619">SUSE bug 1175619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677073" comment="libpython2_7-1_0-2.7.18-150000.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677192" comment="libpython2_7-1_0-32bit-2.7.18-150000.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677074" comment="python-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677193" comment="python-32bit-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677075" comment="python-base-2.7.18-150000.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677194" comment="python-base-32bit-2.7.18-150000.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677087" comment="python-curses-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677195" comment="python-demo-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677088" comment="python-devel-2.7.18-150000.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677196" comment="python-doc-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677197" comment="python-doc-pdf-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677089" comment="python-gdbm-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677198" comment="python-idle-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677084" comment="python-tk-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677090" comment="python-xml-2.7.18-150000.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52588" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194068" ref_url="https://bugzilla.suse.com/1194068" source="BUGZILLA"/>
		<reference ref_id="1194084" ref_url="https://bugzilla.suse.com/1194084" source="BUGZILLA"/>
		<reference ref_id="1197275" ref_url="https://bugzilla.suse.com/1197275" source="BUGZILLA"/>
		<reference ref_id="1197345" ref_url="https://bugzilla.suse.com/1197345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT5CGHERM6PDXKCM7Z3IJLGIYJ6V6AO/" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-0918: Fixed a potential denial of service via crafted packet (bsc#1197275).
- CVE-2022-0996: Fixed a mishandling of password expiry (bsc#1197345).
- Resolved LDAP-Support not working with DHCP by adding required schema (bsc#1194068)
- Resolved multiple index migration bug (bsc#1194084)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194068">SUSE bug 1194068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194084">SUSE bug 1194084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677261" comment="389-ds-1.4.4.19~git28.b12c72226-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677262" comment="389-ds-devel-1.4.4.19~git28.b12c72226-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678440" comment="389-ds-snmp-1.4.4.19~git28.b12c72226-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677263" comment="lib389-1.4.4.19~git28.b12c72226-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677264" comment="libsvrcore0-1.4.4.19~git28.b12c72226-150300.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52589" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194601" ref_url="https://bugzilla.suse.com/1194601" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0175" ref_url="https://www.suse.com/security/cve/CVE-2022-0175/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LNFLD35UGUIRPTGF3HA3JP2MXLLHWPIX/" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0175: Fixed missing initialization of res-&gt;ptr (bsc#1194601).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194601">SUSE bug 1194601</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0175/">CVE-2022-0175</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663734" comment="libvirglrenderer0-0.6.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663735" comment="virglrenderer-devel-0.6.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663832" comment="virglrenderer-test-server-0.6.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52590" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194511" ref_url="https://bugzilla.suse.com/1194511" source="BUGZILLA"/>
		<reference ref_id="1194512" ref_url="https://bugzilla.suse.com/1194512" source="BUGZILLA"/>
		<reference ref_id="1194513" ref_url="https://bugzilla.suse.com/1194513" source="BUGZILLA"/>
		<reference ref_id="1194514" ref_url="https://bugzilla.suse.com/1194514" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44531" ref_url="https://www.suse.com/security/cve/CVE-2021-44531/" source="CVE"/>
		<reference ref_id="CVE-2021-44532" ref_url="https://www.suse.com/security/cve/CVE-2021-44532/" source="CVE"/>
		<reference ref_id="CVE-2021-44533" ref_url="https://www.suse.com/security/cve/CVE-2021-44533/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C3FMQXDJQJ2FMNZQPTMFMJPRBWP3GY2L/" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-44531: Fixed improper handling of URI Subject Alternative Names (bsc#1194511).
- CVE-2021-44532: Fixed certificate Verification Bypass via String Injection (bsc#1194512).
- CVE-2021-44533: Fixed incorrect handling of certificate subject and issuer fields (bsc#1194513).
- CVE-2022-21824: Fixed prototype pollution via console.table properties (bsc#1194514).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194511">SUSE bug 1194511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194512">SUSE bug 1194512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194513">SUSE bug 1194513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194514">SUSE bug 1194514</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44531/">CVE-2021-44531</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44532/">CVE-2021-44532</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44533/">CVE-2021-44533</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663486" comment="nodejs14-14.18.3-15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663487" comment="nodejs14-devel-14.18.3-15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663488" comment="nodejs14-docs-14.18.3-15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663489" comment="npm14-14.18.3-15.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52591" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197698" ref_url="https://bugzilla.suse.com/1197698" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the
  newest version of rust, but we don't, so we can't use the
  rust+cargo notation, which would need both &lt; and &gt;= requirements.
  (bsc#1197698)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197698">SUSE bug 1197698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678631" comment="MozillaFirefox-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678939" comment="MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678688" comment="MozillaFirefox-devel-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678633" comment="MozillaFirefox-translations-common-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678634" comment="MozillaFirefox-translations-other-91.8.0-150200.152.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52592" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194511" ref_url="https://bugzilla.suse.com/1194511" source="BUGZILLA"/>
		<reference ref_id="1194512" ref_url="https://bugzilla.suse.com/1194512" source="BUGZILLA"/>
		<reference ref_id="1194513" ref_url="https://bugzilla.suse.com/1194513" source="BUGZILLA"/>
		<reference ref_id="1194514" ref_url="https://bugzilla.suse.com/1194514" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44531" ref_url="https://www.suse.com/security/cve/CVE-2021-44531/" source="CVE"/>
		<reference ref_id="CVE-2021-44532" ref_url="https://www.suse.com/security/cve/CVE-2021-44532/" source="CVE"/>
		<reference ref_id="CVE-2021-44533" ref_url="https://www.suse.com/security/cve/CVE-2021-44533/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IPUTP7LOLL5OLSQNM5GFCXGYDJHU7FP/" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- CVE-2021-44531: Fixed improper handling of URI Subject Alternative Names (bsc#1194511).
- CVE-2021-44532: Fixed certificate Verification Bypass via String Injection (bsc#1194512).
- CVE-2021-44533: Fixed incorrect handling of certificate subject and issuer fields (bsc#1194513).
- CVE-2022-21824: Fixed prototype pollution via console.table properties (bsc#1194514).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194511">SUSE bug 1194511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194512">SUSE bug 1194512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194513">SUSE bug 1194513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194514">SUSE bug 1194514</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44531/">CVE-2021-44531</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44532/">CVE-2021-44532</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44533/">CVE-2021-44533</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663482" comment="nodejs12-12.22.9-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663483" comment="nodejs12-devel-12.22.9-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663484" comment="nodejs12-docs-12.22.9-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663485" comment="npm12-12.22.9-4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52593" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677226" comment="libexif-devel-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678951" comment="libexif-devel-32bit-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677227" comment="libexif12-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678642" comment="libexif12-32bit-0.6.22-150000.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52594" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678029" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678030" comment="libfreebl3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678031" comment="libfreebl3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678032" comment="libfreebl3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678033" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678034" comment="libsoftokn3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678035" comment="libsoftokn3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678036" comment="libsoftokn3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678037" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678038" comment="mozilla-nss-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678039" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678040" comment="mozilla-nss-certs-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678041" comment="mozilla-nss-devel-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678042" comment="mozilla-nss-sysinit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678956" comment="mozilla-nss-sysinit-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678043" comment="mozilla-nss-tools-3.68.3-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52595" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1114649" ref_url="https://bugzilla.suse.com/1114649" source="BUGZILLA"/>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010682.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

Security issues fixed:

- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).

Non-security issues fixed: 

- Fixes segmentation fault in 'pkcs11-tool.c'. (bsc#1114649)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114649">SUSE bug 1114649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677072" comment="opensc-0.19.0-150100.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677191" comment="opensc-32bit-0.19.0-150100.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52596" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195999" ref_url="https://bugzilla.suse.com/1195999" source="BUGZILLA"/>
		<reference ref_id="1196061" ref_url="https://bugzilla.suse.com/1196061" source="BUGZILLA"/>
		<reference ref_id="1196317" ref_url="https://bugzilla.suse.com/1196317" source="BUGZILLA"/>
		<reference ref_id="1196368" ref_url="https://bugzilla.suse.com/1196368" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196925" ref_url="https://bugzilla.suse.com/1196925" source="BUGZILLA"/>
		<reference ref_id="1197134" ref_url="https://bugzilla.suse.com/1197134" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010688.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
  new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf&lt;&gt;patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195999">SUSE bug 1195999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196061">SUSE bug 1196061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196317">SUSE bug 1196317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196368">SUSE bug 1196368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196925">SUSE bug 1196925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197134">SUSE bug 1197134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678940" comment="libsolv-demo-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677217" comment="libsolv-devel-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677218" comment="libsolv-tools-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677219" comment="libzypp-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677220" comment="libzypp-devel-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678941" comment="libzypp-devel-doc-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677229" comment="perl-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678942" comment="python-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677221" comment="python3-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677222" comment="ruby-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677223" comment="zypper-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678943" comment="zypper-aptitude-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677224" comment="zypper-log-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677225" comment="zypper-needs-restarting-1.14.52-150200.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52597" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679123" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679124" comment="liblzma5-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679125" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679126" comment="xz-devel-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679373" comment="xz-devel-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679127" comment="xz-lang-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679128" comment="xz-static-devel-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52598" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197939" ref_url="https://bugzilla.suse.com/1197939" source="BUGZILLA"/>
		<reference ref_id="1197940" ref_url="https://bugzilla.suse.com/1197940" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010684.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache
  HTTP server. This could be exploited by a remote attacker to cause a denial of
  service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may
  reveal the original path of files protected by path-based authorization
  (bsc#1197939).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197939">SUSE bug 1197939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679374" comment="libsvn_auth_gnome_keyring-1-0-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679375" comment="libsvn_auth_kwallet-1-0-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679129" comment="subversion-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679140" comment="subversion-bash-completion-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679130" comment="subversion-devel-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679141" comment="subversion-perl-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679142" comment="subversion-python-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679376" comment="subversion-python-ctypes-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679377" comment="subversion-ruby-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679172" comment="subversion-server-1.10.6-150300.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679143" comment="subversion-tools-1.10.6-150300.10.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52599" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1180153" ref_url="https://bugzilla.suse.com/1180153" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1194589" ref_url="https://bugzilla.suse.com/1194589" source="BUGZILLA"/>
		<reference ref_id="1194625" ref_url="https://bugzilla.suse.com/1194625" source="BUGZILLA"/>
		<reference ref_id="1194649" ref_url="https://bugzilla.suse.com/1194649" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195640" ref_url="https://bugzilla.suse.com/1195640" source="BUGZILLA"/>
		<reference ref_id="1195926" ref_url="https://bugzilla.suse.com/1195926" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196130" ref_url="https://bugzilla.suse.com/1196130" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196478" ref_url="https://bugzilla.suse.com/1196478" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197243" ref_url="https://bugzilla.suse.com/1197243" source="BUGZILLA"/>
		<reference ref_id="1197245" ref_url="https://bugzilla.suse.com/1197245" source="BUGZILLA"/>
		<reference ref_id="1197300" ref_url="https://bugzilla.suse.com/1197300" source="BUGZILLA"/>
		<reference ref_id="1197302" ref_url="https://bugzilla.suse.com/1197302" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197460" ref_url="https://bugzilla.suse.com/1197460" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197501" ref_url="https://bugzilla.suse.com/1197501" source="BUGZILLA"/>
		<reference ref_id="1197534" ref_url="https://bugzilla.suse.com/1197534" source="BUGZILLA"/>
		<reference ref_id="1197661" ref_url="https://bugzilla.suse.com/1197661" source="BUGZILLA"/>
		<reference ref_id="1197675" ref_url="https://bugzilla.suse.com/1197675" source="BUGZILLA"/>
		<reference ref_id="1197677" ref_url="https://bugzilla.suse.com/1197677" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197811" ref_url="https://bugzilla.suse.com/1197811" source="BUGZILLA"/>
		<reference ref_id="1197812" ref_url="https://bugzilla.suse.com/1197812" source="BUGZILLA"/>
		<reference ref_id="1197815" ref_url="https://bugzilla.suse.com/1197815" source="BUGZILLA"/>
		<reference ref_id="1197817" ref_url="https://bugzilla.suse.com/1197817" source="BUGZILLA"/>
		<reference ref_id="1197819" ref_url="https://bugzilla.suse.com/1197819" source="BUGZILLA"/>
		<reference ref_id="1197820" ref_url="https://bugzilla.suse.com/1197820" source="BUGZILLA"/>
		<reference ref_id="1197888" ref_url="https://bugzilla.suse.com/1197888" source="BUGZILLA"/>
		<reference ref_id="1197889" ref_url="https://bugzilla.suse.com/1197889" source="BUGZILLA"/>
		<reference ref_id="1197894" ref_url="https://bugzilla.suse.com/1197894" source="BUGZILLA"/>
		<reference ref_id="1198027" ref_url="https://bugzilla.suse.com/1198027" source="BUGZILLA"/>
		<reference ref_id="1198028" ref_url="https://bugzilla.suse.com/1198028" source="BUGZILLA"/>
		<reference ref_id="1198029" ref_url="https://bugzilla.suse.com/1198029" source="BUGZILLA"/>
		<reference ref_id="1198030" ref_url="https://bugzilla.suse.com/1198030" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="1198077" ref_url="https://bugzilla.suse.com/1198077" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45402" ref_url="https://www.suse.com/security/cve/CVE-2021-45402/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-1195" ref_url="https://www.suse.com/security/cve/CVE-2022-1195/" source="CVE"/>
		<reference ref_id="CVE-2022-1198" ref_url="https://www.suse.com/security/cve/CVE-2022-1198/" source="CVE"/>
		<reference ref_id="CVE-2022-1199" ref_url="https://www.suse.com/security/cve/CVE-2022-1199/" source="CVE"/>
		<reference ref_id="CVE-2022-1205" ref_url="https://www.suse.com/security/cve/CVE-2022-1205/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-27223" ref_url="https://www.suse.com/security/cve/CVE-2022-27223/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1199: Fixed null-ptr-deref and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198028)
- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)
- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).
- CVE-2022-1195: Fixed an use-after-free vulnerability which could allow a local attacker with a user privilege to execute a denial of service. (bsc#1198029)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)
- CVE-2022-27223: Fixed an out-of-array access in /usb/gadget/udc/udc-xilinx.c. (bsc#1197245)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-45402: Fixed a pointer leak in check_alu_op() of kernel/bpf/verifier.c. (bsc#1196130).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)


The following non-security bugs were fixed:

- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).
- ACPI: APEI: fix return value of __setup handlers (git-fixes).
- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).
- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).
- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).
- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).
- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).
- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).
- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).
- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).
- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).
- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).
- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).
- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).
- ALSA: spi: Add check for clk_enable() (git-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).
- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).
- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).
- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).
- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).
- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).
- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).
- ASoC: fsi: Add check for clk_enable (git-fixes).
- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).
- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).
- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).
- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).
- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).
- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).
- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).
- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).
- ASoC: SOF: topology: remove redundant code (git-fixes).
- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).
- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).
- ASoC: topology: Allow TLV control to be either read or write (git-fixes).
- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).
- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- block: update io_ticks when io hang (bsc#1197817).
- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).
- bpf: Remove config check to enable bpf support for branch records (git-fixes bsc#1177028).
- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1194649).
- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1194649).
- btrfs: avoid unnecessary logging of xattrs during fast fsyncs (bsc#1194649).
- btrfs: check error value from btrfs_update_inode in tree log (bsc#1194649).
- btrfs: check if a log root exists before locking the log_mutex on unlink (bsc#1194649).
- btrfs: check if a log tree exists at inode_logged() (bsc#1194649).
- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1194649).
- btrfs: do not log new dentries when logging that a new name exists (bsc#1194649).
- btrfs: eliminate some false positives when checking if inode was logged (bsc#1194649).
- btrfs: fix race leading to unnecessary transaction commit when logging inode (bsc#1194649).
- btrfs: fix race that causes unnecessary logging of ancestor inodes (bsc#1194649).
- btrfs: fix race that makes inode logging fallback to transaction commit (bsc#1194649).
- btrfs: fix race that results in logging old extents during a fast fsync (bsc#1194649).
- btrfs: fixup error handling in fixup_inode_link_counts (bsc#1194649).
- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1194649).
- btrfs: Remove unnecessary check from join_running_log_trans (bsc#1194649).
- btrfs: remove unnecessary directory inode item update when deleting dir entry (bsc#1194649).
- btrfs: remove unnecessary list head initialization when syncing log (bsc#1194649).
- btrfs: skip unnecessary searches for xattrs when logging an inode (bsc#1194649).
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).
- can: mcba_usb: properly check endpoint type (git-fixes).
- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).
- cifs: do not skip link targets when an I/O fails (bsc#1194625).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).
- clk: bcm2835: Remove unused variable (git-fixes).
- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).
- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).
- clk: Initialize orphan req_rate (git-fixes).
- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).
- clk: nxp: Remove unused variable (git-fixes).
- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).
- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).
- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).
- clk: uniphier: Fix fixed-rate initialization (git-fixes).
- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).
- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).
- cpufreq: schedutil: Destroy mutex before kobject_put() frees (git-fixes)
- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).
- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).
- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).
- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).
- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).
- crypto: qat - do not cast parameter in bit operations (git-fixes).
- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).
- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).
- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).
- crypto: vmx - add missing dependencies (git-fixes).
- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).
- driver core: dd: fix return value of __setup handler (git-fixes).
- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).
- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).
- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).
- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).
- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).
- drm/doc: overview before functions for drm_writeback.c (git-fixes).
- drm/i915: Fix dbuf slice config lookup (git-fixes).
- drm/i915/gem: add missing boundary check in vm_access (git-fixes).
- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).
- drm/meson: Fix error handling when afbcd.ops-&gt;init fails (git-fixes).
- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).
- drm/msm/dpu: add DSPP blocks teardown (git-fixes).
- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).
- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).
- drm/vc4: crtc: Make sure the HDMI controller is powered when disabling (git-fixes).
- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).
- Drop HID multitouch fix patch (bsc#1197243),
- ecryptfs: fix kernel panic with null dev_name (bsc#1197812).
- ecryptfs: Fix typo in message (bsc#1197811).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).
- ext2: correct max file size computing (bsc#1197820).
- firmware: google: Properly state IOMEM dependency (git-fixes).
- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).
- fscrypt: do not ignore minor_hash when hash is 0 (bsc#1197815).
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).
- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).
- hwmon: (pmbus) Add Vin unit off handling (git-fixes).
- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).
- hwrng: atmel - disable trng on failure path (git-fixes).
- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).
- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).
- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).
- iio: adc: Add check for devm_request_threaded_irq (git-fixes).
- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).
- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).
- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).
- iio: inkern: make a best effort on offset calculation (git-fixes).
- Input: aiptek - properly check endpoint type (git-fixes).
- iwlwifi: do not advertise TWT support (git-fixes).
- kernel-binary.spec: Do not use the default certificate path (bsc#1194943).
- KVM: SVM: Do not flush cache if hardware enforces cache coherency across encryption domains (bsc#1178134).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- mac80211: fix potential double free on mesh join (git-fixes).
- mac80211: refuse aggregations sessions before authorized (git-fixes).
- media: aspeed: Correct value for h-total-pixels (git-fixes).
- media: bttv: fix WARNING regression on tunerless devices (git-fixes).
- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).
- media: em28xx: initialize refcount before kref_get (git-fixes).
- media: hantro: Fix overfill bottom register field name (git-fixes).
- media: Revert 'media: em28xx: add missing em28xx_close_extension' (git-fixes).
- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).
- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).
- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).
- membarrier: Execute SYNC_CORE on the calling thread (git-fixes)
- membarrier: Explicitly sync remote cores when SYNC_CORE is (git-fixes)
- memory: emif: Add check for setup_interrupts (git-fixes).
- memory: emif: check the pointer temp in get_device_details() (git-fixes).
- misc: alcor_pci: Fix an error handling path (git-fixes).
- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).
- mm_zone: add function to check if managed dma zone exists (bsc#1197501).
- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).
- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- net: dsa: mv88e6xxx: override existent unicast portvec in port_fdb_add (git-fixes).
- net: enetc: initialize the RFS and RSS memories (git-fixes).
- net: hns3: add a check for tqp_index in hclge_get_ring_chain_from_mbx() (git-fixes).
- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).
- net: stmmac: set TxQ mode back to DCB after disabling CBS (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: watchdog: hold device global xmit lock during tx disable (git-fixes).
- net/smc: Fix loop in smc_listen (git-fixes).
- net/smc: fix using of uninitialized completions (git-fixes).
- net/smc: fix wrong list_del in smc_lgr_cleanup_early (git-fixes).
- net/smc: Make sure the link_id is unique (git-fixes).
- net/smc: Reset conn-&gt;lgr when link group registration fails (git-fixes).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).
- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).
- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).
- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).
- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).
- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).
- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).
- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).
- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).
- nfsd: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).
- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).
- NFSv4/pNFS: Fix another issue with a list iterator pointing to the head (git-fixes).
- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).
- pinctrl: mediatek: paris: Fix 'argument' argument type for mtk_pinconf_get() (git-fixes).
- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).
- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).
- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).
- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).
- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).
- pinctrl: samsung: drop pin banks references on error paths (git-fixes).
- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).
- PM: hibernate: fix __setup handler error handling (git-fixes).
- PM: suspend: fix return value of __setup handler (git-fixes).
- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395).
- powerpc/mm: Fix verification of MMU_FTR_TYPE_44x (bsc#1156395).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).
- powerpc/perf: Expose Performance Monitor Counter SPR's as part of extended regs (bsc#1198077 ltc#197299).
- powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct (bsc#1198077 ltc#197299).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).
- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
- powerpc/xive: fix return value of __setup handler (bsc#1065729).
- printk: Add panic_in_progress helper (bsc#1197894).
- printk: disable optimistic spin during panic (bsc#1197894).
- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).
- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).
- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).
- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).
- Revert 'build initrd without systemd' (bsc#1197300).
- Revert 'Input: clear BTN_RIGHT/MIDDLE on buttonpads' (bsc#1197243).
- Revert 'module, async: async_synchronize_full() on module init iff async is used' (bsc#1197888).
- Revert 'Revert 'build initrd without systemd' (bsc#1197300)'
- Revert 'usb: dwc3: gadget: Use list_replace_init() before traversing lists' (git-fixes).
- s390/bpf: Perform r1 range checking before accessing jit-&gt;seen_reg (git-fixes).
- s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes).
- s390/gmap: validate VMA in __gmap_zap() (git-fixes).
- s390/hypfs: include z/VM guests with access control group set (bsc#1195640 LTC#196352).
- s390/kexec_file: fix error handling when applying relocations (git-fixes).
- s390/kexec: fix memory leak of ipl report buffer (git-fixes).
- s390/kexec: fix return code handling (git-fixes).
- s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes).
- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).
- s390/module: fix loading modules with a lot of relocations (git-fixes).
- s390/pci_mmio: fully validate the VMA before calling follow_pte() (git-fixes).
- s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677 LTC#197378).
- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).
- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).
- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).
- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).
- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).
- scsi: lpfc: Fix typos in comments (bsc#1197675).
- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).
- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).
- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).
- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).
- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).
- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).
- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).
- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).
- scsi: lpfc: Use fc_block_rport() (bsc#1197675).
- scsi: lpfc: Use kcalloc() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).
- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).
- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).
- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).
- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).
- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).
- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).
- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).
- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).
- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).
- scsi: qla2xxx: Fix typos in comments (bsc#1197661).
- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).
- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).
- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).
- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).
- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).
- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).
- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).
- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).
- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).
- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).
- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).
- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).
- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).
- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).
- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).
- tcp: change source port randomizarion at connect() time (bsc#1180153).
- team: protect features update by RCU to avoid deadlock (git-fixes).
- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).
- thermal: int340x: Increase bitmap size (git-fixes).
- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).
- Update config files (bsc#1195926 bsc#1175667). VIRTIO_PCI=m -&gt; VIRTIO_PCI=y
- usb: bdc: Adb shows offline after resuming from S2 (git-fixes).
- usb: bdc: Fix a resource leak in the error handling path of 'bdc_probe()' (git-fixes).
- usb: bdc: Fix unused assignment in bdc_probe() (git-fixes).
- usb: bdc: remove duplicated error message (git-fixes).
- usb: bdc: Use devm_clk_get_optional() (git-fixes).
- usb: bdc: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).
- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).
- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).
- usb: dwc3: gadget: Use list_replace_init() before traversing lists (git-fixes).
- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).
- usb: dwc3: qcom: add IRQ check (git-fixes).
- usb: gadget: bdc: use readl_poll_timeout() to simplify code (git-fixes).
- usb: gadget: Fix use-after-free bug by not setting udc-&gt;dev.driver (git-fixes).
- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- usb: hub: Fix locking issues with address0_mutex (git-fixes).
- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).
- VFS: filename_create(): fix incorrect intent (bsc#1197534).
- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).
- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).
- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).
- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).
- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).
- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).
- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).
- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).
- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).
- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).
- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).
- x86/cpu: Add hardware-enforced cache coherency as a CPUID feature (bsc#1178134).
- x86/mm/pat: Do not flush cache if hardware enforces cache coherency across encryption domnains (bsc#1178134).
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1178134).
- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1178134).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- xhci: fix garbage USBSTS being logged in some cases (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180153">SUSE bug 1180153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194589">SUSE bug 1194589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194625">SUSE bug 1194625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194649">SUSE bug 1194649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195640">SUSE bug 1195640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195926">SUSE bug 1195926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196130">SUSE bug 1196130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196478">SUSE bug 1196478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197243">SUSE bug 1197243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197245">SUSE bug 1197245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197300">SUSE bug 1197300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197302">SUSE bug 1197302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197460">SUSE bug 1197460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197501">SUSE bug 1197501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197534">SUSE bug 1197534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197661">SUSE bug 1197661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197675">SUSE bug 1197675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197677">SUSE bug 1197677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197811">SUSE bug 1197811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197812">SUSE bug 1197812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197815">SUSE bug 1197815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197817">SUSE bug 1197817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197819">SUSE bug 1197819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197820">SUSE bug 1197820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197888">SUSE bug 1197888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197889">SUSE bug 1197889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197894">SUSE bug 1197894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198027">SUSE bug 1198027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198028">SUSE bug 1198028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198029">SUSE bug 1198029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198030">SUSE bug 1198030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198077">SUSE bug 1198077</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45402/">CVE-2021-45402</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1195/">CVE-2022-1195</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1198/">CVE-2022-1198</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1199/">CVE-2022-1199</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1205/">CVE-2022-1205</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27223/">CVE-2022-27223</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679378" comment="cluster-md-kmp-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679379" comment="dlm-kmp-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679380" comment="gfs2-kmp-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679157" comment="kernel-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679158" comment="kernel-azure-devel-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679381" comment="kernel-azure-extra-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679382" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679383" comment="kernel-azure-optional-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679159" comment="kernel-devel-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679160" comment="kernel-source-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679161" comment="kernel-syms-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679384" comment="kselftests-kmp-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679385" comment="ocfs2-kmp-azure-5.3.18-150300.38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679386" comment="reiserfs-kmp-azure-5.3.18-150300.38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52600" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to version 1.16.15 (bsc#1182345):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51331).
  - Fixed an issue when building source in riscv64 (go#51198).
  - Increased compatibility for the DNS protocol in the net module (go#51161).
  - Fixed an issue with histograms in the runtime/metrics module (go#50733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678459" comment="go1.16-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678460" comment="go1.16-doc-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678461" comment="go1.16-race-1.16.15-150000.1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52601" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678957" comment="go1.17-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678958" comment="go1.17-doc-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678639" comment="go1.17-race-1.17.8-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52602" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-1197" ref_url="https://www.suse.com/security/cve/CVE-2022-1197/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Updated to version 91.8 (bsc#1197903):
  - CVE-2022-1097: Fixed a memory corruption issue with NSSToken objects.
  - CVE-2022-28281: Fixed a memory corruption issue due to unexpected WebAuthN
    Extensions.
  - CVE-2022-1197: Fixed an issue where OpenPGP revocation information was ignored.
  - CVE-2022-1196: Fixed a memory corruption issue after VR process destruction.
  - CVE-2022-28282: Fixed a memory corruption issue in document translation.
  - CVE-2022-28285: Fixed a memory corruption issue in JIT code generation.
  - CVE-2022-28286: Fixed an iframe layout issue that could have been exploited
    to stage spoofing attacks.
  - CVE-2022-24713: Fixed a potential denial of service via complex regular
    expressions.
  - CVE-2022-28289: Fixed multiple memory corruption issues.

Non-security fixes:

- Changed Google accounts using password authentication to use OAuth2.
- Fixed an issue where OpenPGP ECC keys created by Thunderbird could not be
  imported into GnuPG.
- Fixed an issue where exporting multiple public PGP keys from Thunderbird
  was not possible.
- Fixed an issue where replying to a newsgroup message erroneously displayed
  a 'No-reply' popup warning.
- Fixed an issue with opening older address books.
- Fixed an issue where LDAP directories would be lost when switching to
  'Offline' mode.
- Fixed an issue when importing webcals.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1197/">CVE-2022-1197</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679120" comment="MozillaThunderbird-91.8.0-150200.8.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679121" comment="MozillaThunderbird-translations-common-91.8.0-150200.8.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679122" comment="MozillaThunderbird-translations-other-91.8.0-150200.8.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52603" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1180153" ref_url="https://bugzilla.suse.com/1180153" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1194649" ref_url="https://bugzilla.suse.com/1194649" source="BUGZILLA"/>
		<reference ref_id="1195640" ref_url="https://bugzilla.suse.com/1195640" source="BUGZILLA"/>
		<reference ref_id="1195926" ref_url="https://bugzilla.suse.com/1195926" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196478" ref_url="https://bugzilla.suse.com/1196478" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197243" ref_url="https://bugzilla.suse.com/1197243" source="BUGZILLA"/>
		<reference ref_id="1197300" ref_url="https://bugzilla.suse.com/1197300" source="BUGZILLA"/>
		<reference ref_id="1197302" ref_url="https://bugzilla.suse.com/1197302" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197501" ref_url="https://bugzilla.suse.com/1197501" source="BUGZILLA"/>
		<reference ref_id="1197534" ref_url="https://bugzilla.suse.com/1197534" source="BUGZILLA"/>
		<reference ref_id="1197661" ref_url="https://bugzilla.suse.com/1197661" source="BUGZILLA"/>
		<reference ref_id="1197675" ref_url="https://bugzilla.suse.com/1197675" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197811" ref_url="https://bugzilla.suse.com/1197811" source="BUGZILLA"/>
		<reference ref_id="1197812" ref_url="https://bugzilla.suse.com/1197812" source="BUGZILLA"/>
		<reference ref_id="1197815" ref_url="https://bugzilla.suse.com/1197815" source="BUGZILLA"/>
		<reference ref_id="1197817" ref_url="https://bugzilla.suse.com/1197817" source="BUGZILLA"/>
		<reference ref_id="1197819" ref_url="https://bugzilla.suse.com/1197819" source="BUGZILLA"/>
		<reference ref_id="1197820" ref_url="https://bugzilla.suse.com/1197820" source="BUGZILLA"/>
		<reference ref_id="1197888" ref_url="https://bugzilla.suse.com/1197888" source="BUGZILLA"/>
		<reference ref_id="1197889" ref_url="https://bugzilla.suse.com/1197889" source="BUGZILLA"/>
		<reference ref_id="1197894" ref_url="https://bugzilla.suse.com/1197894" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198027" ref_url="https://bugzilla.suse.com/1198027" source="BUGZILLA"/>
		<reference ref_id="1198028" ref_url="https://bugzilla.suse.com/1198028" source="BUGZILLA"/>
		<reference ref_id="1198029" ref_url="https://bugzilla.suse.com/1198029" source="BUGZILLA"/>
		<reference ref_id="1198030" ref_url="https://bugzilla.suse.com/1198030" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-1195" ref_url="https://www.suse.com/security/cve/CVE-2022-1195/" source="CVE"/>
		<reference ref_id="CVE-2022-1198" ref_url="https://www.suse.com/security/cve/CVE-2022-1198/" source="CVE"/>
		<reference ref_id="CVE-2022-1199" ref_url="https://www.suse.com/security/cve/CVE-2022-1199/" source="CVE"/>
		<reference ref_id="CVE-2022-1205" ref_url="https://www.suse.com/security/cve/CVE-2022-1205/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1199: Fixed null-ptr-deref and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198028)
- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)
- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).
- CVE-2022-1195: Fixed an use-after-free vulnerability which could allow a local attacker with a user privilege to execute a denial of service. (bsc#1198029)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)

The following non-security bugs were fixed:

- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).
- ACPI: APEI: fix return value of __setup handlers (git-fixes).
- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).
- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).
- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).
- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).
- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).
- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).
- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).
- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).
- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).
- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).
- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).
- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).
- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).
- ALSA: spi: Add check for clk_enable() (git-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).
- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).
- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).
- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).
- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).
- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).
- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).
- ASoC: fsi: Add check for clk_enable (git-fixes).
- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).
- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).
- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).
- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).
- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).
- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).
- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).
- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).
- ASoC: SOF: topology: remove redundant code (git-fixes).
- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).
- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).
- ASoC: topology: Allow TLV control to be either read or write (git-fixes).
- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).
- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).
- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- block: update io_ticks when io hang (bsc#1197817).
- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).
- bpf: Remove config check to enable bpf support for branch records (git-fixes bsc#1177028).
- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1194649).
- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1194649).
- btrfs: avoid unnecessary logging of xattrs during fast fsyncs (bsc#1194649).
- btrfs: check error value from btrfs_update_inode in tree log (bsc#1194649).
- btrfs: check if a log root exists before locking the log_mutex on unlink (bsc#1194649).
- btrfs: check if a log tree exists at inode_logged() (bsc#1194649).
- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1194649).
- btrfs: do not log new dentries when logging that a new name exists (bsc#1194649).
- btrfs: eliminate some false positives when checking if inode was logged (bsc#1194649).
- btrfs: fix race leading to unnecessary transaction commit when logging inode (bsc#1194649).
- btrfs: fix race that causes unnecessary logging of ancestor inodes (bsc#1194649).
- btrfs: fix race that makes inode logging fallback to transaction commit (bsc#1194649).
- btrfs: fix race that results in logging old extents during a fast fsync (bsc#1194649).
- btrfs: fixup error handling in fixup_inode_link_counts (bsc#1194649).
- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1194649).
- btrfs: Remove unnecessary check from join_running_log_trans (bsc#1194649).
- btrfs: remove unnecessary directory inode item update when deleting dir entry (bsc#1194649).
- btrfs: remove unnecessary list head initialization when syncing log (bsc#1194649).
- btrfs: skip unnecessary searches for xattrs when logging an inode (bsc#1194649).
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).
- can: mcba_usb: properly check endpoint type (git-fixes).
- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).
- clk: bcm2835: Remove unused variable (git-fixes).
- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).
- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).
- clk: Initialize orphan req_rate (git-fixes).
- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).
- clk: nxp: Remove unused variable (git-fixes).
- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).
- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).
- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).
- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).
- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).
- clk: uniphier: Fix fixed-rate initialization (git-fixes).
- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).
- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).
- cpufreq: schedutil: Destroy mutex before kobject_put() frees (git-fixes)
- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).
- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).
- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).
- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).
- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).
- crypto: qat - do not cast parameter in bit operations (git-fixes).
- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).
- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).
- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).
- crypto: vmx - add missing dependencies (git-fixes).
- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).
- driver core: dd: fix return value of __setup handler (git-fixes).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).
- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).
- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).
- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).
- drm/doc: overview before functions for drm_writeback.c (git-fixes).
- drm/i915: Fix dbuf slice config lookup (git-fixes).
- drm/i915/gem: add missing boundary check in vm_access (git-fixes).
- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).
- drm/meson: Fix error handling when afbcd.ops-&gt;init fails (git-fixes).
- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).
- drm/msm/dpu: add DSPP blocks teardown (git-fixes).
- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).
- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).
- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).
- drm/vc4: crtc: Make sure the HDMI controller is powered when disabling (git-fixes).
- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).
- ecryptfs: fix kernel panic with null dev_name (bsc#1197812).
- ecryptfs: Fix typo in message (bsc#1197811).
- ext2: correct max file size computing (bsc#1197820).
- firmware: google: Properly state IOMEM dependency (git-fixes).
- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).
- fscrypt: do not ignore minor_hash when hash is 0 (bsc#1197815).
- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).
- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).
- hwmon: (pmbus) Add Vin unit off handling (git-fixes).
- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).
- hwrng: atmel - disable trng on failure path (git-fixes).
- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).
- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).
- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).
- iio: adc: Add check for devm_request_threaded_irq (git-fixes).
- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).
- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).
- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).
- iio: inkern: make a best effort on offset calculation (git-fixes).
- Input: aiptek - properly check endpoint type (git-fixes).
- iwlwifi: do not advertise TWT support (git-fixes).
- KVM: SVM: Do not flush cache if hardware enforces cache coherency across encryption domains (bsc#1178134).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- mac80211: fix potential double free on mesh join (git-fixes).
- mac80211: refuse aggregations sessions before authorized (git-fixes).
- media: aspeed: Correct value for h-total-pixels (git-fixes).
- media: bttv: fix WARNING regression on tunerless devices (git-fixes).
- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).
- media: em28xx: initialize refcount before kref_get (git-fixes).
- media: hantro: Fix overfill bottom register field name (git-fixes).
- media: Revert 'media: em28xx: add missing em28xx_close_extension' (git-fixes).
- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).
- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).
- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).
- membarrier: Execute SYNC_CORE on the calling thread (git-fixes)
- membarrier: Explicitly sync remote cores when SYNC_CORE is (git-fixes)
- memory: emif: Add check for setup_interrupts (git-fixes).
- memory: emif: check the pointer temp in get_device_details() (git-fixes).
- misc: alcor_pci: Fix an error handling path (git-fixes).
- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).
- mm_zone: add function to check if managed dma zone exists (bsc#1197501).
- mm: add vma_lookup(), update find_vma_intersection() comments (git-fixes).
- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).
- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).
- net: dsa: mv88e6xxx: override existent unicast portvec in port_fdb_add (git-fixes).
- net: enetc: initialize the RFS and RSS memories (git-fixes).
- net: hns3: add a check for tqp_index in hclge_get_ring_chain_from_mbx() (git-fixes).
- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).
- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).
- net: stmmac: set TxQ mode back to DCB after disabling CBS (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: watchdog: hold device global xmit lock during tx disable (git-fixes).
- net/smc: Fix loop in smc_listen (git-fixes).
- net/smc: fix using of uninitialized completions (git-fixes).
- net/smc: fix wrong list_del in smc_lgr_cleanup_early (git-fixes).
- net/smc: Make sure the link_id is unique (git-fixes).
- net/smc: Reset conn-&gt;lgr when link group registration fails (git-fixes).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).
- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).
- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).
- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).
- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).
- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).
- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).
- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).
- NFS: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).
- NFS: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).
- NFS: Fix another issue with a list iterator pointing to the head (git-fixes).
- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).
- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).
- pinctrl: mediatek: paris: Fix 'argument' argument type for mtk_pinconf_get() (git-fixes).
- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).
- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).
- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).
- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).
- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).
- pinctrl: samsung: drop pin banks references on error paths (git-fixes).
- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).
- PM: hibernate: fix __setup handler error handling (git-fixes).
- PM: suspend: fix return value of __setup handler (git-fixes).
- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395).
- powerpc/mm: Fix verification of MMU_FTR_TYPE_44x (bsc#1156395).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).
- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
- powerpc/xive: fix return value of __setup handler (bsc#1065729).
- printk: Add panic_in_progress helper (bsc#1197894).
- printk: disable optimistic spin during panic (bsc#1197894).
- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).
- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).
- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).
- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).
- s390/bpf: Perform r1 range checking before accessing jit-&gt;seen_reg (git-fixes).
- s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes).
- s390/gmap: validate VMA in __gmap_zap() (git-fixes).
- s390/hypfs: include z/VM guests with access control group set (bsc#1195640 LTC#196352).
- s390/kexec_file: fix error handling when applying relocations (git-fixes).
- s390/kexec: fix memory leak of ipl report buffer (git-fixes).
- s390/kexec: fix return code handling (git-fixes).
- s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes).
- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).
- s390/module: fix loading modules with a lot of relocations (git-fixes).
- s390/pci_mmio: fully validate the VMA before calling follow_pte() (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).
- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).
- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).
- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).
- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).
- scsi: lpfc: Fix typos in comments (bsc#1197675).
- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).
- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).
- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).
- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).
- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).
- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).
- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).
- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).
- scsi: lpfc: Use fc_block_rport() (bsc#1197675).
- scsi: lpfc: Use kcalloc() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).
- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).
- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).
- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).
- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).
- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).
- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).
- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).
- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).
- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).
- scsi: qla2xxx: Fix typos in comments (bsc#1197661).
- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).
- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).
- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).
- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).
- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).
- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).
- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).
- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).
- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).
- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).
- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).
- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).
- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).
- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).
- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).
- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).
- tcp: change source port randomizarion at connect() time (bsc#1180153).
- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).
- thermal: int340x: Increase bitmap size (git-fixes).
- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).
- Update config files (bsc#1195926 bsc#1175667). VIRTIO_PCI=m -&gt; VIRTIO_PCI=y
- usb: bdc: Adb shows offline after resuming from S2 (git-fixes).
- usb: bdc: Fix a resource leak in the error handling path of 'bdc_probe()' (git-fixes).
- usb: bdc: Fix unused assignment in bdc_probe() (git-fixes).
- usb: bdc: remove duplicated error message (git-fixes).
- usb: bdc: Use devm_clk_get_optional() (git-fixes).
- usb: bdc: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: gadget: Use list_replace_init() before traversing lists (git-fixes).
- usb: dwc3: qcom: add IRQ check (git-fixes).
- usb: gadget: bdc: use readl_poll_timeout() to simplify code (git-fixes).
- usb: gadget: Fix use-after-free bug by not setting udc-&gt;dev.driver (git-fixes).
- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).
- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).
- VFS: filename_create(): fix incorrect intent (bsc#1197534).
- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).
- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).
- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).
- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).
- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).
- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).
- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).
- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).
- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).
- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).
- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).
- x86/cpu: Add hardware-enforced cache coherency as a CPUID feature (bsc#1178134).
- x86/mm/pat: Do not flush cache if hardware enforces cache coherency across encryption domnains (bsc#1178134).
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1178134).
- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1178134).
- xhci: fix garbage USBSTS being logged in some cases (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180153">SUSE bug 1180153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194649">SUSE bug 1194649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195640">SUSE bug 1195640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195926">SUSE bug 1195926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196478">SUSE bug 1196478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197243">SUSE bug 1197243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197300">SUSE bug 1197300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197302">SUSE bug 1197302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197501">SUSE bug 1197501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197534">SUSE bug 1197534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197661">SUSE bug 1197661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197675">SUSE bug 1197675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197811">SUSE bug 1197811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197812">SUSE bug 1197812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197815">SUSE bug 1197815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197817">SUSE bug 1197817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197819">SUSE bug 1197819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197820">SUSE bug 1197820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197888">SUSE bug 1197888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197889">SUSE bug 1197889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197894">SUSE bug 1197894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198027">SUSE bug 1198027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198028">SUSE bug 1198028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198029">SUSE bug 1198029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198030">SUSE bug 1198030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1195/">CVE-2022-1195</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1198/">CVE-2022-1198</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1199/">CVE-2022-1199</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1205/">CVE-2022-1205</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679387" comment="cluster-md-kmp-64kb-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679177" comment="cluster-md-kmp-default-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679388" comment="cluster-md-kmp-preempt-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679389" comment="dlm-kmp-64kb-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679178" comment="dlm-kmp-default-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679390" comment="dlm-kmp-preempt-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679391" comment="dtb-al-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679392" comment="dtb-allwinner-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679393" comment="dtb-altera-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679394" comment="dtb-amd-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679395" comment="dtb-amlogic-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679396" comment="dtb-apm-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679397" comment="dtb-arm-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679398" comment="dtb-broadcom-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679399" comment="dtb-cavium-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679400" comment="dtb-exynos-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679401" comment="dtb-freescale-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679402" comment="dtb-hisilicon-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679403" comment="dtb-lg-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679404" comment="dtb-marvell-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679405" comment="dtb-mediatek-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679406" comment="dtb-nvidia-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679407" comment="dtb-qcom-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679408" comment="dtb-renesas-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679409" comment="dtb-rockchip-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679410" comment="dtb-socionext-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679411" comment="dtb-sprd-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679412" comment="dtb-xilinx-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679413" comment="dtb-zte-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679414" comment="gfs2-kmp-64kb-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679179" comment="gfs2-kmp-default-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679415" comment="gfs2-kmp-preempt-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679131" comment="kernel-64kb-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679132" comment="kernel-64kb-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679416" comment="kernel-64kb-extra-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679417" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679418" comment="kernel-64kb-optional-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679419" comment="kernel-debug-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679420" comment="kernel-debug-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679421" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679133" comment="kernel-default-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679134" comment="kernel-default-base-5.3.18-150300.59.63.1.150300.18.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679422" comment="kernel-default-base-rebuild-5.3.18-150300.59.63.1.150300.18.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679135" comment="kernel-default-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679423" comment="kernel-default-extra-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679424" comment="kernel-default-livepatch-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679425" comment="kernel-default-livepatch-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679426" comment="kernel-default-optional-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679136" comment="kernel-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679144" comment="kernel-docs-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679427" comment="kernel-docs-html-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679428" comment="kernel-kvmsmall-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679429" comment="kernel-kvmsmall-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679430" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679137" comment="kernel-macros-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679145" comment="kernel-obs-build-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679431" comment="kernel-obs-qa-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679138" comment="kernel-preempt-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679146" comment="kernel-preempt-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679432" comment="kernel-preempt-extra-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679433" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679434" comment="kernel-preempt-optional-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679147" comment="kernel-source-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679435" comment="kernel-source-vanilla-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679148" comment="kernel-syms-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679139" comment="kernel-zfcpdump-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679436" comment="kselftests-kmp-64kb-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679437" comment="kselftests-kmp-default-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679438" comment="kselftests-kmp-preempt-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679439" comment="ocfs2-kmp-64kb-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679180" comment="ocfs2-kmp-default-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679440" comment="ocfs2-kmp-preempt-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679441" comment="reiserfs-kmp-64kb-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679150" comment="reiserfs-kmp-default-5.3.18-150300.59.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679442" comment="reiserfs-kmp-preempt-5.3.18-150300.59.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52604" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678635" comment="libSDL2-2_0-0-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678646" comment="libSDL2-2_0-0-32bit-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678636" comment="libSDL2-devel-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678965" comment="libSDL2-devel-32bit-2.0.8-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52605" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1076314" ref_url="https://bugzilla.suse.com/1076314" source="BUGZILLA"/>
		<reference ref_id="1076967" ref_url="https://bugzilla.suse.com/1076967" source="BUGZILLA"/>
		<reference ref_id="1079845" ref_url="https://bugzilla.suse.com/1079845" source="BUGZILLA"/>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1160782" ref_url="https://bugzilla.suse.com/1160782" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314).
- CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967).
- CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130).
- CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677917" comment="libopenjp2-7-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678643" comment="libopenjp2-7-32bit-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677918" comment="openjpeg2-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677919" comment="openjpeg2-devel-2.3.0-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52606" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193738" ref_url="https://bugzilla.suse.com/1193738" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196114" ref_url="https://bugzilla.suse.com/1196114" source="BUGZILLA"/>
		<reference ref_id="1196433" ref_url="https://bugzilla.suse.com/1196433" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196639" ref_url="https://bugzilla.suse.com/1196639" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196942" ref_url="https://bugzilla.suse.com/1196942" source="BUGZILLA"/>
		<reference ref_id="1196973" ref_url="https://bugzilla.suse.com/1196973" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197391" ref_url="https://bugzilla.suse.com/1197391" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39713" ref_url="https://www.suse.com/security/cve/CVE-2021-39713/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0812" ref_url="https://www.suse.com/security/cve/CVE-2022-0812/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-28356" ref_url="https://www.suse.com/security/cve/CVE-2022-28356/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-28356: Fixed a refcount leak bug in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution (bsc#1197227).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel (bnc#1198033).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-0812: Fixed an incorrect header size calculations in xprtrdma (bsc#1196639).
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c (bsc#1196761).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device (bsc#1196836).
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file (bnc#1197366).
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1196973).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers (bsc#1196488).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).

The following non-security bugs were fixed:

- ax88179_178a: Fixed memory issues that could be triggered by malicious USB devices (bsc#1196018).
- genirq: Use rcu in kstat_irqs_usr() (bsc#1193738).
- gve/net: Fixed multiple bugfixes (jsc#SLE-23652).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- net: tipc: validate domain record count on input (bsc#1195254).
- powerpc: Fixed issues related to slow I/O on PowerPC (bsc#1196433).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193738">SUSE bug 1193738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196114">SUSE bug 1196114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196433">SUSE bug 1196433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196639">SUSE bug 1196639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196942">SUSE bug 1196942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196973">SUSE bug 1196973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197391">SUSE bug 1197391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39713/">CVE-2021-39713</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0812/">CVE-2022-0812</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28356/">CVE-2022-28356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680131" comment="kernel-debug-base-4.12.14-150100.197.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679919" comment="kernel-default-man-4.12.14-150100.197.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680132" comment="kernel-kvmsmall-base-4.12.14-150100.197.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680133" comment="kernel-vanilla-4.12.14-150100.197.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680134" comment="kernel-vanilla-base-4.12.14-150100.197.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680135" comment="kernel-vanilla-devel-4.12.14-150100.197.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680136" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680137" comment="kernel-zfcpdump-man-4.12.14-150100.197.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52607" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1142825" ref_url="https://bugzilla.suse.com/1142825" source="BUGZILLA"/>
		<reference ref_id="1142832" ref_url="https://bugzilla.suse.com/1142832" source="BUGZILLA"/>
		<reference ref_id="1142835" ref_url="https://bugzilla.suse.com/1142835" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10181" ref_url="https://www.suse.com/security/cve/CVE-2019-10181/" source="CVE"/>
		<reference ref_id="CVE-2019-10182" ref_url="https://www.suse.com/security/cve/CVE-2019-10182/" source="CVE"/>
		<reference ref_id="CVE-2019-10185" ref_url="https://www.suse.com/security/cve/CVE-2019-10185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010747.html" source="SUSE-SU"/>
		<description>
This update for icedtea-web fixes the following issues:

- CVE-2019-10181: Fixed an issue where an attacker could inject unsigned code
  in a signed JAR file (bsc#1142835).
- CVE-2019-10182: Fixed a path traversal issue where an attacker could upload
  arbritrary files by tricking a victim into running a specially crafted
  application(bsc#1142825).
- CVE-2019-10185: Fixed an issue where an attacker could write files to arbitrary
  locations during JAR auto-extraction (bsc#1142832).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142825">SUSE bug 1142825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142832">SUSE bug 1142832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142835">SUSE bug 1142835</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10181/">CVE-2019-10181</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10182/">CVE-2019-10182</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10185/">CVE-2019-10185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678962" comment="icedtea-web-1.7.2-150100.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678645" comment="icedtea-web-javadoc-1.7.2-150100.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52608" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup, jsr-305 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189749" ref_url="https://bugzilla.suse.com/1189749" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010753.html" source="SUSE-SU"/>
		<description>
This update for jsoup, jsr-305 fixes the following issues:

- CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

Changes in jsr-305:
- Build with java source and target levels 8 
- Upgrade to upstream version 3.0.2

Changes in jsoup:
- Upgrade to upstream version 1.14.2
- Generate tarball using source service instead of a script
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189749">SUSE bug 1189749</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678640" comment="jsoup-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678963" comment="jsoup-javadoc-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678641" comment="jsr-305-3.0.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678964" comment="jsr-305-javadoc-3.0.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52609" version="1" class="patch">
	<metadata>
		<title>Security update for netty (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182103" ref_url="https://bugzilla.suse.com/1182103" source="BUGZILLA"/>
		<reference ref_id="1183262" ref_url="https://bugzilla.suse.com/1183262" source="BUGZILLA"/>
		<reference ref_id="1190610" ref_url="https://bugzilla.suse.com/1190610" source="BUGZILLA"/>
		<reference ref_id="1190613" ref_url="https://bugzilla.suse.com/1190613" source="BUGZILLA"/>
		<reference ref_id="1193672" ref_url="https://bugzilla.suse.com/1193672" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21290" ref_url="https://www.suse.com/security/cve/CVE-2021-21290/" source="CVE"/>
		<reference ref_id="CVE-2021-21295" ref_url="https://www.suse.com/security/cve/CVE-2021-21295/" source="CVE"/>
		<reference ref_id="CVE-2021-37136" ref_url="https://www.suse.com/security/cve/CVE-2021-37136/" source="CVE"/>
		<reference ref_id="CVE-2021-37137" ref_url="https://www.suse.com/security/cve/CVE-2021-37137/" source="CVE"/>
		<reference ref_id="CVE-2021-43797" ref_url="https://www.suse.com/security/cve/CVE-2021-43797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010773.html" source="SUSE-SU"/>
		<description>
This update for netty fixes the following issues:

- Updated to version 4.1.75:
  - CVE-2021-37136: Fixed an unrestricted decompressed data size in Bzip2Decoder
    (bsc#1190610).
  - CVE-2021-37137: Fixed an unrestricted chunk length in SnappyFrameDecoder,
    which might lead to excessive memory usage (#bsc#1190613).
  - CVE-2021-43797: Fixed a potential HTTP request smuggling issue due to
    insufficient validation against control characters (bsc#1193672).
  - CVE-2021-21290: Fixed an information disclosure via the local system
    temporary directory (bsc#1182103).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182103">SUSE bug 1182103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183262">SUSE bug 1183262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190610">SUSE bug 1190610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190613">SUSE bug 1190613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193672">SUSE bug 1193672</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21290/">CVE-2021-21290</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21295/">CVE-2021-21295</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37136/">CVE-2021-37136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37137/">CVE-2021-37137</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43797/">CVE-2021-43797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679577" comment="netty-4.1.75-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679578" comment="netty-javadoc-4.1.75-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679579" comment="netty-poms-4.1.75-150200.4.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52610" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679467" comment="libSDL-1_2-0-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679575" comment="libSDL-1_2-0-32bit-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679468" comment="libSDL-devel-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679576" comment="libSDL-devel-32bit-1.2.15-150000.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52611" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010770.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

- CVE-2022-1270: Fixed a heap buffer overflow when parsing MIFF (bsc#1198351).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679590" comment="GraphicsMagick-1.3.35-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679591" comment="GraphicsMagick-devel-1.3.35-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679592" comment="libGraphicsMagick++-Q16-12-1.3.35-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679593" comment="libGraphicsMagick++-devel-1.3.35-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679594" comment="libGraphicsMagick-Q16-3-1.3.35-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679595" comment="libGraphicsMagick3-config-1.3.35-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679596" comment="libGraphicsMagickWand-Q16-2-1.3.35-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679597" comment="perl-GraphicsMagick-1.3.35-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52612" version="1" class="patch">
	<metadata>
		<title>Security update for nbd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196827" ref_url="https://bugzilla.suse.com/1196827" source="BUGZILLA"/>
		<reference ref_id="1196828" ref_url="https://bugzilla.suse.com/1196828" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26495" ref_url="https://www.suse.com/security/cve/CVE-2022-26495/" source="CVE"/>
		<reference ref_id="CVE-2022-26496" ref_url="https://www.suse.com/security/cve/CVE-2022-26496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010767.html" source="SUSE-SU"/>
		<description>
This update for nbd fixes the following issues:

- CVE-2022-26495: Fixed an integer overflow with a resultant heap-based buffer overflow (bsc#1196827).
- CVE-2022-26496: Fixed a stack-based buffer overflow when parsing the name field by sending a crafted NBD_OPT_INFO (bsc#1196828). 


Update to version 3.24 (bsc#1196827, bsc#1196828, CVE-2022-26495, CVE-2022-26496):
  * https://github.com/advisories/GHSA-q9rw-8758-hccj

Update to version 3.23:
  * Don't overwrite the hostname with the TLS hostname

Update to version 3.22:
  - nbd-server: handle auth for v6-mapped IPv4 addresses 
  - nbd-client.c: parse the next option in all cases
  - configure.ac: silence a few autoconf 2.71 warnings
  - spec: Relax NBD_OPT_LIST_META_CONTEXTS 
  - client: Don't confuse Unix socket with TLS hostname
  - server: Avoid deprecated g_memdup

Update to version 3.21:
  - Fix --disable-manpages build
  - Fix a bug in whitespace handling regarding authorization files
  - Support client-side marking of devices as read-only
  - Support preinitialized NBD connection (i.e., skip the negotiation).
  - Fix the systemd unit file for nbd-client so it works with netlink (the
    more common situation nowadays)

Update to 3.20.0 (no changelog)

Update to version 3.19.0:
  * Better error messages in case of unexpected disconnects
  * Better compatibility with non-bash sh implementations
    (for configure.sh)
  * Fix for a segfault in NBD_OPT_INFO handling
  * The ability to specify whether to listen on both TCP and Unix
    domain sockets, rather than to always do so
  * Various minor editorial and spelling fixes in the documentation.

Update to version 1.18.0:
  * Client: Add the '-g' option to avoid even trying the NBD_OPT_GO
    message
  * Server: fixes to inetd mode
  * Don't make gnutls and libnl automagic.
  * Server: bugfixes in handling of some export names during verification.
  * Server: clean supplementary groups when changing user.
  * Client: when using the netlink protocol, only set a timeout
    when there actually is a timeout, rather than defaulting to 0
    seconds
  * Improve documentation on the nbdtab file
  * Minor improvements to some error messages
  * Improvements to test suite so it works better on non-GNU
    userland environments

- Update to version 1.17.0:
  * proto: add xNBD command NBD_CMD_CACHE to the spec
  * server: do not crash when handling child name
  * server: Close socket pair when fork fails
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196827">SUSE bug 1196827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196828">SUSE bug 1196828</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26495/">CVE-2022-26495</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26496/">CVE-2022-26496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679599" comment="nbd-3.24-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52613" version="1" class="patch">
	<metadata>
		<title>Security update for dcraw (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1056170" ref_url="https://bugzilla.suse.com/1056170" source="BUGZILLA"/>
		<reference ref_id="1063798" ref_url="https://bugzilla.suse.com/1063798" source="BUGZILLA"/>
		<reference ref_id="1084690" ref_url="https://bugzilla.suse.com/1084690" source="BUGZILLA"/>
		<reference ref_id="1097973" ref_url="https://bugzilla.suse.com/1097973" source="BUGZILLA"/>
		<reference ref_id="1097974" ref_url="https://bugzilla.suse.com/1097974" source="BUGZILLA"/>
		<reference ref_id="1117436" ref_url="https://bugzilla.suse.com/1117436" source="BUGZILLA"/>
		<reference ref_id="1117512" ref_url="https://bugzilla.suse.com/1117512" source="BUGZILLA"/>
		<reference ref_id="1117517" ref_url="https://bugzilla.suse.com/1117517" source="BUGZILLA"/>
		<reference ref_id="1117622" ref_url="https://bugzilla.suse.com/1117622" source="BUGZILLA"/>
		<reference ref_id="1117896" ref_url="https://bugzilla.suse.com/1117896" source="BUGZILLA"/>
		<reference ref_id="1189642" ref_url="https://bugzilla.suse.com/1189642" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14608" ref_url="https://www.suse.com/security/cve/CVE-2017-14608/" source="CVE"/>
		<reference ref_id="CVE-2018-19565" ref_url="https://www.suse.com/security/cve/CVE-2018-19565/" source="CVE"/>
		<reference ref_id="CVE-2018-19566" ref_url="https://www.suse.com/security/cve/CVE-2018-19566/" source="CVE"/>
		<reference ref_id="CVE-2018-19567" ref_url="https://www.suse.com/security/cve/CVE-2018-19567/" source="CVE"/>
		<reference ref_id="CVE-2018-19568" ref_url="https://www.suse.com/security/cve/CVE-2018-19568/" source="CVE"/>
		<reference ref_id="CVE-2018-19655" ref_url="https://www.suse.com/security/cve/CVE-2018-19655/" source="CVE"/>
		<reference ref_id="CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801/" source="CVE"/>
		<reference ref_id="CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805/" source="CVE"/>
		<reference ref_id="CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806/" source="CVE"/>
		<reference ref_id="CVE-2021-3624" ref_url="https://www.suse.com/security/cve/CVE-2021-3624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<description>
This update for dcraw fixes the following issues:

- CVE-2017-13735: Fixed a denial of service issue due to a floating point
  exception (bsc#1056170).
- CVE-2017-14608: Fixed an invalid memory access that could lead to information
  disclosure or denial of service (bsc#1063798).
- CVE-2018-19655: Fixed a buffer overflow that could lead to an application
  crash (bsc#1117896).
- CVE-2018-5801: Fixed an invalid memory access that could lead to denial of
  service (bsc#1084690).
- CVE-2018-5805: Fixed a buffer overflow that could lead to an application crash
  (bsc#1097973).
- CVE-2018-5806: Fixed an invalid memory access that could lead to denial of
  service (bsc#1097974).
- CVE-2018-19565: Fixed an invalid memory access that could lead to information
  disclosure or denial of service (bsc#1117622).
- CVE-2018-19566: Fixed an invalid memory access that could lead to information
  disclosure or denial of service (bsc#1117517).
- CVE-2018-19567: Fixed a denial of service issue due to a floating point
  exception (bsc#1117512).
- CVE-2018-19568: Fixed a denial of service issue due to a floating point
  exception (bsc#1117436).
- CVE-2021-3624: Fixed a buffer overflow that could lead to code execution or
  denial of service (bsc#1189642).

Non-security fixes:

- Updated to version 9.28.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056170">SUSE bug 1056170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063798">SUSE bug 1063798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084690">SUSE bug 1084690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097973">SUSE bug 1097973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097974">SUSE bug 1097974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117436">SUSE bug 1117436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117512">SUSE bug 1117512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117517">SUSE bug 1117517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117622">SUSE bug 1117622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117896">SUSE bug 1117896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189642">SUSE bug 1189642</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14608/">CVE-2017-14608</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19565/">CVE-2018-19565</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19566/">CVE-2018-19566</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19567/">CVE-2018-19567</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19568/">CVE-2018-19568</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19655/">CVE-2018-19655</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3624/">CVE-2021-3624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679588" comment="dcraw-9.28.0-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679589" comment="dcraw-lang-9.28.0-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52614" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2020-8112: Fixed a heap buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed a use-after-free if a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed a heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457),
- CVE-2021-29338: Fixed an integer Overflow allows remote attackers to crash the application (bsc#1184774).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679714" comment="libopenjpeg1-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679751" comment="libopenjpeg1-32bit-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679752" comment="openjpeg-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679715" comment="openjpeg-devel-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679753" comment="openjpeg-devel-32bit-1.5.2-150000.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52615" version="1" class="patch">
	<metadata>
		<title>Security update for swtpm (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196240" ref_url="https://bugzilla.suse.com/1196240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23645" ref_url="https://www.suse.com/security/cve/CVE-2022-23645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010790.html" source="SUSE-SU"/>
		<description>
This update for swtpm fixes the following issues:

- Update to version 0.5.3
    - CVE-2022-23645: Check header size indicator against expected size (bsc#1196240).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1196240">SUSE bug 1196240</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23645/">CVE-2022-23645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669983" comment="swtpm-0.5.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669984" comment="swtpm-devel-0.5.3-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52616" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010796.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security hardening, related to Spring Framework vulnerabilities:
    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679716" comment="tomcat-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679717" comment="tomcat-admin-webapps-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679747" comment="tomcat-docs-webapp-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679718" comment="tomcat-el-3_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679748" comment="tomcat-embed-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679749" comment="tomcat-javadoc-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679719" comment="tomcat-jsp-2_3-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679750" comment="tomcat-jsvc-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679720" comment="tomcat-lib-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679721" comment="tomcat-servlet-4_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679722" comment="tomcat-webapps-9.0.36-150200.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52617" version="1" class="patch">
	<metadata>
		<title>Security update for libinput (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198111" ref_url="https://bugzilla.suse.com/1198111" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
		<description>
This update for libinput fixes the following issues:

- CVE-2022-1215: Fixed a format string vulnerability (bsc#1198111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680157" comment="libinput-devel-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680158" comment="libinput-tools-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680159" comment="libinput-udev-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680160" comment="libinput10-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680688" comment="libinput10-32bit-1.10.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52618" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679466" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679598" comment="dnsmasq-utils-2.86-150100.7.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52619" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1182404" ref_url="https://bugzilla.suse.com/1182404" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184318" ref_url="https://bugzilla.suse.com/1184318" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186332" ref_url="https://bugzilla.suse.com/1186332" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192320" ref_url="https://bugzilla.suse.com/1192320" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192691" ref_url="https://bugzilla.suse.com/1192691" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192874" ref_url="https://bugzilla.suse.com/1192874" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193139" ref_url="https://bugzilla.suse.com/1193139" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193655" ref_url="https://bugzilla.suse.com/1193655" source="BUGZILLA"/>
		<reference ref_id="1193993" ref_url="https://bugzilla.suse.com/1193993" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24504" ref_url="https://www.suse.com/security/cve/CVE-2020-24504/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated
    
- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)
  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

The following security bugs were fixed:

- CVE-2021-45485: Fixed an information leak because of certain use of a hash table which use IPv6 source addresses. (bsc#1194094)
- CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c. (bnc#1194087).
- CVE-2021-4001: Fixed a race condition when the EBPF map is frozen. (bsc#1192990)
- CVE-2021-28715: Fixed an issue where a guest could force Linux netback driver to hog large amounts of kernel memory by do not queueing unlimited number of packages.  (bsc#1193442)
- CVE-2021-28714: Fixed an issue where a guest could force Linux netback driver to hog large amounts of kernel memory by fixing rx queue stall detection. (bsc#1193442)
- CVE-2021-28713: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening hvc_xen against event channel storms. (bsc#1193440)
- CVE-2021-28712: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening netfront against event channel storms. (bsc#1193440)
- CVE-2021-28711: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening blkfront against event channel storms. (bsc#1193440)
- CVE-2020-24504: Fixed an uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers that may have allowed an authenticated user to potentially enable denial of service via local access. (bnc#1182404)
- CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bnc#1192845)
- CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847)
- CVE-2021-4002: Added a missing TLB flush that could lead to leak or corruption of data in hugetlbfs. (bsc#1192946)
- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device. (bnc#1179599)

The following non-security bugs were fixed:

- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: tse850: the emaclt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: mt7623: add missing pause for switchport (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- Bbluetooth: btusb: Add another Bluetooth part for Realtek 8852AE (bsc#1193655).
- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).
- bfq: Store full bitmap depth in bfq_data (bsc#1184318).
- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- block: Provide blk_mq_sched_get_icq() (bsc#1184318).
- Bluetooth: Add additional Bluetooth part for Realtek 8852AE (bsc#1193655).
- Bluetooth: btrtl: Refine the ic_id_table for clearer and more regular (bsc#1193655).
- Bluetooth: btusb: Add the more support IDs for Realtek RTL8822CE (bsc#1193655).
- Bluetooth: btusb: Add the new support ID for Realtek RTL8852A (bsc#1193655).
- Bluetooth: btusb: btrtl: Add support for RTL8852A (bsc#1193655).
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- bpf, s390: Fix potential memory leak about jit_data (git-fixes).
- bpf, x86: Fix 'no previous prototype' warning (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs use true,false for bool variable (bsc#1164565).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: Assign boolean values to a bool variable (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- cifs: call wake_up(server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check new file size when extending file by fallocate (bsc#1192606).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: Clarify SMB1 code for delete (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX Create (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- cifs: Clarify SMB1 code for rename open file (bsc#1192606).
- cifs: Clarify SMB1 code for SetFileSize (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- cifs: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: Close cached root handle only if it had a lease (bsc#1164565).
- cifs: Close open handle after interrupted close (bsc#1164565).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not miss cancelled OPEN responses (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix atime update check vs mtime (bsc#1164565).
- cifs: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix gcc warning in sid_to_id (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: fix max ea value size (bnc#1151927 5.3.4).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix misspellings using codespell tool (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix NULL pointer dereference in mid callback (bsc#1164565).
- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- cifs: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: Fix resource leak (bsc#1192606).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix task struct use-after-free on reconnect (bsc#1164565).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: Fix use after free of file info structures (bnc#1151927 5.3.8).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- cifs: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB cache=strict vers=2.1+ (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: Make SMB2_notify_init static (bsc#1164565).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- cifs: New optype for session operations (bsc#1181507).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: Properly process SMB3 lease breaks (bsc#1164565).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor cifs_get_inode_info() (bsc#1164565).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: Remove repeated struct declaration (bsc#1192606).
- cifs: Remove set but not used variable 'capabilities' (bsc#1164565).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: Remove unnecessary struct declaration (bsc#1192606).
- cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: Remove useless variable (bsc#1192606).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify bool comparison (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: Standardize logging output (bsc#1192606).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- cifs: use mod_delayed_work() for server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: use true,false for bool variable (bsc#1164565).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: Warn less noisily on default mount (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- config: refresh BPF configs (jsc#SLE-22574) The SUSE-commit 9a413cc7eb56 ('config: disable unprivileged BPF by default (jsc#SLE-22573)') inherited from SLE15-SP2 puts the BPF config into the wrong place due to SLE15-SP3 additionally backported b24abcff918a ('bpf, kconfig: Add consolidated menu entry for bpf with core options'), and leads to duplicate CONFIG_BPF_UNPRIV_DEFAULT_OFF entires; this commit remove those BPF config. Also, disable unprivileged BPF for armv7hl, which did not inherit the config change from SLE15-SP2.
- constraints: Build aarch64 on recent ARMv8.1 builders. Request asimdrdm feature which is available only on recent ARMv8.1 CPUs. This should prevent scheduling the kernel on an older slower builder.
- Convert trailing spaces and periods in path components (bsc#1179424).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dm raid: remove unnecessary discard limits for raid0 and raid10 (bsc#1192320).
- dm: fix deadlock when swapping to encrypted device (bsc#1186332).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- drm/amd/display: Set plane update flags for all planes in reset (git-fixes).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/msm/a6xx: Allocate enough space for GMU registers (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/nouveau/acr: fix a couple NULL vs IS_ERR() checks (git-fixes).
- drm/nouveau/svm: Fix refcount leak bug and missing check against null bug (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/pl111: Actually fix CONFIG_VEXPRESS_CONFIG depends (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drop superfluous empty lines
- e1000e: Separate TGP board type from SPT (bsc#1192874).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ethtool: fix ethtool msg len calculation for pause stats (jsc#SLE-15075).
- firmware: qcom_scm: Mark string array const (git-fixes).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- hwmon: (k10temp) Add additional missing Zen2 and Zen3 APUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Add support for yellow carp (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Add support for Zen3 CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Create common functions and macros for Zen CPU families (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Define SVI telemetry and current factors for Zen2 CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Do not show Tdie for all Zen/Zen2/Zen3 CPU/APU (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) make some symbols static (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Remove residues of current and voltage (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Remove support for displaying voltage and current on Zen CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Reorganize and simplify temperature support detection (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Rework the temperature offset calculation (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) support Zen3 APUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Swap Tdie and Tctl on Family 17h CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Update documentation and add temp2_input info (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Update driver documentation (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Zen3 Ryzen Desktop CPUs support (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for setting queues to 0 (jsc#SLE-12877).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Fix return of set the new channel count (jsc#SLE-12877).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: Fix not stopping Tx queues for VFs (jsc#SLE-7926).
- ice: Fix VF true promiscuous mode (jsc#SLE-12878).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- ice: Remove toggling of antispoof for VF trusted promiscuous mode (jsc#SLE-12878).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- Input: iforce - fix control-message timeout (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu/mediatek: Fix out-of-range warning with clang (git-fixes).
- iommu/vt-d: Consolidate duplicate cache invaliation code (git-fixes).
- iommu/vt-d: Fix incomplete cache flush in intel_pasid_tear_down_entry() (git-fixes).
- iommu/vt-d: Update the virtual command related registers (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kABI: dm: fix deadlock when swapping to encrypted device (bsc#1186332).
- kabi: hide changes to struct uv_info (git-fixes).
- kernel-obs-build: include the preferred kernel parameters Currently the Open Build Service hardcodes the kernel boot parameters globally. Recently functionality was added to control the parameters by the kernel-obs-build package, so make use of that. parameters here will overwrite what is used by OBS otherwise.
- kernel-obs-build: inform build service about virtio-serial Inform the build worker code that this kernel supports virtio-serial, which improves performance and relability of logging.
- kernel-obs-build: remove duplicated/unused parameters lbs=0 - this parameters is just giving 'unused parameter' and it looks like I can not find any version that implemented this. rd.driver.pre=binfmt_misc is not needed when setup_obs is used, it alread loads the kernel module. quiet and panic=1 will now be also always added by OBS, so we do not have to set it here anymore.
- kernel-source.spec: install-kernel-tools also required on 15.4
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: add md_submit_discard_bio() for submitting discard bio (bsc#1192320).
- md: fix a lock order reversal in md_alloc (git-fixes).
- md/raid10: extend r10bio devs to raid disks (bsc#1192320).
- md/raid10: improve discard request for far layout (bsc#1192320).
- md/raid10: improve raid10 discard request (bsc#1192320).
- md/raid10: initialize r10_bio-&gt;read_slot before use (bsc#1192320).
- md/raid10: pull the code that wait for blocked dev into one function (bsc#1192320).
- md/raid10: Remove unnecessary rcu_dereference in raid10_handle_discard (bsc#1192320).
- mdio: aspeed: Fix 'Link is Down' issue (bsc#1176447).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: bridge: fix under estimation in br_get_linkxstats_size() (bsc#1176447).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hns3: change affinity_mask to numa node range (bsc#1154353).
- net: hns3: fix misuse vf id and vport id in some logs (bsc#1154353).
- net: hns3: remove check VF uc mac exist when set by PF (bsc#1154353).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: stmmac: add EHL 2.5Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add EHL PSE0 PSE1 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add EHL RGMII 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add EHL SGMII 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add TGL SGMII 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: create dwmac-intel.c to contain all Intel platform (bsc#1192691).
- net: stmmac: pci: Add HAPS support using GMAC5 (bsc#1192691).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: E-Switch, return error if encap isn't supported (jsc#SLE-15172).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1176774).
- netfilter: ctnetlink: do not erase error code with EINVAL (bsc#1176447).
- netfilter: ctnetlink: fix filtering with CTA_TUPLE_REPLY (bsc#1176447).
- netfilter: flowtable: fix IPv6 tunnel addr match (bsc#1176447).
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- perf/x86/intel: Fix unchecked MSR access error caused by VLBR_EVENT (git-fixes).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf/x86/vlbr: Add c-&gt;flags to vlbr event constraints (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc/iommu: Report the correct most efficient DMA mask for PCI devices (git-fixes).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/perf: Fix cycles/instructions as PM_CYC/PM_INST_CMPL in power10 (jsc#SLE-13513 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- RDMA/bnxt_re: Update statistics counter name (jsc#SLE-16649).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/*.spec.in: use buildroot macro instead of env variable The RPM_BUILD_ROOT variable is considered deprecated over a buildroot macro. future proof the spec files.
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306) After usrmerge, vmlinux file is not named vmlinux-lt;version&gt;, but simply vmlinux. And this is not reflected in STRIP_KEEP_SYMTAB we set. So fix this by removing the dash...
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd Newer distros have capability to decompress zstd, which provides a 2-5% better compression ratio at very similar cpu overhead. Plus this tests the zstd codepaths now as well.
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1193993).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpi3mr: Fix duplicate device entries when scanning through sysfs (git-fixes).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: pm80xx: Do not call scsi_remove_host() in pm8001_alloc() (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: 8250: Fix RTS modem control while in rs485 mode (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: add defines for new signing negotiate context (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: Add new compression flags (bsc#1192606).
- smb3: Add new info level for query directory (bsc#1192606).
- smb3: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3: add new module load parm require_gcm_256 (bsc#1192606).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: Add support for getting and setting SACLs (bsc#1192606).
- smb3: Add support for lookup with posix extensions query info (bsc#1192606).
- smb3: Add support for negotiating signing algorithm (bsc#1192606).
- smb3: Add support for query info using posix extensions (level 100) (bsc#1192606).
- smb3: add support for recognizing WSL reparse tags (bsc#1192606).
- smb3: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: add support for using info level for posix extensions query (bsc#1192606).
- smb3: Add tracepoints for new compound posix query info (bsc#1192606).
- smb3: Additional compression structures (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: avoid confusing warning message on mount to Azure (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Backup intent flag missing from some more ops (bsc#1164565).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3: do not log warning message if server does not populate salt (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable negotiating stronger encryption by default (bsc#1192606).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: Fix ids returned in POSIX query dir (bsc#1192606).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix mount failure to some servers when compression enabled (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix readpage for large swap cache (bsc#1192606).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in compression flag (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- smb3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- smb3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- smb3: Honor lease disabling for multiuser mounts (git-fixes).
- smb3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: incorrect file id in requests compounded with open (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: Minor cleanup of protocol definitions (bsc#1192606).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: print warning if server does not support requested encryption type (bsc#1192606).
- smb3: print warning once if posix context returned on open  (bsc#1164565).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- smb3: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3: Resolve data corruption of TCP server info fields (bsc#1192606).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: set gcm256 when requested (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: update structures for new compression protocol definitions (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- supported.conf: add pwm-rockchip References: jsc#SLE-22615
- swiotlb: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: chipidea: ci_hdrc_imx: fix potential error pointer dereference in probe (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: serial: option: add Fibocom FM101-GL variants (git-fixes).
- usb: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/amd_nb: Add AMD family 19h model 50h PCI ids (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/efi: Restore Firmware IDT before calling ExitBootServices() (git-fixes).
- x86/entry: Add a fence for kernel entry SWAPGS in paranoid_entry() (bsc#1178134).
- x86/mpx: Disable MPX for 32-bit userland (bsc#1193139).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/sev: Allow #VC exceptions on the VC2 stack (git-fixes).
- x86/sev: Fix SEV-ES INS/OUTS instructions for word, dword, and qword (bsc#1178134).
- x86/sev: Fix stack type check in vc_switch_off_ist() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182404">SUSE bug 1182404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184318">SUSE bug 1184318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186332">SUSE bug 1186332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192320">SUSE bug 1192320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192691">SUSE bug 1192691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192874">SUSE bug 1192874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193139">SUSE bug 1193139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193655">SUSE bug 1193655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193993">SUSE bug 1193993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24504/">CVE-2020-24504</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663141" comment="cluster-md-kmp-64kb-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662956" comment="cluster-md-kmp-default-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663142" comment="cluster-md-kmp-preempt-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663143" comment="dlm-kmp-64kb-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662957" comment="dlm-kmp-default-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663144" comment="dlm-kmp-preempt-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663145" comment="dtb-al-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663146" comment="dtb-allwinner-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663147" comment="dtb-altera-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663148" comment="dtb-amd-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663149" comment="dtb-amlogic-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663150" comment="dtb-apm-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663151" comment="dtb-arm-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663152" comment="dtb-broadcom-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663153" comment="dtb-cavium-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663154" comment="dtb-exynos-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663155" comment="dtb-freescale-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663156" comment="dtb-hisilicon-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663157" comment="dtb-lg-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663158" comment="dtb-marvell-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663159" comment="dtb-mediatek-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663160" comment="dtb-nvidia-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663161" comment="dtb-qcom-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663162" comment="dtb-renesas-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663163" comment="dtb-rockchip-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663164" comment="dtb-socionext-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663165" comment="dtb-sprd-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663166" comment="dtb-xilinx-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663167" comment="dtb-zte-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663168" comment="gfs2-kmp-64kb-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662958" comment="gfs2-kmp-default-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663169" comment="gfs2-kmp-preempt-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662903" comment="kernel-64kb-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662904" comment="kernel-64kb-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663170" comment="kernel-64kb-extra-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663171" comment="kernel-64kb-livepatch-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663172" comment="kernel-64kb-optional-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663173" comment="kernel-debug-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663174" comment="kernel-debug-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663175" comment="kernel-debug-livepatch-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662905" comment="kernel-default-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662906" comment="kernel-default-base-5.3.18-59.40.1.18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663176" comment="kernel-default-base-rebuild-5.3.18-59.40.1.18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662907" comment="kernel-default-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663177" comment="kernel-default-extra-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663178" comment="kernel-default-livepatch-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663179" comment="kernel-default-livepatch-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663180" comment="kernel-default-optional-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662908" comment="kernel-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662928" comment="kernel-docs-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663181" comment="kernel-docs-html-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663182" comment="kernel-kvmsmall-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663183" comment="kernel-kvmsmall-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663184" comment="kernel-kvmsmall-livepatch-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662909" comment="kernel-macros-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662929" comment="kernel-obs-build-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663185" comment="kernel-obs-qa-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662910" comment="kernel-preempt-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662930" comment="kernel-preempt-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663186" comment="kernel-preempt-extra-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663187" comment="kernel-preempt-livepatch-devel-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663188" comment="kernel-preempt-optional-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662931" comment="kernel-source-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663189" comment="kernel-source-vanilla-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662932" comment="kernel-syms-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662911" comment="kernel-zfcpdump-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663190" comment="kselftests-kmp-64kb-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663191" comment="kselftests-kmp-default-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663192" comment="kselftests-kmp-preempt-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663193" comment="ocfs2-kmp-64kb-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662959" comment="ocfs2-kmp-default-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663194" comment="ocfs2-kmp-preempt-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663195" comment="reiserfs-kmp-64kb-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662933" comment="reiserfs-kmp-default-5.3.18-59.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663196" comment="reiserfs-kmp-preempt-5.3.18-59.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52620" version="1" class="patch">
	<metadata>
		<title>Security update for netty (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184203" ref_url="https://bugzilla.suse.com/1184203" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21409" ref_url="https://www.suse.com/security/cve/CVE-2021-21409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010800.html" source="SUSE-SU"/>
		<description>
This update for netty fixes the following issues:

- CVE-2021-21409: Fixed request smuggling via content-length header (bsc#1184203).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184203">SUSE bug 1184203</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21409/">CVE-2021-21409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680689" comment="netty-4.1.75-150200.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680690" comment="netty-javadoc-4.1.75-150200.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680691" comment="netty-poms-4.1.75-150200.4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52621" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1159921" ref_url="https://bugzilla.suse.com/1159921" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20093" ref_url="https://www.suse.com/security/cve/CVE-2019-20093/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010795.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

- CVE-2019-20093: Fixed an invalid memory access that could cause an application
  crash (bsc#1159921).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159921">SUSE bug 1159921</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20093/">CVE-2019-20093</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680692" comment="libpodofo-devel-0.9.6-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680693" comment="libpodofo0_9_6-0.9.6-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680694" comment="podofo-0.9.6-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52622" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193907" ref_url="https://bugzilla.suse.com/1193907" source="BUGZILLA"/>
		<reference ref_id="1193913" ref_url="https://bugzilla.suse.com/1193913" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<reference ref_id="CVE-2021-41496" ref_url="https://www.suse.com/security/cve/CVE-2021-41496/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQS3J3J4254A7C3LD55D7A432FZ2RFFI/" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issues:

- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).
- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193907">SUSE bug 1193907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193913">SUSE bug 1193913</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41496/">CVE-2021-41496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663843" comment="python3-numpy-1.17.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663844" comment="python3-numpy-devel-1.17.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664027" comment="python3-numpy-gnu-hpc-1.17.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664028" comment="python3-numpy-gnu-hpc-devel-1.17.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664029" comment="python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664030" comment="python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52623" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663720" comment="busybox-1.34.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663721" comment="busybox-static-1.34.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52624" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663724" comment="MozillaFirefox-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663826" comment="MozillaFirefox-branding-upstream-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663827" comment="MozillaFirefox-devel-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663726" comment="MozillaFirefox-translations-common-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663727" comment="MozillaFirefox-translations-other-91.5.0-152.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52625" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198518" ref_url="https://bugzilla.suse.com/1198518" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010823.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2022-1328: Fixed an invalid memory access when reading untrusted uuencoded
  data. This could result in including private memory in replies (bsc#1198518).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679816" comment="mutt-1.10.1-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679817" comment="mutt-doc-1.10.1-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679818" comment="mutt-lang-1.10.1-150000.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52626" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1194363" ref_url="https://bugzilla.suse.com/1194363" source="BUGZILLA"/>
		<reference ref_id="1194873" ref_url="https://bugzilla.suse.com/1194873" source="BUGZILLA"/>
		<reference ref_id="1194909" ref_url="https://bugzilla.suse.com/1194909" source="BUGZILLA"/>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1197579" ref_url="https://bugzilla.suse.com/1197579" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

grafana:

- Update from version 7.5.12 to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)
  + Security:
    * Fixes XSS vulnerability in handling data sources
      (bsc#1195726, CVE-2022-21702)
    * Fixes cross-origin request forgery vulnerability
      (bsc#1195727, CVE-2022-21703)
    * Fixes Insecure Direct Object Reference vulnerability in Teams API (bsc#1195728, CVE-2022-21713)
- Update to Go 1.17.
- Add build-time dependency on `wire`.
- Update license to GNU Affero General Public License v3.0.
- Update to version 8.3.4
    * GetUserInfo: return an error if no user was found
      (bsc#1194873, CVE-2022-21673)
  + Features and enhancements:
    * Alerting: Allow configuration of non-ready alertmanagers.
    * Alerting: Allow customization of Google chat message.
    * AppPlugins: Support app plugins with only default nav.
    * InfluxDB: query editor: skip fields in metadata queries.
    * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user
      cancels query in grafana.
    * Prometheus: Forward oauth tokens after prometheus datasource
      migration.
  + Bug fixes:
    * Azure Monitor: Bug fix for variable interpolations in metrics
      dropdowns.
    * Azure Monitor: Improved error messages for variable queries.
    * CloudMonitoring: Fixes broken variable queries that use group
      bys.
    * Configuration: You can now see your expired API keys if you
      have no active ones.
    * Elasticsearch: Fix handling multiple datalinks for a single
      field.
    * Export: Fix error being thrown when exporting dashboards
      using query variables that reference the default datasource.
    * ImportDashboard: Fixes issue with importing dashboard and
      name ending up in uid.
    * Login: Page no longer overflows on mobile.
    * Plugins: Set backend metadata property for core plugins.
    * Prometheus: Fill missing steps with null values.
    * Prometheus: Fix interpolation of $__rate_interval variable.
    * Prometheus: Interpolate variables with curly brackets syntax.
    * Prometheus: Respect the http-method data source setting.
    * Table: Fixes issue with field config applied to wrong fields
      when hiding columns.
    * Toolkit: Fix bug with rootUrls not being properly parsed when
      signing a private plugin.
    * Variables: Fix so data source variables are added to adhoc
      configuration.
  + Plugin development fixes &amp; changes:
    * Toolkit: Revert build config so tslib is bundled with plugins
      to prevent plugins from crashing.
- Update to version 8.3.3:
    * BarChart: Use new data error view component to show actions
      in panel edit.
    * CloudMonitor: Iterate over pageToken for resources.
    * Macaron: Prevent WriteHeader invalid HTTP status code panic.
    * AnnoListPanel: Fix interpolation of variables in tags.
    * CloudWatch: Allow queries to have no dimensions specified.
    * CloudWatch: Fix broken queries for users migrating from
      8.2.4/8.2.5 to 8.3.0.
    * CloudWatch: Make sure MatchExact flag gets the right value.
    * Dashboards: Fix so that empty folders can be deleted from the
      manage dashboards/folders page.
    * InfluxDB: Improve handling of metadata query errors in
      InfluxQL.
    * Loki: Fix adding of ad hoc filters for queries with parser
      and line_format expressions.
    * Prometheus: Fix running of exemplar queries for non-histogram
      metrics.
    * Prometheus: Interpolate template variables in interval.
    * StateTimeline: Fix toolitp not showing when for frames with
      multiple fields.
    * TraceView: Fix virtualized scrolling when trace view is
      opened in right pane in Explore.
    * Variables: Fix repeating panels for on time range changed
      variables.
    * Variables: Fix so queryparam option works for scoped
- Update to version 8.3.2
  + Security: Fixes CVE-2021-43813 and CVE-2021-43815.
- Update to version 8.3.1
  + Security: Fixes CVE-2021-43798.
- Update to version 8.3.0
    * Alerting: Prevent folders from being deleted when they
      contain alerts.
    * Alerting: Show full preview value in tooltip.
    * BarGauge: Limit title width when name is really long.
    * CloudMonitoring: Avoid to escape regexps in filters.
    * CloudWatch: Add support for AWS Metric Insights.
    * TooltipPlugin: Remove other panels' shared tooltip in edit
      panel.
    * Visualizations: Limit y label width to 40% of visualization
      width.
    * Alerting: Clear alerting rule evaluation errors after
      intermittent failures.
    * Alerting: Fix refresh on legacy Alert List panel.
    * Dashboard: Fix queries for panels with non-integer widths.
    * Explore: Fix url update inconsistency.
    * Prometheus: Fix range variables interpolation for time ranges
      smaller than 1 second.
    * ValueMappings: Fixes issue with regex value mapping that only
      sets color.
- Update to version 8.3.0-beta2
  + Breaking changes:
    * Grafana 8 Alerting enabled by default for installations that
      do not use legacy alerting.
    * Keep Last State for 'If execution error or timeout' when
      upgrading to Grafana 8 alerting.
    * Alerting: Create DatasourceError alert if evaluation returns
      error.
    * Alerting: Make Unified Alerting enabled by default for those
      who do not use legacy alerting.
    * Alerting: Support mute timings configuration through the api
      for the embedded alert manager.
    * CloudWatch: Add missing AWS/Events metrics.
    * Docs: Add easier to find deprecation notices to certain data
      sources and to the changelog.
    * Plugins Catalog: Enable install controls based on the
      pluginAdminEnabled flag.
    * Table: Add space between values for the DefaultCell and
      JSONViewCell.
    * Tracing: Make query editors available in dashboard for Tempo
      and Zipkin.
    * AccessControl: Renamed orgs roles, removed fixed:orgs:reader
      introduced in beta1.
    * Azure Monitor: Add trap focus for modals in grafana/ui and
      other small a11y fixes for Azure Monitor.
    * CodeEditor: Prevent suggestions from being clipped.
    * Dashboard: Fix cache timeout persistence.
    * Datasource: Fix stable sort order of query responses.
    * Explore: Fix error in query history when removing last item.
    * Logs: Fix requesting of older logs when flipped order.
    * Prometheus: Fix running of health check query based on access
      mode.
    * TextPanel: Fix suggestions for existing panels.
    * Tracing: Fix incorrect indentations due to reoccurring
      spanIDs.
    * Tracing: Show start time of trace with milliseconds
      precision.
    * Variables: Make renamed or missing variable section
      expandable.
    * Select: Select menus now properly scroll during keyboard
      navigation.
- Update to version 8.3.0-beta1
    * Alerting: Add UI for contact point testing with custom
      annotations and labels.
    * Alerting: Make alert state indicator in panel header work
      with Grafana 8 alerts.
    * Alerting: Option for Discord notifier to use webhook name.
    * Annotations: Deprecate AnnotationsSrv.
    * Auth: Omit all base64 paddings in JWT tokens for the JWT
      auth.
    * Azure Monitor: Clean up fields when editing Metrics.
    * AzureMonitor: Add new starter dashboards.
    * AzureMonitor: Add starter dashboard for app monitoring with
      Application Insights.
    * Barchart/Time series: Allow x axis label.
    * CLI: Improve error handling for installing plugins.
    * CloudMonitoring: Migrate to use backend plugin SDK contracts.
    * CloudWatch Logs: Add retry strategy for hitting max
      concurrent queries.
    * CloudWatch: Add AWS RoboMaker metrics and dimension.
    * CloudWatch: Add AWS Transfer metrics and dimension.
    * Dashboard: replace datasource name with a reference object.
    * Dashboards: Show logs on time series when hovering.
    * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).
    * Elasticsearch: Add time zone setting to Date Histogram
      aggregation.
    * Elasticsearch: Enable full range log volume histogram.
    * Elasticsearch: Full range logs volume.
    * Explore: Allow changing the graph type.
    * Explore: Show ANSI colors when highlighting matched words in
      the logs panel.
    * Graph(old) panel: Listen to events from Time series panel.
    * Import: Load gcom dashboards from URL.
    * LibraryPanels: Improves export and import of library panels
      between orgs.
    * OAuth: Support PKCE.
    * Panel edit: Overrides now highlight correctly when searching.
    * PanelEdit: Display drag indicators on draggable sections.
    * Plugins: Refactor Plugin Management.
    * Prometheus: Add custom query parameters when creating
      PromLink url.
    * Prometheus: Remove limits on metrics, labels, and values in
      Metrics Browser.
    * StateTimeline: Share cursor with rest of the panels.
    * Tempo: Add error details when json upload fails.
    * Tempo: Add filtering for service graph query.
    * Tempo: Add links to nodes in Service Graph pointing to
      Prometheus metrics.
    * Time series/Bar chart panel: Add ability to sort series via
      legend.
    * TimeSeries: Allow multiple axes for the same unit.
    * TraceView: Allow span links defined on dataFrame.
    * Transformations: Support a rows mode in labels to fields.
    * ValueMappings: Don't apply field config defaults to time
      fields.
    * Variables: Only update panels that are impacted by variable
      change.
    * API: Fix dashboard quota limit for imports.
    * Alerting: Fix rule editor issues with Azure Monitor data
      source.
    * Azure monitor: Make sure alert rule editor is not enabled
      when template variables are being used.
    * CloudMonitoring: Fix annotation queries.
    * CodeEditor: Trigger the latest getSuggestions() passed to
      CodeEditor.
    * Dashboard: Remove the current panel from the list of options
      in the Dashboard datasource.
    * Encryption: Fix decrypting secrets in alerting migration.
    * InfluxDB: Fix corner case where index is too large in ALIAS
    * NavBar: Order App plugins alphabetically.
    * NodeGraph: Fix zooming sensitivity on touchpads.
    * Plugins: Add OAuth pass-through logic to api/ds/query
      endpoint.
    * Snapshots: Fix panel inspector for snapshot data.
    * Tempo: Fix basic auth password reset on adding tag.
    * ValueMapping: Fixes issue with regex mappings.
    * grafana/ui: Enable slider marks display.
- Update to version 8.2.7
- Update to version 8.2.6
    * Security: Upgrade Docker base image to Alpine 3.14.3.
    * Security: Upgrade Go to 1.17.2.
    * TimeSeries: Fix fillBelowTo wrongly affecting fills of
      unrelated series.
- Update to version 8.2.5
    * Fix No Data behaviour in Legacy Alerting.
    * Alerting: Fix a bug where the metric in the evaluation string
      was not correctly populated.
    * Alerting: Fix no data behaviour in Legacy Alerting for alert
      rules using the AND operator.
    * CloudMonitoring: Ignore min and max aggregation in MQL
      queries.
    * Dashboards: 'Copy' is no longer added to new dashboard
      titles.
    * DataProxy: Fix overriding response body when response is a
      WebSocket upgrade.
    * Elasticsearch: Use field configured in query editor as field
      for date_histogram aggregations.
    * Explore: Fix running queries without a datasource property
      set.
    * InfluxDB: Fix numeric aliases in queries.
    * Plugins: Ensure consistent plugin settings list response.
    * Tempo: Fix validation of float durations.
    * Tracing: Correct tags for each span are shown.
- Update to version 8.2.4
  + Security: Fixes CVE-2021-41244.
- Update to version 8.2.3
  + Security: Fixes CVE-2021-41174.
- Update to version 8.2.2
    * Annotations: We have improved tag search performance.
    * Application: You can now configure an error-template title.
    * AzureMonitor: We removed a restriction from the resource
      filter query.
    * Packaging: We removed the ProcSubset option in systemd. This
      option prevented Grafana from starting in LXC environments.
    * Prometheus: We removed the autocomplete limit for metrics.
    * Table: We improved the styling of the type icons to make them
      more distinct from column / field name.
    * ValueMappings: You can now use value mapping in stat, gauge,
      bar gauge, and pie chart visualizations.
    * Alerting: Fix panic when Slack's API sends unexpected
      response.
    * Alerting: The Create Alert button now appears on the
      dashboard panel when you are working with a default
      datasource.
    * Explore: We fixed the problem where the Explore log panel
      disappears when an Elasticsearch logs query returns no
      results.
    * Graph: You can now see annotation descriptions on hover.
    * Logs: The system now uses the JSON parser only if the line is
      parsed to an object.
    * Prometheus: We fixed the issue where the system did not reuse
      TCP connections when querying from Grafana alerting.
    * Prometheus: We fixed the problem that resulted in an error
      when a user created a query with a $__interval min step.
    * RowsToFields: We fixed the issue where the system was not
      properly interpreting number values.
    * Scale: We fixed how the system handles NaN percent when data
      min = data max.
    * Table panel: You can now create a filter that includes
      special characters.
- Update to version 8.2.1
    * Dashboard: Fix rendering of repeating panels.
    * Datasources: Fix deletion of data source if plugin is not
      found.
    * Packaging: Remove systemcallfilters sections from systemd
      unit files.
    * Prometheus: Add Headers to HTTP client options.
- Update to version 8.2.0
    * AWS: Updated AWS authentication documentation.
    * Alerting: Added support Alertmanager data source for upstream
      Prometheus AM implementation.
    * Alerting: Allows more characters in label names so
      notifications are sent.
    * Alerting: Get alert rules for a dashboard or a panel using
      /api/v1/rules endpoints.
    * Annotations: Improved rendering performance of event markers.
    * CloudWatch Logs: Skip caching for log queries.
    * Explore: Added an opt-in configuration for Node Graph in
      Jaeger, Zipkin, and Tempo.
    * Packaging: Add stricter systemd unit options.
    * Prometheus: Metrics browser can now handle label values with
    * CodeEditor: Ensure that we trigger the latest onSave callback
      provided to the component.
    * DashboardList/AlertList: Fix for missing All folder value.
    * Plugins: Create a mock icon component to prevent console
      errors.
- Update to version 8.2.0-beta2
    * AccessControl: Document new permissions restricting data
      source access.
    * TimePicker: Add fiscal years and search to time picker.
    * Alerting: Added support for Unified Alerting with Grafana HA.
    * Alerting: Added support for tune rule evaluation using
      configuration options.
    * Alerting: Cleanups alertmanager namespace from key-value
      store when disabling Grafana 8 alerts.
    * Alerting: Remove ngalert feature toggle and introduce two new
      settings for enabling Grafana 8 alerts and disabling them for
      specific organisations.
    * CloudWatch: Introduced new math expression where it is
      necessary to specify the period field.
    * InfluxDB: Added support for $__interval and $__interval_ms in
      Flux queries for alerting.
    * InfluxDB: Flux queries can use more precise start and end
      timestamps with nanosecond-precision.
    * Plugins Catalog: Make the catalog the default way to interact
      with plugins.
    * Prometheus: Removed autocomplete limit for metrics.
    * Alerting: Fixed an issue where the edit page crashes if you
      tried to preview an alert without a condition set.
    * Alerting: Fixed rules migration to keep existing Grafana 8
      alert rules.
    * Alerting: Fixed the silence file content generated during
    * Analytics: Fixed an issue related to interaction event
      propagation in Azure Application Insights.
    * BarGauge: Fixed an issue where the cell color was lit even
      though there was no data.
    * BarGauge: Improved handling of streaming data.
    * CloudMonitoring: Fixed INT64 label unmarshal error.
    * ConfirmModal: Fixes confirm button focus on modal open.
    * Dashboard: Add option to generate short URL for variables
      with values containing spaces.
    * Explore: No longer hides errors containing refId property.
    * Fixed an issue that produced State timeline panel tooltip
      error when data was not in sync.
    * InfluxDB: InfluxQL query editor is set to always use
      resultFormat.
    * Loki: Fixed creating context query for logs with parsed
      labels.
    * PageToolbar: Fixed alignment of titles.
    * Plugins Catalog: Update to the list of available panels after
      an install, update or uninstall.
    * TimeSeries: Fixed an issue where the shared cursor was not
      showing when hovering over in old Graph panel.
    * Variables: Fixed issues related to change of focus or refresh
      pages when pressing enter in a text box variable input.
    * Variables: Panel no longer crash when using the adhoc
      variable in data links.
- Update to version 8.2.0-beta1
    * AccessControl: Introduce new permissions to restrict access
      for reloading provisioning configuration.
    * Alerting: Add UI to edit Cortex/Loki namespace, group names,
      and group evaluation interval.
    * Alerting: Add a Test button to test contact point.
    * Alerting: Allow creating/editing recording rules for Loki and
      Cortex.
    * Alerting: Metrics should have the label org instead of user.
    * Alerting: Sort notification channels by name to make them
      easier to locate.
    * Alerting: Support org level isolation of notification
    * AzureMonitor: Add data links to deep link to Azure Portal
      Azure Resource Graph.
    * AzureMonitor: Add support for annotations from Azure Monitor
      Metrics and Azure Resource Graph services.
    * AzureMonitor: Show error message when subscriptions request
      fails in ConfigEditor.
    * Chore: Update to Golang 1.16.7.
    * CloudWatch Logs: Add link to X-Ray data source for trace IDs
      in logs.
    * CloudWatch Logs: Disable query path using websockets (Live)
      feature.
    * CloudWatch/Logs: Don't group dataframes for non time series
    * Cloudwatch: Migrate queries that use multiple stats to one
      query per stat.
    * Dashboard: Keep live timeseries moving left (v2).
    * Datasources: Introduce response_limit for datasource
      responses.
    * Explore: Add filter by trace or span ID to trace to logs
    * Explore: Download traces as JSON in Explore Inspector.
    * Explore: Reuse Dashboard's QueryRows component.
    * Explore: Support custom display label for derived fields
      buttons for Loki datasource.
    * Grafana UI: Update monaco-related dependencies.
    * Graphite: Deprecate browser access mode.
    * InfluxDB: Improve handling of intervals in alerting.
    * InfluxDB: InfluxQL query editor: Handle unusual characters in
      tag values better.
    * Jaeger: Add ability to upload JSON file for trace data.
    * LibraryElements: Enable specifying UID for new and existing
      library elements.
    * LibraryPanels: Remove library panel icon from the panel
      header so you can no longer tell that a panel is a library
      panel from the dashboard view.
    * Logs panel: Scroll to the bottom on page refresh when sorting
      in ascending order.
    * Loki: Add fuzzy search to label browser.
    * Navigation: Implement active state for items in the Sidemenu.
    * Packaging: Update PID file location from /var/run to /run.
    * Plugins: Add Hide OAuth Forward config option.
    * Postgres/MySQL/MSSQL: Add setting to limit the maximum number
      of rows processed.
    * Prometheus: Add browser access mode deprecation warning.
    * Prometheus: Add interpolation for built-in-time variables to
      backend.
    * Tempo: Add ability to upload trace data in JSON format.
    * TimeSeries/XYChart: Allow grid lines visibility control in
      XYChart and TimeSeries panels.
    * Transformations: Convert field types to time string number or
      boolean.
    * Value mappings: Add regular-expression based value mapping.
    * Zipkin: Add ability to upload trace JSON.
    * Admin: Prevent user from deleting user's current/active
      organization.
    * LibraryPanels: Fix library panel getting saved in the
      dashboard's folder.
    * OAuth: Make generic teams URL and JMES path configurable.
    * QueryEditor: Fix broken copy-paste for mouse middle-click
    * Thresholds: Fix undefined color in 'Add threshold'.
    * Timeseries: Add wide-to-long, and fix multi-frame output.
    * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip
      is set to All.
    * Grafana UI: Fix TS error property css is missing in type.
- Update to version 8.1.8
- Update to version 8.1.7
    * Alerting: Fix alerts with evaluation interval more than 30
      seconds resolving before notification.
    * Elasticsearch/Prometheus: Fix usage of proper SigV4 service
      namespace.
- Update to version 8.1.6
  + Security: Fixes CVE-2021-39226.
- Update to version 8.1.5
    * BarChart: Fixes panel error that happens on second refresh.
- Update to version 8.1.4
  + Features and enhancements
    * Explore: Ensure logs volume bar colors match legend colors.
    * LDAP: Search all DNs for users.
    * Alerting: Fix notification channel migration.
    * Annotations: Fix blank panels for queries with unknown data
      sources.
    * BarChart: Fix stale values and x axis labels.
    * Graph: Make old graph panel thresholds work even if ngalert
      is enabled.
    * InfluxDB: Fix regex to identify / as separator.
    * LibraryPanels: Fix update issues related to library panels in
      rows.
    * Variables: Fix variables not updating inside a Panel when the
      preceding Row uses 'Repeat For'.
- Update to version 8.1.3
  + Bug fixes
    * Alerting: Fix alert flapping in the internal alertmanager.
    * Alerting: Fix request handler failed to convert dataframe
      'results' to plugins.DataTimeSeriesSlice: input frame is not
      recognized as a time series.
    * Dashboard: Fix UIDs are not preserved when importing/creating
      dashboards thru importing .json file.
    * Dashboard: Forces panel re-render when exiting panel edit.
    * Dashboard: Prevent folder from changing when navigating to
      general settings.
    * Docker: Force use of libcrypto1.1 and libssl1.1 versions to
      fix CVE-2021-3711.
    * Elasticsearch: Fix metric names for alert queries.
    * Elasticsearch: Limit Histogram field parameter to numeric
      values.
    * Elasticsearch: Prevent pipeline aggregations to show up in
      terms order by options.
    * LibraryPanels: Prevent duplicate repeated panels from being
      created.
    * Loki: Fix ad-hoc filter in dashboard when used with parser.
    * Plugins: Track signed files + add warn log for plugin assets
      which are not signed.
    * Postgres/MySQL/MSSQL: Fix region annotations not displayed
      correctly.
    * Prometheus: Fix validate selector in metrics browser.
    * Security: Fix stylesheet injection vulnerability.
    * Security: Fix short URL vulnerability.
- Update to version 8.1.2
    * AzureMonitor: Add support for PostgreSQL and MySQL Flexible
      Servers.
    * Datasource: Change HTTP status code for failed datasource
      health check to 400.
    * Explore: Add span duration to left panel in trace viewer.
    * Plugins: Use file extension allowlist when serving plugin
      assets instead of checking for UNIX executable.
    * Profiling: Add support for binding pprof server to custom
      network interfaces.
    * Search: Make search icon keyboard navigable.
    * Template variables: Keyboard navigation improvements.
    * Tooltip: Display ms within minute time range.
    * Alerting: Fix saving LINE contact point.
    * Annotations: Fix alerting annotation coloring.
    * Annotations: Alert annotations are now visible in the correct
      Panel.
    * Auth: Hide SigV4 config UI and disable middleware when its
      config flag is disabled.
    * Dashboard: Prevent incorrect panel layout by comparing window
      width against theme breakpoints.
    * Explore: Fix showing of full log context.
    * PanelEdit: Fix 'Actual' size by passing the correct panel
      size to Dashboard.
    * Plugins: Fix TLS datasource settings.
    * Variables: Fix issue with empty drop downs on navigation.
    * Variables: Fix URL util converting false into true.
    * Toolkit: Fix matchMedia not found error.
- Update to version 8.1.1
    * CloudWatch Logs: Fix crash when no region is selected.
- Update to version 8.1.0
    * Alerting: Deduplicate receivers during migration.
    * ColorPicker: Display colors as RGBA.
    * Select: Make portalling the menu opt-in, but opt-in
      everywhere.
    * TimeRangePicker: Improve accessibility.
    * Annotations: Correct annotations that are displayed upon page
      refresh.
    * Annotations: Fix Enabled button that disappeared from Grafana
      v8.0.6.
    * Annotations: Fix data source template variable that was not
      available for annotations.
    * AzureMonitor: Fix annotations query editor that does not
      load.
    * Geomap: Fix scale calculations.
    * GraphNG: Fix y-axis autosizing.
    * Live: Display stream rate and fix duplicate channels in list
    * Loki: Update labels in log browser when time range changes in
      dashboard.
    * NGAlert: Send resolve signal to alertmanager on alerting -&gt;
      Normal.
    * PasswordField: Prevent a password from being displayed when
      you click the Enter button.
    * Renderer: Remove debug.log file when Grafana is stopped.
    * Security: Update dependencies to fix CVE-2021-36222.
- Update to version 8.1.0-beta3
    * Alerting: Support label matcher syntax in alert rule list
      filter.
    * IconButton: Put tooltip text as aria-label.
    * Live: Experimental HA with Redis.
    * UI: FileDropzone component.
    * CloudWatch: Add AWS LookoutMetrics.
    * Docker: Fix builds by delaying go mod verify until all
      required files are copied over.
    * Exemplars: Fix disable exemplars only on the query that
      failed.
    * SQL: Fix SQL dataframe resampling (fill mode + time
      intervals).
- Update to version 8.1.0-beta2
    * Alerting: Expand the value string in alert annotations and
    * Auth: Add Azure HTTP authentication middleware.
    * Auth: Auth: Pass user role when using the authentication
      proxy.
    * Gazetteer: Update countries.json file to allow for linking to
      3-letter country codes.
    * Config: Fix Docker builds by correcting formatting in
      sample.ini.
    * Explore: Fix encoding of internal URLs.
- Update to version 8.1.0-beta1
    * Alerting: Add Alertmanager notifications tab.
    * Alerting: Add button to deactivate current Alertmanager
    * Alerting: Add toggle in Loki/Prometheus data source
      configuration to opt out of alerting UI.
    * Alerting: Allow any 'evaluate for' value &gt;=0 in the alert
      rule form.
    * Alerting: Load default configuration from status endpoint, if
      Cortex Alertmanager returns empty user configuration. 
    * Alerting: view to display alert rule and its underlying data.
    * Annotation panel: Release the annotation panel.
    * Annotations: Add typeahead support for tags in built-in
      annotations.
    * AzureMonitor: Add curated dashboards for Azure services.
    * AzureMonitor: Add support for deep links to Microsoft Azure
      portal for Metrics.
    * AzureMonitor: Remove support for different credentials for
      Azure Monitor Logs.
    * AzureMonitor: Support querying any Resource for Logs queries.
    * Elasticsearch: Add frozen indices search support.
    * Elasticsearch: Name fields after template variables values
      instead of their name.
    * Elasticsearch: add rate aggregation.
    * Email: Allow configuration of content types for email
      notifications.
    * Explore: Add more meta information when line limit is hit.
    * Explore: UI improvements to trace view.
    * FieldOverrides: Added support to change display name in an
      override field and have it be matched by a later rule.
    * HTTP Client: Introduce dataproxy_max_idle_connections config
      variable.
    * InfluxDB: InfluxQL: adds tags to timeseries data.
    * InfluxDB: InfluxQL: make measurement search case insensitive.
      Legacy Alerting: Replace simplejson with a struct in webhook
      notification channel.
    * Legend: Updates display name for Last (not null) to just
      Last*.
    * Logs panel: Add option to show common labels.
    * Loki: Add $__range variable.
    * Loki: Add support for 'label_values(log stream selector,
      label)' in templating.
    * Loki: Add support for ad-hoc filtering in dashboard.
    * MySQL Datasource: Add timezone parameter.
    * NodeGraph: Show gradient fields in legend.
    * PanelOptions: Don't mutate panel options/field config object
      when updating.
    * PieChart: Make pie gradient more subtle to match other
      charts.
    * Prometheus: Update PromQL typeahead and highlighting.
    * Prometheus: interpolate variable for step field.
    * Provisioning: Improve validation by validating across all
      dashboard providers.
    * SQL Datasources: Allow multiple string/labels columns with
      time series.
    * Select: Portal select menu to document.body.
    * Team Sync: Add group mapping to support team sync in the
      Generic OAuth provider.
    * Tooltip: Make active series more noticeable.
    * Tracing: Add support to configure trace to logs start and end
      time.
    * Transformations: Skip merge when there is only a single data
      frame.
    * ValueMapping: Added support for mapping text to color,
      boolean values, NaN and Null. Improved UI for value mapping.
    * Visualizations: Dynamically set any config (min, max, unit,
      color, thresholds) from query results.
    * live: Add support to handle origin without a value for the
      port when matching with root_url.
    * Alerting: Handle marshaling Inf values.
    * AzureMonitor: Fix macro resolution for template variables.
    * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes
      resources.
    * AzureMonitor: Request and concat subsequent resource pages.
    * Bug: Fix parse duration for day.
    * Datasources: Improve error handling for error messages.
    * Explore: Correct the functionality of shift-enter shortcut
      across all uses.
    * Explore: Show all dataFrames in data tab in Inspector.
    * GraphNG: Fix Tooltip mode 'All' for XYChart.
    * Loki: Fix highlight of logs when using filter expressions
      with backticks.
    * Modal: Force modal content to overflow with scroll.
    * Plugins: Ignore symlinked folders when verifying plugin
      signature.
    * Toolkit: Improve error messages when tasks fail.
- Update to version 8.0.7
- Update to version 8.0.6
    * Alerting: Add annotation upon alert state change.
    * Alerting: Allow space in label and annotation names.
    * InfluxDB: Improve legend labels for InfluxDB query results.
    * Alerting: Fix improper alert by changing the handling of
      empty labels.
    * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.
    * Dashboard: Avoid migration breaking on fieldConfig without
      defaults field in folded panel.
    * DashboardList: Fix issue not re-fetching dashboard list after
      variable change.
    * Database: Fix incorrect format of isolation level
      configuration parameter for MySQL.
    * InfluxDB: Correct tag filtering on InfluxDB data.
    * Links: Fix links that caused a full page reload.
    * Live: Fix HTTP error when InfluxDB metrics have an incomplete
      or asymmetrical field set.
    * Postgres/MySQL/MSSQL: Change time field to 'Time' for time
      series queries.
    * Postgres: Fix the handling of a null return value in query
    * Tempo: Show hex strings instead of uints for IDs.
    * TimeSeries: Improve tooltip positioning when tooltip
      overflows.
    * Transformations: Add 'prepare time series' transformer.
- Update to version 8.0.5
    * Cloudwatch Logs: Send error down to client.
    * Folders: Return 409 Conflict status when folder already
      exists.
    * TimeSeries: Do not show series in tooltip if it's hidden in
      the viz.
    * AzureMonitor: Fix issue where resource group name is missing
      on the resource picker button.
    * Chore: Fix AWS auth assuming role with workspace IAM.
    * DashboardQueryRunner: Fixes unrestrained subscriptions being
    * DateFormats: Fix reading correct setting key for
      use_browser_locale.
    * Links: Fix links to other apps outside Grafana when under sub
      path.
    * Snapshots: Fix snapshot absolute time range issue.
    * Table: Fix data link color.
    * Time Series: Fix X-axis time format when tick increment is
      larger than a year.
    * Tooltip Plugin: Prevent tooltip render if field is undefined.
- Update to version 8.0.4
    * Live: Rely on app url for origin check.
    * PieChart: Sort legend descending, update placeholder.
    * TimeSeries panel: Do not reinitialize plot when thresholds
      mode change.
    * Elasticsearch: Allow case sensitive custom options in
      date_histogram interval.
    * Elasticsearch: Restore previous field naming strategy when
      using variables.
    * Explore: Fix import of queries between SQL data sources.
    * InfluxDB: InfluxQL query editor: fix retention policy
      handling.
    * Loki: Send correct time range in template variable queries.
    * TimeSeries: Preserve RegExp series overrides when migrating
      from old graph panel.
- Update to version 8.0.3
    * Alerting: Increase alertmanager_conf column if MySQL.
    * Time series/Bar chart panel: Handle infinite numbers as nulls
      when converting to plot array.
    * TimeSeries: Ensure series overrides that contain color are
      migrated, and migrate the previous fieldConfig when changing
      the panel type.
    * ValueMappings: Improve singlestat value mappings migration.
    * Annotations: Fix annotation line and marker colors.
    * AzureMonitor: Fix KQL template variable queries without
      default workspace.
    * CloudWatch/Logs: Fix missing response data for log queries.
    * LibraryPanels: Fix crash in library panels list when panel
      plugin is not found.
    * LogsPanel: Fix performance drop when moving logs panel in
    * Loki: Parse log levels when ANSI coloring is enabled.
    * MSSQL: Fix issue with hidden queries still being executed.
    * PanelEdit: Display the VisualizationPicker that was not
      displayed if a panel has an unknown panel plugin.
    * Plugins: Fix loading symbolically linked plugins.
    * Prometheus: Fix issue where legend name was replaced with
      name Value in stat and gauge panels.
    * State Timeline: Fix crash when hovering over panel.
- Update to version 8.0.2
    * Datasource: Add support for max_conns_per_host in dataproxy
      settings.
    * Configuration: Fix changing org preferences in FireFox.
    * PieChart: Fix legend dimension limits.
    * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.
    * Variables: Hide default data source if missing from regex.
- Update to version 8.0.1
    * Alerting/SSE: Fix 'count_non_null' reducer validation.
    * Cloudwatch: Fix duplicated time series.
    * Cloudwatch: Fix missing defaultRegion.
    * Dashboard: Fix Dashboard init failed error on dashboards with
      old singlestat panels in collapsed rows.
    * Datasource: Fix storing timeout option as numeric.
    * Postgres/MySQL/MSSQL: Fix annotation parsing for empty
    * Postgres/MySQL/MSSQL: Numeric/non-string values are now
      returned from query variables.
    * Postgres: Fix an error that was thrown when the annotation
      query did not return any results.
    * StatPanel: Fix an issue with the appearance of the graph when
      switching color mode.
    * Visualizations: Fix an issue in the
      Stat/BarGauge/Gauge/PieChart panels where all values mode
      were showing the same name if they had the same value.
    * Toolkit: Resolve external fonts when Grafana is served from a
      sub path.
- Update to version 8.0.0
    * The following endpoints were deprecated for Grafana v5.0 and
      support for them has now been removed:
      GET /dashboards/db/:slug
      GET /dashboard-solo/db/:slug
      GET /api/dashboard/db/:slug
      DELETE /api/dashboards/db/:slug
    * AzureMonitor: Require default subscription for workspaces()
      template variable query.
    * AzureMonitor: Use resource type display names in the UI.
    * Dashboard: Remove support for loading and deleting dashboard
      by slug.
    * InfluxDB: Deprecate direct browser access in data source.
    * VizLegend: Add a read-only property.
    * AzureMonitor: Fix Azure Resource Graph queries in Azure
      China.
    * Checkbox: Fix vertical layout issue with checkboxes due to
      fixed height.
    * Dashboard: Fix Table view when editing causes the panel data
      to not update.
    * Dashboard: Fix issues where unsaved-changes warning is not
      displayed.
    * Login: Fixes Unauthorized message showing when on login page
      or snapshot page.
    * NodeGraph: Fix sorting markers in grid view.
    * Short URL: Include orgId in generated short URLs.
    * Variables: Support raw values of boolean type.
- Update to version 8.0.0-beta3
    * The default HTTP method for Prometheus data source is now
      POST.
    * API: Support folder UID in dashboards API.
    * Alerting: Add support for configuring avatar URL for the
      Discord notifier.
    * Alerting: Clarify that Threema Gateway Alerts support only
      Basic IDs.
    * Azure: Expose Azure settings to external plugins.
    * AzureMonitor: Deprecate using separate credentials for Azure
      Monitor Logs.
    * AzureMonitor: Display variables in resource picker for Azure
    * AzureMonitor: Hide application insights for data sources not
      using it.
    * AzureMonitor: Support querying subscriptions and resource
      groups in Azure Monitor Logs.
    * AzureMonitor: remove requirement for default subscription.
    * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.
    * CloudWatch: Add missing AWS AppSync metrics.
    * ConfirmModal: Auto focus delete button.
    * Explore: Add caching for queries that are run from logs
    * Loki: Add formatting for annotations.
    * Loki: Bring back processed bytes as meta information.
    * NodeGraph: Display node graph collapsed by default with trace
      view.
    * Overrides: Include a manual override option to hide something
      from visualization.
    * PieChart: Support row data in pie charts.
    * Prometheus: Update default HTTP method to POST for existing
      data sources.
    * Time series panel: Position tooltip correctly when window is
      scrolled or resized.
    * Admin: Fix infinite loading edit on the profile page.
    * Color: Fix issues with random colors in string and date
    * Dashboard: Fix issue with title or folder change has no
      effect after exiting settings view.
    * DataLinks: Fix an issue __series.name is not working in data
      link.
    * Datasource: Fix dataproxy timeout should always be applied
      for outgoing data source HTTP requests.
    * Elasticsearch: Fix NewClient not passing httpClientProvider
      to client impl.
    * Explore: Fix Browser title not updated on Navigation to
      Explore.
    * GraphNG: Remove fieldName and hideInLegend properties from
      UPlotSeriesBuilder.
    * OAuth: Fix fallback to auto_assign_org_role setting for Azure
      AD OAuth when no role claims exists.
    * PanelChrome: Fix issue with empty panel after adding a non
      data panel and coming back from panel edit.
    * StatPanel: Fix data link tooltip not showing for single
      value.
    * Table: Fix sorting for number fields.
    * Table: Have text underline for datalink, and add support for
      image datalink.
    * Transformations: Prevent FilterByValue transform from
      crashing panel edit.
- Update to version 8.0.0-beta2
    * AppPlugins: Expose react-router to apps.
    * AzureMonitor: Add Azure Resource Graph.
    * AzureMonitor: Managed Identity configuration UI.
    * AzureMonitor: Token provider with support for Managed
      Identities.
    * AzureMonitor: Update Logs workspace() template variable query
      to return resource URIs.
    * BarChart: Value label sizing.
    * CloudMonitoring: Add support for preprocessing.
    * CloudWatch: Add AWS/EFS StorageBytes metric.
    * CloudWatch: Allow use of missing AWS namespaces using custom
    * Datasource: Shared HTTP client provider for core backend data
      sources and any data source using the data source proxy.
    * InfluxDB: InfluxQL: allow empty tag values in the query
      editor.
    * Instrumentation: Instrument incoming HTTP request with
      histograms by default.
    * Library Panels: Add name endpoint &amp; unique name validation to
      AddLibraryPanelModal.
    * Logs panel: Support details view.
    * PieChart: Always show the calculation options dropdown in the
    * PieChart: Remove beta flag.
    * Plugins: Enforce signing for all plugins.
    * Plugins: Remove support for deprecated backend plugin
      protocol version.
    * Tempo/Jaeger: Add better display name to legend.
    * Timeline: Add time range zoom.
    * Timeline: Adds opacity &amp; line width option.
    * Timeline: Value text alignment option.
    * ValueMappings: Add duplicate action, and disable dismiss on
      backdrop click.
    * Zipkin: Add node graph view to trace response.
    * Annotations panel: Remove subpath from dashboard links.
    * Content Security Policy: Allow all image sources by default.
    * Content Security Policy: Relax default template wrt. loading
      of scripts, due to nonces not working.
    * Datasource: Fix tracing propagation for alert execution by
      introducing HTTP client outgoing tracing middleware.
    * InfluxDB: InfluxQL always apply time interval end.
    * Library Panels: Fixes 'error while loading library panels'.
    * NewsPanel: Fixes rendering issue in Safari.
    * PanelChrome: Fix queries being issued again when scrolling in
      and out of view.
    * Plugins: Fix Azure token provider cache panic and auth param
      nil value.
    * Snapshots: Fix key and deleteKey being ignored when creating
      an external snapshot.
    * Table: Fix issue with cell border not showing with colored
      background cells.
    * Table: Makes tooltip scrollable for long JSON values.
    * TimeSeries: Fix for Connected null values threshold toggle
      during panel editing.
    * Variables: Fixes inconsistent selected states on dashboard
    * Variables: Refreshes all panels even if panel is full screen.
    * QueryField: Remove carriage return character from pasted text.
- Update to version 8.0.0-beta1
  + License update:
    * AGPL License: Update license from Apache 2.0 to the GNU
      Affero General Public License (AGPL).
    * Removes the never refresh option for Query variables.
    * Removes the experimental Tags feature for Variables.
  + Deprecations:
    * The InfoBox &amp; FeatureInfoBox are now deprecated please use
      the Alert component instead with severity info.
    * API: Add org users with pagination.
    * API: Return 404 when deleting nonexistent API key.
    * API: Return query results as JSON rather than base64 encoded
      Arrow.
    * Alerting: Allow sending notification tags to Opsgenie as
      extra properties.
    * Alerts: Replaces all uses of InfoBox &amp; FeatureInfoBox with
      Alert.
    * Auth: Add support for JWT Authentication.
    * AzureMonitor: Add support for
      Microsoft.SignalRService/SignalR metrics.
    * AzureMonitor: Azure settings in Grafana server config.
    * AzureMonitor: Migrate Metrics query editor to React.
    * BarChart panel: enable series toggling via legend.
    * BarChart panel: Adds support for Tooltip in BarChartPanel.
    * PieChart panel: Change look of highlighted pie slices.
    * CloudMonitoring: Migrate config editor from angular to react.
    * CloudWatch: Add Amplify Console metrics and dimensions.
    * CloudWatch: Add missing Redshift metrics to CloudWatch data
    * CloudWatch: Add metrics for managed RabbitMQ service.
    * DashboardList: Enable templating on search tag input.
    * Datasource config: correctly remove single custom http
      header.
    * Elasticsearch: Add generic support for template variables.
    * Elasticsearch: Allow omitting field when metric supports
      inline script.
    * Elasticsearch: Allow setting a custom limit for log queries.
    * Elasticsearch: Guess field type from first non-empty value.
    * Elasticsearch: Use application/x-ndjson content type for
      multisearch requests.
    * Elasticsearch: Use semver strings to identify ES version.
    * Explore: Add logs navigation to request more logs.
    * Explore: Map Graphite queries to Loki.
    * Explore: Scroll split panes in Explore independently.
    * Explore: Wrap each panel in separate error boundary.
    * FieldDisplay: Smarter naming of stat values when visualising
      row values (all values) in stat panels.
    * Graphite: Expand metric names for variables.
    * Graphite: Handle unknown Graphite functions without breaking
      the visual editor.
    * Graphite: Show graphite functions descriptions.
    * Graphite: Support request cancellation properly (Uses new
      backendSrv.fetch Observable request API).
    * InfluxDB: Flux: Improve handling of complex
      response-structures.
    * InfluxDB: Support region annotations.
    * Inspector: Download logs for manual processing.
    * Jaeger: Add node graph view for trace.
    * Jaeger: Search traces.
    * Loki: Use data source settings for alerting queries.
    * NodeGraph: Exploration mode.
    * OAuth: Add support for empty scopes.
    * PanelChrome: New logic-less emotion based component with no
      dependency on PanelModel or DashboardModel.
    * PanelEdit: Adds a table view toggle to quickly view data in
      table form.
    * PanelEdit: Highlight matched words when searching options.
    * PanelEdit: UX improvements.
    * Plugins: PanelRenderer and simplified QueryRunner to be used
      from plugins.
    * Plugins: AuthType in route configuration and params
      interpolation.
    * Plugins: Enable plugin runtime install/uninstall
      capabilities.
    * Plugins: Support set body content in plugin routes.
    * Plugins: Introduce marketplace app.
    * Plugins: Moving the DataSourcePicker to grafana/runtime so it
      can be reused in plugins.
    * Prometheus: Add custom query params for alert and exemplars
    * Prometheus: Use fuzzy string matching to autocomplete metric
      names and label.
    * Routing: Replace Angular routing with react-router.
    * Slack: Use chat.postMessage API by default.
    * Tempo: Search for Traces by querying Loki directly from
      Tempo.
    * Tempo: Show graph view of the trace.
    * Themes: Switch theme without reload using global shortcut.
    * TimeSeries panel: Add support for shared cursor.
    * TimeSeries panel: Do not crash the panel if there is no time
      series data in the response.
    * Variables: Do not save repeated panels, rows and scopedVars.
    * Variables: Removes experimental Tags feature.
    * Variables: Removes the never refresh option.
    * Visualizations: Unify tooltip options across visualizations.
    * Visualizations: Refactor and unify option creation between
      new visualizations.
    * Visualizations: Remove singlestat panel.
    * APIKeys: Fixes issue with adding first api key.
    * Alerting: Add checks for non supported units - disable
      defaulting to seconds.
    * Alerting: Fix issue where Slack notifications won't link to
      user IDs.
    * Alerting: Omit empty message in PagerDuty notifier.
    * AzureMonitor: Fix migration error from older versions of App
      Insights queries.
    * CloudWatch: Fix AWS/Connect dimensions.
    * CloudWatch: Fix broken AWS/MediaTailor dimension name.
    * Dashboards: Allow string manipulation as advanced variable
      format option.
    * DataLinks: Includes harmless extended characters like
      Cyrillic characters.
    * Drawer: Fixes title overflowing its container.
    * Explore: Fix issue when some query errors were not shown.
    * Generic OAuth: Prevent adding duplicated users.
    * Graphite: Handle invalid annotations.
    * Graphite: Fix autocomplete when tags are not available.
    * InfluxDB: Fix Cannot read property 'length' of undefined in
      when parsing response.
    * Instrumentation: Enable tracing when Jaeger host and port are
    * Instrumentation: Prefix metrics with grafana.
    * MSSQL: By default let driver choose port.
    * OAuth: Add optional strict parsing of role_attribute_path.
    * Panel: Fixes description markdown with inline code being
      rendered on newlines and full width.
    * PanelChrome: Ignore data updates &amp; errors for non data
      panels.
    * Permissions: Fix inherited folder permissions can prevent new
      permissions being added to a dashboard.
    * Plugins: Remove pre-existing plugin installs when installing
      with grafana-cli.
    * Plugins: Support installing to folders with whitespace and
      fix pluginUrl trailing and leading whitespace failures.
    * Postgres/MySQL/MSSQL: Don't return connection failure details
      to the client.
    * Postgres: Fix ms precision of interval in time group macro
      when TimescaleDB is enabled.
    * Provisioning: Use dashboard checksum field as change
      indicator.
    * SQL: Fix so that all captured errors are returned from sql
      engine.
    * Shortcuts: Fixes panel shortcuts so they always work.
    * Table: Fixes so border is visible for cells with links.
    * Variables: Clear query when data source type changes.
    * Variables: Filters out builtin variables from unknown list.
    * Button: Introduce buttonStyle prop.
    * DataQueryRequest: Remove deprecated props showingGraph and
      showingTabel and exploreMode.
    * grafana/ui: Update React Hook Form to v7.
    * IconButton: Introduce variant for red and blue icon buttons.
    * Plugins: Expose the getTimeZone function to be able to get
      the current selected timeZone.
    * TagsInput: Add className to TagsInput.
    * VizLegend: Move onSeriesColorChanged to PanelContext
      (breaking change).
- Update to version 7.5.13
    * Alerting: Fix NoDataFound for alert rules using AND operator.

mgr-cfg:

- Version 4.2.8-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15 (bsc#1197579)
- Version 4.2.7-1
  * Fix installation problem for SLE15SP4 due missing python-selinux

mgr-osad:

- Version 4.2.8-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15

mgr-push:

- Version 4.2.5-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15

mgr-virtualization:

- Version 4.2.4-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15

prometheus-postgres_exporter:

- Version 0.10.0
  * Added hardening to systemd service(s) with changes to `prometheus-postgres_exporter.service` (bsc#1181400)
  * Package rename from golang-github-wrouesnel-postgres_exporter (jsc#SLE-23051)

rhnlib:

- Version 4.2.6-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15

spacecmd:

- Version 4.2.16-1
  * implement system.bootstrap (bsc#1194909)
  * Fix interactive mode for 'system_applyerrata' and 'errata_apply' (bsc#1194363)

spacewalk-client-tools:

- Version 4.2.18-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15
- Version 4.2.17-1
  * Update translation strings

spacewalk-koan:

- Version 4.2.6-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15

spacewalk-oscap:

- Version 4.2.4-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15

suseRegisterInfo:

- Version 4.2.6-1
  * Fix the condition for preventing building python 2 subpackage
    for SLE15

		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194363">SUSE bug 1194363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194909">SUSE bug 1194909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197579">SUSE bug 1197579</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678959" comment="prometheus-postgres_exporter-0.10.0-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678960" comment="python3-rhnlib-4.2.6-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678961" comment="spacecmd-4.2.16-150000.3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52627" version="1" class="patch">
	<metadata>
		<title>Security update for grafana (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191454" ref_url="https://bugzilla.suse.com/1191454" source="BUGZILLA"/>
		<reference ref_id="1193688" ref_url="https://bugzilla.suse.com/1193688" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUS4G6GRHNJN7AR53SGJABSHRZM3XMOY/" source="SUSE-SU"/>
		<description>
This update for grafana fixes the following issues:

- CVE-2021-39226: Fixed snapshot authentication bypass (bsc#1191454)
- CVE-2021-43813: Fixed markdown path traversal (bsc#1193688)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191454">SUSE bug 1191454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193688">SUSE bug 1193688</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663197" comment="grafana-7.5.12-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52628" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1169614" ref_url="https://bugzilla.suse.com/1169614" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLYT44LA5ZMWEXSKKLL4QK25G4FZSHQA/" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- Update to version 20181225: setuid bit for cockpit session binary (bsc#1169614).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169614">SUSE bug 1169614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663722" comment="permissions-20181225-23.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663723" comment="permissions-zypp-plugin-20181225-23.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52629" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1198423" ref_url="https://bugzilla.suse.com/1198423" source="BUGZILLA"/>
		<reference ref_id="1198424" ref_url="https://bugzilla.suse.com/1198424" source="BUGZILLA"/>
		<reference ref_id="1198427" ref_url="https://bugzilla.suse.com/1198427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-27536" ref_url="https://www.suse.com/security/cve/CVE-2022-27536/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010838.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

- CVE-2022-24675: Fixed a stack overlow in Decode() in encoding/pem (bsc#1198423).
- CVE-2022-28327: Fixed a crash due to refused oversized scalars in generic P-256 (bsc#1198424).
- CVE-2022-27536: Fixed a crash in Certificate.Verify in crypto/x509 (bsc#1198427).
    
Bump go1.18 (bsc#1193742)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198423">SUSE bug 1198423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198424">SUSE bug 1198424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198427">SUSE bug 1198427</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27536/">CVE-2022-27536</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679823" comment="go1.18-1.18.1-150000.1.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679824" comment="go1.18-doc-1.18.1-150000.1.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679825" comment="go1.18-race-1.18.1-150000.1.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52630" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1198423" ref_url="https://bugzilla.suse.com/1198423" source="BUGZILLA"/>
		<reference ref_id="1198424" ref_url="https://bugzilla.suse.com/1198424" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010839.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- Updated to version 1.17.9 (bsc#1190649):
  - CVE-2022-24675: Fixed a stack overflow via crafted PEM file (bsc#1198423).
  - CVE-2022-28327: Fixed a potential panic when using big P-256 scalars in the
    crypto/elliptic module (bsc#1198424).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198423">SUSE bug 1198423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198424">SUSE bug 1198424</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679690" comment="go1.17-1.17.9-150000.1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679691" comment="go1.17-doc-1.17.9-150000.1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679636" comment="go1.17-race-1.17.9-150000.1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52631" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188468" ref_url="https://bugzilla.suse.com/1188468" source="BUGZILLA"/>
		<reference ref_id="1188469" ref_url="https://bugzilla.suse.com/1188469" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36373" ref_url="https://www.suse.com/security/cve/CVE-2021-36373/" source="CVE"/>
		<reference ref_id="CVE-2021-36374" ref_url="https://www.suse.com/security/cve/CVE-2021-36374/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010843.html" source="SUSE-SU"/>
		<description>
This update for ant fixes the following issues:

- CVE-2021-36373: Fixed an excessive memory allocation when reading a specially
  crafted TAR archive (bsc#1188468).
- CVE-2021-36374: Fixed an excessive memory allocation when reading a specially
  crafted ZIP archive (bsc#1188469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188468">SUSE bug 1188468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188469">SUSE bug 1188469</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36373/">CVE-2021-36373</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36374/">CVE-2021-36374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677230" comment="ant-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677231" comment="ant-antlr-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677232" comment="ant-apache-bcel-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677233" comment="ant-apache-bsf-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677234" comment="ant-apache-log4j-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677235" comment="ant-apache-oro-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677236" comment="ant-apache-regexp-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677237" comment="ant-apache-resolver-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678944" comment="ant-apache-xalan2-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677238" comment="ant-commons-logging-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678945" comment="ant-commons-net-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678946" comment="ant-imageio-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677239" comment="ant-javamail-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677240" comment="ant-jdepend-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677241" comment="ant-jmf-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678947" comment="ant-jsch-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677242" comment="ant-junit-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678948" comment="ant-junit5-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677243" comment="ant-manual-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677244" comment="ant-scripts-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677245" comment="ant-swing-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678949" comment="ant-testutil-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678950" comment="ant-xz-1.10.7-150200.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52632" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681162" comment="cifs-utils-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681163" comment="cifs-utils-devel-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681284" comment="pam_cifscreds-6.9-150100.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52633" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):
- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):
- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680164" comment="libjavascriptcoregtk-4_0-18-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680708" comment="libjavascriptcoregtk-4_0-18-32bit-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680165" comment="libwebkit2gtk-4_0-37-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680709" comment="libwebkit2gtk-4_0-37-32bit-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680166" comment="libwebkit2gtk3-lang-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680186" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680187" comment="typelib-1_0-WebKit2-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680188" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680710" comment="webkit-jsc-4-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680167" comment="webkit2gtk-4_0-injected-bundles-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680189" comment="webkit2gtk3-devel-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680711" comment="webkit2gtk3-minibrowser-2.36.0-150200.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52634" version="1" class="patch">
	<metadata>
		<title>Security update for firewalld, golang-github-prometheus-prometheus (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1197042" ref_url="https://bugzilla.suse.com/1197042" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010854.html" source="SUSE-SU"/>
		<description>
This update for firewalld, golang-github-prometheus-prometheus fixes the following issues:

Security fixes for golang-github-prometheus-prometheus:

- CVE-2022-21698: Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling 
  requests with non-standard HTTP methods (bsc#1196338).

Other non security changes for golang-github-prometheus-prometheus:

- Build `firewalld-prometheus-config` only for SUSE Linux Enterprise 15, 15-SP1 and 15-SP2, and require `firewalld`.
- Only recommends `firewalld-prometheus-config` as prometheus does not require it to run.
- Create `firewalld-prometheus-config` subpackage (bsc#1197042, jsc#SLE-24373, jsc#SLE-24374, jsc#SLE-24375)

Other non security changes for firewalld:
- Provide dummy `firewalld-prometheus-config` package (bsc#1197042)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197042">SUSE bug 1197042</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680191" comment="firewall-applet-0.9.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680192" comment="firewall-config-0.9.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680182" comment="firewall-macros-0.9.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680183" comment="firewalld-0.9.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680184" comment="firewalld-lang-0.9.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680676" comment="golang-github-prometheus-prometheus-2.32.1-150100.4.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680185" comment="python3-firewall-0.9.3-150300.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52635" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185778" ref_url="https://bugzilla.suse.com/1185778" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30473" ref_url="https://www.suse.com/security/cve/CVE-2021-30473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010852.html" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2021-30473: AOMedia in aom_image.c frees memory that is not located on the heap (bsc#1185778).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185778">SUSE bug 1185778</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30473/">CVE-2021-30473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678952" comment="aom-tools-1.0.0-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678953" comment="libaom-devel-1.0.0-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678954" comment="libaom-devel-doc-1.0.0-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677228" comment="libaom0-1.0.0-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678955" comment="libaom0-32bit-1.0.0-150200.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52636" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197870" ref_url="https://bugzilla.suse.com/1197870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27651" ref_url="https://www.suse.com/security/cve/CVE-2022-27651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010855.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2022-27651: Fixed incorrect default inheritable capabilities for linux container (bsc#1197870).

Update to version 1.25.1.

The following non-security bugs were fixed:
- add workaround for https://bugzilla.opensuse.org/show_bug.cgi?id=1183043
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197870">SUSE bug 1197870</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27651/">CVE-2022-27651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678050" comment="buildah-1.25.1-150300.8.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52637" version="1" class="patch">
	<metadata>
		<title>Security update for cryptsetup (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194469" ref_url="https://bugzilla.suse.com/1194469" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4122" ref_url="https://www.suse.com/security/cve/CVE-2021-4122/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILTMKWZNQBSX2H2MPF3XKXVDEDPDYAIB/" source="SUSE-SU"/>
		<description>
This update for cryptsetup fixes the following issues:

- CVE-2021-4122: Fixed possible attacks against data confidentiality through LUKS2 online reencryption extension crash recovery (bsc#1194469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194469">SUSE bug 1194469</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4122/">CVE-2021-4122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664141" comment="cryptsetup-2.3.7-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664142" comment="cryptsetup-lang-2.3.7-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664143" comment="libcryptsetup-devel-2.3.7-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664144" comment="libcryptsetup12-2.3.7-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664145" comment="libcryptsetup12-32bit-2.3.7-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664146" comment="libcryptsetup12-hmac-2.3.7-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664147" comment="libcryptsetup12-hmac-32bit-2.3.7-150300.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52638" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197279" ref_url="https://bugzilla.suse.com/1197279" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24302" ref_url="https://www.suse.com/security/cve/CVE-2022-24302/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010860.html" source="SUSE-SU"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2022-24302: Fixed a race condition between creation and chmod when writing private keys. (bsc#1197279) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197279">SUSE bug 1197279</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24302/">CVE-2022-24302</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680721" comment="python-paramiko-doc-2.4.2-150100.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680248" comment="python2-paramiko-2.4.2-150100.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680181" comment="python3-paramiko-2.4.2-150100.6.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52639" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1195831" ref_url="https://bugzilla.suse.com/1195831" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010862.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- Add wheel subpackage with the generated wheel for this package
  (bsc#1176262, CVE-2019-20916).

- Make wheel a separate build run to avoid the setuptools/wheel build
  cycle.

- Switch this package to use update-alternatives for all files
  in %{_bindir} so it doesn't collide with the versions on
  'the latest' versions of Python interpreter (jsc#SLE-18038,
  bsc#1195831).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195831">SUSE bug 1195831</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680247" comment="python2-pip-20.0.2-150100.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680168" comment="python3-pip-20.0.2-150100.6.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52640" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183533" ref_url="https://bugzilla.suse.com/1183533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010857.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-28153: Fixed an issue where symlink targets would be incorrectly created as empty files (bsc#1183533).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1183533">SUSE bug 1183533</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680138" comment="gio-branding-upstream-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679804" comment="glib2-devel-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680139" comment="glib2-devel-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680140" comment="glib2-devel-static-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679805" comment="glib2-lang-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680141" comment="glib2-tests-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679806" comment="glib2-tools-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680142" comment="glib2-tools-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679807" comment="libgio-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679808" comment="libgio-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680143" comment="libgio-fam-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680144" comment="libgio-fam-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679809" comment="libglib-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679810" comment="libglib-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679811" comment="libgmodule-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679812" comment="libgmodule-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679813" comment="libgobject-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679814" comment="libgobject-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679815" comment="libgthread-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680145" comment="libgthread-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52641" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	
- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681172" comment="nodejs12-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681173" comment="nodejs12-devel-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681174" comment="nodejs12-docs-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681175" comment="npm12-12.22.12-150200.4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52642" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681168" comment="nodejs14-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681169" comment="nodejs14-devel-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681170" comment="nodejs14-docs-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681171" comment="npm14-14.19.1-150200.15.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52643" version="1" class="patch">
	<metadata>
		<title>Security update for libslirp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1198773" ref_url="https://bugzilla.suse.com/1198773" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<description>
This update for libslirp fixes the following issues:

- CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364).
- CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366).
- Fix a dhcp regression [bsc#1198773]
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198773">SUSE bug 1198773</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680813" comment="libslirp-devel-4.3.1-150300.2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680814" comment="libslirp0-4.3.1-150300.2.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52644" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197028" ref_url="https://bugzilla.suse.com/1197028" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010901.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2022-0856: Fixed a divide by zero issue which could be exploited to cause
  an application crash (bsc#1197028).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197028">SUSE bug 1197028</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681285" comment="caca-utils-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681164" comment="libcaca-devel-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681286" comment="libcaca-ruby-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681165" comment="libcaca0-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681287" comment="libcaca0-32bit-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681166" comment="libcaca0-plugins-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681288" comment="libcaca0-plugins-32bit-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681289" comment="python3-caca-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52645" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198086" ref_url="https://bugzilla.suse.com/1198086" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010903.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:
    
- CVE-2022-24801: Fixed to not be as lenient as earlier HTTP/1.1 RFCs to prevent HTTP request smuggling. (bsc#1198086)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198086">SUSE bug 1198086</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681004" comment="python-Twisted-doc-19.10.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681005" comment="python2-Twisted-19.10.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680812" comment="python3-Twisted-19.10.0-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52646" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182104" ref_url="https://bugzilla.suse.com/1182104" source="BUGZILLA"/>
		<reference ref_id="1182105" ref_url="https://bugzilla.suse.com/1182105" source="BUGZILLA"/>
		<reference ref_id="1184757" ref_url="https://bugzilla.suse.com/1184757" source="BUGZILLA"/>
		<reference ref_id="1184798" ref_url="https://bugzilla.suse.com/1184798" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-3443" ref_url="https://www.suse.com/security/cve/CVE-2021-3443/" source="CVE"/>
		<reference ref_id="CVE-2021-3467" ref_url="https://www.suse.com/security/cve/CVE-2021-3467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010902.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-3467: Fixed NULL pointer deref in jp2_decode() (bsc#1184757). 
- CVE-2021-3443: Fixed NULL pointer deref in jp2_decode() (bsc#1184798).
- CVE-2021-26927: Fixed NULL pointer deref in jp2_decode() (bsc#1182104).
- CVE-2021-26926: Fixed an out of bounds read in jp2_decode() (bsc#1182105).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182104">SUSE bug 1182104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182105">SUSE bug 1182105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184757">SUSE bug 1184757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184798">SUSE bug 1184798</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3443/">CVE-2021-3443</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3467/">CVE-2021-3467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680719" comment="jasper-2.0.14-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680190" comment="libjasper-devel-2.0.14-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680180" comment="libjasper4-2.0.14-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680720" comment="libjasper4-32bit-2.0.14-150000.3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52647" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010904.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- Updated to version 2.35.3:
  - CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-02"/>
	<updated date="2022-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680194" comment="git-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680195" comment="git-arch-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680169" comment="git-core-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680712" comment="git-credential-gnome-keyring-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680713" comment="git-credential-libsecret-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680196" comment="git-cvs-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680197" comment="git-daemon-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680198" comment="git-doc-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680199" comment="git-email-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680200" comment="git-gui-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680714" comment="git-p4-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680201" comment="git-svn-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680202" comment="git-web-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680203" comment="gitk-2.35.3-150300.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680170" comment="perl-Git-2.35.3-150300.10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52648" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="1189356" ref_url="https://bugzilla.suse.com/1189356" source="BUGZILLA"/>
		<reference ref_id="1193179" ref_url="https://bugzilla.suse.com/1193179" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010906.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).

- Update to 3.9.10 (jsc#SLE-23849)

- Remove shebangs from from python-base libraries in _libdir. (bsc#1193179)

- Update to 3.9.9:
  * Core and Builtins
    + bpo-30570: Fixed a crash in issubclass() from infinite recursion when searching pathological __bases__ tuples.
    + bpo-45494: Fix parser crash when reporting errors involving invalid continuation characters. Patch by Pablo Galindo.
    + bpo-45385: Fix reference leak from descr_check. Patch by Dong-hee Na.
    + bpo-45167: Fix deepcopying of types.GenericAlias objects.
    + bpo-44219: Release the GIL while performing isatty system calls on arbitrary file descriptors. In particular, this affects os.isatty(), os.device_encoding() and io.TextIOWrapper. By extension, io.open() in text mode is also affected. This change solves a deadlock in os.isatty(). Patch by Vincent Michel in bpo-44219.
    + bpo-44959: Added fallback to extension modules with '.sl' suffix on HP-UX
    + bpo-44050: Extensions that indicate they use global state (by setting m_size to -1) can again be used in multiple interpreters. This reverts to behavior of Python 3.8.
    + bpo-45121: Fix issue where Protocol.__init__ raises RecursionError when it's called directly or via super(). Patch provided by Yurii Karabas.
    + bpo-45083: When the interpreter renders an exception, its name now has a complete qualname. Previously only the class name was concatenated to the module name, which sometimes resulted in an incorrect full name being displayed.
    + bpo-45738: Fix computation of error location for invalid continuation characters in the parser. Patch by Pablo Galindo.
    + Library
    + bpo-45678: Fix bug in Python 3.9 that meant functools.singledispatchmethod failed to properly wrap the attributes of the target method. Patch by Alex Waygood.
    + bpo-45679: Fix caching of multi-value typing.Literal. Literal[True, 2] is no longer equal to Literal[1, 2].
    + bpo-45438: Fix typing.Signature string representation for generic builtin types.
    + bpo-45581: sqlite3.connect() now correctly raises MemoryError if the underlying SQLite API signals memory error. Patch by Erlend E. Aasland.
    + bpo-39679: Fix bug in functools.singledispatchmethod that caused it to fail when attempting to register a classmethod() or staticmethod() using type annotations. Patch contributed by Alex Waygood.
    + bpo-45515: Add references to zoneinfo in the datetime documentation, mostly replacing outdated references to dateutil.tz. Change by Paul Ganssle.
    + bpo-45467: Fix incremental decoder and stream reader in the 'raw-unicode-escape' codec. Previously they failed if the escape sequence was split.
    + bpo-45461: Fix incremental decoder and stream reader in the 'unicode-escape' codec. Previously they failed if the escape sequence was split.
    + bpo-45239: Fixed email.utils.parsedate_tz() crashing with UnboundLocalError on certain invalid input instead of returning None. Patch by Ben Hoyt.
    + bpo-44904: Fix bug in the doctest module that caused it to fail if a docstring included an example with a classmethod property. Patch by Alex Waygood.
    + bpo-45406: Make inspect.getmodule() catch FileNotFoundError raised by :'func:inspect.getabsfile, and return None to indicate that the module could not be determined.
    + bpo-45262: Prevent use-after-free in asyncio. Make sure the cached running loop holder gets cleared on dealloc to prevent use-after-free in get_running_loop
    + bpo-45386: Make xmlrpc.client more robust to C runtimes where the underlying C strftime function results in a ValueError when testing for year formatting options.
    + bpo-45371: Fix clang rpath issue in distutils. The UnixCCompiler now uses correct clang option to add a runtime library directory (rpath) to a shared library.
    + bpo-20028: Improve error message of csv.Dialect when initializing. Patch by Vajrasky Kok and Dong-hee Na.
    + bpo-45343: Update bundled pip to 21.2.4 and setuptools to 58.1.0
    + bpo-41710: On Unix, if the sem_clockwait() function is available in the C library (glibc 2.30 and newer), the threading.Lock.acquire() method now uses the monotonic clock (time.CLOCK_MONOTONIC) for the timeout, rather than using the system clock (time.CLOCK_REALTIME), to not be affected by system clock changes. Patch by Victor Stinner.
    + bpo-45328: Fixed http.client.HTTPConnection to work properly in OSs that don't support the TCP_NODELAY socket option.
    + bpo-1596321: Fix the threading._shutdown() function when the threading module was imported first from a thread different than the main thread: no longer log an error at Python exit.
    + bpo-45274: Fix a race condition in the Thread.join() method of the threading module. If the function is interrupted by a signal and the signal handler raises an exception, make sure that the thread remains in a consistent state to prevent a deadlock. Patch by Victor Stinner.
    + bpo-45238: Fix unittest.IsolatedAsyncioTestCase.debug(): it runs now asynchronous methods and callbacks.
    + bpo-36674: unittest.TestCase.debug() raises now a unittest.SkipTest if the class or the test method are decorated with the skipping decorator.
    + bpo-45235: Fix an issue where argparse would not preserve values in a provided namespace when using a subparser with defaults.
    + bpo-45234: Fixed a regression in copyfile(), copy(), copy2() raising FileNotFoundError when source is a directory, which should raise IsADirectoryError
    + bpo-45228: Fix stack buffer overflow in parsing J1939 network address.
    + bpo-45192: Fix the tempfile._infer_return_type function so that the dir argument of the tempfile functions accepts an object implementing the os.PathLike protocol.
    + bpo-45160: When tracing a tkinter variable used by a ttk OptionMenu, callbacks are no longer made twice.
    + bpo-35474: Calling mimetypes.guess_all_extensions() with strict=False no longer affects the result of the following call with strict=True. Also, mutating the returned list no longer affects the global state.
    + bpo-45166: typing.get_type_hints() now works with Final wrapped in ForwardRef.
    + bpo-45097: Remove deprecation warnings about the loop argument in asyncio incorrectly emitted in cases when the user does not pass the loop argument.
    + bpo-45081: Fix issue when dataclasses that inherit from typing.Protocol subclasses have wrong __init__. Patch provided by Yurii Karabas.
    + bpo-24444: Fixed an error raised in argparse help display when help for an option is set to 1+ blank spaces or when choices arg is an empty container.
    + bpo-45021: Fix a potential deadlock at shutdown of forked children when using concurrent.futures module
    + bpo-45030: Fix integer overflow in pickling and copying the range iterator.
    + bpo-39039: tarfile.open raises ReadError when a zlib error occurs during file extraction.
    + bpo-44594: Fix an edge case of ExitStack and AsyncExitStack exception chaining. They will now match with block behavior when __context__ is explicitly set to None when the exception is in flight.
  * Documentation
    + bpo-45726: Improve documentation for functools.singledispatch() and functools.singledispatchmethod.
    + bpo-45680: Amend the docs on GenericAlias objects to clarify that non-container classes can also implement __class_getitem__. Patch contributed by Alex Waygood.
    + bpo-45655: Add a new 'relevant PEPs' section to the top of the documentation for the typing module. Patch by Alex Waygood.
    + bpo-45604: Add level argument to multiprocessing.log_to_stderr function docs.
    + bpo-45464: Mention in the documentation of Built-in Exceptions that inheriting from multiple exception types in a single subclass is not recommended due to possible memory layout incompatibility.
    + bpo-45449: Add note about PEP 585 in collections.abc.
    + bpo-45516: Add protocol description to the importlib.abc.Traversable documentation.
    + bpo-20692: Add Programming FAQ entry explaining that int literal attribute access requires either a space after or parentheses around the literal.
    + bpo-45216: Remove extra documentation listing methods in difflib. It was rendering twice in pydoc and was outdated in some places.
    + bpo-45772: socket.socket documentation is corrected to a class from a function.
    + bpo-45392: Update the docstring of the type built-in to remove a redundant line and to mention keyword arguments for the constructor.
  * Tests
    + bpo-45578: Add tests for dis.distb()
    + bpo-45577: Add subtests for all pickle protocols in test_zoneinfo.
    + bpo-43592: test.libregrtest now raises the soft resource limit for the maximum number of file descriptors when the default is too low for our test suite as was often the case on macOS.
    + bpo-40173: Fix test.support.import_helper.import_fresh_module().
    + bpo-45280: Add a test case for empty typing.NamedTuple.
    + bpo-45269: Cover case when invalid markers type is supplied to c_make_encoder.
    + bpo-45209: Fix UserWarning: resource_tracker warning in _test_multiprocessing._TestSharedMemory.test_shared_memory_cleaned_after_process_termination
    + bpo-45195: Fix test_readline.test_nonascii(): sometimes, the newline character is not written at the end, so don't expect it in the output. Patch by Victor Stinner.
    + bpo-45156: Fixes infinite loop on unittest.mock.seal() of mocks created by create_autospec().
    + bpo-45042: Fixes that test classes decorated with @hashlib_helper.requires_hashdigest were skipped all the time.
    + bpo-45235: Reverted an argparse bugfix that caused regression in the handling of default arguments for subparsers. This prevented leaf level arguments from taking precedence over root level arguments.
    + bpo-45765: In importlib.metadata, fix distribution discovery for an empty path.
    + bpo-45644: In-place JSON file formatting using python3 -m json.tool infile infile now works correctly, previously it left the file empty. Patch by Chris Wesseling.
  * Build
    + bpo-43158: setup.py now uses values from configure script to build the _uuid extension module. Configure now detects util-linux's libuuid, too.
    + bpo-45571: Modules/Setup now use PY_CFLAGS_NODIST instead of PY_CFLAGS to compile shared modules.
    + bpo-45532: Update sys.version to use main as fallback information. Patch by Jeong YunWon.
    + bpo-45405: Prevent internal configure error when running configure with recent versions of non-Apple clang. Patch by David Bohman.
    + bpo-45220: Avoid building with the Windows 11 SDK previews automatically. This may be overridden by setting the DefaultWindowsSDKVersion environment variable before building.
  * C API
    + bpo-44687: BufferedReader.peek() no longer raises ValueError when the entire file has already been buffered.
    + bpo-44751: Remove crypt.h include from the public Python.h header.

- rpm-build-python dependency is available on the current Factory, not with SLE.

- BuildRequire rpm-build-python: The provider to inject python(abi)
  has been moved there. rpm-build pulls rpm-build-python
  automatically in when building anything against python3-base, but
  this implies that the initial build of python3-base does not
  trigger the automatic installation.

- Update to 3.9.7:
  - Security
    - Replaced usage of tempfile.mktemp() with TemporaryDirectory
      to avoid a potential race condition.
    - Add auditing events to the marshal module, and stop raising
      code.__init__ events for every unmarshalled code object.
      Directly instantiated code objects will continue to raise
      an event, and audit event handlers should inspect or
      collect the raw marshal data. This reduces a significant
      performance overhead when loading from .pyc files.
    - Made the internal putcmd function in smtplib sanitize input
      for presence of \r and \n characters to avoid (unlikely)
      command injection.
  - Core and Builtins
    - Fixed pickling of range iterators that iterated for over
      2**32 times.
    - Fix a race in WeakKeyDictionary, WeakValueDictionary and
      WeakSet when two threads attempt to commit the last pending
      removal. This fixes asyncio.create_task and fixes a data
      loss in asyncio.run where shutdown_asyncgens is not run
    - Fixed a corner case bug where the result of
      float.fromhex('0x.8p-1074') was rounded the wrong way.
    - Refine the syntax error for trailing commas in import
      statements. Patch by Pablo Galindo.
    - Restore behaviour of complex exponentiation with
      integer-valued exponent of type float or complex.
    - Correct the ast locations of f-strings with format specs
      and repeated expressions. Patch by Pablo Galindo
    - Use new trashcan macros (Py_TRASHCAN_BEGIN/END) in
      frameobject.c instead of the old ones
      (Py_TRASHCAN_SAFE_BEGIN/END).
    - Fix segmentation fault with deep recursion when cleaning
      method objects. Patch by Augusto Goulart and Pablo Galindo.
    - Fix bug where PyErr_SetObject hangs when the current
      exception has a cycle in its context chain.
    - Fix reference leaks in the error paths of update_bases()
      and __build_class__. Patch by Pablo Galindo.
    - Fix undefined behaviour in complex object exponentiation.
    - Remove uses of PyObject_GC_Del() in error path when
      initializing types.GenericAlias.
    - Remove the pass-through for hash() of weakref.proxy objects
      to prevent unintended consequences when the original
      referred object dies while the proxy is part of a hashable
      object. Patch by Pablo Galindo.
    - Fix ltrace functionality when exceptions are raised. Patch
      by Pablo Galindo
    - Fix a crash at Python exit when a deallocator function
      removes the last strong reference to a heap type. Patch by
      Victor Stinner.
    - Fix crash when using passing a non-exception to
      a generator's throw() method. Patch by Noah Oxer
  - Library
    - run() now always return a TestResult instance. Previously
      it returned None if the test class or method was decorated
      with a skipping decorator.
    - Fix bugs in cleaning up classes and modules in unittest:
        - Functions registered with addModuleCleanup() were not
          called unless the user defines tearDownModule() in
          their test module.
        - Functions registered with addClassCleanup() were not
          called if tearDownClass is set to None.
        - Buffering in TestResult did not work with functions
          registered with addClassCleanup() and
          addModuleCleanup().
        - Errors in functions registered with addClassCleanup()
          and addModuleCleanup() were not handled correctly in
          buffered and debug modes.
        - Errors in setUpModule() and functions registered with
          addModuleCleanup() were reported in wrong order.
        - And several lesser bugs.
    - Made email date parsing more robust against malformed
      input, namely a whitespace-only Date: header. Patch by
      Wouter Bolsterlee.
    - Fix a crash in the signal handler of the faulthandler
      module: no longer modify the reference count of frame
      objects. Patch by Victor Stinner.
    - Method stopTestRun() is now always called in pair with
      method startTestRun() for TestResult objects implicitly
      created in run(). Previously it was not called for test
      methods and classes decorated with a skipping decorator.
    - argparse.BooleanOptionalAction's default value is no longer
      printed twice when used with
      argparse.ArgumentDefaultsHelpFormatter.
    - Upgrade bundled pip to 21.2.3 and setuptools to 57.4.0
    - Fix the os.set_inheritable() function on FreeBSD 14 for
      file descriptor opened with the O_PATH flag: ignore the
      EBADF error on ioctl(), fallback on the fcntl()
      implementation. Patch by Victor Stinner.
    - The @functools.total_ordering() decorator now works with
      metaclasses.
    - sqlite3 user-defined functions and aggregators returning
      strings with embedded NUL characters are no longer
      truncated. Patch by Erlend E. Aasland.
    - Always show loop= arg deprecations in asyncio.gather() and
      asyncio.sleep()
    - Non-protocol subclasses of typing.Protocol ignore now the
      __init__ method inherited from protocol base classes.
    - The tokenize.tokenize() doesn't incorrectly generate
      a NEWLINE token if the source doesn't end with a new line
      character but the last line is a comment, as the function
      is already generating a NL token. Patch by Pablo Galindo
    - Fix http.client.HTTPSConnection fails to download &gt;2GiB
      data.
    - rcompleter does not call getattr() on property objects to
      avoid the side-effect of evaluating the corresponding
      method.
    - weakref.proxy objects referencing non-iterators now raise
      TypeError rather than dereferencing the null tp_iternext
      slot and crashing.
    - The implementation of collections.abc.Set._hash() now
      matches that of frozenset.__hash__().
    - Fixed issue in compileall.compile_file() when sys.stdout is
      redirected. Patch by Stefan H?lzl.
    - Give priority to using the current class constructor in
      inspect.signature(). Patch by Weipeng Hong.
    - Fix memory leak in _tkinter._flatten() if it is called with
      a sequence or set, but not list or tuple.
    - Update shutil.copyfile() to raise FileNotFoundError instead
      of confusing IsADirectoryError when a path ending with
      a os.path.sep does not exist; shutil.copy() and
      shutil.copy2() are also affected.
    - handle StopIteration subclass raised from
      @contextlib.contextmanager generator
    - Make the implementation consistency of indexOf() between
      C and Python versions. Patch by Dong-hee Na.
    - Fixes TypedDict to work with typing.get_type_hints() and
      postponed evaluation of annotations across modules.
    - Fix bug with pdb's handling of import error due to
      a package which does not have a __main__ module
    - Fixed an exception thrown while parsing a malformed
      multipart email by email.message.EmailMessage.
    - pathlib.PureWindowsPath.is_reserved() now identifies
      a greater range of reserved filenames, including those with
      trailing spaces or colons.
    - Handle exceptions from parsing the arg of pdb's run/restart
      command.
    - The sqlite3 context manager now performs a rollback (thus
      releasing the database lock) if commit failed. Patch by
      Luca Citi and Erlend E. Aasland.
    - Improved string handling for sqlite3 user-defined functions
      and aggregates:
        - It is now possible to pass strings with embedded null
          characters to UDFs
        - Conversion failures now correctly raise MemoryError
    - Patch by Erlend E. Aasland.
    - Handle RecursionError in TracebackException's constructor,
      so that long exceptions chains are truncated instead of
      causing traceback formatting to fail.
    - Fix email.message.EmailMessage.set_content() when called
      with binary data and 7bit content transfer encoding.
    - The compresslevel and preset keyword arguments of
      tarfile.open() are now both documented and tested.
    - Fixed a Y2k38 bug in the compileall module where it would
      fail to compile files with a modification time after the
      year 2038.
    - Fix test___all__ on platforms lacking a shared memory
      implementation.
    - Pass multiprocessing BaseProxy argument manager_owned
      through AutoProxy.
    - email.utils.getaddresses() now accepts email.header.Header
      objects along with string values. Patch by Zackery Spytz.
    - lib2to3 now recognizes async generators everywhere.
    - Fix TypeError when required subparsers without dest do not
      receive arguments. Patch by Anthony Sottile.
  - Documentation
    - Removed the othergui.rst file, any references to it, and
      the list of GUI frameworks in the FAQ. In their place I've
      added links to the Python Wiki page on GUI frameworks.
    - Update the definition of __future__ in the glossary by
      replacing the confusing word 'pseudo-module' with a more
      accurate description.
    - Add typical examples to os.path.splitext docs
    - Clarify that shutil.make_archive() is not thread-safe due
      to reliance on changing the current working directory.
    - Update of three expired hyperlinks in
      Doc/distributing/index.rst: 'Project structure', 'Building
      and packaging the project', and 'Uploading the project to
      the Python Packaging Index'.
    - Updated the docstring and docs of filecmp.cmp() to be more
      accurate and less confusing especially in respect to
      shallow arg.
    - Match the docstring and python implementation of countOf()
      to the behavior of its c implementation.
    - List all kwargs for textwrap.wrap(), textwrap.fill(), and
      textwrap.shorten(). Now, there are nav links to attributes
      of TextWrap, which makes navigation much easier while
      minimizing duplication in the documentation.
    - Clarify that atexit uses equality comparisons internally.
    - Documentation of csv.Dialect is more descriptive.
    - Fix documentation for the return type of
      sysconfig.get_path().
    - Add a 'Security Considerations' index which links to
      standard library modules that have explicitly documented
      security considerations.
    - Remove the unqualified claim that tkinter is threadsafe. It
      has not been true for several years and likely never was.
      An explanation of what is true may be added later, after
      more discussion, and possibly after patching _tkinter.c,
  - Tests
    - Add calls of gc.collect() in tests to support PyPy.
    - Made tests relying on the _asyncio C extension module
      optional to allow running on alternative Python
      implementations. Patch by Serhiy Storchaka.
    - Fix auto history tests of test_readline: sometimes, the
      newline character is not written at the end, so don't
      expect it in the output.
    - Add ability to wholesale silence DeprecationWarnings while
      running the regression test suite.
    - Notify users running test_decimal regression tests on macOS
      of potential harmless 'malloc can't allocate region'
      messages spewed by test_decimal.
    - Fixed floating point precision issue in turtle tests.
    - Regression tests, when run with -w, are now re-running only
      the affected test methods instead of re-running the entire
      test file.
    - Add test for nested queues when using multiprocessing
      shared objects AutoProxy[Queue] inside ListProxy and
      DictProxy

- Add building with --with-system-libmpdec option (bsc#1189356).

- test_faulthandler is still problematic under qemu linux-user emulation,
  disable it there
- Reenable profileopt with qemu emulation, test_faulthandler is no longer
  run during profiling

    - bpo-44022 (bsc#1189241, CVE-2021-3737): http.client now
      avoids infinitely reading potential HTTP headers after
      a 100 Continue status response from the server.
    - bpo-43075 (CVE-2021-3733, bsc#1189287): Fix Regular
      Expression Denial of Service (ReDoS) vulnerability in
      urllib.request.AbstractBasicAuthHandler. The
      ReDoS-vulnerable regex has quadratic worst-case complexity
      and it allows cause a denial of service when identifying
      crafted invalid RFCs. This ReDoS issue is on the client
      side and needs remote attackers to control the HTTP server.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-02"/>
	<updated date="2022-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189356">SUSE bug 1189356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193179">SUSE bug 1193179</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677076" comment="libpython3_9-1_0-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677199" comment="libpython3_9-1_0-32bit-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677077" comment="python39-3.9.10-150300.4.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677200" comment="python39-32bit-3.9.10-150300.4.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677078" comment="python39-base-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677201" comment="python39-base-32bit-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677079" comment="python39-curses-3.9.10-150300.4.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677080" comment="python39-dbm-3.9.10-150300.4.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677081" comment="python39-devel-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677202" comment="python39-doc-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677203" comment="python39-doc-devhelp-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677082" comment="python39-idle-3.9.10-150300.4.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677204" comment="python39-testsuite-3.9.10-150300.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677083" comment="python39-tk-3.9.10-150300.4.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677085" comment="python39-tools-3.9.10-150300.4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52649" version="1" class="patch">
	<metadata>
		<title>Security update for rust1.56 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWT2GLRS2EG6EW7X57X2RMJHMFK6GEWU/" source="SUSE-SU"/>
		<description>
This update for rust1.56 fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664300" comment="cargo1.56-1.56.1-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664301" comment="rust1.56-1.56.1-150300.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52650" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEHXIWSI3LT73BE7YAXGYKT4HEXYVR3X/" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664151" comment="aide-0.16-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664260" comment="aide-test-0.16-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52651" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-03"/>
	<updated date="2022-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680695" comment="xen-4.14.4_04-150300.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680696" comment="xen-devel-4.14.4_04-150300.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680697" comment="xen-doc-html-4.14.4_04-150300.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680698" comment="xen-libs-4.14.4_04-150300.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680699" comment="xen-libs-32bit-4.14.4_04-150300.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680700" comment="xen-tools-4.14.4_04-150300.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680701" comment="xen-tools-domU-4.14.4_04-150300.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680252" comment="xen-tools-xendomains-wait-disk-4.14.4_04-150300.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52652" version="1" class="patch">
	<metadata>
		<title>Security update for pcp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1171883" ref_url="https://bugzilla.suse.com/1171883" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8025" ref_url="https://www.suse.com/security/cve/CVE-2020-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010922.html" source="SUSE-SU"/>
		<description>
This update for pcp fixes the following issues:

- CVE-2020-8025: Fixed outdated entries in permissions profiles for /var/lib/pcp/tmp/* (bsc#1171883).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-03"/>
	<updated date="2022-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171883">SUSE bug 1171883</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8025/">CVE-2020-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681147" comment="pcp-pmda-kvm-3.11.9-150000.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681148" comment="pcp-pmda-postgresql-3.11.9-150000.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681149" comment="python-pcp-3.11.9-150000.5.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52653" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJ7DM7F3IHCRMEZDBDGMA5O6A5EWNQKE/" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed flaw that allowed abusing lame cache to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663929" comment="bind-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663930" comment="bind-chrootenv-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663846" comment="bind-devel-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663931" comment="bind-doc-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663847" comment="bind-utils-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663848" comment="libbind9-1600-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663849" comment="libdns1605-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663850" comment="libirs-devel-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663851" comment="libirs1601-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663852" comment="libisc1606-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663853" comment="libisccc1600-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663854" comment="libisccfg1600-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663855" comment="libns1604-9.16.6-150300.22.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663856" comment="python3-bind-9.16.6-150300.22.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52654" version="1" class="patch">
	<metadata>
		<title>Security update for amazon-ssm-agent (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196556" ref_url="https://bugzilla.suse.com/1196556" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29527" ref_url="https://www.suse.com/security/cve/CVE-2022-29527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010914.html" source="SUSE-SU"/>
		<description>
This update for amazon-ssm-agent fixes the following issues:

- CVE-2022-29527: Fixed unsafe file creation mode of ssm-agent-users sudoer file (bsc#1196556).

Update to version 3.1.1260.0
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-03"/>
	<updated date="2022-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196556">SUSE bug 1196556</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29527/">CVE-2022-29527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681167" comment="amazon-ssm-agent-3.1.1260.0-150000.5.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52655" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-03"/>
	<updated date="2022-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680171" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680172" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680173" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680174" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680715" comment="ruby2.5-doc-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680716" comment="ruby2.5-doc-ri-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680175" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52656" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-03"/>
	<updated date="2022-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680176" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680717" comment="java-11-openjdk-accessibility-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680177" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680178" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680179" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680245" comment="java-11-openjdk-javadoc-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680246" comment="java-11-openjdk-jmods-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680718" comment="java-11-openjdk-src-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52657" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-puma (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188527" ref_url="https://bugzilla.suse.com/1188527" source="BUGZILLA"/>
		<reference ref_id="1191681" ref_url="https://bugzilla.suse.com/1191681" source="BUGZILLA"/>
		<reference ref_id="1196222" ref_url="https://bugzilla.suse.com/1196222" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29509" ref_url="https://www.suse.com/security/cve/CVE-2021-29509/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<reference ref_id="CVE-2022-23634" ref_url="https://www.suse.com/security/cve/CVE-2022-23634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010927.html" source="SUSE-SU"/>
		<description>
This update for rubygem-puma fixes the following issues:

rubygem-puma was updated to version 4.3.11:

* CVE-2021-29509: Adjusted an incomplete fix for  allows Denial of Service (DoS) (bsc#1188527)
* CVE-2021-41136: Fixed request smuggling if HTTP header value contains the LF character (bsc#1191681)
* CVE-2022-23634: Fixed information leak between requests (bsc#1196222)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-04"/>
	<updated date="2022-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188527">SUSE bug 1188527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191681">SUSE bug 1191681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196222">SUSE bug 1196222</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29509/">CVE-2021-29509</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23634/">CVE-2022-23634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680815" comment="ruby2.5-rubygem-puma-4.3.11-150000.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681003" comment="ruby2.5-rubygem-puma-doc-4.3.11-150000.3.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52658" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1006739" ref_url="https://bugzilla.suse.com/1006739" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9011" ref_url="https://www.suse.com/security/cve/CVE-2016-9011/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010928.html" source="SUSE-SU"/>
		<description>
This update for libwmf fixes the following issues:

libwmf was updated to 0.2.12:

* upstream changed to fork from Fedora: https://github.com/caolanm/libwmf
* merged all the pending fixes
* merge in fixes for libgd CVE-2019-6978 (bsc#1123522)
* fixed memory allocation failure (CVE-2016-9011)

* Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-04"/>
	<updated date="2022-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006739">SUSE bug 1006739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9011/">CVE-2016-9011</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679693" comment="libwmf-0_2-7-0.2.12-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679694" comment="libwmf-0_2-7-32bit-0.2.12-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679695" comment="libwmf-devel-0.2.12-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679696" comment="libwmf-gnome-0.2.12-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679697" comment="libwmf-gnome-32bit-0.2.12-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679698" comment="libwmf-tools-0.2.12-150000.4.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52659" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010930.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-04"/>
	<updated date="2022-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678571" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678572" comment="apache2-mod_auth_mellon-diagnostics-0.17.0-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678573" comment="apache2-mod_auth_mellon-doc-0.17.0-150200.5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52660" version="1" class="patch">
	<metadata>
		<title>Security update for pgadmin4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197143" ref_url="https://bugzilla.suse.com/1197143" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0959" ref_url="https://www.suse.com/security/cve/CVE-2022-0959/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010939.html" source="SUSE-SU"/>
		<description>
This update for pgadmin4 fixes the following issues:

- CVE-2022-0959: Fixed an unrestricted file upload (bsc#1197143).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-04"/>
	<updated date="2022-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197143">SUSE bug 1197143</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0959/">CVE-2022-0959</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679638" comment="pgadmin4-4.30-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679639" comment="pgadmin4-doc-4.30-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679640" comment="pgadmin4-web-4.30-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679692" comment="pgadmin4-web-uwsgi-4.30-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52661" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010950.html" source="SUSE-SU"/>
		<description>
This update for tar fixes the following issues:

- CVE-2021-20193: Fixed a memory leak in read_header() in list.c (bsc#1181131).
- CVE-2019-9923: Fixed a null-pointer dereference in pax_decode_header in sparse.c (bsc#1130496).
- CVE-2018-20482: Fixed infinite read loop in sparse_dump_region in sparse.c (bsc#1120610).

- Update to GNU tar 1.34:
  * Fix extraction over pipe
  * Fix memory leak in read_header (CVE-2021-20193) (bsc#1181131)
  * Fix extraction when . and .. are unreadable
  * Gracefully handle duplicate symlinks when extracting
  * Re-initialize supplementary groups when switching to user
    privileges

- Update to GNU tar 1.33:
  * POSIX extended format headers do not include PID by default
  * --delay-directory-restore works for archives with reversed
    member ordering
  * Fix extraction of a symbolic link hardlinked to another
    symbolic link
  * Wildcards in exclude-vcs-ignore mode don't match slash
  * Fix the --no-overwrite-dir option
  * Fix handling of chained renames in incremental backups
  * Link counting works for file names supplied with -T
  * Accept only position-sensitive (file-selection) options in file
    list files

- prepare usrmerge (bsc#1029961)

- Update to GNU 1.32
  * Fix the use of --checkpoint without explicit --checkpoint-action
  * Fix extraction with the -U option
  * Fix iconv usage on BSD-based systems
  * Fix possible NULL dereference (savannah bug #55369)
    [bsc#1130496] [CVE-2019-9923]
  * Improve the testsuite

- Update to GNU 1.31
  * Fix heap-buffer-overrun with --one-top-level, bug introduced
    with the addition of that option in 1.28
  * Support for zstd compression
  * New option '--zstd' instructs tar to use zstd as compression
    program. When listing, extractng and comparing, zstd compressed
    archives are recognized automatically. When '-a' option is in
    effect, zstd compression is selected if the destination archive
    name ends in '.zst' or '.tzst'.
  * The -K option interacts properly with member names given in the
    command line. Names of members to extract can be specified along
    with the '-K NAME' option. In this case, tar will extract NAME
    and those of named members that appear in the archive after it,
    which is consistent with the semantics of the option. Previous
    versions of tar extracted NAME, those of named members that
    appeared before it, and everything after it.
  * Fix CVE-2018-20482 - When creating archives with the --sparse
    option, previous versions of tar would loop endlessly if a
    sparse file had been truncated while being archived.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-05"/>
	<updated date="2022-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679457" comment="tar-1.34-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679584" comment="tar-backup-scripts-1.34-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679585" comment="tar-doc-1.34-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679458" comment="tar-lang-1.34-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679459" comment="tar-rmt-1.34-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679586" comment="tar-tests-1.34-150000.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52662" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193364" ref_url="https://bugzilla.suse.com/1193364" source="BUGZILLA"/>
		<reference ref_id="1196625" ref_url="https://bugzilla.suse.com/1196625" source="BUGZILLA"/>
		<reference ref_id="1197636" ref_url="https://bugzilla.suse.com/1197636" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010949.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2022-0897: Fixed a crash in nwfilter when counting number of network filters (bsc#1197636).

The following non-security bugs were fixed:

- qemu: Improve save operation by increasing pipe size
  c61d1e9b-virfile-set-pipe-size.patch,
  47d6d185-virfile-fix-indent.patch,
  cd7acb33-virfile-report-error.patch
  bsc#1196625
  
- qemu: Directly query KVM for TSC scaling support
  5df2c492-use-kvm-for-tsc-scaling.patch
  bsc#1193364
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-05"/>
	<updated date="2022-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193364">SUSE bug 1193364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196625">SUSE bug 1196625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197636">SUSE bug 1197636</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680253" comment="libvirt-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680254" comment="libvirt-admin-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680255" comment="libvirt-bash-completion-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680256" comment="libvirt-client-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680257" comment="libvirt-daemon-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680258" comment="libvirt-daemon-config-network-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680259" comment="libvirt-daemon-config-nwfilter-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680260" comment="libvirt-daemon-driver-interface-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680261" comment="libvirt-daemon-driver-libxl-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680262" comment="libvirt-daemon-driver-lxc-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680263" comment="libvirt-daemon-driver-network-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680264" comment="libvirt-daemon-driver-nodedev-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680265" comment="libvirt-daemon-driver-nwfilter-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680266" comment="libvirt-daemon-driver-qemu-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680267" comment="libvirt-daemon-driver-secret-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680268" comment="libvirt-daemon-driver-storage-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680269" comment="libvirt-daemon-driver-storage-core-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680270" comment="libvirt-daemon-driver-storage-disk-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680702" comment="libvirt-daemon-driver-storage-gluster-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680271" comment="libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680272" comment="libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680273" comment="libvirt-daemon-driver-storage-logical-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680274" comment="libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680275" comment="libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680276" comment="libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680277" comment="libvirt-daemon-hooks-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680278" comment="libvirt-daemon-lxc-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680279" comment="libvirt-daemon-qemu-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680280" comment="libvirt-daemon-xen-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680281" comment="libvirt-devel-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680703" comment="libvirt-devel-32bit-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680282" comment="libvirt-doc-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680163" comment="libvirt-libs-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680283" comment="libvirt-lock-sanlock-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680284" comment="libvirt-nss-7.1.0-150300.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680704" comment="wireshark-plugin-libvirt-7.1.0-150300.6.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52663" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1094832" ref_url="https://bugzilla.suse.com/1094832" source="BUGZILLA"/>
		<reference ref_id="1146299" ref_url="https://bugzilla.suse.com/1146299" source="BUGZILLA"/>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="CVE-2018-11490" ref_url="https://www.suse.com/security/cve/CVE-2018-11490/" source="CVE"/>
		<reference ref_id="CVE-2019-15133" ref_url="https://www.suse.com/security/cve/CVE-2019-15133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010963.html" source="SUSE-SU"/>
		<description>
This update for giflib fixes the following issues:

- CVE-2019-15133: Fixed a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero (bsc#1146299).
- CVE-2018-11490: Fixed a heap-based buffer overflow in DGifDecompressLine function in dgif_lib.c (bsc#1094832).
- CVE-2016-3977: Fixed a heap buffer overflow in gif2rgb (bsc#974847). 
     
Update to version 5.2.1
  * In gifbuild.c, avoid a core dump on no color map.
  * Restore inadvertently removed library version numbers in Makefile.
   
Changes in version 5.2.0
  * The undocumented and deprecated GifQuantizeBuffer() entry point
    has been moved to the util library to reduce libgif size and attack
    surface. Applications needing this function are couraged to link the
    util library or make their own copy.
  * The following obsolete utility programs are no longer installed:
    gifecho, giffilter, gifinto, gifsponge. These were either installed in
    error or have been obsolesced by modern image-transformmation tools
    like ImageMagick convert. They may be removed entirely in a future
    release.
  * Address SourceForge issue #136: Stack-buffer-overflow in gifcolor.c:84
  * Address SF bug #134: Giflib fails to slurp significant number of gifs
  * Apply SPDX convention for license tagging.
   
Changes in version 5.1.9
  * The documentation directory now includes an HTMlified version of the
    GIF89 standard, and a more detailed description of how LZW compression
    is applied to GIFs.
  * Address SF bug #129: The latest version of giflib cannot be build on windows.
  * Address SF bug #126: Cannot compile giflib using c89
   
Changes in version 5.1.8
  * Address SF bug #119: MemorySanitizer: FPE on unknown address (CVE-2019-15133 bsc#1146299)
  * Address SF bug #125: 5.1.7: xmlto is still required for tarball
  * Address SF bug #124: 5.1.7: ar invocation is not crosscompile compatible
  * Address SF bug #122: 5.1.7 installs manpages to wrong directory
  * Address SF bug #121: make: getversion: Command not found
  * Address SF bug #120: 5.1.7 does not build a proper library - no 
   
Changes in version 5.1.7
  * Correct a minor packaging error (superfluous symlinks) in the 5.1.6 tarballs.
   
Changes in version 5.1.6
  * Fix library installation in the Makefile.
   
Changes in version 5.1.5
  * Fix SF bug #114: Null dereferences in main() of gifclrmp
  * Fix SF bug #113: Heap Buffer Overflow-2 in function DGifDecompressLine()
    in cgif.c.  This had been assigned (CVE-2018-11490 bsc#1094832).
  * Fix SF bug #111: segmentation fault in PrintCodeBlock
  * Fix SF bug #109: Segmentation fault of giftool reading a crafted file
  * Fix SF bug #107: Floating point exception in giftext utility
  * Fix SF bug #105: heap buffer overflow in DumpScreen2RGB in gif2rgb.c:317
  * Fix SF bug #104: Ineffective bounds check in DGifSlurp
  * Fix SF bug #103: GIFLIB 5.1.4: DGifSlurp fails on empty comment
  * Fix SF bug #87: Heap buffer overflow in 5.1.2 (gif2rgb). (CVE-2016-3977 bsc#974847)
  * The horrible old autoconf build system has been removed with extreme prejudice. 
    You now build this simply by running 'make' from the top-level directory.

The following non-security bugs were fixed:

- build path independent objects and inherit CFLAGS from the build system (bsc#1184123)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-06"/>
	<updated date="2022-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094832">SUSE bug 1094832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146299">SUSE bug 1146299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11490/">CVE-2018-11490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15133/">CVE-2019-15133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679712" comment="giflib-devel-5.2.1-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679754" comment="giflib-devel-32bit-5.2.1-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679755" comment="giflib-progs-5.2.1-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679713" comment="libgif7-5.2.1-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679756" comment="libgif7-32bit-5.2.1-150000.4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52664" version="1" class="patch">
	<metadata>
		<title>Security update for zxing-cpp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191743" ref_url="https://bugzilla.suse.com/1191743" source="BUGZILLA"/>
		<reference ref_id="1191942" ref_url="https://bugzilla.suse.com/1191942" source="BUGZILLA"/>
		<reference ref_id="1191944" ref_url="https://bugzilla.suse.com/1191944" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28021" ref_url="https://www.suse.com/security/cve/CVE-2021-28021/" source="CVE"/>
		<reference ref_id="CVE-2021-42715" ref_url="https://www.suse.com/security/cve/CVE-2021-42715/" source="CVE"/>
		<reference ref_id="CVE-2021-42716" ref_url="https://www.suse.com/security/cve/CVE-2021-42716/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TPIWID3WJ3SMCA23W52QU3RW6AU7JCA7/" source="SUSE-SU"/>
		<description>
This update for zxing-cpp fixes the following issues:

- CVE-2021-28021: Fixed buffer overflow vulnerability in function stbi__extend_receive in stb_image.h via a crafted JPEG file. (bsc#1191743).
- CVE-2021-42715: Fixed buffer overflow in stb_image PNM loader (bsc#1191942).
- CVE-2021-42716: Fixed denial of service in stb_image HDR loader when reading crafted HDR files (bsc#1191944).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191743">SUSE bug 1191743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191942">SUSE bug 1191942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191944">SUSE bug 1191944</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28021/">CVE-2021-28021</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42715/">CVE-2021-42715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42716/">CVE-2021-42716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664155" comment="libZXing1-1.2.0-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664156" comment="zxing-cpp-devel-1.2.0-9.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52665" version="1" class="patch">
	<metadata>
		<title>Security update for ldb (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198397" ref_url="https://bugzilla.suse.com/1198397" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3670" ref_url="https://www.suse.com/security/cve/CVE-2021-3670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010970.html" source="SUSE-SU"/>
		<description>
This update for ldb fixes the following issues:

- Update to version 2.4.2
  - CVE-2021-3670: Fixed an issue where the LDAP server MaxQueryDuration value
    would not be honoured (bsc#1198397).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1198397">SUSE bug 1198397</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3670/">CVE-2021-3670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679460" comment="ldb-tools-2.4.2-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679461" comment="libldb-devel-2.4.2-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679462" comment="libldb2-2.4.2-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679463" comment="libldb2-32bit-2.4.2-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679464" comment="python3-ldb-2.4.2-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679587" comment="python3-ldb-32bit-2.4.2-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679465" comment="python3-ldb-devel-2.4.2-150300.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52666" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199061" ref_url="https://bugzilla.suse.com/1199061" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010971.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2022-24903: Fixed potential heap buffer overflow in modules for TCP syslog reception (bsc#1199061).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682352" comment="rsyslog-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682744" comment="rsyslog-diag-tools-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682745" comment="rsyslog-doc-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682746" comment="rsyslog-module-dbi-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682747" comment="rsyslog-module-elasticsearch-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682748" comment="rsyslog-module-gcrypt-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682411" comment="rsyslog-module-gssapi-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682412" comment="rsyslog-module-gtls-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682413" comment="rsyslog-module-mmnormalize-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682414" comment="rsyslog-module-mysql-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682749" comment="rsyslog-module-omamqp1-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682750" comment="rsyslog-module-omhttpfs-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682751" comment="rsyslog-module-omtcl-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682752" comment="rsyslog-module-ossl-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682415" comment="rsyslog-module-pgsql-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682416" comment="rsyslog-module-relp-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682417" comment="rsyslog-module-snmp-8.2106.0-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682418" comment="rsyslog-module-udpspoof-8.2106.0-150200.4.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52667" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="1198922" ref_url="https://bugzilla.suse.com/1198922" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010979.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-10"/>
	<updated date="2022-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198922">SUSE bug 1198922</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682353" comment="gzip-1.10-150200.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52668" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199242" ref_url="https://bugzilla.suse.com/1199242" source="BUGZILLA"/>
		<reference ref_id="1199244" ref_url="https://bugzilla.suse.com/1199244" source="BUGZILLA"/>
		<reference ref_id="1199245" ref_url="https://bugzilla.suse.com/1199245" source="BUGZILLA"/>
		<reference ref_id="1199246" ref_url="https://bugzilla.suse.com/1199246" source="BUGZILLA"/>
		<reference ref_id="1199274" ref_url="https://bugzilla.suse.com/1199274" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20770" ref_url="https://www.suse.com/security/cve/CVE-2022-20770/" source="CVE"/>
		<reference ref_id="CVE-2022-20771" ref_url="https://www.suse.com/security/cve/CVE-2022-20771/" source="CVE"/>
		<reference ref_id="CVE-2022-20785" ref_url="https://www.suse.com/security/cve/CVE-2022-20785/" source="CVE"/>
		<reference ref_id="CVE-2022-20792" ref_url="https://www.suse.com/security/cve/CVE-2022-20792/" source="CVE"/>
		<reference ref_id="CVE-2022-20796" ref_url="https://www.suse.com/security/cve/CVE-2022-20796/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010993.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM file parser (bsc#1199242).
- CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the scan verdict cache check (bsc#1199246).
- CVE-2022-20771: Fixed a possible infinite loop vulnerability in the TIFF file parser (bsc#1199244).
- CVE-2022-20785: Fixed a possible memory leak in the HTML file parser / Javascript normalizer (bsc#1199245).
- CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write vulnerability in the signature database load module (bsc#1199274).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199242">SUSE bug 1199242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199244">SUSE bug 1199244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199245">SUSE bug 1199245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199246">SUSE bug 1199246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199274">SUSE bug 1199274</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20770/">CVE-2022-20770</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20771/">CVE-2022-20771</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20785/">CVE-2022-20785</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20792/">CVE-2022-20792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20796/">CVE-2022-20796</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682360" comment="clamav-0.103.6-150000.3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682361" comment="clamav-devel-0.103.6-150000.3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682362" comment="libclamav9-0.103.6-150000.3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682363" comment="libfreshclam2-0.103.6-150000.3.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52669" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198614" ref_url="https://bugzilla.suse.com/1198614" source="BUGZILLA"/>
		<reference ref_id="1198723" ref_url="https://bugzilla.suse.com/1198723" source="BUGZILLA"/>
		<reference ref_id="1198766" ref_url="https://bugzilla.suse.com/1198766" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27775" ref_url="https://www.suse.com/security/cve/CVE-2022-27775/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010999.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27776: Fixed auth/cookie leak on redirect (bsc#1198766)
- CVE-2022-27775: Fixed bad local IPv6 connection reuse (bsc#1198723)
- CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc#1198614)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-13"/>
	<updated date="2022-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198614">SUSE bug 1198614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198723">SUSE bug 1198723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27775/">CVE-2022-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683441" comment="curl-7.66.0-150200.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683442" comment="libcurl-devel-7.66.0-150200.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683852" comment="libcurl-devel-32bit-7.66.0-150200.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683443" comment="libcurl4-7.66.0-150200.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683444" comment="libcurl4-32bit-7.66.0-150200.4.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52670" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199025" ref_url="https://bugzilla.suse.com/1199025" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26491" ref_url="https://www.suse.com/security/cve/CVE-2022-26491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011017.html" source="SUSE-SU"/>
		<description>
This update for pidgin fixes the following issues:

- CVE-2022-26491: Fixed MITM vulnerability when DNSSEC wasn't used (bsc#1199025).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199025">SUSE bug 1199025</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26491/">CVE-2022-26491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683362" comment="finch-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683363" comment="finch-devel-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683364" comment="libpurple-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682921" comment="libpurple-branding-upstream-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683365" comment="libpurple-devel-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682923" comment="libpurple-lang-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683366" comment="libpurple-plugin-sametime-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683367" comment="libpurple-tcl-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683368" comment="pidgin-2.13.0-150200.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683369" comment="pidgin-devel-2.13.0-150200.12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52671" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199278" ref_url="https://bugzilla.suse.com/1199278" source="BUGZILLA"/>
		<reference ref_id="1199279" ref_url="https://bugzilla.suse.com/1199279" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011025.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2022-29500: Fixed architectural flaw that could have been exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).
- CVE-2022-29501: Fixed a problem that an unprivileged user could have sent data to arbitrary unix socket as root (bsc#1199279).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199278">SUSE bug 1199278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199279">SUSE bug 1199279</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683372" comment="libnss_slurm2-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683373" comment="libpmi0-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683374" comment="libslurm36-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683375" comment="perl-slurm-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683376" comment="slurm-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683377" comment="slurm-auth-none-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683378" comment="slurm-config-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683379" comment="slurm-config-man-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683380" comment="slurm-cray-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683381" comment="slurm-devel-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683382" comment="slurm-doc-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683383" comment="slurm-hdf5-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683384" comment="slurm-lua-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683385" comment="slurm-munge-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683386" comment="slurm-node-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683387" comment="slurm-openlava-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683388" comment="slurm-pam_slurm-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683389" comment="slurm-plugins-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683390" comment="slurm-rest-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683391" comment="slurm-seff-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683392" comment="slurm-sjstat-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683393" comment="slurm-slurmdbd-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683394" comment="slurm-sql-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683395" comment="slurm-sview-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683396" comment="slurm-torque-20.11.9-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683397" comment="slurm-webdoc-20.11.9-150300.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52672" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011028.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682354" comment="libldap-2_4-2-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682355" comment="libldap-2_4-2-32bit-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682356" comment="libldap-data-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682366" comment="openldap2-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682367" comment="openldap2-back-meta-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682368" comment="openldap2-back-perl-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682758" comment="openldap2-back-sock-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682759" comment="openldap2-back-sql-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682357" comment="openldap2-client-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682369" comment="openldap2-contrib-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682358" comment="openldap2-devel-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682365" comment="openldap2-devel-32bit-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682359" comment="openldap2-devel-static-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682760" comment="openldap2-doc-2.4.46-150200.14.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682370" comment="openldap2-ppolicy-check-password-1.2-150200.14.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52673" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1028340" ref_url="https://bugzilla.suse.com/1028340" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1121726" ref_url="https://bugzilla.suse.com/1121726" source="BUGZILLA"/>
		<reference ref_id="1137728" ref_url="https://bugzilla.suse.com/1137728" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1182073" ref_url="https://bugzilla.suse.com/1182073" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1193556" ref_url="https://bugzilla.suse.com/1193556" source="BUGZILLA"/>
		<reference ref_id="1193842" ref_url="https://bugzilla.suse.com/1193842" source="BUGZILLA"/>
		<reference ref_id="1195926" ref_url="https://bugzilla.suse.com/1195926" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196114" ref_url="https://bugzilla.suse.com/1196114" source="BUGZILLA"/>
		<reference ref_id="1196367" ref_url="https://bugzilla.suse.com/1196367" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196639" ref_url="https://bugzilla.suse.com/1196639" source="BUGZILLA"/>
		<reference ref_id="1196942" ref_url="https://bugzilla.suse.com/1196942" source="BUGZILLA"/>
		<reference ref_id="1197157" ref_url="https://bugzilla.suse.com/1197157" source="BUGZILLA"/>
		<reference ref_id="1197391" ref_url="https://bugzilla.suse.com/1197391" source="BUGZILLA"/>
		<reference ref_id="1197656" ref_url="https://bugzilla.suse.com/1197656" source="BUGZILLA"/>
		<reference ref_id="1197660" ref_url="https://bugzilla.suse.com/1197660" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1197926" ref_url="https://bugzilla.suse.com/1197926" source="BUGZILLA"/>
		<reference ref_id="1198217" ref_url="https://bugzilla.suse.com/1198217" source="BUGZILLA"/>
		<reference ref_id="1198330" ref_url="https://bugzilla.suse.com/1198330" source="BUGZILLA"/>
		<reference ref_id="1198400" ref_url="https://bugzilla.suse.com/1198400" source="BUGZILLA"/>
		<reference ref_id="1198413" ref_url="https://bugzilla.suse.com/1198413" source="BUGZILLA"/>
		<reference ref_id="1198437" ref_url="https://bugzilla.suse.com/1198437" source="BUGZILLA"/>
		<reference ref_id="1198448" ref_url="https://bugzilla.suse.com/1198448" source="BUGZILLA"/>
		<reference ref_id="1198484" ref_url="https://bugzilla.suse.com/1198484" source="BUGZILLA"/>
		<reference ref_id="1198515" ref_url="https://bugzilla.suse.com/1198515" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198825" ref_url="https://bugzilla.suse.com/1198825" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199024" ref_url="https://bugzilla.suse.com/1199024" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2021-0707" ref_url="https://www.suse.com/security/cve/CVE-2021-0707/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2022-0812" ref_url="https://www.suse.com/security/cve/CVE-2022-0812/" source="CVE"/>
		<reference ref_id="CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158/" source="CVE"/>
		<reference ref_id="CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-28356" ref_url="https://www.suse.com/security/cve/CVE-2022-28356/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<reference ref_id="CVE-2022-29156" ref_url="https://www.suse.com/security/cve/CVE-2022-29156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-27835: Fixed a use after free vulnerability in infiniband hfi1 driver in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2021-0707: Fixed a use after free vulnerability in dma_buf_release of dma-buf.c, which may lead to local escalation of privilege with no additional execution privileges needed (bnc#1198437).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2021-4154: Fixed a use-after-free vulnerability in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c, allowing a local privilege escalation by an attacker with user privileges by exploiting the fsconfig syscall parameter, leading to a container breakout and a denial of service on the system (bnc#1193842).
- CVE-2022-0812: Fixed information leak when a file is read from RDMA (bsc#1196639)
- CVE-2022-1158: Fixed a vulnerability in the kvm module that may lead to a use-after-free write or denial of service (bsc#1197660).
- CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2022-28356: Fixed a refcount leak bug in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).
- CVE-2022-28893: Fixed a use after free vulnerability in inet_put_port where some sockets are not closed before xs_xprt_free() (bsc#1198330).
- CVE-2022-29156: Fixed a double free vulnerability related to rtrs_clt_dev_release.ate (jsc#SLE-15176 bsc#1198515).

The following non-security bugs were fixed:

- ACPI/APEI: Limit printable size of BERT table data (git-fixes).
- ACPI: processor idle: Check for architectural support for LPI (git-fixes).
- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).
- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).
- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).
- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).
- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).
- ALSA: pcm: Test for 'silence' field in struct 'pcm_format_data' (git-fixes).
- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).
- ALSA: usb-audio: Increase max buffer size (git-fixes).
- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).
- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).
- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).
- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).
- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).
- ASoC: soc-compress: Change the check for codec_dai (git-fixes).
- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).
- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).
- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).
- Bluetooth: Fix use after free in hci_send_acl (git-fixes).
- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).
- Bluetooth: hci_serdev: call init_rwsem() before p-&gt;open() (git-fixes).
- Documentation: add link to stable release candidate tree (git-fixes).
- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).
- IB/hfi1: Allow larger MTU without AIP (jsc#SLE-13208).
- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).
- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).
- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).
- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).
- PCI: aardvark: Fix support for MSI interrupts (git-fixes).
- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).
- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).
- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).
- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).
- RDMA/core: Set MR type in ib_reg_user_mr (jsc#SLE-8449).
- RDMA/mlx5: Add a missing update of cache-&gt;last_add (jsc#SLE-15175).
- RDMA/mlx5: Do not remove cache MRs when a delay is needed (jsc#SLE-15175).
- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (jsc#SLE-15175).
- SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() (git-fixes).
- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).
- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).
- SUNRPC: Handle low memory situations in call_status() (git-fixes).
- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).
- USB: serial: pl2303: add IBM device IDs (git-fixes).
- USB: serial: simple: add Nokia phone driver (git-fixes).
- USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).
- USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).
- USB: dwc3: omap: fix 'unbalanced disables for smps10_out1' on omap5evm (git-fixes).
- USB: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).
- adm8211: fix error return code in adm8211_probe() (git-fixes).
- arm64/sve: Use correct size when reinitialising SVE state (git-fixes)
- arm64: clear_page() shouldn't use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes)
- arm64: dts: allwinner: h5: NanoPI Neo 2: Fix ethernet node (git-fixes)
- arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode (git-fixes)
- arm64: dts: exynos: correct GIC CPU interfaces address range on (git-fixes)
- arm64: dts: ls1028a: fix memory node (git-fixes)
- arm64: dts: ls1028a: fix node name for the sysclk (git-fixes)
- arm64: dts: lx2160a: fix scl-gpios property name (git-fixes)
- arm64: dts: marvell: armada-37xx: Extend PCIe MEM space (git-fixes)
- arm64: dts: marvell: armada-37xx: Fix reg for standard variant of (git-fixes)
- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes)
- arm64: dts: rockchip: Fix GPU register width for RK3328 (git-fixes)
- arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from (git-fixes)
- arm64: dts: zii-ultra: fix 12V_MAIN voltage (git-fixes)
- arm64: head: avoid over-mapping in map_memory (git-fixes)
- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).
- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).
- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).
- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).
- ath5k: fix building with LEDS=m (git-fixes).
- ath9k: Fix usage of driver-private space in tx_info (git-fixes).
- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).
- ath9k_htc: fix uninit value bugs (git-fixes).
- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (jsc#SLE-15172).
- bfq: Avoid merging queues with different parents (bsc#1197926).
- bfq: Drop pointless unlock-lock pair (bsc#1197926).
- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).
- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).
- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).
- bfq: Split shared queues on move between cgroups (bsc#1197926).
- bfq: Track whether bfq_group is still online (bsc#1197926).
- bfq: Update cgroup information before merging bio (bsc#1197926).
- block: Drop leftover references to RQF_SORTED (bsc#1182073).
- bnx2x: fix napi API usage sequence (bsc#1198217).
- bpf: Resolve to prog-&gt;aux-&gt;dst_prog-&gt;type only for BPF_PROG_TYPE_EXT (git-fixes bsc#1177028).
- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).
- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).
- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).
- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).
- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).
- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).
- cifs: fix bad fids sent over wire (bsc#1197157).
- clk: Enforce that disjoints limits are invalid (git-fixes).
- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).
- direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656).
- direct-io: defer alignment check until after the EOF check (bsc#1197656).
- direct-io: do not force writeback for reads beyond EOF (bsc#1197656).
- dma-debug: fix return value of __setup handlers (git-fixes).
- dma: at_xdmac: fix a missing check on list iterator (git-fixes).
- dmaengine: Revert 'dmaengine: shdma: Fix runtime PM imbalance on error' (git-fixes).
- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).
- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).
- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).
- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).
- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).
- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).
- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).
- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).
- drm/amd: Add USBC connector ID (git-fixes).
- drm/amdgpu: Fix recursive locking warning (git-fixes).
- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).
- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).
- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).
- drm/amdkfd: make CRAT table missing message informational only (git-fixes).
- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).
- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).
- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).
- drm/edid: Do not clear formats if using deep color (git-fixes).
- drm/edid: check basic audio support on CEA extension block (git-fixes).
- drm/i915/gem: Flush coherency domains on first set-domain-ioctl (git-fixes).
- drm/i915: Call i915_globals_exit() if pci_register_device() fails (git-fixes).
- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).
- drm/mediatek: Add AAL output size configuration (git-fixes).
- drm/mediatek: Fix aal size config (git-fixes).
- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).
- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).
- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).
- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).
- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).
- drm: Add orientation quirk for GPD Win Max (git-fixes).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- e1000e: Fix possible overflow in LTR decoding (git-fixes).
- fibmap: Reject negative block numbers (bsc#1198448).
- fibmap: Use bmap instead of -&gt;bmap method in ioctl_fibmap (bsc#1198448).
- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).
- gpiolib: acpi: use correct format characters (git-fixes).
- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).
- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).
- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).
- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).
- ipmi: Move remove_work to dedicated workqueue (git-fixes).
- ipmi: bail out if init_srcu_struct fails (git-fixes).
- iwlwifi: Fix -EIO error code that is never returned (git-fixes).
- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).
- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).
- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).
- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).
- media: hdpvr: initialize dev-&gt;worker at hdpvr_register_videodev (git-fixes).
- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).
- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).
- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).
- mmc: host: Return an error when -&gt;enable_sdio_irq() ops is missing (git-fixes).
- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).
- mmc: mmci_sdmmc: Replace sg_dma_xxx macros (git-fixes).
- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).
- mtd: onenand: Check for error irq (git-fixes).
- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).
- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).
- mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes).
- net: asix: add proper error handling of usb read errors (git-fixes).
- net: mcs7830: handle usb read errors properly (git-fixes).
- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).
- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).
- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).
- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).
- power: supply: axp20x_battery: properly report current when discharging (git-fixes).
- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).
- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).
- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).
- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).
- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).
- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).
- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).
- random: check for signal_pending() outside of need_resched() check (git-fixes).
- ray_cs: Check ioremap return value (git-fixes).
- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).
- rtc: check if __rtc_read_time was successful (git-fixes).
- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).
- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).
- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).
- scsi: mpt3sas: Page fault in reply q processing (git-fixes).
- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).
- spi: Fix erroneous sgs value with min_t() (git-fixes).
- spi: Fix invalid sgs value (git-fixes).
- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).
- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).
- spi: mxic: Fix the transmit path (git-fixes).
- spi: tegra20: Use of_device_get_match_data() (git-fixes).
- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).
- vgacon: Propagate console boot parameters before calling `vc_resize' (bsc#1152489)
- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).
- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).
- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).
- video: fbdev: udlfb: properly check endpoint type (bsc#1152489)
- video: fbdev: w100fb: Reset global state (git-fixes).
- virtio_console: break out of buf poll on remove (git-fixes).
- virtio_console: eliminate anonymous module_init &amp; module_exit (git-fixes).
- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).
- x86/pm: Save the MSR validity status at context setup (bsc#1198400).
- x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes).
- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1198400).
- xen/blkfront: fix comment for need_copy (git-fixes).
- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).
- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).
- xen: fix is_xen_pmu() (git-fixes).
- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).
- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028340">SUSE bug 1028340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121726">SUSE bug 1121726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137728">SUSE bug 1137728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182073">SUSE bug 1182073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193556">SUSE bug 1193556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193842">SUSE bug 1193842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195926">SUSE bug 1195926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196114">SUSE bug 1196114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196367">SUSE bug 1196367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196639">SUSE bug 1196639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196942">SUSE bug 1196942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197157">SUSE bug 1197157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197391">SUSE bug 1197391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197656">SUSE bug 1197656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197660">SUSE bug 1197660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197926">SUSE bug 1197926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198217">SUSE bug 1198217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198330">SUSE bug 1198330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198400">SUSE bug 1198400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198413">SUSE bug 1198413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198437">SUSE bug 1198437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198448">SUSE bug 1198448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198484">SUSE bug 1198484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198515">SUSE bug 1198515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198825">SUSE bug 1198825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199024">SUSE bug 1199024</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0707/">CVE-2021-0707</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0812/">CVE-2022-0812</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28356/">CVE-2022-28356</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29156/">CVE-2022-29156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683297" comment="cluster-md-kmp-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683298" comment="dlm-kmp-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683299" comment="gfs2-kmp-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682940" comment="kernel-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682941" comment="kernel-azure-devel-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683300" comment="kernel-azure-extra-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683301" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683302" comment="kernel-azure-optional-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682942" comment="kernel-devel-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682943" comment="kernel-source-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682944" comment="kernel-syms-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683303" comment="kselftests-kmp-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683304" comment="ocfs2-kmp-azure-5.3.18-150300.38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683305" comment="reiserfs-kmp-azure-5.3.18-150300.38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52674" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011022.html" source="SUSE-SU"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679452" comment="jackson-annotations-javadoc-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679580" comment="jackson-bom-2.13.0-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679454" comment="jackson-core-javadoc-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679456" comment="jackson-databind-javadoc-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680705" comment="jackson-dataformat-smile-2.13.0-150200.3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680706" comment="jackson-dataformats-binary-2.13.0-150200.3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680707" comment="jackson-dataformats-binary-javadoc-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52675" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1028340" ref_url="https://bugzilla.suse.com/1028340" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1137728" ref_url="https://bugzilla.suse.com/1137728" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1177028" ref_url="https://bugzilla.suse.com/1177028" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1182073" ref_url="https://bugzilla.suse.com/1182073" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1193556" ref_url="https://bugzilla.suse.com/1193556" source="BUGZILLA"/>
		<reference ref_id="1193842" ref_url="https://bugzilla.suse.com/1193842" source="BUGZILLA"/>
		<reference ref_id="1194625" ref_url="https://bugzilla.suse.com/1194625" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1195926" ref_url="https://bugzilla.suse.com/1195926" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196114" ref_url="https://bugzilla.suse.com/1196114" source="BUGZILLA"/>
		<reference ref_id="1196367" ref_url="https://bugzilla.suse.com/1196367" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196639" ref_url="https://bugzilla.suse.com/1196639" source="BUGZILLA"/>
		<reference ref_id="1196942" ref_url="https://bugzilla.suse.com/1196942" source="BUGZILLA"/>
		<reference ref_id="1197157" ref_url="https://bugzilla.suse.com/1197157" source="BUGZILLA"/>
		<reference ref_id="1197391" ref_url="https://bugzilla.suse.com/1197391" source="BUGZILLA"/>
		<reference ref_id="1197656" ref_url="https://bugzilla.suse.com/1197656" source="BUGZILLA"/>
		<reference ref_id="1197660" ref_url="https://bugzilla.suse.com/1197660" source="BUGZILLA"/>
		<reference ref_id="1197677" ref_url="https://bugzilla.suse.com/1197677" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1197926" ref_url="https://bugzilla.suse.com/1197926" source="BUGZILLA"/>
		<reference ref_id="1198077" ref_url="https://bugzilla.suse.com/1198077" source="BUGZILLA"/>
		<reference ref_id="1198217" ref_url="https://bugzilla.suse.com/1198217" source="BUGZILLA"/>
		<reference ref_id="1198330" ref_url="https://bugzilla.suse.com/1198330" source="BUGZILLA"/>
		<reference ref_id="1198400" ref_url="https://bugzilla.suse.com/1198400" source="BUGZILLA"/>
		<reference ref_id="1198413" ref_url="https://bugzilla.suse.com/1198413" source="BUGZILLA"/>
		<reference ref_id="1198437" ref_url="https://bugzilla.suse.com/1198437" source="BUGZILLA"/>
		<reference ref_id="1198448" ref_url="https://bugzilla.suse.com/1198448" source="BUGZILLA"/>
		<reference ref_id="1198484" ref_url="https://bugzilla.suse.com/1198484" source="BUGZILLA"/>
		<reference ref_id="1198515" ref_url="https://bugzilla.suse.com/1198515" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198534" ref_url="https://bugzilla.suse.com/1198534" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198825" ref_url="https://bugzilla.suse.com/1198825" source="BUGZILLA"/>
		<reference ref_id="1198989" ref_url="https://bugzilla.suse.com/1198989" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199024" ref_url="https://bugzilla.suse.com/1199024" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2021-0707" ref_url="https://www.suse.com/security/cve/CVE-2021-0707/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2022-0812" ref_url="https://www.suse.com/security/cve/CVE-2022-0812/" source="CVE"/>
		<reference ref_id="CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158/" source="CVE"/>
		<reference ref_id="CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-28356" ref_url="https://www.suse.com/security/cve/CVE-2022-28356/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<reference ref_id="CVE-2022-29156" ref_url="https://www.suse.com/security/cve/CVE-2022-29156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-29156: Fixed a double free related to rtrs_clt_dev_release (bnc#1198515).
- CVE-2022-28893: Ensuring that sockets are in the intended state inside the SUNRPC subsystem (bnc#1198330).
- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).
- CVE-2022-28356: Fixed a refcount leak bug found in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).
- CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914).
- CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1197660).
- CVE-2022-0812: Fixed random memory leakage inside NFS/RDMA (bsc#1196639).
- CVE-2021-4154: Fixed a use-after-free flaw inside cgroup1_parse_param in kernel/cgroup/cgroup-v1.c. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system (bnc#1193842).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2021-0707: Fixed possible memory corruption due to a use after free inside dma_buf_releas e of dma-buf.c (bnc#1198437).
- CVE-2020-27835: Fixed use after free in infiniband hfi1 driver in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).


The following non-security bugs were fixed:

- ACPI: processor idle: Check for architectural support for LPI (git-fixes).
- ACPI/APEI: Limit printable size of BERT table data (git-fixes).
- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).
- adm8211: fix error return code in adm8211_probe() (git-fixes).
- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).
- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).
- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).
- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).
- ALSA: pcm: Test for 'silence' field in struct 'pcm_format_data' (git-fixes).
- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).
- ALSA: usb-audio: Increase max buffer size (git-fixes).
- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).
- arm64: clear_page() shouldn't use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes)
- arm64: dts: allwinner: h5: NanoPI Neo 2: Fix ethernet node (git-fixes)
- arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode (git-fixes)
- arm64: dts: exynos: correct GIC CPU interfaces address range on (git-fixes)
- arm64: dts: ls1028a: fix memory node (git-fixes)
- arm64: dts: ls1028a: fix node name for the sysclk (git-fixes)
- arm64: dts: lx2160a: fix scl-gpios property name (git-fixes)
- arm64: dts: marvell: armada-37xx: Extend PCIe MEM space (git-fixes)
- arm64: dts: marvell: armada-37xx: Fix reg for standard variant of (git-fixes)
- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes)
- arm64: dts: rockchip: Fix GPU register width for RK3328 (git-fixes)
- arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from (git-fixes)
- arm64: dts: zii-ultra: fix 12V_MAIN voltage (git-fixes)
- arm64: head: avoid over-mapping in map_memory (git-fixes)
- arm64: Update config files; arm LIBNVDIMM y-&gt;m ppc64le ND_BLK -&gt;m (bsc#1199024).
- arm64/sve: Use correct size when reinitialising SVE state (git-fixes)
- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).
- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).
- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).
- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).
- ASoC: soc-compress: Change the check for codec_dai (git-fixes).
- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).
- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).
- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).
- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).
- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).
- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).
- ath5k: fix building with LEDS=m (git-fixes).
- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).
- ath9k_htc: fix uninit value bugs (git-fixes).
- ath9k: Fix usage of driver-private space in tx_info (git-fixes).
- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).
- backlight: qcom-wled: Respect enabled-strings in set_brightness (bsc#1152489)
- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (jsc#SLE-15172).
- bfq: Avoid merging queues with different parents (bsc#1197926).
- bfq: Drop pointless unlock-lock pair (bsc#1197926).
- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).
- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).
- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).
- bfq: Split shared queues on move between cgroups (bsc#1197926).
- bfq: Track whether bfq_group is still online (bsc#1197926).
- bfq: Update cgroup information before merging bio (bsc#1197926).
- block: Drop leftover references to RQF_SORTED (bsc#1182073).
- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).
- Bluetooth: Fix use after free in hci_send_acl (git-fixes).
- Bluetooth: hci_serdev: call init_rwsem() before p-&gt;open() (git-fixes).
- bnx2x: fix napi API usage sequence (bsc#1198217).
- bpf: Resolve to prog-&gt;aux-&gt;dst_prog-&gt;type only for BPF_PROG_TYPE_EXT (git-fixes bsc#1177028).
- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).
- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).
- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).
- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).
- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).
- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).
- cifs: do not skip link targets when an I/O fails (bsc#1194625).
- cifs: fix bad fids sent over wire (bsc#1197157).
- clk: Enforce that disjoints limits are invalid (git-fixes).
- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).
- direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656).
- direct-io: defer alignment check until after the EOF check (bsc#1197656).
- direct-io: do not force writeback for reads beyond EOF (bsc#1197656).
- dma-debug: fix return value of __setup handlers (git-fixes).
- dma: at_xdmac: fix a missing check on list iterator (git-fixes).
- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).
- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).
- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).
- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).
- dmaengine: Revert 'dmaengine: shdma: Fix runtime PM imbalance on error' (git-fixes).
- Documentation: add link to stable release candidate tree (git-fixes).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: Add orientation quirk for GPD Win Max (git-fixes).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- drm/amd: Add USBC connector ID (git-fixes).
- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).
- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).
- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).
- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).
- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1152472)
- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1152489)
- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).
- drm/amdgpu: Fix recursive locking warning (git-fixes).
- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).
- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).
- drm/amdkfd: make CRAT table missing message informational only (git-fixes).
- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).
- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).
- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).
- drm/cma-helper: Set VM_DONTEXPAND for mmap (bsc#1152472)
- drm/edid: check basic audio support on CEA extension block (git-fixes).
- drm/edid: Do not clear formats if using deep color (git-fixes).
- drm/fb-helper: Mark screen buffers in system memory with (bsc#1152472)
- drm/i915: Call i915_globals_exit() if pci_register_device() fails (git-fixes).
- drm/i915: Drop all references to DRM IRQ midlayer (bsc#1152489)
- drm/i915: Keep gem ctx-&gt;vm alive until the final put (bsc#1152489)
- drm/i915: s/JSP2/ICP2/ PCH (bsc#1152489)
- drm/i915/gem: Flush coherency domains on first set-domain-ioctl (git-fixes).
- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).
- drm/mediatek: Add AAL output size configuration (git-fixes).
- drm/mediatek: Fix aal size config (git-fixes).
- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).
- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).
- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).
- drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap (bsc#1152472)
- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).
- drm/vc4: crtc: Lookup the encoder from the register at boot (bsc#1198534)
- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).
- drm/vmwgfx: Remove unused compile options (bsc#1152472)
- e1000e: Fix possible overflow in LTR decoding (git-fixes).
- fibmap: Reject negative block numbers (bsc#1198448).
- fibmap: Use bmap instead of -&gt;bmap method in ioctl_fibmap (bsc#1198448).
- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).
- gpiolib: acpi: use correct format characters (git-fixes).
- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).
- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).
- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).
- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).
- IB/hfi1: Allow larger MTU without AIP (jsc#SLE-13208).
- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).
- ipmi: bail out if init_srcu_struct fails (git-fixes).
- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).
- ipmi: Move remove_work to dedicated workqueue (git-fixes).
- iwlwifi: Fix -EIO error code that is never returned (git-fixes).
- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).
- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).
- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).
- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).
- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).
- media: hdpvr: initialize dev-&gt;worker at hdpvr_register_videodev (git-fixes).
- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).
- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).
- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).
- mmc: host: Return an error when -&gt;enable_sdio_irq() ops is missing (git-fixes).
- mmc: mmci_sdmmc: Replace sg_dma_xxx macros (git-fixes).
- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).
- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).
- mtd: onenand: Check for error irq (git-fixes).
- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).
- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).
- mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes).
- net: asix: add proper error handling of usb read errors (git-fixes).
- net: mana: Add counter for packet dropped by XDP (bsc#1195651).
- net: mana: Add counter for XDP_TX (bsc#1195651).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- net: mana: Reuse XDP dropped page (bsc#1195651).
- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).
- net: mcs7830: handle usb read errors properly (git-fixes).
- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).
- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).
- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).
- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).
- PCI: aardvark: Fix support for MSI interrupts (git-fixes).
- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).
- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).
- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).
- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).
- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).
- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).
- power: supply: axp20x_battery: properly report current when discharging (git-fixes).
- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).
- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).
- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).
- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).
- powerpc/perf: Expose Performance Monitor Counter SPR's as part of extended regs (bsc#1198077 ltc#197299).
- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).
- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).
- powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct (bsc#1198077 ltc#197299).
- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).
- random: check for signal_pending() outside of need_resched() check (git-fixes).
- ray_cs: Check ioremap return value (git-fixes).
- RDMA/core: Set MR type in ib_reg_user_mr (jsc#SLE-8449).
- RDMA/mlx5: Add a missing update of cache-&gt;last_add (jsc#SLE-15175).
- RDMA/mlx5: Do not remove cache MRs when a delay is needed (jsc#SLE-15175).
- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (jsc#SLE-15175).
- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).
- rpm: Run external scriptlets on uninstall only when available (bsc#1196514 bsc#1196114 bsc#1196942).
- rpm: Use bash for %() expansion (jsc#SLE-18234).
- rpm/*.spec.in: remove backtick usage
- rpm/constraints.in: skip SLOW_DISK workers for kernel-source
- rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926, bsc#1198484)
- rtc: check if __rtc_read_time was successful (git-fixes).
- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).
- s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677 LTC#197378).
- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).
- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).
- scsi: mpt3sas: Page fault in reply q processing (git-fixes).
- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).
- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).
- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).
- spi: Fix erroneous sgs value with min_t() (git-fixes).
- spi: Fix invalid sgs value (git-fixes).
- spi: mxic: Fix the transmit path (git-fixes).
- spi: tegra20: Use of_device_get_match_data() (git-fixes).
- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).
- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).
- SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() (git-fixes).
- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).
- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).
- SUNRPC: Handle low memory situations in call_status() (git-fixes).
- USB: dwc3: core: Fix tx/rx threshold settings (git-fixes).
- USB: dwc3: core: Only handle soft-reset in DCTL (git-fixes).
- USB: dwc3: gadget: Return proper request status (git-fixes).
- USB: dwc3: omap: fix 'unbalanced disables for smps10_out1' on omap5evm (git-fixes).
- USB: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).
- USB: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (bsc#1152489)
- USB: serial: pl2303: add IBM device IDs (git-fixes).
- USB: serial: simple: add Nokia phone driver (git-fixes).
- USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).
- USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).
- vgacon: Propagate console boot parameters before calling `vc_resize' (bsc#1152489)
- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).
- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).
- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).
- video: fbdev: udlfb: properly check endpoint type (bsc#1152489)
- video: fbdev: w100fb: Reset global state (git-fixes).
- virtio_console: break out of buf poll on remove (git-fixes).
- virtio_console: eliminate anonymous module_init &amp; module_exit (git-fixes).
- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).
- x86/pm: Save the MSR validity status at context setup (bsc#1198400).
- x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes).
- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1198400).
- xen: fix is_xen_pmu() (git-fixes).
- xen/blkfront: fix comment for need_copy (git-fixes).
- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).
- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).
- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).
- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028340">SUSE bug 1028340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137728">SUSE bug 1137728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177028">SUSE bug 1177028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182073">SUSE bug 1182073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193556">SUSE bug 1193556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193842">SUSE bug 1193842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194625">SUSE bug 1194625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195926">SUSE bug 1195926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196114">SUSE bug 1196114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196367">SUSE bug 1196367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196639">SUSE bug 1196639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196942">SUSE bug 1196942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197157">SUSE bug 1197157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197391">SUSE bug 1197391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197656">SUSE bug 1197656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197660">SUSE bug 1197660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197677">SUSE bug 1197677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197926">SUSE bug 1197926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198077">SUSE bug 1198077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198217">SUSE bug 1198217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198330">SUSE bug 1198330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198400">SUSE bug 1198400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198413">SUSE bug 1198413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198437">SUSE bug 1198437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198448">SUSE bug 1198448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198484">SUSE bug 1198484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198515">SUSE bug 1198515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198534">SUSE bug 1198534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198825">SUSE bug 1198825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198989">SUSE bug 1198989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199024">SUSE bug 1199024</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0707/">CVE-2021-0707</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0812/">CVE-2022-0812</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28356/">CVE-2022-28356</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29156/">CVE-2022-29156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683306" comment="cluster-md-kmp-64kb-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683007" comment="cluster-md-kmp-default-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683307" comment="cluster-md-kmp-preempt-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683308" comment="dlm-kmp-64kb-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683008" comment="dlm-kmp-default-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683309" comment="dlm-kmp-preempt-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683310" comment="dtb-al-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683311" comment="dtb-allwinner-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683312" comment="dtb-altera-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683313" comment="dtb-amd-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683314" comment="dtb-amlogic-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683315" comment="dtb-apm-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683316" comment="dtb-arm-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683317" comment="dtb-broadcom-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683318" comment="dtb-cavium-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683319" comment="dtb-exynos-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683320" comment="dtb-freescale-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683321" comment="dtb-hisilicon-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683322" comment="dtb-lg-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683323" comment="dtb-marvell-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683324" comment="dtb-mediatek-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683325" comment="dtb-nvidia-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683326" comment="dtb-qcom-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683327" comment="dtb-renesas-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683328" comment="dtb-rockchip-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683329" comment="dtb-socionext-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683330" comment="dtb-sprd-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683331" comment="dtb-xilinx-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683332" comment="dtb-zte-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683333" comment="gfs2-kmp-64kb-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683009" comment="gfs2-kmp-default-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683334" comment="gfs2-kmp-preempt-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682878" comment="kernel-64kb-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682879" comment="kernel-64kb-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683335" comment="kernel-64kb-extra-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683336" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683337" comment="kernel-64kb-optional-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683338" comment="kernel-debug-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683339" comment="kernel-debug-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683340" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682880" comment="kernel-default-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682881" comment="kernel-default-base-5.3.18-150300.59.68.1.150300.18.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683341" comment="kernel-default-base-rebuild-5.3.18-150300.59.68.1.150300.18.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682882" comment="kernel-default-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683342" comment="kernel-default-extra-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683343" comment="kernel-default-livepatch-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683344" comment="kernel-default-livepatch-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683345" comment="kernel-default-optional-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682883" comment="kernel-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682888" comment="kernel-docs-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683346" comment="kernel-docs-html-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683347" comment="kernel-kvmsmall-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683348" comment="kernel-kvmsmall-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683349" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682884" comment="kernel-macros-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682889" comment="kernel-obs-build-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683350" comment="kernel-obs-qa-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682885" comment="kernel-preempt-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682890" comment="kernel-preempt-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683351" comment="kernel-preempt-extra-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683352" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683353" comment="kernel-preempt-optional-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682891" comment="kernel-source-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683354" comment="kernel-source-vanilla-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682892" comment="kernel-syms-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682886" comment="kernel-zfcpdump-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683355" comment="kselftests-kmp-64kb-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683356" comment="kselftests-kmp-default-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683357" comment="kselftests-kmp-preempt-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683358" comment="ocfs2-kmp-64kb-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683010" comment="ocfs2-kmp-default-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683359" comment="ocfs2-kmp-preempt-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683360" comment="reiserfs-kmp-64kb-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682914" comment="reiserfs-kmp-default-5.3.18-150300.59.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683361" comment="reiserfs-kmp-preempt-5.3.18-150300.59.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52676" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011031.html" source="SUSE-SU"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682213" comment="e2fsprogs-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682214" comment="e2fsprogs-devel-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682215" comment="libcom_err-devel-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682340" comment="libcom_err-devel-32bit-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682216" comment="libcom_err-devel-static-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682217" comment="libcom_err2-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682218" comment="libcom_err2-32bit-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682219" comment="libext2fs-devel-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682341" comment="libext2fs-devel-32bit-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682220" comment="libext2fs-devel-static-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682221" comment="libext2fs2-1.43.8-150000.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682342" comment="libext2fs2-32bit-1.43.8-150000.4.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52677" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="1196441" ref_url="https://bugzilla.suse.com/1196441" source="BUGZILLA"/>
		<reference ref_id="1197284" ref_url="https://bugzilla.suse.com/1197284" source="BUGZILLA"/>
		<reference ref_id="1197517" ref_url="https://bugzilla.suse.com/1197517" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648/" source="CVE"/>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011030.html" source="SUSE-SU"/>
		<description>
This update for containerd, docker fixes the following issues:

- CVE-2022-24769: Fixed incorrect default inheritable capabilities (bsc#1197517).
- CVE-2022-23648: Fixed directory traversal issue (bsc#1196441).
- CVE-2022-27191: Fixed a crash in a golang.org/x/crypto/ssh server (bsc#1197284).
- CVE-2021-43565: Fixed a panic in golang.org/x/crypto by empty plaintext packet (bsc#1193930).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196441">SUSE bug 1196441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197284">SUSE bug 1197284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197517">SUSE bug 1197517</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679819" comment="containerd-1.5.11-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679831" comment="containerd-ctr-1.5.11-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681369" comment="docker-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681370" comment="docker-bash-completion-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681371" comment="docker-fish-completion-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682171" comment="docker-kubic-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682172" comment="docker-kubic-bash-completion-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682173" comment="docker-kubic-fish-completion-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682174" comment="docker-kubic-kubeadm-criconfig-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682175" comment="docker-kubic-zsh-completion-20.10.14_ce-150000.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682176" comment="docker-zsh-completion-20.10.14_ce-150000.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52678" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1177437" ref_url="https://bugzilla.suse.com/1177437" source="BUGZILLA"/>
		<reference ref_id="1190256" ref_url="https://bugzilla.suse.com/1190256" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191929" ref_url="https://bugzilla.suse.com/1191929" source="BUGZILLA"/>
		<reference ref_id="1192931" ref_url="https://bugzilla.suse.com/1192931" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193328" ref_url="https://bugzilla.suse.com/1193328" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194027" ref_url="https://bugzilla.suse.com/1194027" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194493" ref_url="https://bugzilla.suse.com/1194493" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194518" ref_url="https://bugzilla.suse.com/1194518" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194578" ref_url="https://bugzilla.suse.com/1194578" source="BUGZILLA"/>
		<reference ref_id="1194580" ref_url="https://bugzilla.suse.com/1194580" source="BUGZILLA"/>
		<reference ref_id="1194584" ref_url="https://bugzilla.suse.com/1194584" source="BUGZILLA"/>
		<reference ref_id="1194586" ref_url="https://bugzilla.suse.com/1194586" source="BUGZILLA"/>
		<reference ref_id="1194587" ref_url="https://bugzilla.suse.com/1194587" source="BUGZILLA"/>
		<reference ref_id="1194589" ref_url="https://bugzilla.suse.com/1194589" source="BUGZILLA"/>
		<reference ref_id="1194590" ref_url="https://bugzilla.suse.com/1194590" source="BUGZILLA"/>
		<reference ref_id="1194591" ref_url="https://bugzilla.suse.com/1194591" source="BUGZILLA"/>
		<reference ref_id="1194592" ref_url="https://bugzilla.suse.com/1194592" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194953" ref_url="https://bugzilla.suse.com/1194953" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2021-46283" ref_url="https://www.suse.com/security/cve/CVE-2021-46283/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-46283: nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and general protection fault) because of the missing initialization for nft_set_elem_expr_alloc. A local user can set a netfilter table expression in their own namespace (bnc#1194518).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: In the IPv6 implementation net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: In the IPv4 implementation net/ipv4/route.c has an information leak because the hash table is very small (bnc#1194087).

The following non-security bugs were fixed:

- ACPI: APD: Check for NULL pointer after calling devm_ioremap() (git-fixes).
- ACPI: Add stubs for wakeup handler functions (git-fixes).
- ACPI: scan: Create platform device for BCM4752 and LNV4752 ACPI nodes (git-fixes).
- ALSA: PCM: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ALSA: ctl: Fix copy of updated id with element read/write (git-fixes).
- ALSA: drivers: opl3: Fix incorrect use of vp-&gt;state (git-fixes).
- ALSA: hda/hdmi: Disable silent stream on GLK (git-fixes).
- ALSA: hda/realtek - Add headset Mic support for Lenovo ALC897 platform (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for ASRock NUC Box 1100 (git-fixes).
- ALSA: hda/realtek: Amp init fixup for HP ZBook 15 G6 (git-fixes).
- ALSA: hda/realtek: Fix quirk for Clevo NJ51CU (git-fixes).
- ALSA: hda/realtek: Fix quirk for TongFang PHxTxX1 (git-fixes).
- ALSA: hda/realtek: Fixes HP Spectre x360 15-eb1xxx speakers (git-fixes).
- ALSA: hda/realtek: Headset fixup for Clevo NH77HJQ (git-fixes).
- ALSA: hda: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ALSA: hda: Make proper use of timecounter (git-fixes).
- ALSA: jack: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ALSA: jack: Check the return value of kstrdup() (git-fixes).
- ALSA: oss: fix compile error when OSS_DEBUG is enabled (git-fixes).
- ALSA: pcm: oss: Fix negative period/buffer sizes (git-fixes).
- ALSA: pcm: oss: Handle missing errors in snd_pcm_oss_change_params*() (git-fixes).
- ALSA: pcm: oss: Limit the period size to 16MB (git-fixes).
- ALSA: usb-audio: Drop superfluous '0' in Presonus Studio 1810c's ID (git-fixes).
- ALSA: usb-audio: Line6 HX-Stomp XL USB_ID for 48k-fixed quirk (git-fixes).
- ASoC: codecs: wcd934x: handle channel mappping list correctly (git-fixes).
- ASoC: codecs: wcd934x: return correct value from mixer put (git-fixes).
- ASoC: codecs: wcd934x: return error code correctly from hw_params (git-fixes).
- ASoC: codecs: wsa881x: fix return values from kcontrol put (git-fixes).
- ASoC: cs42l42: Correct configuring of switch inversion from ts-inv (git-fixes).
- ASoC: cs42l42: Disable regulators if probe fails (git-fixes).
- ASoC: cs42l42: Use device_property API instead of of_property (git-fixes).
- ASoC: fsl_asrc: refine the check of available clock divider (git-fixes).
- ASoC: fsl_mqs: fix MODULE_ALIAS (git-fixes).
- ASoC: mediatek: Check for error clk pointer (git-fixes).
- ASoC: meson: aiu: Move AIU_I2S_MISC hold setting to aiu-fifo-i2s (git-fixes).
- ASoC: meson: aiu: fifo: Add missing dma_coerce_mask_and_coherent() (git-fixes).
- ASoC: qdsp6: q6routing: Fix return value from msm_routing_put_audio_mixer (git-fixes).
- ASoC: rt5663: Handle device_property_read_u32_array error codes (git-fixes).
- ASoC: samsung: idma: Check of ioremap return value (git-fixes).
- ASoC: soc-core: fix null-ptr-deref in snd_soc_del_component_unlocked() (git-fixes).
- ASoC: sunxi: fix a sound binding broken reference (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in ADMAIF (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in AHUB (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in DMIC (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in DSPK (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in I2S (git-fixes).
- ASoC: tegra: Fix wrong value type in ADMAIF (git-fixes).
- ASoC: tegra: Fix wrong value type in DMIC (git-fixes).
- ASoC: tegra: Fix wrong value type in DSPK (git-fixes).
- ASoC: tegra: Fix wrong value type in I2S (git-fixes).
- ASoC: uniphier: drop selecting non-existing SND_SOC_UNIPHIER_AIO_DMA (git-fixes).
- Add cherry-picked IDs for qemu fw_cfg patches
- Bluetooth: L2CAP: Fix using wrong mode (git-fixes).
- Bluetooth: bfusb: fix division by zero in send path (git-fixes).
- Bluetooth: btmtksdio: fix resume failure (git-fixes).
- Bluetooth: btusb: fix memory leak in btusb_mtk_submit_wmt_recv_urb() (git-fixes).
- Bluetooth: cmtp: fix possible panic when cmtp_init_sockets() fails (git-fixes).
- Bluetooth: hci_bcm: Check for error irq (git-fixes).
- Bluetooth: hci_qca: Stop IBS timer during BT OFF (git-fixes).
- Bluetooth: stop proccessing malicious adv data (git-fixes).
- Documentation: ACPI: Fix data node reference documentation (git-fixes).
- Documentation: dmaengine: Correctly describe dmatest with channel unset (git-fixes).
- Documentation: refer to config RANDOMIZE_BASE for kernel address-space randomization (git-fixes).
- HID: add USB_HID dependancy to hid-chicony (git-fixes).
- HID: add USB_HID dependancy to hid-prodikeys (git-fixes).
- HID: asus: Add depends on USB_HID to HID_ASUS Kconfig option (git-fixes).
- HID: bigbenff: prevent null pointer dereference (git-fixes).
- HID: google: add eel USB id (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_frame_init_v1_buttonpad (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_get_str_desc (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_huion_init (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_init (git-fixes).
- HID: quirks: Add quirk for the Microsoft Surface 3 type-cover (git-fixes).
- Input: appletouch - initialize work before device registration (git-fixes).
- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).
- Input: elantech - fix stack out of bound access in elantech_change_report_id() (git-fixes).
- Input: i8042 - add deferred probe support (bsc#1190256).
- Input: i8042 - enable deferred probe quirk for ASUS UM325UA (bsc#1190256).
- Input: max8925_onkey - do not mark comment as kernel-doc (git-fixes).
- Input: spaceball - fix parsing of movement data packets (git-fixes).
- Input: ti_am335x_tsc - fix STEPCONFIG setup for Z2 (git-fixes).
- Input: ti_am335x_tsc - set ADCREFM for X configuration (git-fixes).
- Move upstreamed patches into sorted section
- NFC: st21nfca: Fix memory leak in device probe and remove (git-fixes).
- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- PCI/ACPI: Fix acpi_pci_osc_control_set() kernel-doc comment (git-fixes).
- PCI/MSI: Clear PCI_MSIX_FLAGS_MASKALL on error (git-fixes).
- PCI/MSI: Fix pci_irq_vector()/pci_irq_get_affinity() (git-fixes).
- PCI/MSI: Mask MSI-X vectors only on success (git-fixes).
- PCI: cadence: Add cdns_plat_pcie_probe() missing return (git-fixes).
- PCI: dwc: Do not remap invalid res (git-fixes).
- PCI: mvebu: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI: mvebu: Do not modify PCI IO type bits in conf_write (git-fixes).
- PCI: mvebu: Fix support for DEVCAP2, DEVCTL2 and LNKCTL2 registers on emulated bridge (git-fixes).
- PCI: mvebu: Fix support for PCI_EXP_DEVCTL on emulated bridge (git-fixes).
- PCI: mvebu: Fix support for PCI_EXP_RTSTA on emulated bridge (git-fixes).
- PCI: pci-bridge-emul: Properly mark reserved PCIe bits in PCI config space (git-fixes).
- PCI: pci-bridge-emul: Set PCI_STATUS_CAP_LIST for PCIe device (git-fixes).
- PCI: pciehp: Fix infinite loop in IRQ handler upon power fault (git-fixes).
- PCI: xgene: Fix IB window setup (git-fixes).
- PM: runtime: Defer suspending suppliers (git-fixes).
- PM: sleep: Do not assume that 'mem' is always present (git-fixes).
- RDMA/hns: Replace kfree() with kvfree() (jsc#SLE-14777).
- Rename colliding patches before the next SLE15-SP2 -&gt; SLE15-SP3 merge
- Rename colliding patches before the next cve/linux-5.3 -&gt; SLE15-SP3 merge
- Revert 'PM: sleep: Do not assume that 'mem' is always present' (git-fixes).
- Revert 'USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set' (git-fixes).
- Revert 'net/mlx5: Add retry mechanism to the command entry index allocation' (jsc#SLE-15172).
- USB: Fix 'slab-out-of-bounds Write' bug in usb_hcd_poll_rh_status (git-fixes).
- USB: NO_LPM quirk Lenovo Powered USB-C Travel Hub (git-fixes).
- USB: NO_LPM quirk Lenovo USB-C to Ethernet Adapher(RTL8153-04) (git-fixes).
- USB: cdc-acm: fix break reporting (git-fixes).
- USB: cdc-acm: fix racy tty buffer accesses (git-fixes).
- USB: chipidea: fix interrupt deadlock (git-fixes).
- USB: core: Fix bug in resuming hub's handling of wakeup requests (git-fixes).
- USB: gadget: bRequestType is a bitfield, not a enum (git-fixes).
- USB: gadget: detect too-big endpoint 0 requests (git-fixes).
- USB: gadget: zero allocate endpoint 0 buffers (git-fixes).
- USB: serial: cp210x: fix CP2105 GPIO registration (git-fixes).
- USB: serial: option: add Telit FN990 compositions (git-fixes).
- Update patches.suse/tpm-fix-potential-NULL-pointer-access-in-tpm_del_cha.patch (git-fixes bsc#1193660 ltc#195634).
- Updated mpi3mr entry in supported.conf (bsc#1194578 jsc#SLE-18120) Moving this driver into the 'supported' package.
- amd/display: downgrade validation failure log level (git-fixes).
- ata: ahci: Add Green Sardine vendor ID as board_ahci_mobile (git-fixes).
- atlantic: Fix buff_ring OOB in aq_ring_rx_clean (git-fixes).
- ax25: NPD bug when detaching AX25 device (git-fixes).
- backlight: qcom-wled: Fix off-by-one maximum with default num_strings (git-fixes).
- backlight: qcom-wled: Override default length with qcom,enabled-strings (git-fixes).
- backlight: qcom-wled: Pass number of elements to read to read_u32_array (git-fixes).
- backlight: qcom-wled: Validate enabled string indices in DT (git-fixes).
- batman-adv: mcast: do not send link-local multicast to mcast routers (git-fixes).
- blk-cgroup: synchronize blkg creation against policy deactivation (bsc#1194584).
- block/scsi-ioctl: Fix kernel-infoleak in scsi_put_cdrom_generic_arg() (git-fixes).
- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).
- can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data (git-fixes).
- can: gs_usb: gs_can_start_xmit(): zero-initialize hf-&gt;{flags,reserved} (git-fixes).
- can: kvaser_usb: get CAN clock frequency from device (git-fixes).
- can: sja1000: fix use after free in ems_pcmcia_add_card() (git-fixes).
- can: softing: softing_startstop(): fix set but not used variable warning (git-fixes).
- can: softing_cs: softingcs_probe(): fix memleak on registration failure (git-fixes).
- can: usb_8dev: remove unused member echo_skb from struct usb_8dev_priv (git-fixes).
- can: xilinx_can: xcan_probe(): check for error irq (git-fixes).
- char/mwave: Adjust io port register size (git-fixes).
- clk: Do not parent clks until the parent is fully registered (git-fixes).
- clk: Gemini: fix struct name in kernel-doc (git-fixes).
- clk: bcm-2835: Pick the closest clock rate (git-fixes).
- clk: bcm-2835: Remove rounding up the dividers (git-fixes).
- clk: imx8mn: Fix imx8mn_clko1_sels (git-fixes).
- clk: imx: pllv1: fix kernel-doc notation for struct clk_pllv1 (git-fixes).
- clk: qcom: gcc-msm8996: Drop (again) gcc_aggre1_pnoc_ahb_clk (git-fixes).
- clk: qcom: regmap-mux: fix parent clock lookup (git-fixes).
- clk: stm32: Fix ltdc's clock turn off by clk_disable_unused() after system enter shell (git-fixes).
- crypto: caam - replace this_cpu_ptr with raw_cpu_ptr (git-fixes).
- crypto: mxs-dcp - Use sg_mapping_iter to copy data (git-fixes).
- crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop() (git-fixes).
- crypto: qat - do not ignore errors from enable_vf2pf_comms() (git-fixes).
- crypto: qat - fix reuse of completion variable (git-fixes).
- crypto: qat - handle both source of interrupt in VF ISR (git-fixes).
- crypto: qce - fix uaf on qce_ahash_register_one (git-fixes).
- crypto: stm32/crc32 - Fix kernel BUG triggered in probe() (git-fixes).
- crypto: stm32/cryp - fix double pm exit (git-fixes).
- crypto: stm32/cryp - fix lrw chaining mode (git-fixes).
- crypto: stm32/cryp - fix xts and race condition in crypto_engine requests (git-fixes).
- debugfs: lockdown: Allow reading debugfs files that are not world readable (bsc#1193328 ltc#195566).
- device property: Fix documentation for FWNODE_GRAPH_DEVICE_DISABLED (git-fixes).
- dm crypt: document encrypted keyring key option (git-fixes).
- dm writecache: add 'cleaner' and 'max_age' to Documentation (git-fixes).
- dm writecache: advance the number of arguments when reporting max_age (git-fixes).
- dm writecache: fix performance degradation in ssd mode (git-fixes).
- dm writecache: flush origin device when writing and cache is full (git-fixes).
- dma_fence_array: Fix PENDING_ERROR leak in dma_fence_array_signaled() (git-fixes).
- dmaengine: at_xdmac: Do not start transactions at tx_submit level (git-fixes).
- dmaengine: at_xdmac: Fix at_xdmac_lld struct definition (git-fixes).
- dmaengine: at_xdmac: Fix concurrency over xfers_list (git-fixes).
- dmaengine: at_xdmac: Fix lld view setting (git-fixes).
- dmaengine: at_xdmac: Print debug message after realeasing the lock (git-fixes).
- dmaengine: bestcomm: fix system boot lockups (git-fixes).
- dmaengine: idxd: add module parameter to force disable of SVA (bsc#1192931).
- dmaengine: idxd: enable SVA feature for IOMMU (bsc#1192931).
- dmaengine: pxa/mmp: stop referencing config-&gt;slave_id (git-fixes).
- dmaengine: st_fdma: fix MODULE_ALIAS (git-fixes).
- drm/amd/amdgpu: Increase HWIP_MAX_INSTANCE to 10 (git-fixes).
- drm/amd/display: Fix for the no Audio bug with Tiled Displays (git-fixes).
- drm/amd/display: Update bounding box states (v2) (git-fixes).
- drm/amd/display: Update number of DCN3 clock states (git-fixes).
- drm/amd/display: add connector type check for CRC source set (git-fixes).
- drm/amd/display: dcn20_resource_construct reduce scope of FPU enabled (git-fixes).
- drm/amd/display: fix incorrect CM/TF programming sequence in dwb (git-fixes).
- drm/amd/display: fix missing writeback disablement if plane is removed (git-fixes).
- drm/amdgpu: Fix a NULL pointer dereference in amdgpu_connector_lcd_native_mode() (git-fixes).
- drm/amdgpu: Fix a printing message (git-fixes).
- drm/amdgpu: Fix amdgpu_ras_eeprom_init() (git-fixes).
- drm/amdgpu: correct register access for RLC_JUMP_TABLE_RESTORE (git-fixes).
- drm/amdgpu: revert 'Add autodump debugfs node for gpu reset v8' (git-fixes).
- drm/amdkfd: Account for SH/SE count when setting up cu masks (git-fixes).
- drm/amdkfd: Check for null pointer after calling kmemdup (git-fixes).
- drm/ast: potential dereference of null pointer (git-fixes).
- drm/atomic: Check new_crtc_state-&gt;active to determine if CRTC needs disable in self refresh mode (git-fixes).
- drm/bridge: analogix_dp: Make PSR-exit block less (git-fixes).
- drm/bridge: display-connector: fix an uninitialized pointer in probe() (git-fixes).
- drm/bridge: nwl-dsi: Avoid potential multiplication overflow on 32-bit (git-fixes).
- drm/bridge: ti-sn65dsi86: Set max register for regmap (git-fixes).
- drm/display: fix possible null-pointer dereference in dcn10_set_clock() (git-fixes).
- drm/exynos: Always initialize mapping in exynos_drm_register_dma() (git-fixes).
- drm/i915/fb: Fix rounding error in subsampled plane size calculation (git-fixes).
- drm/i915: Avoid bitwise vs logical OR warning in snb_wm_latency_quirk() (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm/dpu: fix safe status debugfs file (git-fixes).
- drm/msm/dsi: Fix DSI and DSI PHY regulator config from SDM660 (git-fixes).
- drm/msm/dsi: set default num_data_lanes (git-fixes).
- drm/msm/mdp5: fix cursor-related warnings (git-fixes).
- drm/msm: mdp4: drop vblank get/put from prepare/complete_commit (git-fixes).
- drm/msm: prevent NULL dereference in msm_gpu_crashstate_capture() (git-fixes).
- drm/panel: innolux-p079zca: Delete panel on attach() failure (git-fixes).
- drm/panel: kingdisplay-kd097d04: Delete panel on attach() failure (git-fixes).
- drm/radeon/radeon_kms: Fix a NULL pointer dereference in radeon_driver_open_kms() (git-fixes).
- drm/rockchip: dsi: Disable PLL clock on bind error (git-fixes).
- drm/rockchip: dsi: Fix unbalanced clock on probe error (git-fixes).
- drm/rockchip: dsi: Hold pm-runtime across bind/unbind (git-fixes).
- drm/rockchip: dsi: Reconfigure hardware on resume() (git-fixes).
- drm/sun4i: dw-hdmi: Fix missing put_device() call in sun8i_hdmi_phy_get (git-fixes).
- drm/sun4i: fix unmet dependency on RESET_CONTROLLER for PHY_SUN6I_MIPI_DPHY (git-fixes).
- drm/syncobj: Deal with signalled fences in drm_syncobj_find_fence (git-fixes).
- drm/tegra: vic: Fix DMA API misuse (git-fixes).
- drm/vboxvideo: fix a NULL vs IS_ERR() check (git-fixes).
- drm/vc4: hdmi: Make sure the controller is powered up during bind (git-fixes).
- drm/vc4: hdmi: Set HD_CTL_WHOLSMP and HD_CTL_CHALIGN_SET (git-fixes).
- drm/vc4: hdmi: Set a default HSM rate (git-fixes).
- drm: fix null-ptr-deref in drm_dev_init_release() (git-fixes).
- drm: xlnx: zynqmp: release reset to DP controller before accessing DP registers (git-fixes).
- drm: xlnx: zynqmp_dpsub: Call pm_runtime_get_sync before setting pixel clock (git-fixes).
- eeprom: idt_89hpesx: Put fwnode in matching case during -&gt;probe() (git-fixes).
- eeprom: idt_89hpesx: Restore printing the unsupported fwnode name (git-fixes).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- ext4: fix lazy initialization next schedule time computation in more granular unit (bsc#1194580).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- firmware: Update Kconfig help text for Google firmware (git-fixes).
- firmware: arm_scmi: pm: Propagate return value to caller (git-fixes).
- firmware: arm_scpi: Fix string overflow in SCPI genpd driver (git-fixes).
- firmware: qcom_scm: Fix error retval in __qcom_scm_is_call_available() (git-fixes).
- firmware: qemu_fw_cfg: fix NULL-pointer deref on duplicate entries (git-fixes).
- firmware: qemu_fw_cfg: fix kobject leak in probe error path (git-fixes).
- firmware: qemu_fw_cfg: fix sysfs information leak (git-fixes).
- firmware: raspberrypi: Fix a leak in 'rpi_firmware_get()' (git-fixes).
- firmware: smccc: Fix check for ARCH_SOC_ID not implemented (git-fixes).
- firmware: tegra: Fix error application of sizeof() to pointer (git-fixes).
- firmware: tegra: Reduce stack usage (git-fixes).
- firmware_loader: fix pre-allocated buf built-in firmware use (git-fixes).
- floppy: Fix hang in watchdog when disk is ejected (git-fixes).
- flow_offload: return EOPNOTSUPP for the unsupported mpls action type (bsc#1154353).
- fuse: Pass correct lend value to filemap_write_and_wait_range() (bsc#1194953).
- gpiolib: acpi: Make set-debounce-timeout failures non fatal (git-fixes).
- gpu: host1x: Add back arm_iommu_detach_device() (git-fixes).
- hwmon: (lm90) Add basic support for TI TMP461 (git-fixes).
- hwmon: (lm90) Add max6654 support to lm90 driver (git-fixes).
- hwmon: (lm90) Do not report 'busy' status bit as alarm (git-fixes).
- hwmon: (lm90) Drop critical attribute support for MAX6654 (git-fixes).
- hwmon: (lm90) Fix usage of CONFIG2 register in detect function (git-fixes).
- hwmon: (lm90) Introduce flag indicating extended temperature support (git-fixes).
- i2c: rk3x: Handle a spurious start completion interrupt flag (git-fixes).
- i2c: validate user data in compat ioctl (git-fixes).
- i3c: fix incorrect address slot lookup on 64-bit (git-fixes).
- i3c: master: dw: check return of dw_i3c_master_get_free_pos() (git-fixes).
- i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (git-fixes).
- i40e: Fix for displaying message regarding NVM version (git-fixes).
- i40e: Fix incorrect netdev's real number of RX/TX queues (git-fixes).
- i40e: Fix to not show opcode msg on unsuccessful VF MAC change (git-fixes).
- i40e: fix use-after-free in i40e_sync_filters_subtask() (git-fixes).
- iavf: Fix limit of total number of queues to active queues of VF (git-fixes).
- iavf: restore MSI state on reset (git-fixes).
- ieee802154: atusb: fix uninit value in atusb_set_extended_addr (git-fixes).
- ieee802154: fix error return code in ieee802154_llsec_getparams() (git-fixes).
- ieee802154: fix error return code in ieee802154_add_iface() (git-fixes).
- ieee802154: hwsim: Fix memory leak in hwsim_add_one (git-fixes).
- ieee802154: hwsim: Fix possible memory leak in hwsim_subscribe_all_others (git-fixes).
- ieee802154: hwsim: avoid possible crash in hwsim_del_edge_nl() (git-fixes).
- ieee802154: hwsim: fix GPF in hwsim_set_edge_lqi (git-fixes).
- igb: Fix removal of unicast MAC filters of VFs (git-fixes).
- igbvf: fix double free in `igbvf_probe` (git-fixes).
- igc: Fix typo in i225 LTR functions (jsc#SLE-13533).
- iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove (git-fixes).
- iio: ad7768-1: Call iio_trigger_notify_done() on error (git-fixes).
- iio: adc: axp20x_adc: fix charging current reporting on AXP22x (git-fixes).
- iio: at91-sama5d2: Fix incorrect sign extension (git-fixes).
- iio: dln2-adc: Fix lockdep complaint (git-fixes).
- iio: dln2: Check return value of devm_iio_trigger_register() (git-fixes).
- iio: itg3200: Call iio_trigger_notify_done() on error (git-fixes).
- iio: kxsd9: Do not return error code in trigger handler (git-fixes).
- iio: ltr501: Do not return error code in trigger handler (git-fixes).
- iio: mma8452: Fix trigger reference couting (git-fixes).
- iio: stk3310: Do not return error code in interrupt handler (git-fixes).
- iio: trigger: Fix reference counting (git-fixes).
- iio: trigger: stm32-timer: fix MODULE_ALIAS (git-fixes).
- ionic: Initialize the 'lif-&gt;dbid_inuse' bitmap (bsc#1167773).
- isofs: Fix out of bound access for corrupted isofs image (bsc#1194591).
- iwlwifi: fw: correctly limit to monitor dump (git-fixes).
- iwlwifi: mvm: Fix scan channel flags settings (git-fixes).
- iwlwifi: mvm: Use div_s64 instead of do_div in iwl_mvm_ftm_rtt_smoothing() (git-fixes).
- iwlwifi: mvm: avoid static queue number aliasing (git-fixes).
- iwlwifi: mvm: disable RX-diversity in powersave (git-fixes).
- iwlwifi: mvm: fix 32-bit build in FTM (git-fixes).
- iwlwifi: mvm: fix access to BSS elements (git-fixes).
- iwlwifi: mvm: test roc running status bits before removing the sta (git-fixes).
- iwlwifi: pcie: free RBs during configure (git-fixes).
- ixgbe: set X550 MDIO speed before talking to PHY (git-fixes).
- kmod: make request_module() return an error when autoloading is disabled (git-fixes).
- kobject: Restore old behaviour of kobject_del(NULL) (git-fixes).
- kobject_uevent: remove warning in init_uevent_argv() (git-fixes).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- libata: add horkage for ASMedia 1092 (git-fixes).
- libata: if T_LENGTH is zero, dma direction should be DMA_NONE (git-fixes).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lockdown: Allow unprivileged users to see lockdown status (git-fixes).
- mISDN: change function names to avoid conflicts (git-fixes).
- mac80211: Fix monitor MTU limit so that A-MSDUs get through (git-fixes).
- mac80211: agg-tx: do not schedule_and_wake_txq() under sta-&gt;lock (git-fixes).
- mac80211: do not access the IV when it was stripped (git-fixes).
- mac80211: fix lookup when adding AddBA extension element (git-fixes).
- mac80211: fix regression in SSN handling of addba tx (git-fixes).
- mac80211: initialize variable have_higher_than_11mbit (git-fixes).
- mac80211: mark TX-during-stop for TX in in_reconfig (git-fixes).
- mac80211: send ADDBA requests using the tid/queue of the aggregation session (git-fixes).
- mac80211: track only QoS data frames for admission control (git-fixes).
- mac80211: validate extended element ID is present (git-fixes).
- mailbox: hi3660: convert struct comments to kernel-doc notation (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: aspeed: Update signal status immediately to ensure sane hw state (git-fixes).
- media: aspeed: fix mode-detect always time out at 2nd run (git-fixes).
- media: cpia2: fix control-message timeouts (git-fixes).
- media: dib0700: fix undefined behavior in tuner shutdown (git-fixes).
- media: dib8000: Fix a memleak in dib8000_init() (git-fixes).
- media: dmxdev: fix UAF when dvb_register_device() fails (git-fixes).
- media: dw2102: Fix use after free (git-fixes).
- media: em28xx: fix control-message timeouts (git-fixes).
- media: em28xx: fix memory leak in em28xx_init_dev (git-fixes).
- media: flexcop-usb: fix control-message timeouts (git-fixes).
- media: hantro: Fix probe func error path (git-fixes).
- media: i2c: imx274: fix trivial typo expsoure/exposure (git-fixes).
- media: i2c: imx274: fix trivial typo obainted/obtained (git-fixes).
- media: imx-pxp: Initialize the spinlock prior to using it (git-fixes).
- media: mceusb: fix control-message timeouts (git-fixes).
- media: msi001: fix possible null-ptr-deref in msi001_probe() (git-fixes).
- media: mtk-vcodec: call v4l2_m2m_ctx_release first when file is released (git-fixes).
- media: pvrusb2: fix control-message timeouts (git-fixes).
- media: rcar-csi2: Correct the selection of hsfreqrange (git-fixes).
- media: rcar-csi2: Optimize the selection PHTW register (git-fixes).
- media: redrat3: fix control-message timeouts (git-fixes).
- media: s2255: fix control-message timeouts (git-fixes).
- media: saa7146: mxb: Fix a NULL pointer dereference in mxb_attach() (git-fixes).
- media: si2157: Fix 'warm' tuner state detection (git-fixes).
- media: si470x-i2c: fix possible memory leak in si470x_i2c_probe() (git-fixes).
- media: stk1160: fix control-message timeouts (git-fixes).
- media: streamzap: remove unnecessary ir_raw_event_reset and handle (git-fixes).
- media: uvcvideo: fix division by zero at stream start (git-fixes).
- media: venus: core: Fix a resource leak in the error handling path of 'venus_probe()' (git-fixes).
- memblock: ensure there is no overflow in memblock_overlaps_region() (git-fixes).
- memory: emif: Remove bogus debugfs error handling (git-fixes).
- mfd: intel-lpss: Fix too early PM enablement in the ACPI -&gt;probe() (git-fixes).
- misc: fastrpc: Add missing lock before accessing find_vma() (git-fixes).
- misc: fastrpc: fix improper packet size calculation (git-fixes).
- misc: lattice-ecp3-config: Fix task hung when firmware load failed (git-fixes).
- mmc: meson-mx-sdio: add IRQ check (git-fixes).
- mmc: sdhci-esdhc-imx: clear the buffer_read_ready to reset standard tuning circuit (git-fixes).
- mmc: sdhci-esdhc-imx: disable CMDQ support (git-fixes).
- mmc: sdhci-pci: Add PCI ID for Intel ADL (git-fixes).
- mmc: sdhci-tegra: Fix switch to HS400ES mode (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode (git-fixes).
- mt76: mt7915: fix an off-by-one bound check (git-fixes).
- mtd: rawnand: fsmc: Fix timing computation (git-fixes).
- mtd: rawnand: fsmc: Take instruction delay into account (git-fixes).
- mtd: rawnand: mpc5121: Remove unused variable in ads5121_select_chip() (git-fixes).
- mtd: spi-nor: hisi-sfc: Remove excessive clk_disable_unprepare() (git-fixes).
- mwifiex: Fix possible ABBA deadlock (git-fixes).
- mwifiex: Try waking the firmware until we get an interrupt (git-fixes).
- net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources (jsc#SLE-8464).
- net/mlx5: Set command entry semaphore up once got index free (jsc#SLE-15172).
- net/mlx5e: Fix wrong features assignment in case of error (git-fixes).
- net/mlx5e: Wrap the tx reporter dump callback to extract the sq (jsc#SLE-15172).
- net/sched: fq_pie: prevent dismantle issue (jsc#SLE-15172).
- net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1176774).
- net: create netdev-&gt;dev_addr assignment helpers (git-fixes).
- net: ena: Fix error handling when calculating max IO queues number (bsc#1154492).
- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1154492).
- net: ena: Fix wrong rx request id by resetting device (git-fixes).
- net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (jsc#SLE-14777).
- net: usb: lan78xx: add Allied Telesis AT29M2-AF (git-fixes).
- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).
- netfilter: nft_set_pipapo: allocate pcpu scratch maps on clone (bsc#1176447).
- nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done (git-fixes).
- nfc: fix segfault in nfc_genl_dump_devices_done (git-fixes).
- nfsd: Fix nsfd startup race (again) (git-fixes).
- nft_set_pipapo: Fix bucket load in AVX2 lookup routine for six 8-bit groups (bsc#1176447).
- nvme-tcp: block BH in sk state_change sk callback (git-fixes).
- nvme-tcp: can't set sk_user_data without write_lock (git-fixes).
- nvme-tcp: check sgl supported by target (git-fixes).
- nvme-tcp: do not update queue count when failing to set io queues (git-fixes).
- nvme-tcp: fix a NULL deref when receiving a 0-length r2t PDU (git-fixes).
- nvme-tcp: fix crash triggered with a dataless request submission (git-fixes).
- nvme-tcp: fix error codes in nvme_tcp_setup_ctrl() (git-fixes).
- nvme-tcp: fix io_work priority inversion (git-fixes).
- nvme-tcp: fix possible data corruption with bio merges (git-fixes).
- nvme-tcp: fix possible req-&gt;offset corruption (git-fixes).
- nvme-tcp: fix wrong setting of request iov_iter (git-fixes).
- nvme-tcp: get rid of unused helper function (git-fixes).
- nvme-tcp: pair send_mutex init with destroy (git-fixes).
- nvme-tcp: pass multipage bvec to request iov_iter (git-fixes).
- nvme-tcp: remove incorrect Kconfig dep in BLK_DEV_NVME (git-fixes).
- pcmcia: fix setting of kthread task states (git-fixes).
- pcmcia: rsrc_nonstatic: Fix a NULL pointer dereference in __nonstatic_find_io_region() (git-fixes).
- pcmcia: rsrc_nonstatic: Fix a NULL pointer dereference in nonstatic_find_mem_region() (git-fixes).
- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).
- pinctrl: mediatek: fix global-out-of-bounds issue (git-fixes).
- pinctrl: qcom: spmi-gpio: correct parent irqspec translation (git-fixes).
- pinctrl: stm32: consider the GPIO offset to expose all the GPIO lines (git-fixes).
- pinctrl: stm32: use valid pin identifier in stm32_pinctrl_resume() (git-fixes).
- pipe: increase minimum default pipe size to 2 pages (bsc#1194587).
- platform/x86: apple-gmux: use resource_size() with res (git-fixes).
- platform/x86: thinkpad_acpi: Fix WWAN device disabled issue after S3 deep (git-fixes).
- power: reset: ltc2952: Fix use of floating point literals (git-fixes).
- power: supply: core: Break capacity loop (git-fixes).
- power: supply: max17042_battery: Clear status bits in interrupt handler (git-fixes).
- powerpc/64s: fix program check interrupt emergency stack path (bsc#1156395).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/perf: Fix PMU callbacks to clear pending PMI before resetting an overflown PMC (bsc#1156395).
- powerpc/perf: Fix data source encodings for L2.1 and L3.1 accesses (bsc#1065729).
- powerpc/prom_init: Fix improper check of prom_getprop() (bsc#1065729).
- powerpc/pseries/cpuhp: cache node corrections (bsc#1065729).
- powerpc/pseries/cpuhp: delete add/remove_by_count code (bsc#1065729).
- powerpc/pseries/mobility: ignore ibm, platform-facilities updates (bsc#1065729).
- powerpc/traps: do not enable irqs in _exception (bsc#1065729).
- powerpc/xive: Add missing null check after calling kmalloc (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).
- powerpc: add interrupt_cond_local_irq_enable helper (bsc#1065729).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- pwm: mxs: Do not modify HW state in .probe() after the PWM chip was registered (git-fixes).
- pwm: tiecap: Drop .free() callback (git-fixes).
- qlcnic: potential dereference null pointer of rx_queue-&gt;page_ring (git-fixes).
- quota: check block number when reading the block in quota file (bsc#1194589).
- quota: correct error number in free_dqentry() (bsc#1194590).
- random: fix data race on crng init time (git-fixes).
- random: fix data race on crng_node_pool (git-fixes).
- regmap: Call regmap_debugfs_exit() prior to _init() (git-fixes).
- rndis_host: support Hytera digital radios (git-fixes).
- rpmsg: core: Clean up resources on announce_create failure (git-fixes).
- rtl8xxxu: Fix the handling of TX A-MPDU aggregation (git-fixes).
- rtlwifi: rtl8192cu: Fix WARNING when calling local_irq_restore() with interrupts enabled (git-fixes).
- rtw88: use read_poll_timeout instead of fixed sleep (git-fixes).
- rtw88: wow: build wow function only if CONFIG_PM is on (git-fixes).
- rtw88: wow: fix size access error of probe request (git-fixes).
- sata: nv: fix debug format string mismatch (git-fixes).
- select: Fix indefinitely sleeping task in poll_schedule_timeout() (bsc#1194027).
- selftests: KVM: Explicitly use movq to read xmm registers (git-fixes).
- selinux: fix potential memleak in selinux_add_opt() (git-fixes).
- seq_buf: Fix overflow in seq_buf_putmem_hex() (git-fixes).
- seq_buf: Make trace_seq_putmem_hex() support data longer than 8 (git-fixes).
- serial: pl011: Add ACPI SBSA UART match id (git-fixes).
- serial: tty: uartlite: fix console setup (git-fixes).
- sfc: Check null pointer of rx_queue-&gt;page_ring (git-fixes).
- sfc: The RX page_ring is optional (git-fixes).
- sfc: falcon: Check null pointer of rx_queue-&gt;page_ring (git-fixes).
- sfc_ef100: potential dereference of null pointer (jsc#SLE-16683).
- shmem: shmem_writepage() split unlikely i915 THP (git-fixes).
- slimbus: qcom: fix potential NULL dereference in qcom_slim_prg_slew() (git-fixes).
- soc/tegra: fuse: Fix bitwise vs. logical OR warning (git-fixes).
- soc: fsl: dpaa2-console: free buffer before returning from dpaa2_console_read (git-fixes).
- soc: fsl: dpio: rename the enqueue descriptor variable (git-fixes).
- soc: fsl: dpio: replace smp_processor_id with raw_smp_processor_id (git-fixes).
- soc: fsl: dpio: use an explicit NULL instead of 0 (git-fixes).
- soc: fsl: dpio: use the combined functions to protect critical zone (git-fixes).
- spi: change clk_disable_unprepare to clk_unprepare (git-fixes).
- spi: spi-meson-spifc: Add missing pm_runtime_disable() in meson_spifc_probe (git-fixes).
- spi: spi-rspi: Drop redeclaring ret variable in qspi_transfer_in() (git-fixes).
- staging: emxx_udc: Fix passing of NULL to dma_alloc_coherent() (git-fixes).
- staging: fbtft: Do not spam logs when probe is deferred (git-fixes).
- staging: fbtft: Rectify GPIO handling (git-fixes).
- staging: fieldbus: anybuss: jump to correct label in an error path (git-fixes).
- staging: ks7010: select CRYPTO_HASH/CRYPTO_MICHAEL_MIC (git-fixes).
- staging: rtl8192e: return error code from rtllib_softmac_init() (git-fixes).
- staging: rtl8192e: rtllib_module: fix error handle case in alloc_rtllib() (git-fixes).
- staging: wlan-ng: Avoid bitwise vs logical OR warning in hfa384x_usb_throttlefn() (git-fixes).
- string.h: fix incompatibility between FORTIFY_SOURCE and KASAN (git-fixes).
- thermal/drivers/imx8mm: Enable ADC when enabling monitor (git-fixes).
- thermal/drivers/int340x: Do not set a wrong tcc offset on resume (git-fixes).
- thermal: core: Reset previous low and high trip during thermal zone init (git-fixes).
- tpm: add request_locality before write TPM_INT_ENABLE (git-fixes).
- tpm: fix potential NULL pointer access in tpm_del_char_device (git-fixes).
- tracing/kprobes: 'nmissed' not showed correctly for kretprobe (git-fixes).
- tracing/uprobes: Check the return value of kstrdup() for tu-&gt;filename (git-fixes).
- tracing: Add test for user space strings when filtering on string pointers (git-fixes).
- tracing: Fix check for trace_percpu_buffer validity in get_trace_buf() (git-fixes).
- tty: max310x: fix flexible_array.cocci warnings (git-fixes).
- tty: serial: atmel: Call dma_async_issue_pending() (git-fixes).
- tty: serial: atmel: Check return code of dmaengine_submit() (git-fixes).
- tty: serial: earlycon dependency (git-fixes).
- tty: serial: qcom_geni_serial: Drop __init from qcom_geni_console_setup (git-fixes).
- tty: serial: uartlite: allow 64 bit address (git-fixes).
- tty: synclink_gt: rename a conflicting function name (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- uio: uio_dmem_genirq: Catch the Exception (git-fixes).
- usb: core: config: fix validation of wMaxPacketValue entries (git-fixes).
- usb: core: config: using bit mask instead of individual bits (git-fixes).
- usb: dwc2: check return value after calling platform_get_resource() (git-fixes).
- usb: dwc3: gadget: Continue to process pending requests (git-fixes).
- usb: dwc3: gadget: Ignore EP queue requests during bus reset (git-fixes).
- usb: dwc3: gadget: Reclaim extra TRBs after request completion (git-fixes).
- usb: dwc3: pci: Enable dis_uX_susphy_quirk for Intel Merrifield (git-fixes).
- usb: dwc3: ulpi: Fix USB2.0 HS/FS/LS PHY suspend regression (git-fixes).
- usb: dwc3: ulpi: Replace CPU-based busyloop with Protocol-based one (git-fixes).
- usb: dwc3: ulpi: fix checkpatch warning (git-fixes).
- usb: ftdi-elan: fix memory leak on device disconnect (git-fixes).
- usb: gadget: composite: Allow bMaxPower=0 if self-powered (git-fixes).
- usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear (git-fixes).
- usb: gadget: u_ether: fix race in setting MAC address in setup phase (git-fixes).
- usb: mtu3: add memory barrier before set GPD's HWO (git-fixes).
- usb: mtu3: fix interval value for intr and isoc (git-fixes).
- usb: mtu3: fix list_head check warning (git-fixes).
- usb: mtu3: set interval of FS intr and isoc endpoint (git-fixes).
- usb: typec: tcpm: handle SRC_STARTUP state if cc changes (git-fixes).
- usb: xhci: Extend support for runtime power management for AMD's Yellow carp (git-fixes).
- usermodehelper: reset umask to default before executing user process (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- video: backlight: Drop maximum brightness override for brightness zero (git-fixes).
- watchdog: Fix OMAP watchdog early handling (git-fixes).
- watchdog: f71808e_wdt: fix inaccurate report in WDIOC_GETTIMEOUT (git-fixes).
- wcn36xx: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- wcn36xx: Indicate beacon not connection loss on MISSED_BEACON_IND (git-fixes).
- wcn36xx: Release DMA channel descriptor allocations (git-fixes).
- wcn36xx: handle connection loss indication (git-fixes).
- wireless: iwlwifi: Fix a double free in iwl_txq_dyn_alloc_dma (git-fixes).
- x86/platform/uv: Add more to secondary CPU kdump info (bsc#1194493).
- xhci: Fresco FL1100 controller should not have BROKEN_MSI quirk set (git-fixes).
- xhci: Remove CONFIG_USB_DEFAULT_PERSIST to prevent xHCI from runtime suspending (git-fixes).
- xhci: avoid race between disable slot command and host runtime suspend (git-fixes).
- xhci: fix unsafe memory usage in xhci tracing (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177437">SUSE bug 1177437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190256">SUSE bug 1190256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191929">SUSE bug 1191929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192931">SUSE bug 1192931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193328">SUSE bug 1193328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194027">SUSE bug 1194027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194493">SUSE bug 1194493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194518">SUSE bug 1194518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194578">SUSE bug 1194578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194580">SUSE bug 1194580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194584">SUSE bug 1194584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194586">SUSE bug 1194586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194587">SUSE bug 1194587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194589">SUSE bug 1194589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194590">SUSE bug 1194590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194591">SUSE bug 1194591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194592">SUSE bug 1194592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194953">SUSE bug 1194953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46283/">CVE-2021-46283</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664773" comment="cluster-md-kmp-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664774" comment="dlm-kmp-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664775" comment="gfs2-kmp-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664521" comment="kernel-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664522" comment="kernel-azure-devel-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664776" comment="kernel-azure-extra-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664777" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664778" comment="kernel-azure-optional-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664523" comment="kernel-devel-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664524" comment="kernel-source-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664525" comment="kernel-syms-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664779" comment="kselftests-kmp-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664780" comment="ocfs2-kmp-azure-5.3.18-150300.38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664781" comment="reiserfs-kmp-azure-5.3.18-150300.38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52679" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011051.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-44906: Fixed prototype pollution in npm dependency (bsc#1198247).
- CVE-2021-44907: Fixed insuficient sanitation in npm dependency (bsc#1197283).
- CVE-2022-0235: Fixed passing of cookie data and sensitive headers to different hostnames in node-fetch-npm (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682754" comment="nodejs8-8.17.0-150200.10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682755" comment="nodejs8-devel-8.17.0-150200.10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682756" comment="nodejs8-docs-8.17.0-150200.10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682757" comment="npm8-8.17.0-150200.10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52680" version="1" class="patch">
	<metadata>
		<title>Security update for rust1.55 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXNFO6HH5VY6DMGZN52EB2OJNJXKBC5H/" source="SUSE-SU"/>
		<description>
This update for rust1.55 fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664302" comment="cargo1.55-1.55.0-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664303" comment="rust1.55-1.55.0-150300.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52681" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="1194514" ref_url="https://bugzilla.suse.com/1194514" source="BUGZILLA"/>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011058.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
- CVE-2022-21824: Fixed prototype pollution via console.table (bsc#1194514).
- CVE-2021-44906: Fixed prototype pollution in npm dependency (bsc#1198247).
- CVE-2021-44907: Fixed insuficient sanitation in npm dependency (bsc#1197283).
- CVE-2022-0235: Fixed passing of cookie data and sensitive headers to different hostnames in node-fetch-npm (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194514">SUSE bug 1194514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683568" comment="nodejs10-10.24.1-150000.1.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683569" comment="nodejs10-devel-10.24.1-150000.1.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683551" comment="nodejs10-docs-10.24.1-150000.1.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683570" comment="npm10-10.24.1-150000.1.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52682" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1520" ref_url="https://www.suse.com/security/cve/CVE-2022-1520/" source="CVE"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29913" ref_url="https://www.suse.com/security/cve/CVE-2022-29913/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Various security fixes MFSA 2022-18 (bsc#1198970):

- CVE-2022-1520: Incorrect security status shown after viewing an attached email (bmo#1745019).
- CVE-2022-29914: Fullscreen notification bypass using popups (bmo#1746448).
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts (bmo#1755081).
- CVE-2022-29916: Leaking browser history with CSS variables (bmo#1760674).
- CVE-2022-29911: iframe sandbox bypass (bmo#1761981).
- CVE-2022-29912: Reader mode bypassed SameSite cookies (bmo#1692655).
- CVE-2022-29913: Speech Synthesis feature not properly disabled (bmo#1764778).
- CVE-2022-29917: Memory safety bugs fixed in Thunderbird 91.9 (bmo#1684739, bmo#1706441, bmo#1753298, bmo#1762614, bmo#1762620).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1520/">CVE-2022-1520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29913/">CVE-2022-29913</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683866" comment="MozillaThunderbird-91.9.0-150200.8.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683867" comment="MozillaThunderbird-translations-common-91.9.0-150200.8.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683868" comment="MozillaThunderbird-translations-other-91.9.0-150200.8.68.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52683" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011083.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683476" comment="ucode-intel-20220510-150200.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52684" version="1" class="patch">
	<metadata>
		<title>Security update for libslirp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1198773" ref_url="https://bugzilla.suse.com/1198773" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<description>
This update for libslirp fixes the following issues:

- CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364).
- CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366).
- Fix a dhcp regression [bsc#1198773]
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198773">SUSE bug 1198773</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683545" comment="libslirp-devel-4.3.1-150300.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683546" comment="libslirp0-4.3.1-150300.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52685" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684013" comment="MozillaFirefox-91.9.0-150200.152.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684142" comment="MozillaFirefox-branding-upstream-91.9.0-150200.152.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684143" comment="MozillaFirefox-devel-91.9.0-150200.152.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684015" comment="MozillaFirefox-translations-common-91.9.0-150200.152.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684016" comment="MozillaFirefox-translations-other-91.9.0-150200.152.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52686" version="1" class="patch">
	<metadata>
		<title>Security update for rust1.57 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7LMNDFMX4WXDPLRBNT2EQKB2QXZZVISA/" source="SUSE-SU"/>
		<description>
This update for rust1.57 fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664304" comment="cargo1.57-1.57.0-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664305" comment="rust1.57-1.57.0-150300.7.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52687" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011098.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
- CVE-2022-29824: Fixed integer overflow that could have led to an out-of-bounds write in buf.c (xmlBuf*) and tree.c (xmlBuffer*) (bsc#1199132).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683445" comment="libxml2-2-2.9.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683446" comment="libxml2-2-32bit-2.9.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683447" comment="libxml2-devel-2.9.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683853" comment="libxml2-devel-32bit-2.9.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683854" comment="libxml2-doc-2.9.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683448" comment="libxml2-tools-2.9.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683542" comment="python2-libxml2-python-2.9.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683449" comment="python3-libxml2-python-2.9.7-150000.3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52688" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1076963" ref_url="https://bugzilla.suse.com/1076963" source="BUGZILLA"/>
		<reference ref_id="1112009" ref_url="https://bugzilla.suse.com/1112009" source="BUGZILLA"/>
		<reference ref_id="1112033" ref_url="https://bugzilla.suse.com/1112033" source="BUGZILLA"/>
		<reference ref_id="1179191" ref_url="https://bugzilla.suse.com/1179191" source="BUGZILLA"/>
		<reference ref_id="1185382" ref_url="https://bugzilla.suse.com/1185382" source="BUGZILLA"/>
		<reference ref_id="1185383" ref_url="https://bugzilla.suse.com/1185383" source="BUGZILLA"/>
		<reference ref_id="1185384" ref_url="https://bugzilla.suse.com/1185384" source="BUGZILLA"/>
		<reference ref_id="1185385" ref_url="https://bugzilla.suse.com/1185385" source="BUGZILLA"/>
		<reference ref_id="1185386" ref_url="https://bugzilla.suse.com/1185386" source="BUGZILLA"/>
		<reference ref_id="1185387" ref_url="https://bugzilla.suse.com/1185387" source="BUGZILLA"/>
		<reference ref_id="1185388" ref_url="https://bugzilla.suse.com/1185388" source="BUGZILLA"/>
		<reference ref_id="1185389" ref_url="https://bugzilla.suse.com/1185389" source="BUGZILLA"/>
		<reference ref_id="1185390" ref_url="https://bugzilla.suse.com/1185390" source="BUGZILLA"/>
		<reference ref_id="1185391" ref_url="https://bugzilla.suse.com/1185391" source="BUGZILLA"/>
		<reference ref_id="1185392" ref_url="https://bugzilla.suse.com/1185392" source="BUGZILLA"/>
		<reference ref_id="1185393" ref_url="https://bugzilla.suse.com/1185393" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25031" ref_url="https://www.suse.com/security/cve/CVE-2019-25031/" source="CVE"/>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTS3PI42CZC7TVKVUTBOIMO2PDFTABYC/" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076963">SUSE bug 1076963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112009">SUSE bug 1112009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112033">SUSE bug 1112033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185382">SUSE bug 1185382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185383">SUSE bug 1185383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185384">SUSE bug 1185384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185385">SUSE bug 1185385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185386">SUSE bug 1185386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185387">SUSE bug 1185387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185388">SUSE bug 1185388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185389">SUSE bug 1185389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185390">SUSE bug 1185390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185391">SUSE bug 1185391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185392">SUSE bug 1185392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185393">SUSE bug 1185393</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25031/">CVE-2019-25031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664287" comment="libunbound2-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664373" comment="unbound-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664288" comment="unbound-anchor-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664289" comment="unbound-devel-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664374" comment="unbound-munin-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664375" comment="unbound-python-1.6.8-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52689" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197147" ref_url="https://bugzilla.suse.com/1197147" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011112.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).

Bugfixes:

- Use png_get_eXIf_1 when available (bsc#1197147).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197147">SUSE bug 1197147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684005" comment="ImageMagick-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684006" comment="ImageMagick-config-7-SUSE-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684007" comment="ImageMagick-config-7-upstream-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684008" comment="ImageMagick-devel-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684135" comment="ImageMagick-devel-32bit-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684136" comment="ImageMagick-doc-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684137" comment="ImageMagick-extra-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684009" comment="libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684138" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684010" comment="libMagick++-devel-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684139" comment="libMagick++-devel-32bit-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684011" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684140" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684012" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684141" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684017" comment="perl-PerlMagick-7.0.7.34-150200.10.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52690" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197644" ref_url="https://bugzilla.suse.com/1197644" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011115.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- Fixed filter_var bypass vulnerability (bsc#1197644).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1197644">SUSE bug 1197644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682956" comment="apache2-mod_php7-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682957" comment="php7-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682958" comment="php7-bcmath-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682959" comment="php7-bz2-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682960" comment="php7-calendar-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682961" comment="php7-ctype-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682962" comment="php7-curl-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682963" comment="php7-dba-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682964" comment="php7-devel-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682965" comment="php7-dom-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682928" comment="php7-embed-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682966" comment="php7-enchant-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682967" comment="php7-exif-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682968" comment="php7-fastcgi-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682969" comment="php7-fileinfo-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683370" comment="php7-firebird-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682970" comment="php7-fpm-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682971" comment="php7-ftp-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682972" comment="php7-gd-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682973" comment="php7-gettext-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682974" comment="php7-gmp-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682975" comment="php7-iconv-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682976" comment="php7-intl-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682977" comment="php7-json-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682978" comment="php7-ldap-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682979" comment="php7-mbstring-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682980" comment="php7-mysql-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682981" comment="php7-odbc-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682982" comment="php7-opcache-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682983" comment="php7-openssl-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682984" comment="php7-pcntl-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682985" comment="php7-pdo-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682986" comment="php7-pgsql-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682987" comment="php7-phar-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682988" comment="php7-posix-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682989" comment="php7-readline-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682990" comment="php7-shmop-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682991" comment="php7-snmp-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682992" comment="php7-soap-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682993" comment="php7-sockets-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682994" comment="php7-sodium-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682995" comment="php7-sqlite-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682996" comment="php7-sysvmsg-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682997" comment="php7-sysvsem-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682998" comment="php7-sysvshm-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683371" comment="php7-test-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682999" comment="php7-tidy-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683000" comment="php7-tokenizer-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683001" comment="php7-xmlreader-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683002" comment="php7-xmlrpc-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683003" comment="php7-xmlwriter-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683004" comment="php7-xsl-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683005" comment="php7-zip-7.4.6-150200.3.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683006" comment="php7-zlib-7.4.6-150200.3.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52691" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181361" ref_url="https://bugzilla.suse.com/1181361" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20196" ref_url="https://www.suse.com/security/cve/CVE-2021-20196/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XYIZAS6LJG7AX5XUIXPP347424BX5VK/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-20196: Fixed null pointer dereference that may lead to guest crash (bsc#1181361).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181361">SUSE bug 1181361</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20196/">CVE-2021-20196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663895" comment="qemu-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664031" comment="qemu-arm-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664032" comment="qemu-audio-alsa-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664033" comment="qemu-audio-pa-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664034" comment="qemu-audio-spice-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663900" comment="qemu-block-curl-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664035" comment="qemu-block-dmg-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664036" comment="qemu-block-gluster-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663901" comment="qemu-block-iscsi-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664037" comment="qemu-block-nfs-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663902" comment="qemu-block-rbd-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663903" comment="qemu-block-ssh-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663904" comment="qemu-chardev-baum-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664038" comment="qemu-chardev-spice-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664039" comment="qemu-extra-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663906" comment="qemu-guest-agent-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664040" comment="qemu-hw-display-qxl-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664041" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664042" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664043" comment="qemu-hw-display-virtio-vga-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664044" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664045" comment="qemu-hw-usb-redirect-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664046" comment="qemu-hw-usb-smartcard-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663913" comment="qemu-ipxe-1.0.0+-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664047" comment="qemu-ivshmem-tools-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663914" comment="qemu-ksm-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663915" comment="qemu-kvm-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663916" comment="qemu-lang-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664048" comment="qemu-linux-user-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664049" comment="qemu-microvm-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664050" comment="qemu-ppc-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664051" comment="qemu-s390x-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663919" comment="qemu-seabios-1.14.0_0_g155821a-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663920" comment="qemu-sgabios-8-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663921" comment="qemu-skiboot-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664052" comment="qemu-testsuite-5.2.0-150300.109.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663845" comment="qemu-tools-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663922" comment="qemu-ui-curses-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664053" comment="qemu-ui-gtk-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664054" comment="qemu-ui-opengl-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664055" comment="qemu-ui-spice-app-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664056" comment="qemu-ui-spice-core-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663927" comment="qemu-vgabios-1.14.0_0_g155821a-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664057" comment="qemu-vhost-user-gpu-5.2.0-150300.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664058" comment="qemu-x86-5.2.0-150300.109.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52692" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664152" comment="expat-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664153" comment="libexpat-devel-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664264" comment="libexpat-devel-32bit-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664154" comment="libexpat1-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664063" comment="libexpat1-32bit-2.2.5-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52693" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197634" ref_url="https://bugzilla.suse.com/1197634" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26280" ref_url="https://www.suse.com/security/cve/CVE-2022-26280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011132.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2022-26280: Fixed out-of-bounds read via the component zipx_lzma_alone_init (bsc#1197634).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-23"/>
	<updated date="2022-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197634">SUSE bug 1197634</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26280/">CVE-2022-26280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683483" comment="bsdtar-3.4.2-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683474" comment="libarchive-devel-3.4.2-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683475" comment="libarchive13-3.4.2-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683865" comment="libarchive13-32bit-3.4.2-150200.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52694" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664283" comment="libjavascriptcoregtk-4_0-18-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664369" comment="libjavascriptcoregtk-4_0-18-32bit-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664284" comment="libwebkit2gtk-4_0-37-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664370" comment="libwebkit2gtk-4_0-37-32bit-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664285" comment="libwebkit2gtk3-lang-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664296" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664297" comment="typelib-1_0-WebKit2-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664298" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664371" comment="webkit-jsc-4-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664286" comment="webkit2gtk-4_0-injected-bundles-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664299" comment="webkit2gtk3-devel-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664372" comment="webkit2gtk3-minibrowser-2.34.3-23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52695" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1199413" ref_url="https://bugzilla.suse.com/1199413" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011146.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

- CVE-2022-29526: Fixed faccessat() system call operation that checked the wrong group (bsc#1199413).

- go1.18.2 (released 2022-05-10) (bsc#1193742).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199413">SUSE bug 1199413</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684415" comment="go1.18-1.18.2-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684416" comment="go1.18-doc-1.18.2-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684417" comment="go1.18-race-1.18.2-150000.1.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52696" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011145.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684375" comment="MozillaFirefox-91.9.1-150200.152.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695050" comment="MozillaFirefox-branding-upstream-91.9.1-150200.152.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009693677" comment="MozillaFirefox-devel-91.9.1-150200.152.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684377" comment="MozillaFirefox-translations-common-91.9.1-150200.152.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684378" comment="MozillaFirefox-translations-other-91.9.1-150200.152.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52697" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_20_11 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199278" ref_url="https://bugzilla.suse.com/1199278" source="BUGZILLA"/>
		<reference ref_id="1199279" ref_url="https://bugzilla.suse.com/1199279" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011144.html" source="SUSE-SU"/>
		<description>
This update for slurm_20_11 fixes the following issues:

- CVE-2022-29500: Fixed architectural flaw that could have been exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).
- CVE-2022-29501: Fixed a problem that an unprivileged user could have sent data to arbitrary unix socket as root (bsc#1199279).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-24"/>
	<updated date="2022-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199278">SUSE bug 1199278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199279">SUSE bug 1199279</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683398" comment="libnss_slurm2_20_11-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683399" comment="libpmi0_20_11-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683400" comment="perl-slurm_20_11-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683401" comment="slurm_20_11-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683402" comment="slurm_20_11-auth-none-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683403" comment="slurm_20_11-config-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683404" comment="slurm_20_11-config-man-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683405" comment="slurm_20_11-cray-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683406" comment="slurm_20_11-devel-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683407" comment="slurm_20_11-doc-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683408" comment="slurm_20_11-hdf5-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683409" comment="slurm_20_11-lua-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683410" comment="slurm_20_11-munge-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683411" comment="slurm_20_11-node-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683412" comment="slurm_20_11-openlava-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683413" comment="slurm_20_11-pam_slurm-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683414" comment="slurm_20_11-plugins-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683415" comment="slurm_20_11-rest-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683416" comment="slurm_20_11-seff-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683417" comment="slurm_20_11-sjstat-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683418" comment="slurm_20_11-slurmdbd-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683419" comment="slurm_20_11-sql-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683420" comment="slurm_20_11-sview-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683421" comment="slurm_20_11-torque-20.11.9-150200.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683422" comment="slurm_20_11-webdoc-20.11.9-150200.6.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52698" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LS5Y2M6XDX2JOBPPLIMAXXAXRPAU65ND/" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write. (bsc#1171479)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664148" comment="libjson-c-devel-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664259" comment="libjson-c-doc-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664149" comment="libjson-c3-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664150" comment="libjson-c3-32bit-0.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52699" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199459" ref_url="https://bugzilla.suse.com/1199459" source="BUGZILLA"/>
		<reference ref_id="1199470" ref_url="https://bugzilla.suse.com/1199470" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26312" ref_url="https://www.suse.com/security/cve/CVE-2021-26312/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26342" ref_url="https://www.suse.com/security/cve/CVE-2021-26342/" source="CVE"/>
		<reference ref_id="CVE-2021-26347" ref_url="https://www.suse.com/security/cve/CVE-2021-26347/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26349" ref_url="https://www.suse.com/security/cve/CVE-2021-26349/" source="CVE"/>
		<reference ref_id="CVE-2021-26350" ref_url="https://www.suse.com/security/cve/CVE-2021-26350/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26372" ref_url="https://www.suse.com/security/cve/CVE-2021-26372/" source="CVE"/>
		<reference ref_id="CVE-2021-26373" ref_url="https://www.suse.com/security/cve/CVE-2021-26373/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-26376" ref_url="https://www.suse.com/security/cve/CVE-2021-26376/" source="CVE"/>
		<reference ref_id="CVE-2021-26378" ref_url="https://www.suse.com/security/cve/CVE-2021-26378/" source="CVE"/>
		<reference ref_id="CVE-2021-26388" ref_url="https://www.suse.com/security/cve/CVE-2021-26388/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

Update AMD ucode and SEV firmware
- (CVE-2021-26339, CVE-2021-26373, CVE-2021-26347, CVE-2021-26376,
  CVE-2021-26375, CVE-2021-26378, CVE-2021-26372, CVE-2021-26339,
  CVE-2021-26348, CVE-2021-26342, CVE-2021-26388, CVE-2021-26349,
  CVE-2021-26364, CVE-2021-26312, CVE-2021-26350, CVE-2021-46744,
  bsc#1199459, bsc#1199470)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199459">SUSE bug 1199459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199470">SUSE bug 1199470</bugzilla>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26312/">CVE-2021-26312</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-26342/">CVE-2021-26342</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26347/">CVE-2021-26347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-26349/">CVE-2021-26349</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26350/">CVE-2021-26350</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26372/">CVE-2021-26372</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26373/">CVE-2021-26373</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26376/">CVE-2021-26376</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26378/">CVE-2021-26378</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26388/">CVE-2021-26388</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684002" comment="kernel-firmware-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684144" comment="kernel-firmware-all-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684145" comment="kernel-firmware-amdgpu-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684146" comment="kernel-firmware-ath10k-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684147" comment="kernel-firmware-ath11k-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684148" comment="kernel-firmware-atheros-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684149" comment="kernel-firmware-bluetooth-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684150" comment="kernel-firmware-bnx2-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684003" comment="kernel-firmware-brcm-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684151" comment="kernel-firmware-chelsio-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684152" comment="kernel-firmware-dpaa2-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684153" comment="kernel-firmware-i915-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684154" comment="kernel-firmware-intel-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684155" comment="kernel-firmware-iwlwifi-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684156" comment="kernel-firmware-liquidio-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684157" comment="kernel-firmware-marvell-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684158" comment="kernel-firmware-media-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684159" comment="kernel-firmware-mediatek-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684160" comment="kernel-firmware-mellanox-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684161" comment="kernel-firmware-mwifiex-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684162" comment="kernel-firmware-network-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684163" comment="kernel-firmware-nfp-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684164" comment="kernel-firmware-nvidia-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684165" comment="kernel-firmware-platform-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684166" comment="kernel-firmware-prestera-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684167" comment="kernel-firmware-qlogic-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684168" comment="kernel-firmware-radeon-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684169" comment="kernel-firmware-realtek-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684170" comment="kernel-firmware-serial-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684171" comment="kernel-firmware-sound-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684172" comment="kernel-firmware-ti-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684173" comment="kernel-firmware-ueagle-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684174" comment="kernel-firmware-usb-network-20210208-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684004" comment="ucode-amd-20210208-150300.4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52700" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198952" ref_url="https://bugzilla.suse.com/1198952" source="BUGZILLA"/>
		<reference ref_id="1198953" ref_url="https://bugzilla.suse.com/1198953" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24735" ref_url="https://www.suse.com/security/cve/CVE-2022-24735/" source="CVE"/>
		<reference ref_id="CVE-2022-24736" ref_url="https://www.suse.com/security/cve/CVE-2022-24736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011158.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

- CVE-2022-24735: Fixed Lua code injection (bsc#1198952).
- CVE-2022-24736: Fixed Lua NULL pointer dereference (bsc#1198953).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198952">SUSE bug 1198952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198953">SUSE bug 1198953</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24735/">CVE-2022-24735</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24736/">CVE-2022-24736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683544" comment="redis-6.0.14-150200.6.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52701" version="1" class="patch">
	<metadata>
		<title>Security update for fribidi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196147" ref_url="https://bugzilla.suse.com/1196147" source="BUGZILLA"/>
		<reference ref_id="1196148" ref_url="https://bugzilla.suse.com/1196148" source="BUGZILLA"/>
		<reference ref_id="1196150" ref_url="https://bugzilla.suse.com/1196150" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308/" source="CVE"/>
		<reference ref_id="CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309/" source="CVE"/>
		<reference ref_id="CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011159.html" source="SUSE-SU"/>
		<description>
This update for fribidi fixes the following issues:

- CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147).
- CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode (bsc#1196148).
- CVE-2022-25310: Fixed NULL pointer dereference in fribidi_remove_bidi_marks (bsc#1196150).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-25"/>
	<updated date="2022-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196147">SUSE bug 1196147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196148">SUSE bug 1196148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196150">SUSE bug 1196150</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684246" comment="fribidi-1.0.5-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684247" comment="fribidi-devel-1.0.5-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684248" comment="libfribidi0-1.0.5-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684379" comment="libfribidi0-32bit-1.0.5-150200.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52702" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199474" ref_url="https://bugzilla.suse.com/1199474" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26691" ref_url="https://www.suse.com/security/cve/CVE-2022-26691/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011166.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2022-26691: Fixed an authentication bypass and code execution vulnerability (bsc#1199474)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199474">SUSE bug 1199474</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26691/">CVE-2022-26691</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684249" comment="cups-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684250" comment="cups-client-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684251" comment="cups-config-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684418" comment="cups-ddk-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684252" comment="cups-devel-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695051" comment="cups-devel-32bit-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684253" comment="libcups2-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684254" comment="libcups2-32bit-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684255" comment="libcupscgi1-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695052" comment="libcupscgi1-32bit-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684256" comment="libcupsimage2-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695053" comment="libcupsimage2-32bit-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684257" comment="libcupsmime1-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695054" comment="libcupsmime1-32bit-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684258" comment="libcupsppdc1-2.2.7-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695055" comment="libcupsppdc1-32bit-2.2.7-150000.3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52703" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1199413" ref_url="https://bugzilla.suse.com/1199413" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011167.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-29526: Fixed faccessat() system call operation that checked the wrong group (bsc#1199413).

- go1.17.10 (released 2022-05-10) (bsc#1190649).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-26"/>
	<updated date="2022-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199413">SUSE bug 1199413</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695056" comment="go1.17-1.17.10-150000.1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695057" comment="go1.17-doc-1.17.10-150000.1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684421" comment="go1.17-race-1.17.10-150000.1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52704" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011171.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-27"/>
	<updated date="2022-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684259" comment="curl-7.66.0-150200.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684260" comment="libcurl-devel-7.66.0-150200.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695058" comment="libcurl-devel-32bit-7.66.0-150200.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684261" comment="libcurl4-7.66.0-150200.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684262" comment="libcurl4-32bit-7.66.0-150200.4.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52705" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195964" ref_url="https://bugzilla.suse.com/1195964" source="BUGZILLA"/>
		<reference ref_id="1195965" ref_url="https://bugzilla.suse.com/1195965" source="BUGZILLA"/>
		<reference ref_id="1197066" ref_url="https://bugzilla.suse.com/1197066" source="BUGZILLA"/>
		<reference ref_id="1197068" ref_url="https://bugzilla.suse.com/1197068" source="BUGZILLA"/>
		<reference ref_id="1197072" ref_url="https://bugzilla.suse.com/1197072" source="BUGZILLA"/>
		<reference ref_id="1197073" ref_url="https://bugzilla.suse.com/1197073" source="BUGZILLA"/>
		<reference ref_id="1197074" ref_url="https://bugzilla.suse.com/1197074" source="BUGZILLA"/>
		<reference ref_id="1197631" ref_url="https://bugzilla.suse.com/1197631" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562/" source="CVE"/>
		<reference ref_id="CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865/" source="CVE"/>
		<reference ref_id="CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891/" source="CVE"/>
		<reference ref_id="CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908/" source="CVE"/>
		<reference ref_id="CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<reference ref_id="CVE-2022-1056" ref_url="https://www.suse.com/security/cve/CVE-2022-1056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-0561: Fixed null source pointer passed as an argument to memcpy() within TIFFFetchStripThing() in tif_dirread.c (bsc#1195964).
- CVE-2022-0562: Fixed null source pointer passed as an argument to memcpy() within TIFFReadDirectory() in tif_dirread.c (bsc#1195965).
- CVE-2022-0865: Fixed assertion failure in TIFFReadAndRealloc (bsc#1197066).
- CVE-2022-0909: Fixed divide by zero error in tiffcrop that could have led to a denial-of-service via a crafted tiff file (bsc#1197072).
- CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have led to a denial-of-service via a crafted tiff file (bsc#1197073).
- CVE-2022-0908: Fixed null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() (bsc#1197074).
- CVE-2022-1056: Fixed out-of-bounds read error in tiffcrop that could have led to a denial-of-service via a crafted tiff file (bsc#1197631).
- CVE-2022-0891: Fixed heap buffer overflow in extractImageSection (bsc#1197068).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-30"/>
	<updated date="2022-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195964">SUSE bug 1195964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195965">SUSE bug 1195965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197066">SUSE bug 1197066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197068">SUSE bug 1197068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197072">SUSE bug 1197072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197073">SUSE bug 1197073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197074">SUSE bug 1197074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197631">SUSE bug 1197631</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1056/">CVE-2022-1056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684263" comment="libtiff-devel-4.0.9-150000.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695059" comment="libtiff-devel-32bit-4.0.9-150000.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684264" comment="libtiff5-4.0.9-150000.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684380" comment="libtiff5-32bit-4.0.9-150000.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684616" comment="tiff-4.0.9-150000.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52706" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011183.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property matching issue in JIT compiled regular expressions (bsc#1199232).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-30"/>
	<updated date="2022-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684265" comment="libpcre2-16-0-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695060" comment="libpcre2-16-0-32bit-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684266" comment="libpcre2-32-0-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695061" comment="libpcre2-32-0-32bit-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684267" comment="libpcre2-8-0-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695062" comment="libpcre2-8-0-32bit-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684268" comment="libpcre2-posix2-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695063" comment="libpcre2-posix2-32bit-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684269" comment="pcre2-devel-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695064" comment="pcre2-devel-static-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695065" comment="pcre2-doc-10.31-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695066" comment="pcre2-tools-10.31-150000.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52707" version="1" class="patch">
	<metadata>
		<title>Security update for helm-mirror (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1156646" ref_url="https://bugzilla.suse.com/1156646" source="BUGZILLA"/>
		<reference ref_id="1197728" ref_url="https://bugzilla.suse.com/1197728" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18658" ref_url="https://www.suse.com/security/cve/CVE-2019-18658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011203.html" source="SUSE-SU"/>
		<description>
This update for helm-mirror fixes the following issues:

- Updated to version 0.3.1:
  - CVE-2019-18658: Fixed a potential symbolic link issue in helm that could be
    used to leak sensitive files (bsc#1156646).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156646">SUSE bug 1156646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197728">SUSE bug 1197728</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18658/">CVE-2019-18658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681372" comment="helm-mirror-0.3.1-150000.1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52708" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011202.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684535" comment="postgresql10-10.21-150100.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684536" comment="postgresql10-contrib-10.21-150100.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009692663" comment="postgresql10-docs-10.21-150100.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684538" comment="postgresql10-plperl-10.21-150100.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684539" comment="postgresql10-plpython-10.21-150100.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684540" comment="postgresql10-pltcl-10.21-150100.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684541" comment="postgresql10-server-10.21-150100.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695067" comment="postgresql10-test-10.21-150100.8.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52709" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195172" ref_url="https://bugzilla.suse.com/1195172" source="BUGZILLA"/>
		<reference ref_id="1198873" ref_url="https://bugzilla.suse.com/1198873" source="BUGZILLA"/>
		<reference ref_id="1198963" ref_url="https://bugzilla.suse.com/1198963" source="BUGZILLA"/>
		<reference ref_id="1198964" ref_url="https://bugzilla.suse.com/1198964" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3839" ref_url="https://www.suse.com/security/cve/CVE-2021-3839/" source="CVE"/>
		<reference ref_id="CVE-2022-0669" ref_url="https://www.suse.com/security/cve/CVE-2022-0669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011208.html" source="SUSE-SU"/>
		<description>
This update for dpdk fixes the following issues:

Security:
- CVE-2021-3839: Fixed a memory corruption issue during vhost-user communication
  (bsc#1198963).
- CVE-2022-0669: Fixed a denial of service that could be triggered by a vhost-user
  master (bsc#1198964).

Bugfixes:
- kni: allow configuring thread granularity (bsc#1195172).
- Fixed reading of PCI device name as UTF strings (bsc#1198873).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195172">SUSE bug 1195172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198873">SUSE bug 1198873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198963">SUSE bug 1198963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198964">SUSE bug 1198964</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3839/">CVE-2021-3839</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0669/">CVE-2022-0669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684743" comment="dpdk-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684744" comment="dpdk-devel-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695068" comment="dpdk-doc-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695069" comment="dpdk-examples-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684745" comment="dpdk-kmp-default-19.11.4_k5.3.18_150300.59.63-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695070" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_150300.59.63-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684746" comment="dpdk-thunderx-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684747" comment="dpdk-thunderx-devel-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695071" comment="dpdk-thunderx-doc-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695072" comment="dpdk-thunderx-examples-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684748" comment="dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.63-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695073" comment="dpdk-thunderx-kmp-preempt-19.11.4_k5.3.18_150300.59.63-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695074" comment="dpdk-thunderx-tools-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684749" comment="dpdk-tools-19.11.4-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684750" comment="libdpdk-20_0-19.11.4-150300.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52710" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011207.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684542" comment="postgresql12-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684543" comment="postgresql12-contrib-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684544" comment="postgresql12-devel-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684545" comment="postgresql12-docs-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684617" comment="postgresql12-llvmjit-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684546" comment="postgresql12-plperl-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684547" comment="postgresql12-plpython-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684548" comment="postgresql12-pltcl-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684549" comment="postgresql12-server-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684550" comment="postgresql12-server-devel-12.11-150200.8.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684618" comment="postgresql12-test-12.11-150200.8.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52711" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011209.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-31"/>
	<updated date="2022-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684270" comment="postgresql13-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684751" comment="postgresql13-contrib-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684752" comment="postgresql13-devel-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684753" comment="postgresql13-docs-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684619" comment="postgresql13-llvmjit-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684754" comment="postgresql13-plperl-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684755" comment="postgresql13-plpython-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684756" comment="postgresql13-pltcl-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684757" comment="postgresql13-server-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684758" comment="postgresql13-server-devel-13.7-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684620" comment="postgresql13-test-13.7-150200.5.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52712" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGEROI6PUOTOXKFIH2MPKUQ3PI6VWLXQ/" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664492" comment="libpolkit0-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664782" comment="libpolkit0-32bit-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664493" comment="polkit-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664494" comment="polkit-devel-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664783" comment="polkit-doc-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664495" comment="typelib-1_0-Polkit-1_0-0.116-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52713" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZ5E6BLKCNZQZF3KYEYUXNMPDMMNYFCM/" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-01"/>
	<updated date="2022-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684759" comment="libecpg6-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695075" comment="libecpg6-32bit-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684271" comment="libpq5-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009692835" comment="libpq5-32bit-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684272" comment="postgresql14-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684760" comment="postgresql14-contrib-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684761" comment="postgresql14-devel-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695076" comment="postgresql14-devel-mini-14.3-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684762" comment="postgresql14-docs-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684621" comment="postgresql14-llvmjit-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684763" comment="postgresql14-plperl-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684764" comment="postgresql14-plpython-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684765" comment="postgresql14-pltcl-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684766" comment="postgresql14-server-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684767" comment="postgresql14-server-devel-14.3-150200.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695077" comment="postgresql14-test-14.3-150200.5.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52714" version="1" class="patch">
	<metadata>
		<title>Security update for hdf5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1093657" ref_url="https://bugzilla.suse.com/1093657" source="BUGZILLA"/>
		<reference ref_id="1101471" ref_url="https://bugzilla.suse.com/1101471" source="BUGZILLA"/>
		<reference ref_id="1101474" ref_url="https://bugzilla.suse.com/1101474" source="BUGZILLA"/>
		<reference ref_id="1102175" ref_url="https://bugzilla.suse.com/1102175" source="BUGZILLA"/>
		<reference ref_id="1109167" ref_url="https://bugzilla.suse.com/1109167" source="BUGZILLA"/>
		<reference ref_id="1109168" ref_url="https://bugzilla.suse.com/1109168" source="BUGZILLA"/>
		<reference ref_id="1109564" ref_url="https://bugzilla.suse.com/1109564" source="BUGZILLA"/>
		<reference ref_id="1109565" ref_url="https://bugzilla.suse.com/1109565" source="BUGZILLA"/>
		<reference ref_id="1109566" ref_url="https://bugzilla.suse.com/1109566" source="BUGZILLA"/>
		<reference ref_id="1109568" ref_url="https://bugzilla.suse.com/1109568" source="BUGZILLA"/>
		<reference ref_id="1109569" ref_url="https://bugzilla.suse.com/1109569" source="BUGZILLA"/>
		<reference ref_id="1109570" ref_url="https://bugzilla.suse.com/1109570" source="BUGZILLA"/>
		<reference ref_id="1167401" ref_url="https://bugzilla.suse.com/1167401" source="BUGZILLA"/>
		<reference ref_id="1167404" ref_url="https://bugzilla.suse.com/1167404" source="BUGZILLA"/>
		<reference ref_id="1167405" ref_url="https://bugzilla.suse.com/1167405" source="BUGZILLA"/>
		<reference ref_id="1179521" ref_url="https://bugzilla.suse.com/1179521" source="BUGZILLA"/>
		<reference ref_id="1196682" ref_url="https://bugzilla.suse.com/1196682" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11206" ref_url="https://www.suse.com/security/cve/CVE-2018-11206/" source="CVE"/>
		<reference ref_id="CVE-2018-14032" ref_url="https://www.suse.com/security/cve/CVE-2018-14032/" source="CVE"/>
		<reference ref_id="CVE-2018-14033" ref_url="https://www.suse.com/security/cve/CVE-2018-14033/" source="CVE"/>
		<reference ref_id="CVE-2018-14460" ref_url="https://www.suse.com/security/cve/CVE-2018-14460/" source="CVE"/>
		<reference ref_id="CVE-2018-17234" ref_url="https://www.suse.com/security/cve/CVE-2018-17234/" source="CVE"/>
		<reference ref_id="CVE-2018-17237" ref_url="https://www.suse.com/security/cve/CVE-2018-17237/" source="CVE"/>
		<reference ref_id="CVE-2018-17432" ref_url="https://www.suse.com/security/cve/CVE-2018-17432/" source="CVE"/>
		<reference ref_id="CVE-2018-17433" ref_url="https://www.suse.com/security/cve/CVE-2018-17433/" source="CVE"/>
		<reference ref_id="CVE-2018-17434" ref_url="https://www.suse.com/security/cve/CVE-2018-17434/" source="CVE"/>
		<reference ref_id="CVE-2018-17436" ref_url="https://www.suse.com/security/cve/CVE-2018-17436/" source="CVE"/>
		<reference ref_id="CVE-2018-17437" ref_url="https://www.suse.com/security/cve/CVE-2018-17437/" source="CVE"/>
		<reference ref_id="CVE-2018-17438" ref_url="https://www.suse.com/security/cve/CVE-2018-17438/" source="CVE"/>
		<reference ref_id="CVE-2020-10809" ref_url="https://www.suse.com/security/cve/CVE-2020-10809/" source="CVE"/>
		<reference ref_id="CVE-2020-10810" ref_url="https://www.suse.com/security/cve/CVE-2020-10810/" source="CVE"/>
		<reference ref_id="CVE-2020-10811" ref_url="https://www.suse.com/security/cve/CVE-2020-10811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011219.html" source="SUSE-SU"/>
		<description>
This update for hdf5 fixes the following issues:

Security issues fixed:

- CVE-2020-10811: Fixed heap-based buffer over-read in the function H5O__layout_decode() located in H5Olayout.c (bsc#1167405).
- CVE-2020-10810: Fixed NULL pointer dereference in the function H5AC_unpin_entry() located in H5AC.c (bsc#1167401).
- CVE-2020-10809: Fixed heap-based buffer overflow in the function Decompress() located in decompress.c (bsc#1167404).
- CVE-2018-17438: Fixed SIGFPE signal raise in the function H5D__select_io() of H5Dselect.c (bsc#1109570).
- CVE-2018-17437: Fixed memory leak in the H5O_dtype_decode_helper() function in H5Odtype.c. (bsc#1109569).
- CVE-2018-17436: Fixed issue in ReadCode() in decompress.c that allowed attackers to cause a denial of service via a crafted HDF5 file (bsc#1109568).
- CVE-2018-17434: Fixed SIGFPE signal raise in function apply_filters() of h5repack_filters.c (bsc#1109566).
- CVE-2018-17433: Fixed heap-based buffer overflow in ReadGifImageDesc() in gifread.c (bsc#1109565).
- CVE-2018-17432: Fixed NULL pointer dereference in H5O_sdspace_encode() in H5Osdspace.c (bsc#1109564).
- CVE-2018-17237: Fixed SIGFPE signal raise in the function H5D__chunk_set_info_real() (bsc#1109168).
- CVE-2018-17234: Fixed memory leak in the H5O__chunk_deserialize() function in H5Ocache.c (bsc#1109167).
- CVE-2018-14460: Fixed heap-based buffer over-read in the function H5O_sdspace_decode in H5Osdspace.c (bsc#1102175).
- CVE-2018-14033: Fixed heap-based buffer over-read in the function H5O_layout_decode in H5Olayout.c (bsc#1101471).
- CVE-2018-14032: Fixed heap-based buffer over-read in the function H5O_fill_new_decode in H5Ofill.c (bsc#1101474).
- CVE-2018-11206: Fixed out of bounds read in H5O_fill_new_decode and H5O_fill_old_decode in H5Ofill.c (bsc#1093657).

Bugfixes:

- Fix python-h5py packages built against out-of-date version of HDF5 (bsc#1196682).
- Fix netcdf-cxx4 packages built against out-of-date version of HDF5 (bsc#1179521).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-08"/>
	<updated date="2022-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1093657">SUSE bug 1093657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101471">SUSE bug 1101471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101474">SUSE bug 1101474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102175">SUSE bug 1102175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109167">SUSE bug 1109167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109168">SUSE bug 1109168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109564">SUSE bug 1109564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109565">SUSE bug 1109565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109566">SUSE bug 1109566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109568">SUSE bug 1109568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109569">SUSE bug 1109569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109570">SUSE bug 1109570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167401">SUSE bug 1167401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167404">SUSE bug 1167404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167405">SUSE bug 1167405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179521">SUSE bug 1179521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196682">SUSE bug 1196682</bugzilla>
	<cve impact="low" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11206/">CVE-2018-11206</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14032/">CVE-2018-14032</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14033/">CVE-2018-14033</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14460/">CVE-2018-14460</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17234/">CVE-2018-17234</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17237/">CVE-2018-17237</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17432/">CVE-2018-17432</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17433/">CVE-2018-17433</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17434/">CVE-2018-17434</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17436/">CVE-2018-17436</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17437/">CVE-2018-17437</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17438/">CVE-2018-17438</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10809/">CVE-2020-10809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10810/">CVE-2020-10810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10811/">CVE-2020-10811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684443" comment="hdf5-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684444" comment="hdf5-gnu-hpc-devel-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684445" comment="hdf5-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684446" comment="hdf5-gnu-mpich-hpc-devel-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684447" comment="hdf5-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684448" comment="hdf5-gnu-mvapich2-hpc-devel-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684449" comment="hdf5-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684450" comment="hdf5-gnu-openmpi3-hpc-devel-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684451" comment="hdf5-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684452" comment="hdf5-gnu-openmpi4-hpc-devel-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684453" comment="hdf5-hpc-examples-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695078" comment="hdf5_1_10_8-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695079" comment="hdf5_1_10_8-gnu-hpc-devel-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695080" comment="hdf5_1_10_8-gnu-hpc-devel-static-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695081" comment="hdf5_1_10_8-gnu-hpc-module-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695082" comment="hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695083" comment="hdf5_1_10_8-gnu-mpich-hpc-devel-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695084" comment="hdf5_1_10_8-gnu-mpich-hpc-devel-static-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695085" comment="hdf5_1_10_8-gnu-mpich-hpc-module-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695086" comment="hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695087" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695088" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel-static-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695089" comment="hdf5_1_10_8-gnu-mvapich2-hpc-module-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695090" comment="hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695091" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695092" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel-static-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695093" comment="hdf5_1_10_8-gnu-openmpi3-hpc-module-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695094" comment="hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695095" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695096" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel-static-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695097" comment="hdf5_1_10_8-gnu-openmpi4-hpc-module-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695098" comment="hdf5_1_10_8-hpc-examples-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695099" comment="libhdf5-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695100" comment="libhdf5-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695101" comment="libhdf5-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695102" comment="libhdf5-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695103" comment="libhdf5-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695104" comment="libhdf5_1_10_8-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695105" comment="libhdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695106" comment="libhdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695107" comment="libhdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695108" comment="libhdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695109" comment="libhdf5_cpp-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695110" comment="libhdf5_cpp-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695111" comment="libhdf5_cpp-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695112" comment="libhdf5_cpp-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695113" comment="libhdf5_cpp-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695114" comment="libhdf5_cpp_1_10_8-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695115" comment="libhdf5_cpp_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695116" comment="libhdf5_cpp_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695117" comment="libhdf5_cpp_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695118" comment="libhdf5_cpp_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695119" comment="libhdf5_fortran-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695120" comment="libhdf5_fortran-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695121" comment="libhdf5_fortran-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695122" comment="libhdf5_fortran-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695123" comment="libhdf5_fortran-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695124" comment="libhdf5_fortran_1_10_8-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695125" comment="libhdf5_fortran_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695126" comment="libhdf5_fortran_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695127" comment="libhdf5_fortran_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695128" comment="libhdf5_fortran_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695129" comment="libhdf5_hl-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695130" comment="libhdf5_hl-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695131" comment="libhdf5_hl-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695132" comment="libhdf5_hl-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695133" comment="libhdf5_hl-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695134" comment="libhdf5_hl_1_10_8-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695135" comment="libhdf5_hl_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695136" comment="libhdf5_hl_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695137" comment="libhdf5_hl_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695138" comment="libhdf5_hl_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695139" comment="libhdf5_hl_cpp-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695140" comment="libhdf5_hl_cpp-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695141" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695142" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695143" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695144" comment="libhdf5_hl_cpp_1_10_8-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695145" comment="libhdf5_hl_cpp_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695146" comment="libhdf5_hl_cpp_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695147" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695148" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695149" comment="libhdf5_hl_fortran-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695150" comment="libhdf5_hl_fortran-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695151" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695152" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695153" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695154" comment="libhdf5hl_fortran_1_10_8-gnu-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695155" comment="libhdf5hl_fortran_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695156" comment="libhdf5hl_fortran_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695157" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695158" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52715" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)

- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684381" comment="MozillaFirefox-91.10.0-150200.152.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695159" comment="MozillaFirefox-branding-upstream-91.10.0-150200.152.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009693678" comment="MozillaFirefox-devel-91.10.0-150200.152.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684383" comment="MozillaFirefox-translations-common-91.10.0-150200.152.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684384" comment="MozillaFirefox-translations-other-91.10.0-150200.152.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52716" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1080985" ref_url="https://bugzilla.suse.com/1080985" source="BUGZILLA"/>
		<reference ref_id="1111572" ref_url="https://bugzilla.suse.com/1111572" source="BUGZILLA"/>
		<reference ref_id="1142041" ref_url="https://bugzilla.suse.com/1142041" source="BUGZILLA"/>
		<reference ref_id="1198106" ref_url="https://bugzilla.suse.com/1198106" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6952" ref_url="https://www.suse.com/security/cve/CVE-2018-6952/" source="CVE"/>
		<reference ref_id="CVE-2019-13636" ref_url="https://www.suse.com/security/cve/CVE-2019-13636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011225.html" source="SUSE-SU"/>
		<description>
This update for patch fixes the following issues:

Security issues fixed:

- CVE-2019-13636: Fixed follow symlinks unless --follow-symlinks is given. This increases the security against malicious patches (bsc#1142041).
- CVE-2018-6952: Fixed swapping fakelines in pch_swap. This bug was causing a double free leading to a crash (bsc#1080985).

Bugfixes:

- Abort when cleaning up fails. This bug could cause an infinite loop when a patch wouldn't apply, leading to a segmentation fault (bsc#1111572).
- Pass the correct stat to backup files. This bug would occasionally cause backup files to be missing when all hunks failed to apply (bsc#1198106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-02"/>
	<updated date="2022-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080985">SUSE bug 1080985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111572">SUSE bug 1111572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142041">SUSE bug 1142041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198106">SUSE bug 1198106</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6952/">CVE-2018-6952</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13636/">CVE-2019-13636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684273" comment="patch-2.7.6-150000.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52717" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1177437" ref_url="https://bugzilla.suse.com/1177437" source="BUGZILLA"/>
		<reference ref_id="1190256" ref_url="https://bugzilla.suse.com/1190256" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191929" ref_url="https://bugzilla.suse.com/1191929" source="BUGZILLA"/>
		<reference ref_id="1192931" ref_url="https://bugzilla.suse.com/1192931" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193328" ref_url="https://bugzilla.suse.com/1193328" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194027" ref_url="https://bugzilla.suse.com/1194027" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194266" ref_url="https://bugzilla.suse.com/1194266" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194493" ref_url="https://bugzilla.suse.com/1194493" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194518" ref_url="https://bugzilla.suse.com/1194518" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194578" ref_url="https://bugzilla.suse.com/1194578" source="BUGZILLA"/>
		<reference ref_id="1194580" ref_url="https://bugzilla.suse.com/1194580" source="BUGZILLA"/>
		<reference ref_id="1194584" ref_url="https://bugzilla.suse.com/1194584" source="BUGZILLA"/>
		<reference ref_id="1194586" ref_url="https://bugzilla.suse.com/1194586" source="BUGZILLA"/>
		<reference ref_id="1194587" ref_url="https://bugzilla.suse.com/1194587" source="BUGZILLA"/>
		<reference ref_id="1194589" ref_url="https://bugzilla.suse.com/1194589" source="BUGZILLA"/>
		<reference ref_id="1194590" ref_url="https://bugzilla.suse.com/1194590" source="BUGZILLA"/>
		<reference ref_id="1194591" ref_url="https://bugzilla.suse.com/1194591" source="BUGZILLA"/>
		<reference ref_id="1194592" ref_url="https://bugzilla.suse.com/1194592" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194953" ref_url="https://bugzilla.suse.com/1194953" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2021-46283" ref_url="https://www.suse.com/security/cve/CVE-2021-46283/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-46283: nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and general protection fault) because of the missing initialization for nft_set_elem_expr_alloc. A local user can set a netfilter table expression in their own namespace (bnc#1194518).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4 (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: In the IPv6 implementation in net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: In the IPv4 implementation in net/ipv4/route.c has an information leak because the hash table is very small (bnc#1194087).

The following non-security bugs were fixed:

- ACPI: APD: Check for NULL pointer after calling devm_ioremap() (git-fixes).
- ACPI: Add stubs for wakeup handler functions (git-fixes).
- ACPI: scan: Create platform device for BCM4752 and LNV4752 ACPI nodes (git-fixes).
- ALSA: PCM: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ALSA: ctl: Fix copy of updated id with element read/write (git-fixes).
- ALSA: drivers: opl3: Fix incorrect use of vp-&gt;state (git-fixes).
- ALSA: hda/hdmi: Disable silent stream on GLK (git-fixes).
- ALSA: hda/realtek - Add headset Mic support for Lenovo ALC897 platform (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for ASRock NUC Box 1100 (git-fixes).
- ALSA: hda/realtek: Amp init fixup for HP ZBook 15 G6 (git-fixes).
- ALSA: hda/realtek: Fix quirk for Clevo NJ51CU (git-fixes).
- ALSA: hda/realtek: Fix quirk for TongFang PHxTxX1 (git-fixes).
- ALSA: hda/realtek: Fixes HP Spectre x360 15-eb1xxx speakers (git-fixes).
- ALSA: hda/realtek: Headset fixup for Clevo NH77HJQ (git-fixes).
- ALSA: hda: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ALSA: hda: Make proper use of timecounter (git-fixes).
- ALSA: jack: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ALSA: jack: Check the return value of kstrdup() (git-fixes).
- ALSA: oss: fix compile error when OSS_DEBUG is enabled (git-fixes).
- ALSA: pcm: oss: Fix negative period/buffer sizes (git-fixes).
- ALSA: pcm: oss: Handle missing errors in snd_pcm_oss_change_params*() (git-fixes).
- ALSA: pcm: oss: Limit the period size to 16MB (git-fixes).
- ALSA: usb-audio: Drop superfluous '0' in Presonus Studio 1810c's ID (git-fixes).
- ALSA: usb-audio: Line6 HX-Stomp XL USB_ID for 48k-fixed quirk (git-fixes).
- ASoC: codecs: wcd934x: handle channel mappping list correctly (git-fixes).
- ASoC: codecs: wcd934x: return correct value from mixer put (git-fixes).
- ASoC: codecs: wcd934x: return error code correctly from hw_params (git-fixes).
- ASoC: codecs: wsa881x: fix return values from kcontrol put (git-fixes).
- ASoC: cs42l42: Correct configuring of switch inversion from ts-inv (git-fixes).
- ASoC: cs42l42: Disable regulators if probe fails (git-fixes).
- ASoC: cs42l42: Use device_property API instead of of_property (git-fixes).
- ASoC: fsl_asrc: refine the check of available clock divider (git-fixes).
- ASoC: fsl_mqs: fix MODULE_ALIAS (git-fixes).
- ASoC: mediatek: Check for error clk pointer (git-fixes).
- ASoC: meson: aiu: Move AIU_I2S_MISC hold setting to aiu-fifo-i2s (git-fixes).
- ASoC: meson: aiu: fifo: Add missing dma_coerce_mask_and_coherent() (git-fixes).
- ASoC: qdsp6: q6routing: Fix return value from msm_routing_put_audio_mixer (git-fixes).
- ASoC: rt5663: Handle device_property_read_u32_array error codes (git-fixes).
- ASoC: samsung: idma: Check of ioremap return value (git-fixes).
- ASoC: soc-core: fix null-ptr-deref in snd_soc_del_component_unlocked() (git-fixes).
- ASoC: sunxi: fix a sound binding broken reference (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in ADMAIF (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in AHUB (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in DMIC (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in DSPK (git-fixes).
- ASoC: tegra: Fix kcontrol put callback in I2S (git-fixes).
- ASoC: tegra: Fix wrong value type in ADMAIF (git-fixes).
- ASoC: tegra: Fix wrong value type in DMIC (git-fixes).
- ASoC: tegra: Fix wrong value type in DSPK (git-fixes).
- ASoC: tegra: Fix wrong value type in I2S (git-fixes).
- ASoC: uniphier: drop selecting non-existing SND_SOC_UNIPHIER_AIO_DMA (git-fixes).
- Add cherry-picked IDs for qemu fw_cfg patches
- Bluetooth: L2CAP: Fix using wrong mode (git-fixes).
- Bluetooth: bfusb: fix division by zero in send path (git-fixes).
- Bluetooth: btmtksdio: fix resume failure (git-fixes).
- Bluetooth: btusb: fix memory leak in btusb_mtk_submit_wmt_recv_urb() (git-fixes).
- Bluetooth: cmtp: fix possible panic when cmtp_init_sockets() fails (git-fixes).
- Bluetooth: hci_bcm: Check for error irq (git-fixes).
- Bluetooth: hci_qca: Stop IBS timer during BT OFF (git-fixes).
- Bluetooth: stop proccessing malicious adv data (git-fixes).
- Documentation: ACPI: Fix data node reference documentation (git-fixes).
- Documentation: dmaengine: Correctly describe dmatest with channel unset (git-fixes).
- Documentation: refer to config RANDOMIZE_BASE for kernel address-space randomization (git-fixes).
- HID: add USB_HID dependancy to hid-chicony (git-fixes).
- HID: add USB_HID dependancy to hid-prodikeys (git-fixes).
- HID: asus: Add depends on USB_HID to HID_ASUS Kconfig option (git-fixes).
- HID: bigbenff: prevent null pointer dereference (git-fixes).
- HID: google: add eel USB id (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_frame_init_v1_buttonpad (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_get_str_desc (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_huion_init (git-fixes).
- HID: hid-uclogic-params: Invalid parameter check in uclogic_params_init (git-fixes).
- HID: quirks: Add quirk for the Microsoft Surface 3 type-cover (git-fixes).
- Input: appletouch - initialize work before device registration (git-fixes).
- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).
- Input: elantech - fix stack out of bound access in elantech_change_report_id() (git-fixes).
- Input: i8042 - add deferred probe support (bsc#1190256).
- Input: i8042 - enable deferred probe quirk for ASUS UM325UA (bsc#1190256).
- Input: max8925_onkey - do not mark comment as kernel-doc (git-fixes).
- Input: spaceball - fix parsing of movement data packets (git-fixes).
- Input: ti_am335x_tsc - fix STEPCONFIG setup for Z2 (git-fixes).
- Input: ti_am335x_tsc - set ADCREFM for X configuration (git-fixes).
- Move upstreamed patches into sorted section
- NFC: st21nfca: Fix memory leak in device probe and remove (git-fixes).
- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- PCI/ACPI: Fix acpi_pci_osc_control_set() kernel-doc comment (git-fixes).
- PCI/MSI: Clear PCI_MSIX_FLAGS_MASKALL on error (git-fixes).
- PCI/MSI: Fix pci_irq_vector()/pci_irq_get_affinity() (git-fixes).
- PCI/MSI: Mask MSI-X vectors only on success (git-fixes).
- PCI: cadence: Add cdns_plat_pcie_probe() missing return (git-fixes).
- PCI: dwc: Do not remap invalid res (git-fixes).
- PCI: mvebu: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI: mvebu: Do not modify PCI IO type bits in conf_write (git-fixes).
- PCI: mvebu: Fix support for DEVCAP2, DEVCTL2 and LNKCTL2 registers on emulated bridge (git-fixes).
- PCI: mvebu: Fix support for PCI_EXP_DEVCTL on emulated bridge (git-fixes).
- PCI: mvebu: Fix support for PCI_EXP_RTSTA on emulated bridge (git-fixes).
- PCI: pci-bridge-emul: Properly mark reserved PCIe bits in PCI config space (git-fixes).
- PCI: pci-bridge-emul: Set PCI_STATUS_CAP_LIST for PCIe device (git-fixes).
- PCI: pciehp: Fix infinite loop in IRQ handler upon power fault (git-fixes).
- PCI: xgene: Fix IB window setup (git-fixes).
- PM: runtime: Defer suspending suppliers (git-fixes).
- PM: sleep: Do not assume that 'mem' is always present (git-fixes).
- RDMA/hns: Replace kfree() with kvfree() (jsc#SLE-14777).
- Revert 'PM: sleep: Do not assume that 'mem' is always present' (git-fixes).
- Revert 'USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set' (git-fixes).
- Revert 'net/mlx5: Add retry mechanism to the command entry index allocation' (jsc#SLE-15172).
- USB: Fix 'slab-out-of-bounds Write' bug in usb_hcd_poll_rh_status (git-fixes).
- USB: NO_LPM quirk Lenovo Powered USB-C Travel Hub (git-fixes).
- USB: NO_LPM quirk Lenovo USB-C to Ethernet Adapher(RTL8153-04) (git-fixes).
- USB: cdc-acm: fix break reporting (git-fixes).
- USB: cdc-acm: fix racy tty buffer accesses (git-fixes).
- USB: chipidea: fix interrupt deadlock (git-fixes).
- USB: core: Fix bug in resuming hub's handling of wakeup requests (git-fixes).
- USB: gadget: bRequestType is a bitfield, not a enum (git-fixes).
- USB: gadget: detect too-big endpoint 0 requests (git-fixes).
- USB: gadget: zero allocate endpoint 0 buffers (git-fixes).
- USB: serial: cp210x: fix CP2105 GPIO registration (git-fixes).
- USB: serial: option: add Telit FN990 compositions (git-fixes).
- Update patches.suse/tpm-fix-potential-NULL-pointer-access-in-tpm_del_cha.patch (git-fixes bsc#1193660 ltc#195634).
- Updated mpi3mr entry in supported.conf (bsc#1194578 jsc#SLE-18120) Moving this driver into the 'supported' package.
- amd/display: downgrade validation failure log level (git-fixes).
- ata: ahci: Add Green Sardine vendor ID as board_ahci_mobile (git-fixes).
- atlantic: Fix buff_ring OOB in aq_ring_rx_clean (git-fixes).
- ax25: NPD bug when detaching AX25 device (git-fixes).
- backlight: qcom-wled: Fix off-by-one maximum with default num_strings (git-fixes).
- backlight: qcom-wled: Override default length with qcom,enabled-strings (git-fixes).
- backlight: qcom-wled: Pass number of elements to read to read_u32_array (git-fixes).
- backlight: qcom-wled: Validate enabled string indices in DT (git-fixes).
- batman-adv: mcast: do not send link-local multicast to mcast routers (git-fixes).
- blk-cgroup: synchronize blkg creation against policy deactivation (bsc#1194584).
- block/scsi-ioctl: Fix kernel-infoleak in scsi_put_cdrom_generic_arg() (git-fixes).
- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).
- can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data (git-fixes).
- can: gs_usb: gs_can_start_xmit(): zero-initialize hf-&gt;{flags,reserved} (git-fixes).
- can: kvaser_usb: get CAN clock frequency from device (git-fixes).
- can: sja1000: fix use after free in ems_pcmcia_add_card() (git-fixes).
- can: softing: softing_startstop(): fix set but not used variable warning (git-fixes).
- can: softing_cs: softingcs_probe(): fix memleak on registration failure (git-fixes).
- can: usb_8dev: remove unused member echo_skb from struct usb_8dev_priv (git-fixes).
- can: xilinx_can: xcan_probe(): check for error irq (git-fixes).
- char/mwave: Adjust io port register size (git-fixes).
- clk: Do not parent clks until the parent is fully registered (git-fixes).
- clk: Gemini: fix struct name in kernel-doc (git-fixes).
- clk: bcm-2835: Pick the closest clock rate (git-fixes).
- clk: bcm-2835: Remove rounding up the dividers (git-fixes).
- clk: imx8mn: Fix imx8mn_clko1_sels (git-fixes).
- clk: imx: pllv1: fix kernel-doc notation for struct clk_pllv1 (git-fixes).
- clk: qcom: gcc-msm8996: Drop (again) gcc_aggre1_pnoc_ahb_clk (git-fixes).
- clk: qcom: regmap-mux: fix parent clock lookup (git-fixes).
- clk: stm32: Fix ltdc's clock turn off by clk_disable_unused() after system enter shell (git-fixes).
- crypto: caam - replace this_cpu_ptr with raw_cpu_ptr (git-fixes).
- crypto: mxs-dcp - Use sg_mapping_iter to copy data (git-fixes).
- crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop() (git-fixes).
- crypto: qat - do not ignore errors from enable_vf2pf_comms() (git-fixes).
- crypto: qat - fix reuse of completion variable (git-fixes).
- crypto: qat - handle both source of interrupt in VF ISR (git-fixes).
- crypto: qce - fix uaf on qce_ahash_register_one (git-fixes).
- crypto: stm32/crc32 - Fix kernel BUG triggered in probe() (git-fixes).
- crypto: stm32/cryp - fix double pm exit (git-fixes).
- crypto: stm32/cryp - fix lrw chaining mode (git-fixes).
- crypto: stm32/cryp - fix xts and race condition in crypto_engine requests (git-fixes).
- debugfs: lockdown: Allow reading debugfs files that are not world readable (bsc#1193328 ltc#195566).
- device property: Fix documentation for FWNODE_GRAPH_DEVICE_DISABLED (git-fixes).
- dm crypt: document encrypted keyring key option (git-fixes).
- dm writecache: add 'cleaner' and 'max_age' to Documentation (git-fixes).
- dm writecache: advance the number of arguments when reporting max_age (git-fixes).
- dm writecache: fix performance degradation in ssd mode (git-fixes).
- dm writecache: flush origin device when writing and cache is full (git-fixes).
- dma_fence_array: Fix PENDING_ERROR leak in dma_fence_array_signaled() (git-fixes).
- dmaengine: at_xdmac: Do not start transactions at tx_submit level (git-fixes).
- dmaengine: at_xdmac: Fix at_xdmac_lld struct definition (git-fixes).
- dmaengine: at_xdmac: Fix concurrency over xfers_list (git-fixes).
- dmaengine: at_xdmac: Fix lld view setting (git-fixes).
- dmaengine: at_xdmac: Print debug message after realeasing the lock (git-fixes).
- dmaengine: bestcomm: fix system boot lockups (git-fixes).
- dmaengine: idxd: add module parameter to force disable of SVA (bsc#1192931).
- dmaengine: idxd: enable SVA feature for IOMMU (bsc#1192931).
- dmaengine: pxa/mmp: stop referencing config-&gt;slave_id (git-fixes).
- dmaengine: st_fdma: fix MODULE_ALIAS (git-fixes).
- drm/amd/amdgpu: Increase HWIP_MAX_INSTANCE to 10 (git-fixes).
- drm/amd/display: Fix for the no Audio bug with Tiled Displays (git-fixes).
- drm/amd/display: Update bounding box states (v2) (git-fixes).
- drm/amd/display: Update number of DCN3 clock states (git-fixes).
- drm/amd/display: add connector type check for CRC source set (git-fixes).
- drm/amd/display: dcn20_resource_construct reduce scope of FPU enabled (git-fixes).
- drm/amd/display: fix incorrect CM/TF programming sequence in dwb (git-fixes).
- drm/amd/display: fix missing writeback disablement if plane is removed (git-fixes).
- drm/amdgpu: Fix a NULL pointer dereference in amdgpu_connector_lcd_native_mode() (git-fixes).
- drm/amdgpu: Fix a printing message (git-fixes).
- drm/amdgpu: Fix amdgpu_ras_eeprom_init() (git-fixes).
- drm/amdgpu: correct register access for RLC_JUMP_TABLE_RESTORE (git-fixes).
- drm/amdgpu: revert 'Add autodump debugfs node for gpu reset v8' (git-fixes).
- drm/amdkfd: Account for SH/SE count when setting up cu masks (git-fixes).
- drm/amdkfd: Check for null pointer after calling kmemdup (git-fixes).
- drm/ast: potential dereference of null pointer (git-fixes).
- drm/atomic: Check new_crtc_state-&gt;active to determine if CRTC needs disable in self refresh mode (git-fixes).
- drm/bridge: analogix_dp: Make PSR-exit block less (git-fixes).
- drm/bridge: display-connector: fix an uninitialized pointer in probe() (git-fixes).
- drm/bridge: nwl-dsi: Avoid potential multiplication overflow on 32-bit (git-fixes).
- drm/bridge: ti-sn65dsi86: Set max register for regmap (git-fixes).
- drm/display: fix possible null-pointer dereference in dcn10_set_clock() (git-fixes).
- drm/exynos: Always initialize mapping in exynos_drm_register_dma() (git-fixes).
- drm/i915/fb: Fix rounding error in subsampled plane size calculation (git-fixes).
- drm/i915: Avoid bitwise vs logical OR warning in snb_wm_latency_quirk() (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm/dpu: fix safe status debugfs file (git-fixes).
- drm/msm/dsi: Fix DSI and DSI PHY regulator config from SDM660 (git-fixes).
- drm/msm/dsi: set default num_data_lanes (git-fixes).
- drm/msm/mdp5: fix cursor-related warnings (git-fixes).
- drm/msm: mdp4: drop vblank get/put from prepare/complete_commit (git-fixes).
- drm/msm: prevent NULL dereference in msm_gpu_crashstate_capture() (git-fixes).
- drm/panel: innolux-p079zca: Delete panel on attach() failure (git-fixes).
- drm/panel: kingdisplay-kd097d04: Delete panel on attach() failure (git-fixes).
- drm/radeon/radeon_kms: Fix a NULL pointer dereference in radeon_driver_open_kms() (git-fixes).
- drm/rockchip: dsi: Disable PLL clock on bind error (git-fixes).
- drm/rockchip: dsi: Fix unbalanced clock on probe error (git-fixes).
- drm/rockchip: dsi: Hold pm-runtime across bind/unbind (git-fixes).
- drm/rockchip: dsi: Reconfigure hardware on resume() (git-fixes).
- drm/sun4i: dw-hdmi: Fix missing put_device() call in sun8i_hdmi_phy_get (git-fixes).
- drm/sun4i: fix unmet dependency on RESET_CONTROLLER for PHY_SUN6I_MIPI_DPHY (git-fixes).
- drm/syncobj: Deal with signalled fences in drm_syncobj_find_fence (git-fixes).
- drm/tegra: vic: Fix DMA API misuse (git-fixes).
- drm/vboxvideo: fix a NULL vs IS_ERR() check (git-fixes).
- drm/vc4: hdmi: Make sure the controller is powered up during bind (git-fixes).
- drm/vc4: hdmi: Set HD_CTL_WHOLSMP and HD_CTL_CHALIGN_SET (git-fixes).
- drm/vc4: hdmi: Set a default HSM rate (git-fixes).
- drm: fix null-ptr-deref in drm_dev_init_release() (git-fixes).
- drm: xlnx: zynqmp: release reset to DP controller before accessing DP registers (git-fixes).
- drm: xlnx: zynqmp_dpsub: Call pm_runtime_get_sync before setting pixel clock (git-fixes).
- eeprom: idt_89hpesx: Put fwnode in matching case during -&gt;probe() (git-fixes).
- eeprom: idt_89hpesx: Restore printing the unsupported fwnode name (git-fixes).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- ext4: fix lazy initialization next schedule time computation in more granular unit (bsc#1194580).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- firmware: Update Kconfig help text for Google firmware (git-fixes).
- firmware: arm_scmi: pm: Propagate return value to caller (git-fixes).
- firmware: arm_scpi: Fix string overflow in SCPI genpd driver (git-fixes).
- firmware: qcom_scm: Fix error retval in __qcom_scm_is_call_available() (git-fixes).
- firmware: qemu_fw_cfg: fix NULL-pointer deref on duplicate entries (git-fixes).
- firmware: qemu_fw_cfg: fix kobject leak in probe error path (git-fixes).
- firmware: qemu_fw_cfg: fix sysfs information leak (git-fixes).
- firmware: raspberrypi: Fix a leak in 'rpi_firmware_get()' (git-fixes).
- firmware: smccc: Fix check for ARCH_SOC_ID not implemented (git-fixes).
- firmware: tegra: Fix error application of sizeof() to pointer (git-fixes).
- firmware: tegra: Reduce stack usage (git-fixes).
- firmware_loader: fix pre-allocated buf built-in firmware use (git-fixes).
- floppy: Fix hang in watchdog when disk is ejected (git-fixes).
- flow_offload: return EOPNOTSUPP for the unsupported mpls action type (bsc#1154353).
- fuse: Pass correct lend value to filemap_write_and_wait_range() (bsc#1194953).
- gpiolib: acpi: Make set-debounce-timeout failures non fatal (git-fixes).
- gpu: host1x: Add back arm_iommu_detach_device() (git-fixes).
- hwmon: (lm90) Add basic support for TI TMP461 (git-fixes).
- hwmon: (lm90) Add max6654 support to lm90 driver (git-fixes).
- hwmon: (lm90) Do not report 'busy' status bit as alarm (git-fixes).
- hwmon: (lm90) Drop critical attribute support for MAX6654 (git-fixes).
- hwmon: (lm90) Fix usage of CONFIG2 register in detect function (git-fixes).
- hwmon: (lm90) Introduce flag indicating extended temperature support (git-fixes).
- i2c: rk3x: Handle a spurious start completion interrupt flag (git-fixes).
- i2c: validate user data in compat ioctl (git-fixes).
- i3c: fix incorrect address slot lookup on 64-bit (git-fixes).
- i3c: master: dw: check return of dw_i3c_master_get_free_pos() (git-fixes).
- i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (git-fixes).
- i40e: Fix for displaying message regarding NVM version (git-fixes).
- i40e: Fix incorrect netdev's real number of RX/TX queues (git-fixes).
- i40e: Fix to not show opcode msg on unsuccessful VF MAC change (git-fixes).
- i40e: fix use-after-free in i40e_sync_filters_subtask() (git-fixes).
- iavf: Fix limit of total number of queues to active queues of VF (git-fixes).
- iavf: restore MSI state on reset (git-fixes).
- ieee802154: atusb: fix uninit value in atusb_set_extended_addr (git-fixes).
- ieee802154: fix error return code in ieee802154_llsec_getparams() (git-fixes).
- ieee802154: fix error return code in ieee802154_add_iface() (git-fixes).
- ieee802154: hwsim: Fix memory leak in hwsim_add_one (git-fixes).
- ieee802154: hwsim: Fix possible memory leak in hwsim_subscribe_all_others (git-fixes).
- ieee802154: hwsim: avoid possible crash in hwsim_del_edge_nl() (git-fixes).
- ieee802154: hwsim: fix GPF in hwsim_set_edge_lqi (git-fixes).
- igb: Fix removal of unicast MAC filters of VFs (git-fixes).
- igbvf: fix double free in `igbvf_probe` (git-fixes).
- igc: Fix typo in i225 LTR functions (jsc#SLE-13533).
- iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove (git-fixes).
- iio: ad7768-1: Call iio_trigger_notify_done() on error (git-fixes).
- iio: adc: axp20x_adc: fix charging current reporting on AXP22x (git-fixes).
- iio: at91-sama5d2: Fix incorrect sign extension (git-fixes).
- iio: dln2-adc: Fix lockdep complaint (git-fixes).
- iio: dln2: Check return value of devm_iio_trigger_register() (git-fixes).
- iio: itg3200: Call iio_trigger_notify_done() on error (git-fixes).
- iio: kxsd9: Do not return error code in trigger handler (git-fixes).
- iio: ltr501: Do not return error code in trigger handler (git-fixes).
- iio: mma8452: Fix trigger reference couting (git-fixes).
- iio: stk3310: Do not return error code in interrupt handler (git-fixes).
- iio: trigger: Fix reference counting (git-fixes).
- iio: trigger: stm32-timer: fix MODULE_ALIAS (git-fixes).
- ionic: Initialize the 'lif-&gt;dbid_inuse' bitmap (bsc#1167773).
- isofs: Fix out of bound access for corrupted isofs image (bsc#1194591).
- iwlwifi: fw: correctly limit to monitor dump (git-fixes).
- iwlwifi: mvm: Fix scan channel flags settings (git-fixes).
- iwlwifi: mvm: Use div_s64 instead of do_div in iwl_mvm_ftm_rtt_smoothing() (git-fixes).
- iwlwifi: mvm: avoid static queue number aliasing (git-fixes).
- iwlwifi: mvm: disable RX-diversity in powersave (git-fixes).
- iwlwifi: mvm: fix 32-bit build in FTM (git-fixes).
- iwlwifi: mvm: fix access to BSS elements (git-fixes).
- iwlwifi: mvm: test roc running status bits before removing the sta (git-fixes).
- iwlwifi: pcie: free RBs during configure (git-fixes).
- ixgbe: set X550 MDIO speed before talking to PHY (git-fixes).
- kmod: make request_module() return an error when autoloading is disabled (git-fixes).
- kobject: Restore old behaviour of kobject_del(NULL) (git-fixes).
- kobject_uevent: remove warning in init_uevent_argv() (git-fixes).
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- libata: add horkage for ASMedia 1092 (git-fixes).
- libata: if T_LENGTH is zero, dma direction should be DMA_NONE (git-fixes).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lockdown: Allow unprivileged users to see lockdown status (git-fixes).
- mISDN: change function names to avoid conflicts (git-fixes).
- mac80211: Fix monitor MTU limit so that A-MSDUs get through (git-fixes).
- mac80211: agg-tx: do not schedule_and_wake_txq() under sta-&gt;lock (git-fixes).
- mac80211: do not access the IV when it was stripped (git-fixes).
- mac80211: fix lookup when adding AddBA extension element (git-fixes).
- mac80211: fix regression in SSN handling of addba tx (git-fixes).
- mac80211: initialize variable have_higher_than_11mbit (git-fixes).
- mac80211: mark TX-during-stop for TX in in_reconfig (git-fixes).
- mac80211: send ADDBA requests using the tid/queue of the aggregation session (git-fixes).
- mac80211: track only QoS data frames for admission control (git-fixes).
- mac80211: validate extended element ID is present (git-fixes).
- mailbox: hi3660: convert struct comments to kernel-doc notation (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: aspeed: Update signal status immediately to ensure sane hw state (git-fixes).
- media: aspeed: fix mode-detect always time out at 2nd run (git-fixes).
- media: cpia2: fix control-message timeouts (git-fixes).
- media: dib0700: fix undefined behavior in tuner shutdown (git-fixes).
- media: dib8000: Fix a memleak in dib8000_init() (git-fixes).
- media: dmxdev: fix UAF when dvb_register_device() fails (git-fixes).
- media: dw2102: Fix use after free (git-fixes).
- media: em28xx: fix control-message timeouts (git-fixes).
- media: em28xx: fix memory leak in em28xx_init_dev (git-fixes).
- media: flexcop-usb: fix control-message timeouts (git-fixes).
- media: hantro: Fix probe func error path (git-fixes).
- media: i2c: imx274: fix trivial typo expsoure/exposure (git-fixes).
- media: i2c: imx274: fix trivial typo obainted/obtained (git-fixes).
- media: imx-pxp: Initialize the spinlock prior to using it (git-fixes).
- media: mceusb: fix control-message timeouts (git-fixes).
- media: msi001: fix possible null-ptr-deref in msi001_probe() (git-fixes).
- media: mtk-vcodec: call v4l2_m2m_ctx_release first when file is released (git-fixes).
- media: pvrusb2: fix control-message timeouts (git-fixes).
- media: rcar-csi2: Correct the selection of hsfreqrange (git-fixes).
- media: rcar-csi2: Optimize the selection PHTW register (git-fixes).
- media: redrat3: fix control-message timeouts (git-fixes).
- media: s2255: fix control-message timeouts (git-fixes).
- media: saa7146: mxb: Fix a NULL pointer dereference in mxb_attach() (git-fixes).
- media: si2157: Fix 'warm' tuner state detection (git-fixes).
- media: si470x-i2c: fix possible memory leak in si470x_i2c_probe() (git-fixes).
- media: stk1160: fix control-message timeouts (git-fixes).
- media: streamzap: remove unnecessary ir_raw_event_reset and handle (git-fixes).
- media: uvcvideo: fix division by zero at stream start (git-fixes).
- media: venus: core: Fix a resource leak in the error handling path of 'venus_probe()' (git-fixes).
- memblock: ensure there is no overflow in memblock_overlaps_region() (git-fixes).
- memory: emif: Remove bogus debugfs error handling (git-fixes).
- mfd: intel-lpss: Fix too early PM enablement in the ACPI -&gt;probe() (git-fixes).
- misc: fastrpc: Add missing lock before accessing find_vma() (git-fixes).
- misc: fastrpc: fix improper packet size calculation (git-fixes).
- misc: lattice-ecp3-config: Fix task hung when firmware load failed (git-fixes).
- mmc: meson-mx-sdio: add IRQ check (git-fixes).
- mmc: sdhci-esdhc-imx: clear the buffer_read_ready to reset standard tuning circuit (git-fixes).
- mmc: sdhci-esdhc-imx: disable CMDQ support (git-fixes).
- mmc: sdhci-pci: Add PCI ID for Intel ADL (git-fixes).
- mmc: sdhci-tegra: Fix switch to HS400ES mode (git-fixes).
- move to 'mainline soon' section: - patches.suse/0001-mmc-moxart_remove-Fix-UAF.patch
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode (git-fixes).
- mt76: mt7915: fix an off-by-one bound check (git-fixes).
- mtd: rawnand: fsmc: Fix timing computation (git-fixes).
- mtd: rawnand: fsmc: Take instruction delay into account (git-fixes).
- mtd: rawnand: mpc5121: Remove unused variable in ads5121_select_chip() (git-fixes).
- mtd: spi-nor: hisi-sfc: Remove excessive clk_disable_unprepare() (git-fixes).
- mwifiex: Fix possible ABBA deadlock (git-fixes).
- mwifiex: Try waking the firmware until we get an interrupt (git-fixes).
- net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources (jsc#SLE-8464).
- net/mlx5: Set command entry semaphore up once got index free (jsc#SLE-15172).
- net/mlx5e: Fix wrong features assignment in case of error (git-fixes).
- net/mlx5e: Wrap the tx reporter dump callback to extract the sq (jsc#SLE-15172).
- net/sched: fq_pie: prevent dismantle issue (jsc#SLE-15172).
- net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1176774).
- net: create netdev-&gt;dev_addr assignment helpers (git-fixes).
- net: ena: Fix error handling when calculating max IO queues number (bsc#1154492).
- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1154492).
- net: ena: Fix wrong rx request id by resetting device (git-fixes).
- net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (jsc#SLE-14777).
- net: usb: lan78xx: add Allied Telesis AT29M2-AF (git-fixes).
- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).
- netfilter: nft_set_pipapo: allocate pcpu scratch maps on clone (bsc#1176447).
- nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done (git-fixes).
- nfc: fix segfault in nfc_genl_dump_devices_done (git-fixes).
- nfsd: Fix nsfd startup race (again) (git-fixes).
- nft_set_pipapo: Fix bucket load in AVX2 lookup routine for six 8-bit groups (bsc#1176447).
- nvme-tcp: block BH in sk state_change sk callback (git-fixes).
- nvme-tcp: can't set sk_user_data without write_lock (git-fixes).
- nvme-tcp: check sgl supported by target (git-fixes).
- nvme-tcp: do not update queue count when failing to set io queues (git-fixes).
- nvme-tcp: fix a NULL deref when receiving a 0-length r2t PDU (git-fixes).
- nvme-tcp: fix crash triggered with a dataless request submission (git-fixes).
- nvme-tcp: fix error codes in nvme_tcp_setup_ctrl() (git-fixes).
- nvme-tcp: fix io_work priority inversion (git-fixes).
- nvme-tcp: fix possible data corruption with bio merges (git-fixes).
- nvme-tcp: fix possible req-&gt;offset corruption (git-fixes).
- nvme-tcp: fix wrong setting of request iov_iter (git-fixes).
- nvme-tcp: get rid of unused helper function (git-fixes).
- nvme-tcp: pair send_mutex init with destroy (git-fixes).
- nvme-tcp: pass multipage bvec to request iov_iter (git-fixes).
- nvme-tcp: remove incorrect Kconfig dep in BLK_DEV_NVME (git-fixes).
- pcmcia: fix setting of kthread task states (git-fixes).
- pcmcia: rsrc_nonstatic: Fix a NULL pointer dereference in __nonstatic_find_io_region() (git-fixes).
- pcmcia: rsrc_nonstatic: Fix a NULL pointer dereference in nonstatic_find_mem_region() (git-fixes).
- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).
- pinctrl: mediatek: fix global-out-of-bounds issue (git-fixes).
- pinctrl: qcom: spmi-gpio: correct parent irqspec translation (git-fixes).
- pinctrl: stm32: consider the GPIO offset to expose all the GPIO lines (git-fixes).
- pinctrl: stm32: use valid pin identifier in stm32_pinctrl_resume() (git-fixes).
- pipe: increase minimum default pipe size to 2 pages (bsc#1194587).
- platform/x86: apple-gmux: use resource_size() with res (git-fixes).
- platform/x86: thinkpad_acpi: Fix WWAN device disabled issue after S3 deep (git-fixes).
- power: reset: ltc2952: Fix use of floating point literals (git-fixes).
- power: supply: core: Break capacity loop (git-fixes).
- power: supply: max17042_battery: Clear status bits in interrupt handler (git-fixes).
- powerpc/64s: fix program check interrupt emergency stack path (bsc#1156395).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/perf: Fix PMU callbacks to clear pending PMI before resetting an overflown PMC (bsc#1156395).
- powerpc/perf: Fix data source encodings for L2.1 and L3.1 accesses (bsc#1065729).
- powerpc/prom_init: Fix improper check of prom_getprop() (bsc#1065729).
- powerpc/pseries/cpuhp: cache node corrections (bsc#1065729).
- powerpc/pseries/cpuhp: delete add/remove_by_count code (bsc#1065729).
- powerpc/pseries/mobility: ignore ibm, platform-facilities updates (bsc#1065729).
- powerpc/traps: do not enable irqs in _exception (bsc#1065729).
- powerpc/xive: Add missing null check after calling kmalloc (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).
- powerpc: add interrupt_cond_local_irq_enable helper (bsc#1065729).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- pwm: mxs: Do not modify HW state in .probe() after the PWM chip was registered (git-fixes).
- pwm: tiecap: Drop .free() callback (git-fixes).
- qlcnic: potential dereference null pointer of rx_queue-&gt;page_ring (git-fixes).
- quota: check block number when reading the block in quota file (bsc#1194589).
- quota: correct error number in free_dqentry() (bsc#1194590).
- random: fix data race on crng init time (git-fixes).
- random: fix data race on crng_node_pool (git-fixes).
- regmap: Call regmap_debugfs_exit() prior to _init() (git-fixes).
- rndis_host: support Hytera digital radios (git-fixes).
- rpmsg: core: Clean up resources on announce_create failure (git-fixes).
- rtl8xxxu: Fix the handling of TX A-MPDU aggregation (git-fixes).
- rtlwifi: rtl8192cu: Fix WARNING when calling local_irq_restore() with interrupts enabled (git-fixes).
- rtw88: use read_poll_timeout instead of fixed sleep (git-fixes).
- rtw88: wow: build wow function only if CONFIG_PM is on (git-fixes).
- rtw88: wow: fix size access error of probe request (git-fixes).
- sata: nv: fix debug format string mismatch (git-fixes).
- scsi: lpfc: Add additional debugfs support for CMF (bsc#1194266).
- scsi: lpfc: Adjust CMF total bytes and rxmonitor (bsc#1194266).
- scsi: lpfc: Cap CMF read bytes to MBPI (bsc#1194266).
- scsi: lpfc: Change return code on I/Os received during link bounce (bsc#1194266).
- scsi: lpfc: Fix NPIV port deletion crash (bsc#1194266).
- scsi: lpfc: Fix leaked lpfc_dmabuf mbox allocations with NPIV (bsc#1194266).
- scsi: lpfc: Fix lpfc_force_rscn ndlp kref imbalance (bsc#1194266).
- scsi: lpfc: Trigger SLI4 firmware dump before doing driver cleanup (bsc#1194266).
- scsi: lpfc: Update lpfc version to 14.0.0.4 (bsc#1194266).
- scsi: qla2xxx: Fix mailbox direction flags in qla2xxx_get_adapter_id() (git-fixes).
- scsi: qla2xxx: Format log strings only if needed (git-fixes).
- scsi: qla2xxx: edif: Fix EDIF bsg (git-fixes).
- scsi: qla2xxx: edif: Fix app start delay (git-fixes).
- scsi: qla2xxx: edif: Fix app start fail (git-fixes).
- scsi: qla2xxx: edif: Fix off by one bug in qla_edif_app_getfcinfo() (git-fixes).
- scsi: qla2xxx: edif: Flush stale events and msgs on session down (git-fixes).
- scsi: qla2xxx: edif: Increase ELS payload (git-fixes).
- select: Fix indefinitely sleeping task in poll_schedule_timeout() (bsc#1194027).
- selftests: KVM: Explicitly use movq to read xmm registers (git-fixes).
- selinux: fix potential memleak in selinux_add_opt() (git-fixes).
- seq_buf: Fix overflow in seq_buf_putmem_hex() (git-fixes).
- seq_buf: Make trace_seq_putmem_hex() support data longer than 8 (git-fixes).
- serial: pl011: Add ACPI SBSA UART match id (git-fixes).
- serial: tty: uartlite: fix console setup (git-fixes).
- sfc: Check null pointer of rx_queue-&gt;page_ring (git-fixes).
- sfc: The RX page_ring is optional (git-fixes).
- sfc: falcon: Check null pointer of rx_queue-&gt;page_ring (git-fixes).
- sfc_ef100: potential dereference of null pointer (jsc#SLE-16683).
- shmem: shmem_writepage() split unlikely i915 THP (git-fixes).
- slimbus: qcom: fix potential NULL dereference in qcom_slim_prg_slew() (git-fixes).
- soc/tegra: fuse: Fix bitwise vs. logical OR warning (git-fixes).
- soc: fsl: dpaa2-console: free buffer before returning from dpaa2_console_read (git-fixes).
- soc: fsl: dpio: rename the enqueue descriptor variable (git-fixes).
- soc: fsl: dpio: replace smp_processor_id with raw_smp_processor_id (git-fixes).
- soc: fsl: dpio: use an explicit NULL instead of 0 (git-fixes).
- soc: fsl: dpio: use the combined functions to protect critical zone (git-fixes).
- spi: change clk_disable_unprepare to clk_unprepare (git-fixes).
- spi: spi-meson-spifc: Add missing pm_runtime_disable() in meson_spifc_probe (git-fixes).
- spi: spi-rspi: Drop redeclaring ret variable in qspi_transfer_in() (git-fixes).
- staging: emxx_udc: Fix passing of NULL to dma_alloc_coherent() (git-fixes).
- staging: fbtft: Do not spam logs when probe is deferred (git-fixes).
- staging: fbtft: Rectify GPIO handling (git-fixes).
- staging: fieldbus: anybuss: jump to correct label in an error path (git-fixes).
- staging: ks7010: select CRYPTO_HASH/CRYPTO_MICHAEL_MIC (git-fixes).
- staging: rtl8192e: return error code from rtllib_softmac_init() (git-fixes).
- staging: rtl8192e: rtllib_module: fix error handle case in alloc_rtllib() (git-fixes).
- staging: wlan-ng: Avoid bitwise vs logical OR warning in hfa384x_usb_throttlefn() (git-fixes).
- string.h: fix incompatibility between FORTIFY_SOURCE and KASAN (git-fixes).
- thermal/drivers/imx8mm: Enable ADC when enabling monitor (git-fixes).
- thermal/drivers/int340x: Do not set a wrong tcc offset on resume (git-fixes).
- thermal: core: Reset previous low and high trip during thermal zone init (git-fixes).
- tpm: add request_locality before write TPM_INT_ENABLE (git-fixes).
- tpm: fix potential NULL pointer access in tpm_del_char_device (git-fixes).
- tracing/kprobes: 'nmissed' not showed correctly for kretprobe (git-fixes).
- tracing/uprobes: Check the return value of kstrdup() for tu-&gt;filename (git-fixes).
- tracing: Add test for user space strings when filtering on string pointers (git-fixes).
- tracing: Fix check for trace_percpu_buffer validity in get_trace_buf() (git-fixes).
- tty: max310x: fix flexible_array.cocci warnings (git-fixes).
- tty: serial: atmel: Call dma_async_issue_pending() (git-fixes).
- tty: serial: atmel: Check return code of dmaengine_submit() (git-fixes).
- tty: serial: earlycon dependency (git-fixes).
- tty: serial: qcom_geni_serial: Drop __init from qcom_geni_console_setup (git-fixes).
- tty: serial: uartlite: allow 64 bit address (git-fixes).
- tty: synclink_gt: rename a conflicting function name (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- uio: uio_dmem_genirq: Catch the Exception (git-fixes).
- usb: core: config: fix validation of wMaxPacketValue entries (git-fixes).
- usb: core: config: using bit mask instead of individual bits (git-fixes).
- usb: dwc2: check return value after calling platform_get_resource() (git-fixes).
- usb: dwc3: gadget: Continue to process pending requests (git-fixes).
- usb: dwc3: gadget: Ignore EP queue requests during bus reset (git-fixes).
- usb: dwc3: gadget: Reclaim extra TRBs after request completion (git-fixes).
- usb: dwc3: pci: Enable dis_uX_susphy_quirk for Intel Merrifield (git-fixes).
- usb: dwc3: ulpi: Fix USB2.0 HS/FS/LS PHY suspend regression (git-fixes).
- usb: dwc3: ulpi: Replace CPU-based busyloop with Protocol-based one (git-fixes).
- usb: dwc3: ulpi: fix checkpatch warning (git-fixes).
- usb: ftdi-elan: fix memory leak on device disconnect (git-fixes).
- usb: gadget: composite: Allow bMaxPower=0 if self-powered (git-fixes).
- usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear (git-fixes).
- usb: gadget: u_ether: fix race in setting MAC address in setup phase (git-fixes).
- usb: mtu3: add memory barrier before set GPD's HWO (git-fixes).
- usb: mtu3: fix interval value for intr and isoc (git-fixes).
- usb: mtu3: fix list_head check warning (git-fixes).
- usb: mtu3: set interval of FS intr and isoc endpoint (git-fixes).
- usb: typec: tcpm: handle SRC_STARTUP state if cc changes (git-fixes).
- usb: xhci: Extend support for runtime power management for AMD's Yellow carp (git-fixes).
- usermodehelper: reset umask to default before executing user process (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- video: backlight: Drop maximum brightness override for brightness zero (git-fixes).
- watchdog: Fix OMAP watchdog early handling (git-fixes).
- watchdog: f71808e_wdt: fix inaccurate report in WDIOC_GETTIMEOUT (git-fixes).
- wcn36xx: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- wcn36xx: Indicate beacon not connection loss on MISSED_BEACON_IND (git-fixes).
- wcn36xx: Release DMA channel descriptor allocations (git-fixes).
- wcn36xx: handle connection loss indication (git-fixes).
- wireguard: allowedips: add missing __rcu annotation to satisfy sparse (git-fixes).
- wireguard: device: reset peer src endpoint when netns exits (git-fixes).
- wireguard: ratelimiter: use kvcalloc() instead of kvzalloc() (git-fixes).
- wireguard: receive: drop handshakes if queue lock is contended (git-fixes).
- wireguard: receive: use ring buffer for incoming handshakes (git-fixes).
- wireguard: selftests: actually test for routing loops (git-fixes).
- wireguard: selftests: increase default dmesg log size (git-fixes).
- wireless: iwlwifi: Fix a double free in iwl_txq_dyn_alloc_dma (git-fixes).
- x86/platform/uv: Add more to secondary CPU kdump info (bsc#1194493).
- xhci: Fresco FL1100 controller should not have BROKEN_MSI quirk set (git-fixes).
- xhci: Remove CONFIG_USB_DEFAULT_PERSIST to prevent xHCI from runtime suspending (git-fixes).
- xhci: avoid race between disable slot command and host runtime suspend (git-fixes).
- xhci: fix unsafe memory usage in xhci tracing (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177437">SUSE bug 1177437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190256">SUSE bug 1190256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191929">SUSE bug 1191929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192931">SUSE bug 1192931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193328">SUSE bug 1193328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194027">SUSE bug 1194027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194266">SUSE bug 1194266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194493">SUSE bug 1194493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194518">SUSE bug 1194518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194578">SUSE bug 1194578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194580">SUSE bug 1194580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194584">SUSE bug 1194584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194586">SUSE bug 1194586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194587">SUSE bug 1194587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194589">SUSE bug 1194589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194590">SUSE bug 1194590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194591">SUSE bug 1194591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194592">SUSE bug 1194592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194953">SUSE bug 1194953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46283/">CVE-2021-46283</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664784" comment="cluster-md-kmp-64kb-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664531" comment="cluster-md-kmp-default-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664785" comment="cluster-md-kmp-preempt-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664786" comment="dlm-kmp-64kb-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664532" comment="dlm-kmp-default-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664787" comment="dlm-kmp-preempt-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664788" comment="dtb-al-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664789" comment="dtb-allwinner-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664790" comment="dtb-altera-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664791" comment="dtb-amd-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664792" comment="dtb-amlogic-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664793" comment="dtb-apm-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664794" comment="dtb-arm-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664795" comment="dtb-broadcom-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664796" comment="dtb-cavium-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664797" comment="dtb-exynos-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664798" comment="dtb-freescale-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664799" comment="dtb-hisilicon-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664800" comment="dtb-lg-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664801" comment="dtb-marvell-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664802" comment="dtb-mediatek-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664803" comment="dtb-nvidia-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664804" comment="dtb-qcom-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664805" comment="dtb-renesas-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664806" comment="dtb-rockchip-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664807" comment="dtb-socionext-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664808" comment="dtb-sprd-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664809" comment="dtb-xilinx-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664810" comment="dtb-zte-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664811" comment="gfs2-kmp-64kb-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664533" comment="gfs2-kmp-default-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664812" comment="gfs2-kmp-preempt-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664500" comment="kernel-64kb-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664501" comment="kernel-64kb-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664813" comment="kernel-64kb-extra-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664814" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664815" comment="kernel-64kb-optional-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664816" comment="kernel-debug-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664817" comment="kernel-debug-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664818" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664502" comment="kernel-default-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664503" comment="kernel-default-base-5.3.18-150300.59.43.1.150300.18.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664819" comment="kernel-default-base-rebuild-5.3.18-150300.59.43.1.150300.18.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664504" comment="kernel-default-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664820" comment="kernel-default-extra-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664821" comment="kernel-default-livepatch-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664822" comment="kernel-default-livepatch-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664823" comment="kernel-default-optional-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664505" comment="kernel-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664509" comment="kernel-docs-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664824" comment="kernel-docs-html-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664825" comment="kernel-kvmsmall-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664826" comment="kernel-kvmsmall-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664827" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664506" comment="kernel-macros-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664510" comment="kernel-obs-build-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664828" comment="kernel-obs-qa-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664507" comment="kernel-preempt-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664511" comment="kernel-preempt-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664829" comment="kernel-preempt-extra-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664830" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664831" comment="kernel-preempt-optional-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664512" comment="kernel-source-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664832" comment="kernel-source-vanilla-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664513" comment="kernel-syms-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664508" comment="kernel-zfcpdump-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664833" comment="kselftests-kmp-64kb-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664834" comment="kselftests-kmp-default-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664835" comment="kselftests-kmp-preempt-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664836" comment="ocfs2-kmp-64kb-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664534" comment="ocfs2-kmp-default-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664837" comment="ocfs2-kmp-preempt-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664838" comment="reiserfs-kmp-64kb-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664514" comment="reiserfs-kmp-default-5.3.18-150300.59.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664839" comment="reiserfs-kmp-preempt-5.3.18-150300.59.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52718" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- CVE-2021-4140: Fixed Iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664261" comment="MozillaThunderbird-91.5.0-8.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664262" comment="MozillaThunderbird-translations-common-91.5.0-8.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664263" comment="MozillaThunderbird-translations-other-91.5.0-8.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52719" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198603" ref_url="https://bugzilla.suse.com/1198603" source="BUGZILLA"/>
		<reference ref_id="1198604" ref_url="https://bugzilla.suse.com/1198604" source="BUGZILLA"/>
		<reference ref_id="1198605" ref_url="https://bugzilla.suse.com/1198605" source="BUGZILLA"/>
		<reference ref_id="1198606" ref_url="https://bugzilla.suse.com/1198606" source="BUGZILLA"/>
		<reference ref_id="1198607" ref_url="https://bugzilla.suse.com/1198607" source="BUGZILLA"/>
		<reference ref_id="1198609" ref_url="https://bugzilla.suse.com/1198609" source="BUGZILLA"/>
		<reference ref_id="1198610" ref_url="https://bugzilla.suse.com/1198610" source="BUGZILLA"/>
		<reference ref_id="1198611" ref_url="https://bugzilla.suse.com/1198611" source="BUGZILLA"/>
		<reference ref_id="1198612" ref_url="https://bugzilla.suse.com/1198612" source="BUGZILLA"/>
		<reference ref_id="1198613" ref_url="https://bugzilla.suse.com/1198613" source="BUGZILLA"/>
		<reference ref_id="1198628" ref_url="https://bugzilla.suse.com/1198628" source="BUGZILLA"/>
		<reference ref_id="1198629" ref_url="https://bugzilla.suse.com/1198629" source="BUGZILLA"/>
		<reference ref_id="1198630" ref_url="https://bugzilla.suse.com/1198630" source="BUGZILLA"/>
		<reference ref_id="1198631" ref_url="https://bugzilla.suse.com/1198631" source="BUGZILLA"/>
		<reference ref_id="1198632" ref_url="https://bugzilla.suse.com/1198632" source="BUGZILLA"/>
		<reference ref_id="1198633" ref_url="https://bugzilla.suse.com/1198633" source="BUGZILLA"/>
		<reference ref_id="1198634" ref_url="https://bugzilla.suse.com/1198634" source="BUGZILLA"/>
		<reference ref_id="1198635" ref_url="https://bugzilla.suse.com/1198635" source="BUGZILLA"/>
		<reference ref_id="1198636" ref_url="https://bugzilla.suse.com/1198636" source="BUGZILLA"/>
		<reference ref_id="1198637" ref_url="https://bugzilla.suse.com/1198637" source="BUGZILLA"/>
		<reference ref_id="1198638" ref_url="https://bugzilla.suse.com/1198638" source="BUGZILLA"/>
		<reference ref_id="1198639" ref_url="https://bugzilla.suse.com/1198639" source="BUGZILLA"/>
		<reference ref_id="1198640" ref_url="https://bugzilla.suse.com/1198640" source="BUGZILLA"/>
		<reference ref_id="1199928" ref_url="https://bugzilla.suse.com/1199928" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46669" ref_url="https://www.suse.com/security/cve/CVE-2021-46669/" source="CVE"/>
		<reference ref_id="CVE-2022-21427" ref_url="https://www.suse.com/security/cve/CVE-2022-21427/" source="CVE"/>
		<reference ref_id="CVE-2022-27376" ref_url="https://www.suse.com/security/cve/CVE-2022-27376/" source="CVE"/>
		<reference ref_id="CVE-2022-27377" ref_url="https://www.suse.com/security/cve/CVE-2022-27377/" source="CVE"/>
		<reference ref_id="CVE-2022-27378" ref_url="https://www.suse.com/security/cve/CVE-2022-27378/" source="CVE"/>
		<reference ref_id="CVE-2022-27379" ref_url="https://www.suse.com/security/cve/CVE-2022-27379/" source="CVE"/>
		<reference ref_id="CVE-2022-27380" ref_url="https://www.suse.com/security/cve/CVE-2022-27380/" source="CVE"/>
		<reference ref_id="CVE-2022-27381" ref_url="https://www.suse.com/security/cve/CVE-2022-27381/" source="CVE"/>
		<reference ref_id="CVE-2022-27382" ref_url="https://www.suse.com/security/cve/CVE-2022-27382/" source="CVE"/>
		<reference ref_id="CVE-2022-27383" ref_url="https://www.suse.com/security/cve/CVE-2022-27383/" source="CVE"/>
		<reference ref_id="CVE-2022-27384" ref_url="https://www.suse.com/security/cve/CVE-2022-27384/" source="CVE"/>
		<reference ref_id="CVE-2022-27386" ref_url="https://www.suse.com/security/cve/CVE-2022-27386/" source="CVE"/>
		<reference ref_id="CVE-2022-27387" ref_url="https://www.suse.com/security/cve/CVE-2022-27387/" source="CVE"/>
		<reference ref_id="CVE-2022-27444" ref_url="https://www.suse.com/security/cve/CVE-2022-27444/" source="CVE"/>
		<reference ref_id="CVE-2022-27445" ref_url="https://www.suse.com/security/cve/CVE-2022-27445/" source="CVE"/>
		<reference ref_id="CVE-2022-27446" ref_url="https://www.suse.com/security/cve/CVE-2022-27446/" source="CVE"/>
		<reference ref_id="CVE-2022-27447" ref_url="https://www.suse.com/security/cve/CVE-2022-27447/" source="CVE"/>
		<reference ref_id="CVE-2022-27448" ref_url="https://www.suse.com/security/cve/CVE-2022-27448/" source="CVE"/>
		<reference ref_id="CVE-2022-27449" ref_url="https://www.suse.com/security/cve/CVE-2022-27449/" source="CVE"/>
		<reference ref_id="CVE-2022-27451" ref_url="https://www.suse.com/security/cve/CVE-2022-27451/" source="CVE"/>
		<reference ref_id="CVE-2022-27452" ref_url="https://www.suse.com/security/cve/CVE-2022-27452/" source="CVE"/>
		<reference ref_id="CVE-2022-27455" ref_url="https://www.suse.com/security/cve/CVE-2022-27455/" source="CVE"/>
		<reference ref_id="CVE-2022-27456" ref_url="https://www.suse.com/security/cve/CVE-2022-27456/" source="CVE"/>
		<reference ref_id="CVE-2022-27457" ref_url="https://www.suse.com/security/cve/CVE-2022-27457/" source="CVE"/>
		<reference ref_id="CVE-2022-27458" ref_url="https://www.suse.com/security/cve/CVE-2022-27458/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to 10.5.16 (bsc#1199928):

- CVE-2021-46669 (bsc#1199928)
- CVE-2022-27376 (bsc#1198628)
- CVE-2022-27377 (bsc#1198603)
- CVE-2022-27378 (bsc#1198604)
- CVE-2022-27379 (bsc#1198605)
- CVE-2022-27380 (bsc#1198606)
- CVE-2022-27381 (bsc#1198607)
- CVE-2022-27382 (bsc#1198609)
- CVE-2022-27383 (bsc#1198610)
- CVE-2022-27384 (bsc#1198611)
- CVE-2022-27386 (bsc#1198612)
- CVE-2022-27387 (bsc#1198613)
- CVE-2022-27444 (bsc#1198634)
- CVE-2022-27445 (bsc#1198629)
- CVE-2022-27446 (bsc#1198630)
- CVE-2022-27447 (bsc#1198631)
- CVE-2022-27448 (bsc#1198632)
- CVE-2022-27449 (bsc#1198633)
- CVE-2022-27451 (bsc#1198639)
- CVE-2022-27452 (bsc#1198640)
- CVE-2022-27455 (bsc#1198638)
- CVE-2022-27456 (bsc#1198635)
- CVE-2022-27457 (bsc#1198636)
- CVE-2022-27458 (bsc#1198637)

- The following issue is not affecting this package: CVE-2022-21427
  
External refernences:

- https://mariadb.com/kb/en/library/mariadb-10516-release-notes
- https://mariadb.com/kb/en/library/mariadb-10516-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198603">SUSE bug 1198603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198604">SUSE bug 1198604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198605">SUSE bug 1198605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198606">SUSE bug 1198606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198607">SUSE bug 1198607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198609">SUSE bug 1198609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198610">SUSE bug 1198610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198611">SUSE bug 1198611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198612">SUSE bug 1198612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198613">SUSE bug 1198613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198628">SUSE bug 1198628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198629">SUSE bug 1198629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198630">SUSE bug 1198630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198631">SUSE bug 1198631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198632">SUSE bug 1198632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198633">SUSE bug 1198633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198634">SUSE bug 1198634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198635">SUSE bug 1198635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198636">SUSE bug 1198636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198637">SUSE bug 1198637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198638">SUSE bug 1198638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198639">SUSE bug 1198639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198640">SUSE bug 1198640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199928">SUSE bug 1199928</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46669/">CVE-2021-46669</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21427/">CVE-2022-21427</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27376/">CVE-2022-27376</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27377/">CVE-2022-27377</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27378/">CVE-2022-27378</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27379/">CVE-2022-27379</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27380/">CVE-2022-27380</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27381/">CVE-2022-27381</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27382/">CVE-2022-27382</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27383/">CVE-2022-27383</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27384/">CVE-2022-27384</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27386/">CVE-2022-27386</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27387/">CVE-2022-27387</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27444/">CVE-2022-27444</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27445/">CVE-2022-27445</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27446/">CVE-2022-27446</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27447/">CVE-2022-27447</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27448/">CVE-2022-27448</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27449/">CVE-2022-27449</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27451/">CVE-2022-27451</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27452/">CVE-2022-27452</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27455/">CVE-2022-27455</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27456/">CVE-2022-27456</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27457/">CVE-2022-27457</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27458/">CVE-2022-27458</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684768" comment="libmariadbd-devel-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684769" comment="libmariadbd19-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684770" comment="mariadb-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695160" comment="mariadb-bench-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684771" comment="mariadb-client-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684772" comment="mariadb-errormessages-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695161" comment="mariadb-rpm-macros-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695162" comment="mariadb-test-10.5.16-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684773" comment="mariadb-tools-10.5.16-150300.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52720" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1200134" ref_url="https://bugzilla.suse.com/1200134" source="BUGZILLA"/>
		<reference ref_id="1200135" ref_url="https://bugzilla.suse.com/1200135" source="BUGZILLA"/>
		<reference ref_id="1200136" ref_url="https://bugzilla.suse.com/1200136" source="BUGZILLA"/>
		<reference ref_id="1200137" ref_url="https://bugzilla.suse.com/1200137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29804" ref_url="https://www.suse.com/security/cve/CVE-2022-29804/" source="CVE"/>
		<reference ref_id="CVE-2022-30580" ref_url="https://www.suse.com/security/cve/CVE-2022-30580/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30634" ref_url="https://www.suse.com/security/cve/CVE-2022-30634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011250.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to go1.17.11 (released 2022-06-01) (bsc#1190649):

- CVE-2022-30634: Fixed crypto/rand rand.Read hangs with extremely large buffers (bsc#1200134).
- CVE-2022-30629: Fixed crypto/tls session tickets lack random ticket_age_add (bsc#1200135).
- CVE-2022-29804: Fixed path/filepath Clean(`.\c:`) returns `c:` on Windows (bsc#1200137).
- CVE-2022-30580: Fixed os/exec empty Cmd.Path can result in running unintended binary on Windows (bsc#1200136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200134">SUSE bug 1200134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200135">SUSE bug 1200135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200136">SUSE bug 1200136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200137">SUSE bug 1200137</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29804/">CVE-2022-29804</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30580/">CVE-2022-30580</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30634/">CVE-2022-30634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695163" comment="go1.17-1.17.11-150000.1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695164" comment="go1.17-doc-1.17.11-150000.1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684424" comment="go1.17-race-1.17.11-150000.1.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52721" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1200134" ref_url="https://bugzilla.suse.com/1200134" source="BUGZILLA"/>
		<reference ref_id="1200135" ref_url="https://bugzilla.suse.com/1200135" source="BUGZILLA"/>
		<reference ref_id="1200136" ref_url="https://bugzilla.suse.com/1200136" source="BUGZILLA"/>
		<reference ref_id="1200137" ref_url="https://bugzilla.suse.com/1200137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29804" ref_url="https://www.suse.com/security/cve/CVE-2022-29804/" source="CVE"/>
		<reference ref_id="CVE-2022-30580" ref_url="https://www.suse.com/security/cve/CVE-2022-30580/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30634" ref_url="https://www.suse.com/security/cve/CVE-2022-30634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011249.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

Update to go1.18.3 (released 2022-06-01) (bsc#1193742):

- CVE-2022-30634: Fixed crypto/rand rand.Read hangs with extremely large buffers (bsc#1200134).
- CVE-2022-30629: Fixed crypto/tls session tickets lack random ticket_age_add (bsc#1200135).
- CVE-2022-29804: Fixed path/filepath Clean(`.\c:`) returns `c:` on Windows (bsc#1200137).
- CVE-2022-30580: Fixed os/exec empty Cmd.Path can result in running unintended binary on Windows (bsc#1200136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-07"/>
	<updated date="2022-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200134">SUSE bug 1200134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200135">SUSE bug 1200135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200136">SUSE bug 1200136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200137">SUSE bug 1200137</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29804/">CVE-2022-29804</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30580/">CVE-2022-30580</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30634/">CVE-2022-30634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684425" comment="go1.18-1.18.3-150000.1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684426" comment="go1.18-doc-1.18.3-150000.1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684427" comment="go1.18-race-1.18.3-150000.1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52722" version="1" class="patch">
	<metadata>
		<title>Security update for google-gson (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199064" ref_url="https://bugzilla.suse.com/1199064" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25647" ref_url="https://www.suse.com/security/cve/CVE-2022-25647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011263.html" source="SUSE-SU"/>
		<description>
This update for google-gson fixes the following issues:

- CVE-2022-25647: Fixed deserialization of untrusted data (bsc#1199064).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-10"/>
	<updated date="2022-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199064">SUSE bug 1199064</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25647/">CVE-2022-25647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683482" comment="google-gson-2.8.9-150200.3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683855" comment="google-gson-javadoc-2.8.9-150200.3.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52723" version="1" class="patch">
	<metadata>
		<title>Security update for netty3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193672" ref_url="https://bugzilla.suse.com/1193672" source="BUGZILLA"/>
		<reference ref_id="1197787" ref_url="https://bugzilla.suse.com/1197787" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43797" ref_url="https://www.suse.com/security/cve/CVE-2021-43797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011268.html" source="SUSE-SU"/>
		<description>
This update for netty3 fixes the following issues:

- CVE-2021-43797: Fixed a potential HTTP request smuggling issue due to
  insufficient validation against control characters (bsc#1193672).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193672">SUSE bug 1193672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197787">SUSE bug 1197787</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43797/">CVE-2021-43797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682364" comment="netty3-3.10.6-150200.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682753" comment="netty3-javadoc-3.10.6-150200.3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52724" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199623" ref_url="https://bugzilla.suse.com/1199623" source="BUGZILLA"/>
		<reference ref_id="1200363" ref_url="https://bugzilla.suse.com/1200363" source="BUGZILLA"/>
		<reference ref_id="1200364" ref_url="https://bugzilla.suse.com/1200364" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30552" ref_url="https://www.suse.com/security/cve/CVE-2022-30552/" source="CVE"/>
		<reference ref_id="CVE-2022-30767" ref_url="https://www.suse.com/security/cve/CVE-2022-30767/" source="CVE"/>
		<reference ref_id="CVE-2022-30790" ref_url="https://www.suse.com/security/cve/CVE-2022-30790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011266.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

- CVE-2022-30552: A large buffer overflow could have lead to a denial of service in the IP Packet deframentation code.
(bsc#1200363)
- CVE-2022-30790: A Hole Descriptor Overwrite could have lead to an arbitrary out of bounds write primitive.
(bsc#1200364)
- CVE-2022-30767: Fixed an unbounded memcpy with a failed length check leading to a buffer overflow (bsc#1199623).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199623">SUSE bug 1199623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200363">SUSE bug 1200363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200364">SUSE bug 1200364</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-30552/">CVE-2022-30552</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30767/">CVE-2022-30767</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30790/">CVE-2022-30790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695165" comment="u-boot-avnetultra96rev1-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695166" comment="u-boot-avnetultra96rev1-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695167" comment="u-boot-bananapim64-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695168" comment="u-boot-bananapim64-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695169" comment="u-boot-dragonboard410c-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695170" comment="u-boot-dragonboard410c-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695171" comment="u-boot-dragonboard820c-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695172" comment="u-boot-dragonboard820c-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695173" comment="u-boot-evb-rk3399-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695174" comment="u-boot-evb-rk3399-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695175" comment="u-boot-firefly-rk3399-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695176" comment="u-boot-firefly-rk3399-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695177" comment="u-boot-geekbox-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695178" comment="u-boot-geekbox-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695179" comment="u-boot-hikey-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695180" comment="u-boot-hikey-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695181" comment="u-boot-khadas-vim-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695182" comment="u-boot-khadas-vim-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695183" comment="u-boot-khadas-vim2-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695184" comment="u-boot-khadas-vim2-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695185" comment="u-boot-libretech-ac-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695186" comment="u-boot-libretech-ac-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695187" comment="u-boot-libretech-cc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695188" comment="u-boot-libretech-cc-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695189" comment="u-boot-ls1012afrdmqspi-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695190" comment="u-boot-ls1012afrdmqspi-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695191" comment="u-boot-mvebudb-88f3720-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695192" comment="u-boot-mvebudb-88f3720-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695193" comment="u-boot-mvebudbarmada8k-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695194" comment="u-boot-mvebudbarmada8k-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695195" comment="u-boot-mvebuespressobin-88f3720-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695196" comment="u-boot-mvebuespressobin-88f3720-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695197" comment="u-boot-mvebumcbin-88f8040-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695198" comment="u-boot-mvebumcbin-88f8040-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695199" comment="u-boot-nanopia64-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695200" comment="u-boot-nanopia64-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695201" comment="u-boot-odroid-c2-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695202" comment="u-boot-odroid-c2-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695203" comment="u-boot-odroid-c4-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695204" comment="u-boot-odroid-c4-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695205" comment="u-boot-odroid-n2-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695206" comment="u-boot-odroid-n2-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695207" comment="u-boot-orangepipc2-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695208" comment="u-boot-orangepipc2-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695209" comment="u-boot-p2371-2180-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695210" comment="u-boot-p2371-2180-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695211" comment="u-boot-p2771-0000-500-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695212" comment="u-boot-p2771-0000-500-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695213" comment="u-boot-p3450-0000-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695214" comment="u-boot-p3450-0000-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695215" comment="u-boot-pine64plus-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695216" comment="u-boot-pine64plus-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695217" comment="u-boot-pinebook-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695218" comment="u-boot-pinebook-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695219" comment="u-boot-pinebook-pro-rk3399-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695220" comment="u-boot-pinebook-pro-rk3399-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695221" comment="u-boot-pineh64-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695222" comment="u-boot-pineh64-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695223" comment="u-boot-pinephone-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695224" comment="u-boot-pinephone-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695225" comment="u-boot-poplar-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695226" comment="u-boot-poplar-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695227" comment="u-boot-rock-pi-4-rk3399-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695228" comment="u-boot-rock-pi-4-rk3399-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695229" comment="u-boot-rock64-rk3328-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695230" comment="u-boot-rock64-rk3328-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695231" comment="u-boot-rock960-rk3399-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695232" comment="u-boot-rock960-rk3399-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695233" comment="u-boot-rockpro64-rk3399-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695234" comment="u-boot-rockpro64-rk3399-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695235" comment="u-boot-rpi3-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695236" comment="u-boot-rpi3-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695237" comment="u-boot-rpi4-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695238" comment="u-boot-rpi4-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684274" comment="u-boot-rpiarm64-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684275" comment="u-boot-rpiarm64-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684276" comment="u-boot-tools-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695239" comment="u-boot-xilinxzynqmpvirt-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695240" comment="u-boot-xilinxzynqmpvirt-doc-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695241" comment="u-boot-xilinxzynqmpzcu102rev10-2021.01-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695242" comment="u-boot-xilinxzynqmpzcu102rev10-doc-2021.01-150300.7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52725" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200363" ref_url="https://bugzilla.suse.com/1200363" source="BUGZILLA"/>
		<reference ref_id="1200364" ref_url="https://bugzilla.suse.com/1200364" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30552" ref_url="https://www.suse.com/security/cve/CVE-2022-30552/" source="CVE"/>
		<reference ref_id="CVE-2022-30790" ref_url="https://www.suse.com/security/cve/CVE-2022-30790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011272.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

 - A large buffer overflow could have lead to a denial of service in the IP Packet deframentation code.
(CVE-2022-30552, bsc#1200363)
- A Hole Descriptor Overwrite could have lead to an arbitrary out of bounds write primitive.
(CVE-2022-30790, bsc#1200364)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200363">SUSE bug 1200363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200364">SUSE bug 1200364</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-30552/">CVE-2022-30552</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30790/">CVE-2022-30790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695243" comment="u-boot-xilinxzynqmpgeneric-2020.01-150200.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695244" comment="u-boot-xilinxzynqmpgeneric-doc-2020.01-150200.10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52726" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199768" ref_url="https://bugzilla.suse.com/1199768" source="BUGZILLA"/>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<reference ref_id="CVE-2022-1834" ref_url="https://www.suse.com/security/cve/CVE-2022-1834/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31739" ref_url="https://www.suse.com/security/cve/CVE-2022-31739/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 91.9.1

MFSA 2022-19 (bsc#1199768):

- CVE-2022-1802: Prototype pollution in Top-Level Await implementation (bmo#1770137).
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution (bmo#1770048).
  
Update to Mozilla Thunderbird 91.10

MFSA 2022-22 (bsc#1200027):

- CVE-2022-31736: Cross-Origin resource's length leaked (bmo#1735923)
- CVE-2022-31737: Heap buffer overflow in WebGL (bmo#1743767)
- CVE-2022-31738: Browser window spoof using fullscreen mode (bmo#1756388)
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files (bmo#1765049)
- CVE-2022-31740: Register allocation problem in WASM on arm64 (bmo#1766806)
- CVE-2022-31741: Uninitialized variable leads to invalid memory read (bmo#1767590) 
- CVE-2022-1834: Braille space character caused incorrect sender email to be  shown for a digitally signed email (bmo#1767816)
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (bmo#1730434)
- CVE-2022-31747: Memory safety bugs fixed in Thunderbird 91.10 (bmo#1760765, bmo#1765610, bmo#1766283, bmo#1767365, bmo#1768559, bmo#1768734)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1834/">CVE-2022-1834</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31739/">CVE-2022-31739</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695245" comment="MozillaThunderbird-91.10.0-150200.8.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695246" comment="MozillaThunderbird-translations-common-91.10.0-150200.8.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695247" comment="MozillaThunderbird-translations-other-91.10.0-150200.8.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52727" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199653" ref_url="https://bugzilla.suse.com/1199653" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30067" ref_url="https://www.suse.com/security/cve/CVE-2022-30067/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011277.html" source="SUSE-SU"/>
		<description>
This update for gimp fixes the following issues:

- CVE-2022-30067: Fixed uncontrolled memory consumption via crafted XCF file (bsc#1199653).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199653">SUSE bug 1199653</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30067/">CVE-2022-30067</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695248" comment="gimp-2.10.12-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695249" comment="gimp-devel-2.10.12-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684710" comment="gimp-lang-2.10.12-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695250" comment="gimp-plugin-aa-2.10.12-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695251" comment="libgimp-2_0-0-2.10.12-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695252" comment="libgimp-2_0-0-32bit-2.10.12-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695253" comment="libgimpui-2_0-0-2.10.12-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695254" comment="libgimpui-2_0-0-32bit-2.10.12-150300.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52728" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191184" ref_url="https://bugzilla.suse.com/1191184" source="BUGZILLA"/>
		<reference ref_id="1191185" ref_url="https://bugzilla.suse.com/1191185" source="BUGZILLA"/>
		<reference ref_id="1191186" ref_url="https://bugzilla.suse.com/1191186" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1197948" ref_url="https://bugzilla.suse.com/1197948" source="BUGZILLA"/>
		<reference ref_id="1198460" ref_url="https://bugzilla.suse.com/1198460" source="BUGZILLA"/>
		<reference ref_id="1198493" ref_url="https://bugzilla.suse.com/1198493" source="BUGZILLA"/>
		<reference ref_id="1198495" ref_url="https://bugzilla.suse.com/1198495" source="BUGZILLA"/>
		<reference ref_id="1198496" ref_url="https://bugzilla.suse.com/1198496" source="BUGZILLA"/>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28735" ref_url="https://www.suse.com/security/cve/CVE-2022-28735/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011275.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes and hardenings for boothole 3 / boothole 2022 (bsc#1198581)

- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28735: Fixed some verifier framework changes (bsc#1198495)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2

- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191184">SUSE bug 1191184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191185">SUSE bug 1191185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191186">SUSE bug 1191186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197948">SUSE bug 1197948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198493">SUSE bug 1198493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198495">SUSE bug 1198495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198496">SUSE bug 1198496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28735/">CVE-2022-28735</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684277" comment="grub2-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684278" comment="grub2-arm64-efi-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695255" comment="grub2-arm64-efi-debug-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695256" comment="grub2-branding-upstream-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684279" comment="grub2-i386-pc-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695257" comment="grub2-i386-pc-debug-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684280" comment="grub2-powerpc-ieee1275-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695258" comment="grub2-powerpc-ieee1275-debug-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684281" comment="grub2-s390x-emu-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695259" comment="grub2-s390x-emu-debug-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684282" comment="grub2-snapper-plugin-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684283" comment="grub2-systemd-sleep-plugin-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684284" comment="grub2-x86_64-efi-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695260" comment="grub2-x86_64-efi-debug-2.04-150300.22.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684774" comment="grub2-x86_64-xen-2.04-150300.22.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52729" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="1199965" ref_url="https://bugzilla.suse.com/1199965" source="BUGZILLA"/>
		<reference ref_id="1199966" ref_url="https://bugzilla.suse.com/1199966" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362/" source="CVE"/>
		<reference ref_id="CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363/" source="CVE"/>
		<reference ref_id="CVE-2022-26364" ref_url="https://www.suse.com/security/cve/CVE-2022-26364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26358, CVE-2022-26359, CVE-2022-26360, CVE-2022-26361: Fixed IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues (XSA-400) (bsc#1197426)
- CVE-2022-26362: Fixed race condition in typeref acquisition (bsc#1199965)
- CVE-2022-26363, CVE-2022-26364: Fixed insufficient care with non-coherent mappings (bsc#1199966)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-13"/>
	<updated date="2022-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199965">SUSE bug 1199965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199966">SUSE bug 1199966</bugzilla>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26364/">CVE-2022-26364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695261" comment="xen-4.14.5_02-150300.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695262" comment="xen-devel-4.14.5_02-150300.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695263" comment="xen-doc-html-4.14.5_02-150300.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695264" comment="xen-libs-4.14.5_02-150300.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695265" comment="xen-libs-32bit-4.14.5_02-150300.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695266" comment="xen-tools-4.14.5_02-150300.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695267" comment="xen-tools-domU-4.14.5_02-150300.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684778" comment="xen-tools-xendomains-wait-disk-4.14.5_02-150300.3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52730" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196739" ref_url="https://bugzilla.suse.com/1196739" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21716" ref_url="https://www.suse.com/security/cve/CVE-2022-21716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011279.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21716: Fixed that ssh server accepts an infinite amount of data using all the available memory (bsc#1196739).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196739">SUSE bug 1196739</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21716/">CVE-2022-21716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695268" comment="python-Twisted-doc-19.10.0-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695269" comment="python2-Twisted-19.10.0-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684714" comment="python3-Twisted-19.10.0-150200.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52731" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199287" ref_url="https://bugzilla.suse.com/1199287" source="BUGZILLA"/>
		<reference ref_id="1200106" ref_url="https://bugzilla.suse.com/1200106" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011284.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.3 (bsc#1200106)

- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684287" comment="libjavascriptcoregtk-4_0-18-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695270" comment="libjavascriptcoregtk-4_0-18-32bit-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684288" comment="libwebkit2gtk-4_0-37-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695271" comment="libwebkit2gtk-4_0-37-32bit-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684289" comment="libwebkit2gtk3-lang-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684385" comment="typelib-1_0-JavaScriptCore-4_0-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684386" comment="typelib-1_0-WebKit2-4_0-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684387" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695272" comment="webkit-jsc-4-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684290" comment="webkit2gtk-4_0-injected-bundles-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684388" comment="webkit2gtk3-devel-2.36.3-150200.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695273" comment="webkit2gtk3-minibrowser-2.36.3-150200.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52732" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1061840" ref_url="https://bugzilla.suse.com/1061840" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1118212" ref_url="https://bugzilla.suse.com/1118212" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1180100" ref_url="https://bugzilla.suse.com/1180100" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1195826" ref_url="https://bugzilla.suse.com/1195826" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1196478" ref_url="https://bugzilla.suse.com/1196478" source="BUGZILLA"/>
		<reference ref_id="1196570" ref_url="https://bugzilla.suse.com/1196570" source="BUGZILLA"/>
		<reference ref_id="1196840" ref_url="https://bugzilla.suse.com/1196840" source="BUGZILLA"/>
		<reference ref_id="1197446" ref_url="https://bugzilla.suse.com/1197446" source="BUGZILLA"/>
		<reference ref_id="1197472" ref_url="https://bugzilla.suse.com/1197472" source="BUGZILLA"/>
		<reference ref_id="1197601" ref_url="https://bugzilla.suse.com/1197601" source="BUGZILLA"/>
		<reference ref_id="1197675" ref_url="https://bugzilla.suse.com/1197675" source="BUGZILLA"/>
		<reference ref_id="1198438" ref_url="https://bugzilla.suse.com/1198438" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198971" ref_url="https://bugzilla.suse.com/1198971" source="BUGZILLA"/>
		<reference ref_id="1198989" ref_url="https://bugzilla.suse.com/1198989" source="BUGZILLA"/>
		<reference ref_id="1199035" ref_url="https://bugzilla.suse.com/1199035" source="BUGZILLA"/>
		<reference ref_id="1199052" ref_url="https://bugzilla.suse.com/1199052" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199114" ref_url="https://bugzilla.suse.com/1199114" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199564" ref_url="https://bugzilla.suse.com/1199564" source="BUGZILLA"/>
		<reference ref_id="1199626" ref_url="https://bugzilla.suse.com/1199626" source="BUGZILLA"/>
		<reference ref_id="1199631" ref_url="https://bugzilla.suse.com/1199631" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199670" ref_url="https://bugzilla.suse.com/1199670" source="BUGZILLA"/>
		<reference ref_id="1199839" ref_url="https://bugzilla.suse.com/1199839" source="BUGZILLA"/>
		<reference ref_id="1200019" ref_url="https://bugzilla.suse.com/1200019" source="BUGZILLA"/>
		<reference ref_id="1200045" ref_url="https://bugzilla.suse.com/1200045" source="BUGZILLA"/>
		<reference ref_id="1200046" ref_url="https://bugzilla.suse.com/1200046" source="BUGZILLA"/>
		<reference ref_id="1200192" ref_url="https://bugzilla.suse.com/1200192" source="BUGZILLA"/>
		<reference ref_id="1200216" ref_url="https://bugzilla.suse.com/1200216" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972/" source="CVE"/>
		<reference ref_id="CVE-2022-20008" ref_url="https://www.suse.com/security/cve/CVE-2022-20008/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-0168: Fixed a NULL pointer dereference in smb2_ioctl_query_info. (bsc#1197472)
- CVE-2022-20008: Fixed bug that allows to read kernel heap memory due to uninitialized data in mmc_blk_read_single of block.c. (bnc#1199564)
- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)
- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).

The following non-security bugs were fixed:

- ACPI: property: Release subnode properties with data nodes (git-fixes).
- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).
- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).
- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).
- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).
- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).
- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).
- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).
- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).
- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).
- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).
- ALSA: wavefront: Proper check of get_user() error (git-fixes).
- ARM: 9169/1: entry: fix Thumb2 bug in iWMMXt exception handling (git-fixes)
- ARM: 9170/1: fix panic when kasan and kprobe are enabled (git-fixes)
- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes)
- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes)
- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes)
- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes)
- ARM: dts: armada-38x: Add generic compatible to UART nodes (git-fixes)
- ARM: dts: at91: fix pinctrl phandles (git-fixes)
- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes)
- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes)
- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes)
- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes)
- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes)
- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes)
- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes)
- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes)
- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes)
- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes)
- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes)
- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes)
- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes)
- ARM: dts: imx6ull-pinfunc: Fix CSI_DATA07__ESAI_TX0 pad name (git-fixes)
- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes)
- ARM: dts: meson: Fix the UART compatible strings (git-fixes)
- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes)
- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes)
- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes)
- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes)
- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes)
- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes)
- arm: mediatek: select arch timer for mt7629 (git-fixes)
- ARM: omap: remove debug-leds driver (git-fixes)
- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes)
- ARM: socfpga: dts: fix qspi node compatible (git-fixes)
- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes)
- ARM: tegra: Move panels to AUX bus (git-fixes)
- arm64: dts: broadcom: Fix sata nodename (git-fixes)
- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes)
- arm64: dts: rockchip: Fix SDIO regulator supply properties on (git-fixes)
- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).
- arm64: pgtable: make __pte_to_phys/__phys_to_pte_val inline functions (git-fixes)
- arm64/mm: avoid fixmap race condition when create pud mapping (git-fixes)
- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).
- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).
- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).
- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).
- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).
- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).
- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).
- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).
- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).
- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).
- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).
- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).
- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).
- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).
- ASoC: rt5514: Fix event generation for 'DSP Voice Wake Up' control (git-fixes).
- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).
- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).
- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect (git-fixes).
- ata: pata_hpt37x: fix PCI clock detection (git-fixes).
- ata: pata_marvell: Check the 'bmdma_addr' beforing reading (git-fixes).
- ath9k_htc: fix potential out of bounds access with invalid rxstatus-&gt;rs_keyix (git-fixes).
- ath9k: fix ar9003_get_eepmisc (git-fixes).
- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).
- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).
- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).
- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).
- Bluetooth: Fix the creation of hdev-&gt;name (git-fixes).
- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).
- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix unnecessary dropping of RX packets (jsc#SLE-15075).
- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).
- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).
- can: grcan: grcan_close(): fix deadlock (git-fixes).
- can: grcan: use ofdev-&gt;dev when allocating DMA memory (git-fixes).
- carl9170: tx: fix an incorrect use of list iterator (git-fixes).
- ceph: fix setting of xattrs on async created inodes (bsc#1200192).
- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).
- clk: at91: generated: consider range when calculating best rate (git-fixes).
- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).
- clk: imx8mp: fix usb_root_clk parent (git-fixes).
- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).
- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).
- copy_process(): Move fd_install() out of sighand-&gt;siglock critical section (bsc#1199626).
- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).
- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).
- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).
- crypto: x86 - eliminate anonymous module_init and module_exit (git-fixes).
- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).
- dim: initialize all struct fields (git-fixes).
- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).
- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).
- docs: powerpc: Fix misspellings and grammar errors (bsc#1055117 ltc#159753).
- docs: submitting-patches: Fix crossref to 'The canonical patch format' (git-fixes).
- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).
- drbd: fix duplicate array initializer (git-fixes).
- drbd: Fix five use after free bugs in get_initial_state (git-fixes).
- drbd: remove assign_p_sizes_qlim (git-fixes).
- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).
- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).
- driver: core: fix deadlock in __device_attach (git-fixes).
- driver: base: fix UAF when driver_attach failed (git-fixes).
- drivers: base: cacheinfo: Get rid of DEFINE_SMP_CALL_CACHE_FUNCTION() (git-fixes)
- drivers/base/memory: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).
- drivers/base/node.c: fix compaction sysfs file leak (git-fixes).
- drm: mali-dp: potential dereference of null pointer (git-fixes).
- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).
- drm: sti: do not use kernel-doc markers (git-fixes).
- drm/amd/display/dc/gpio/gpio_service: Pass around correct dce_{version, environment} types (git-fixes).
- drm/amdkfd: Fix GWS queue count (git-fixes).
- drm/blend: fix typo in the comment (git-fixes).
- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).
- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).
- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).
- drm/edid: fix invalid EDID extension block filtering (git-fixes).
- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).
- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (git-fixes).
- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).
- drm/mediatek: Fix mtk_cec_mask() (git-fixes).
- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).
- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).
- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).
- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).
- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).
- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).
- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/msm/mdp5: check the return of kzalloc() (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).
- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).
- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).
- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).
- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).
- drm/vc4: hvs: Reset muxes at probe time (git-fixes).
- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).
- drm/vc4: txp: Force alpha to be 0xff if it's disabled (git-fixes).
- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).
- EDAC/synopsys: Read the error count from the correct register (bsc#1178134).
- firewire: core: extend card-&gt;lock in fw_core_handle_bus_reset (git-fixes).
- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).
- firewire: remove check of list iterator against head past the loop body (git-fixes).
- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).
- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).
- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).
- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).
- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)
- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)
- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)
- genirq/affinity: Handle affinity setting on inactive (git-fixes)
- genirq/msi: Ensure deactivation on teardown (git-fixes)
- genirq/proc: Reject invalid affinity masks (again) (git-fixes)
- genirq/timings: Fix error return code in (git-fixes)
- genirq/timings: Prevent potential array overflow in (git-fixes)
- gma500: fix an incorrect NULL check on list iterator (git-fixes).
- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).
- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).
- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).
- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).
- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).
- gpiolib: of: fix bounds check for 'gpio-reserved-ranges' (git-fixes).
- hex2bin: fix access beyond string end (git-fixes).
- HID: elan: Fix potential double free in elan_input_configured (git-fixes).
- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).
- hinic: fix bug of wq out of bound access (bsc#1176447).
- hwmon: (f71882fg) Fix negative temperature (git-fixes).
- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).
- hwmon: (tmp401) Add OF device ID table (git-fixes).
- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).
- i2c: at91: use dma safe buffers (git-fixes).
- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).
- i40e: stop disabling VFs due to PF error responses (git-fixes).
- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (jsc#SLE-12878).
- ice: Clear default forwarding VSI during VSI release (jsc#SLE-12878).
- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (jsc#SLE-7926).
- ice: Fix race conditions between virtchnl handling and VF ndo ops (git-fixes).
- ice: synchronize_rcu() when terminating rings (jsc#SLE-7926).
- iio: adc: ad7124: Remove shift from scan_type (git-fixes).
- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).
- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).
- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).
- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).
- iio: dac: ad5592r: Fix the missing return value (git-fixes).
- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).
- Input: add bounds checking to input_set_capability() (git-fixes).
- Input: ili210x - fix reset timing (git-fixes).
- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).
- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).
- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).
- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).
- ionic: avoid races in ionic_heartbeat_check (bsc#1167773).
- ionic: Cleanups in the Tx hotpath code (bsc#1167773).
- ionic: disable napi when ionic_lif_init() fails (bsc#1167773).
- ionic: Do not send reset commands if FW isn't running (bsc#1167773).
- ionic: fix missing pci_release_regions() on error in ionic_probe() (bsc#1167773).
- ionic: fix type complaint in ionic_dev_cmd_clean() (jsc#SLE-16649).
- ionic: monitor fw status generation (bsc#1167773).
- ionic: remove the dbid_inuse bitmap (bsc#1167773).
- ionic: start watchdog after all is setup (bsc#1167773).
- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).
- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).
- iwlwifi: mvm: fix the return type for DSM functions 1 and 2 (git-fixes).
- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).
- kABI: ivtv: restore caps member (git-fixes).
- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).
- KVM: VMX: Fix stale docs for kvm-intel.emulate_invalid_guest_state (git-fixes).
- lan743x: fix rx_napi_poll/interrupt ping-pong (git-fixes).
- lan743x: remove redundant assignment to variable rx_process_result (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).
- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).
- mac80211: Reset MBSSID parameters upon connection (git-fixes).
- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).
- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).
- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).
- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-fixes).
- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).
- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).
- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).
- media: videobuf2: Fix the size printk format (git-fixes).
- media: vim2m: Register video device after setting up internals (git-fixes).
- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).
- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).
- mm, page_alloc: fix build_zonerefs_node() (git-fixes).
- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (jsc#SLE-15176, jsc#SLE-16387).
- mmc: block: Use generic_cmd6_time when modifying INAND_CMD38_ARG_EXT_CSD (git-fixes).
- mmc: core: Specify timeouts for BKOPS and CACHE_FLUSH for eMMC (git-fixes).
- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- mt76: mt7663s: fix rx buffer refcounting (git-fixes).
- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).
- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).
- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).
- net: bcmgenet: Fix a resource leak in an error handling path in the probe functin (git-fixes).
- net: dsa: lantiq_gswip: Enable GSWIP_MII_CFG_EN also for internal PHYs (git-fixes).
- net: dsa: lantiq_gswip: Fix GSWIP_MII_CFG(p) register access (git-fixes).
- net: ethernet: Fix memleak in ethoc_probe (git-fixes).
- net: ethernet: ti: cpts: fix ethtool output when no ptp_clock registered (git-fixes).
- net: hdlc_ppp: Fix issues when mod_timer is called while timer is running (git-fixes).
- net: hns3: add a check for index in hclge_get_rss_key() (git-fixes).
- net: hns3: clear inited state and stop client after failed to register netdev (bsc#1154353).
- net: hns3: fix bug when PF set the duplicate MAC address for VFs (jsc#SLE-14777).
- net: hns3: fix kernel crash when unload VF while it is being reset (git-fixes).
- net: korina: fix return value (git-fixes).
- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1183405).
- net: stmmac: dwmac-sun8i: Balance internal PHY power (git-fixes).
- net: stmmac: dwmac-sun8i: Balance internal PHY resource references (git-fixes).
- net: stmmac: dwmac-sun8i: Balance syscon (de)initialization (git-fixes).
- net: stmmac: dwmac-sun8i: Fix probe error handling (git-fixes).
- net/mlx5: Fix a race on command flush flow (jsc#SLE-15172).
- net/mlx5e: Fix the calling of update_buffer_lossy() API (jsc#SLE-15172).
- netdevice: demote the type of some dev_addr_set() helpers (bsc#1200216).
- netfilter: conntrack: connection timeout after re-register (bsc#1199035).
- netfilter: conntrack: move synack init code to helper (bsc#1199035).
- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).
- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).
- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).
- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (bsc#1176447).
- NFC: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).
- NFC: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).
- NFC: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).
- NFC: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).
- NFC: NULL out the dev-&gt;rfkill to prevent UAF (git-fixes).
- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).
- NFS: Do not invalidate inode attributes on delegation return (git-fixes).
- nl80211: show SSID for P2P_GO interfaces (git-fixes).
- nvdimm/region: always show the 'align' attribute (bsc#1199114).
- nvme-tcp: allow selecting the network interface for connections (bsc#1199670).
- nvme-tcp: use __dev_get_by_name instead dev_get_by_name for OPT_HOST_IFACE (bsc#1199670).
- objtool: Fix type of reloc::addend (git-fixes).
- PCI: aardvark: Clear all MSIs at setup (git-fixes).
- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).
- PCI: Do not enable AtomicOps on VFs (git-fixes).
- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- PCI: imx6: Fix PERST# start-up sequence (git-fixes).
- PCI: iproc: Set affinity mask on MSI interrupts (git-fixes).
- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).
- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).
- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).
- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).
- PCI/PM: Power up all devices during runtime resume (git-fixes).
- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).
- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).
- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).
- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).
- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).
- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).
- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).
- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).
- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).
- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).
- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).
- pinctrl/rockchip: support deferring other gpio params (git-fixes).
- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).
- ping: remove pr_err from ping_lookup (bsc#1195826).
- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).
- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).
- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).
- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).
- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).
- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).
- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).
- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).
- powerpc/xive: Add some error handling code to 'xive_spapr_init()' (git-fixes).
- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).
- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).
- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).
- qlcnic: Fix error code in probe (git-fixes).
- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).
- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).
- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).
- revert scsi: qla2xxx: Changes to support FCP2 Target (bsc#1198438).
- rtc: fix use-after-free on device removal (git-fixes).
- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).
- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).
- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).
- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).
- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)
- sched/topology: Skip updating masks for non-online nodes (bsc#1197446 ltc#183000).
- scsi: dc395x: Fix a missing check on list iterator (git-fixes).
- scsi: fnic: Fix a tracing statement (git-fixes).
- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).
- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).
- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).
- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).
- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).
- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).
- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).
- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045 bsc#1198989 bsc#1197675).
- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).
- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).
- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).
- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).
- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).
- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).
- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).
- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).
- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).
- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).
- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).
- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).
- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).
- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).
- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045 bsc#1198989 bsc#1197675).
- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).
- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).
- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).
- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).
- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).
- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).
- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).
- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).
- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).
- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).
- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).
- scsi: lpfc: Remove unneeded variable (bsc#1200045).
- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).
- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).
- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).
- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).
- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).
- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).
- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).
- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).
- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).
- scsi: lpfc: Zero SLI4 fcp_cmnd buffer's fcpCntl0 field (bsc#1200045).
- scsi: pm8001: Fix abort all task initialization (git-fixes).
- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).
- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).
- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).
- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).
- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).
- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).
- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).
- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).
- scsi: sr: Do not leak information in ioctl (git-fixes).
- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).
- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).
- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).
- scsi: virtio-scsi: Eliminate anonymous module_init &amp; module_exit (git-fixes).
- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).
- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).
- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).
- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).
- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).
- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).
- serial: 8250: core: Remove unneeded &amp;lt;linux/pm_runtime.h&gt; (git-fixes).
- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).
- serial: 8250: pxa: Remove unneeded &amp;lt;linux/pm_runtime.h&gt; (git-fixes).
- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).
- serial: imx: fix overrun interrupts in DMA mode (git-fixes).
- serial: meson: acquire port-&gt;lock in startup() (git-fixes).
- serial: pch: do not overwrite xmit-&gt;buf[0] by x_char (git-fixes).
- serial: rda-uart: Do not allow CS5-6 (git-fixes).
- serial: sh-sci: Do not allow CS5-6 (git-fixes).
- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).
- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).
- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).
- serial: txx9: Do not allow CS5-6 (git-fixes).
- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).
- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).
- smsc911x: allow using IRQ0 (git-fixes).
- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).
- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).
- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).
- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).
- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).
- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).
- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).
- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).
- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).
- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).
- thermal: int340x: Fix attr.show callback prototype (git-fixes).
- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).
- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).
- timekeeping: Really make sure wall_to_monotonic isn't (git-fixes)
- timers: Fix warning condition in __run_timers() (git-fixes)
- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).
- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).
- tracing: Fix potential double free in create_var_ref() (git-fixes).
- tracing: Fix return value of trace_pid_write() (git-fixes).
- tty: fix deadlock caused by calling printk() under tty_port-&gt;lock (git-fixes).
- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).
- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).
- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).
- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).
- usb: cdc-wdm: fix reading stuck on device close (git-fixes).
- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).
- usb: ehci-omap: drop unused ehci_read() function (git-fixes).
- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).
- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).
- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).
- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).
- usb: quirks: add a Realtek card reader (git-fixes).
- usb: quirks: add STRING quirk for VCOM device (git-fixes).
- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).
- usb: serial: option: add Fibocom L610 modem (git-fixes).
- usb: serial: option: add Fibocom MA510 modem (git-fixes).
- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).
- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).
- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).
- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).
- usb: storage: karma: fix rio_karma_init return (git-fixes).
- usb: typec: mux: Check dev_set_name() return value (git-fixes).
- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).
- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).
- usb: typec: ucsi: Fix role swapping (git-fixes).
- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).
- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).
- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).
- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).
- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).
- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).
- xhci: increase usb U3 -&gt; U0 link resume timeout from 100ms to 500ms (git-fixes).
- xhci: stop polling roothubs after shutdown (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061840">SUSE bug 1061840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118212">SUSE bug 1118212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180100">SUSE bug 1180100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195826">SUSE bug 1195826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196478">SUSE bug 1196478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196570">SUSE bug 1196570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196840">SUSE bug 1196840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197446">SUSE bug 1197446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197472">SUSE bug 1197472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197601">SUSE bug 1197601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197675">SUSE bug 1197675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198438">SUSE bug 1198438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198971">SUSE bug 1198971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198989">SUSE bug 1198989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199035">SUSE bug 1199035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199052">SUSE bug 1199052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199114">SUSE bug 1199114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199564">SUSE bug 1199564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199626">SUSE bug 1199626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199631">SUSE bug 1199631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199670">SUSE bug 1199670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199839">SUSE bug 1199839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200019">SUSE bug 1200019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200045">SUSE bug 1200045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200046">SUSE bug 1200046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200192">SUSE bug 1200192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200216">SUSE bug 1200216</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-20008/">CVE-2022-20008</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695274" comment="cluster-md-kmp-64kb-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684890" comment="cluster-md-kmp-default-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695275" comment="cluster-md-kmp-preempt-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695276" comment="dlm-kmp-64kb-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684891" comment="dlm-kmp-default-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695277" comment="dlm-kmp-preempt-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695278" comment="dtb-al-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695279" comment="dtb-allwinner-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695280" comment="dtb-altera-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695281" comment="dtb-amd-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695282" comment="dtb-amlogic-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695283" comment="dtb-apm-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695284" comment="dtb-arm-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695285" comment="dtb-broadcom-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695286" comment="dtb-cavium-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695287" comment="dtb-exynos-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695288" comment="dtb-freescale-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695289" comment="dtb-hisilicon-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695290" comment="dtb-lg-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695291" comment="dtb-marvell-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695292" comment="dtb-mediatek-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695293" comment="dtb-nvidia-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695294" comment="dtb-qcom-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695295" comment="dtb-renesas-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695296" comment="dtb-rockchip-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695297" comment="dtb-socionext-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695298" comment="dtb-sprd-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695299" comment="dtb-xilinx-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695300" comment="dtb-zte-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695301" comment="gfs2-kmp-64kb-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684892" comment="gfs2-kmp-default-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695302" comment="gfs2-kmp-preempt-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684291" comment="kernel-64kb-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684292" comment="kernel-64kb-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695303" comment="kernel-64kb-extra-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695304" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695305" comment="kernel-64kb-optional-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695306" comment="kernel-debug-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695307" comment="kernel-debug-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695308" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684293" comment="kernel-default-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684294" comment="kernel-default-base-5.3.18-150300.59.71.2.150300.18.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695309" comment="kernel-default-base-rebuild-5.3.18-150300.59.71.2.150300.18.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684295" comment="kernel-default-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695310" comment="kernel-default-extra-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695311" comment="kernel-default-livepatch-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695312" comment="kernel-default-livepatch-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695313" comment="kernel-default-optional-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684296" comment="kernel-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684428" comment="kernel-docs-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695314" comment="kernel-docs-html-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695315" comment="kernel-kvmsmall-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695316" comment="kernel-kvmsmall-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695317" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684297" comment="kernel-macros-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684429" comment="kernel-obs-build-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695318" comment="kernel-obs-qa-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684298" comment="kernel-preempt-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684430" comment="kernel-preempt-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695319" comment="kernel-preempt-extra-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695320" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695321" comment="kernel-preempt-optional-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684431" comment="kernel-source-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695322" comment="kernel-source-vanilla-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684432" comment="kernel-syms-5.3.18-150300.59.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684299" comment="kernel-zfcpdump-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695323" comment="kselftests-kmp-64kb-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695324" comment="kselftests-kmp-default-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695325" comment="kselftests-kmp-preempt-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695326" comment="ocfs2-kmp-64kb-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684893" comment="ocfs2-kmp-default-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695327" comment="ocfs2-kmp-preempt-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695328" comment="reiserfs-kmp-64kb-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684551" comment="reiserfs-kmp-default-5.3.18-150300.59.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695329" comment="reiserfs-kmp-preempt-5.3.18-150300.59.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52733" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1061840" ref_url="https://bugzilla.suse.com/1061840" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1103269" ref_url="https://bugzilla.suse.com/1103269" source="BUGZILLA"/>
		<reference ref_id="1118212" ref_url="https://bugzilla.suse.com/1118212" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1180100" ref_url="https://bugzilla.suse.com/1180100" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1195826" ref_url="https://bugzilla.suse.com/1195826" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1196478" ref_url="https://bugzilla.suse.com/1196478" source="BUGZILLA"/>
		<reference ref_id="1196570" ref_url="https://bugzilla.suse.com/1196570" source="BUGZILLA"/>
		<reference ref_id="1196840" ref_url="https://bugzilla.suse.com/1196840" source="BUGZILLA"/>
		<reference ref_id="1197446" ref_url="https://bugzilla.suse.com/1197446" source="BUGZILLA"/>
		<reference ref_id="1197472" ref_url="https://bugzilla.suse.com/1197472" source="BUGZILLA"/>
		<reference ref_id="1197601" ref_url="https://bugzilla.suse.com/1197601" source="BUGZILLA"/>
		<reference ref_id="1197675" ref_url="https://bugzilla.suse.com/1197675" source="BUGZILLA"/>
		<reference ref_id="1198438" ref_url="https://bugzilla.suse.com/1198438" source="BUGZILLA"/>
		<reference ref_id="1198534" ref_url="https://bugzilla.suse.com/1198534" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198971" ref_url="https://bugzilla.suse.com/1198971" source="BUGZILLA"/>
		<reference ref_id="1198989" ref_url="https://bugzilla.suse.com/1198989" source="BUGZILLA"/>
		<reference ref_id="1199035" ref_url="https://bugzilla.suse.com/1199035" source="BUGZILLA"/>
		<reference ref_id="1199052" ref_url="https://bugzilla.suse.com/1199052" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199114" ref_url="https://bugzilla.suse.com/1199114" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199564" ref_url="https://bugzilla.suse.com/1199564" source="BUGZILLA"/>
		<reference ref_id="1199626" ref_url="https://bugzilla.suse.com/1199626" source="BUGZILLA"/>
		<reference ref_id="1199631" ref_url="https://bugzilla.suse.com/1199631" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1199670" ref_url="https://bugzilla.suse.com/1199670" source="BUGZILLA"/>
		<reference ref_id="1199839" ref_url="https://bugzilla.suse.com/1199839" source="BUGZILLA"/>
		<reference ref_id="1200019" ref_url="https://bugzilla.suse.com/1200019" source="BUGZILLA"/>
		<reference ref_id="1200045" ref_url="https://bugzilla.suse.com/1200045" source="BUGZILLA"/>
		<reference ref_id="1200046" ref_url="https://bugzilla.suse.com/1200046" source="BUGZILLA"/>
		<reference ref_id="1200192" ref_url="https://bugzilla.suse.com/1200192" source="BUGZILLA"/>
		<reference ref_id="1200216" ref_url="https://bugzilla.suse.com/1200216" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972/" source="CVE"/>
		<reference ref_id="CVE-2022-20008" ref_url="https://www.suse.com/security/cve/CVE-2022-20008/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-20008: Fixed bug that allows to read kernel heap memory due to uninitialized data in mmc_blk_read_single of block.c. (bnc#1199564)
- CVE-2022-0168: Fixed a NULL pointer dereference in smb2_ioctl_query_info. (bsc#1197472)
- CVE-2022-24448: Fixed an issue if an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).

The following non-security bugs were fixed:

- ACPI: property: Release subnode properties with data nodes (git-fixes).
- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).
- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).
- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).
- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).
- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).
- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).
- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).
- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).
- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).
- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).
- ALSA: wavefront: Proper check of get_user() error (git-fixes).
- ARM: 9169/1: entry: fix Thumb2 bug in iWMMXt exception handling (git-fixes)
- ARM: 9170/1: fix panic when kasan and kprobe are enabled (git-fixes)
- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes)
- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes)
- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes)
- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes)
- ARM: dts: armada-38x: Add generic compatible to UART nodes (git-fixes)
- ARM: dts: at91: fix pinctrl phandles (git-fixes)
- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes)
- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes)
- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes)
- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes)
- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes)
- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes)
- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes)
- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes)
- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes)
- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes)
- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes)
- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes)
- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes)
- ARM: dts: imx6ull-pinfunc: Fix CSI_DATA07__ESAI_TX0 pad name (git-fixes)
- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes)
- ARM: dts: meson: Fix the UART compatible strings (git-fixes)
- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes)
- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes)
- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes)
- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes)
- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes)
- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes)
- ARM: mediatek: select arch timer for mt7629 (git-fixes)
- ARM: omap: remove debug-leds driver (git-fixes)
- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes)
- ARM: socfpga: dts: fix qspi node compatible (git-fixes)
- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes)
- ARM: tegra: Move panels to AUX bus (git-fixes)
- arm64: dts: broadcom: Fix sata nodename (git-fixes)
- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes)
- arm64: dts: rockchip: Fix SDIO regulator supply properties on (git-fixes)
- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).
- arm64: pgtable: make __pte_to_phys/__phys_to_pte_val inline functions (git-fixes)
- arm64/mm: avoid fixmap race condition when create pud mapping (git-fixes)
- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).
- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).
- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).
- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).
- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).
- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).
- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).
- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).
- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).
- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).
- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).
- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).
- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).
- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).
- ASoC: rt5514: Fix event generation for 'DSP Voice Wake Up' control (git-fixes).
- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).
- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).
- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect (git-fixes).
- ata: pata_hpt37x: fix PCI clock detection (git-fixes).
- ata: pata_marvell: Check the 'bmdma_addr' beforing reading (git-fixes).
- ath9k_htc: fix potential out of bounds access with invalid rxstatus-&gt;rs_keyix (git-fixes).
- ath9k: fix ar9003_get_eepmisc (git-fixes).
- backlight: qcom-wled: Respect enabled-strings in set_brightness (bsc#1152489)
- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).
- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).
- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).
- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).
- Bluetooth: Fix the creation of hdev-&gt;name (git-fixes).
- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).
- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix unnecessary dropping of RX packets (jsc#SLE-15075).
- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).
- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).
- can: grcan: grcan_close(): fix deadlock (git-fixes).
- can: grcan: use ofdev-&gt;dev when allocating DMA memory (git-fixes).
- carl9170: tx: fix an incorrect use of list iterator (git-fixes).
- ceph: fix setting of xattrs on async created inodes (bsc#1200192).
- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).
- clk: at91: generated: consider range when calculating best rate (git-fixes).
- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).
- clk: imx8mp: fix usb_root_clk parent (git-fixes).
- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).
- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).
- copy_process(): Move fd_install() out of sighand-&gt;siglock critical section (bsc#1199626).
- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).
- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).
- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).
- crypto: x86 - eliminate anonymous module_init &amp; module_exit (git-fixes).
- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).
- dim: initialize all struct fields (git-fixes).
- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).
- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).
- docs: powerpc: Fix misspellings and grammar errors (bsc#1055117 ltc#159753).
- docs: submitting-patches: Fix crossref to 'The canonical patch format' (git-fixes).
- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).
- drbd: fix duplicate array initializer (git-fixes).
- drbd: Fix five use after free bugs in get_initial_state (git-fixes).
- drbd: remove assign_p_sizes_qlim (git-fixes).
- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).
- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).
- driver core: fix deadlock in __device_attach (git-fixes).
- driver: base: fix UAF when driver_attach failed (git-fixes).
- drivers: base: cacheinfo: Get rid of DEFINE_SMP_CALL_CACHE_FUNCTION() (git-fixes)
- drivers/base/memory: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).
- drivers/base/node.c: fix compaction sysfs file leak (git-fixes).
- drm: mali-dp: potential dereference of null pointer (git-fixes).
- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).
- drm: sti: do not use kernel-doc markers (git-fixes).
- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1152472)
- drm/amd/display/dc/gpio/gpio_service: Pass around correct dce_{version, environment} types (git-fixes).
- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1152489)
- drm/amdkfd: Fix GWS queue count (git-fixes).
- drm/blend: fix typo in the comment (git-fixes).
- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).
- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).
- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).
- drm/cma-helper: Set VM_DONTEXPAND for mmap (bsc#1152472)
- drm/edid: fix invalid EDID extension block filtering (git-fixes).
- drm/fb-helper: Mark screen buffers in system memory with (bsc#1152472)
- drm/i915: Drop all references to DRM IRQ midlayer (bsc#1152489)
- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).
- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (git-fixes).
- drm/i915: Keep gem ctx-&gt;vm alive until the final put (bsc#1152489)
- drm/i915: s/JSP2/ICP2/ PCH (bsc#1152489)
- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).
- drm/mediatek: Fix mtk_cec_mask() (git-fixes).
- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).
- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).
- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).
- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).
- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).
- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).
- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/msm/mdp5: check the return of kzalloc() (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).
- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).
- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).
- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).
- drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap (bsc#1152472)
- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).
- drm/vc4: crtc: Lookup the encoder from the register at boot (bsc#1198534)
- drm/vc4: hvs: Reset muxes at probe time (git-fixes).
- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).
- drm/vc4: txp: Force alpha to be 0xff if it's disabled (git-fixes).
- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).
- drm/vmwgfx: Remove unused compile options (bsc#1152472)
- EDAC/synopsys: Read the error count from the correct register (bsc#1178134).
- firewire: core: extend card-&gt;lock in fw_core_handle_bus_reset (git-fixes).
- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).
- firewire: remove check of list iterator against head past the loop body (git-fixes).
- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).
- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).
- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).
- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).
- Fix double fget() in vhost_net_set_backend() (git-fixes).
- genirq: Fix reference leaks on irq affinity notifiers (git-fixes)
- genirq: Let GENERIC_IRQ_IPI select IRQ_DOMAIN_HIERARCHY (git-fixes)
- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)
- genirq/affinity: Handle affinity setting on inactive (git-fixes)
- genirq/msi: Ensure deactivation on teardown (git-fixes)
- genirq/proc: Reject invalid affinity masks (again) (git-fixes)
- genirq/timings: Fix error return code in (git-fixes)
- genirq/timings: Prevent potential array overflow in (git-fixes)
- gma500: fix an incorrect NULL check on list iterator (git-fixes).
- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).
- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).
- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).
- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).
- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).
- gpiolib: of: fix bounds check for 'gpio-reserved-ranges' (git-fixes).
- hex2bin: fix access beyond string end (git-fixes).
- HID: elan: Fix potential double free in elan_input_configured (git-fixes).
- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).
- hinic: fix bug of wq out of bound access (bsc#1176447).
- hwmon: (f71882fg) Fix negative temperature (git-fixes).
- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).
- hwmon: (tmp401) Add OF device ID table (git-fixes).
- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).
- i2c: at91: use dma safe buffers (git-fixes).
- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).
- i40e: stop disabling VFs due to PF error responses (git-fixes).
- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (jsc#SLE-12878).
- ice: Clear default forwarding VSI during VSI release (jsc#SLE-12878).
- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (jsc#SLE-7926).
- ice: Fix race conditions between virtchnl handling and VF ndo ops (git-fixes).
- ice: synchronize_rcu() when terminating rings (jsc#SLE-7926).
- iio: adc: ad7124: Remove shift from scan_type (git-fixes).
- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).
- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).
- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).
- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).
- iio: dac: ad5592r: Fix the missing return value (git-fixes).
- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).
- Input: add bounds checking to input_set_capability() (git-fixes).
- Input: ili210x - fix reset timing (git-fixes).
- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).
- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).
- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).
- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).
- ionic: avoid races in ionic_heartbeat_check (bsc#1167773).
- ionic: Cleanups in the Tx hotpath code (bsc#1167773).
- ionic: disable napi when ionic_lif_init() fails (bsc#1167773).
- ionic: Do not send reset commands if FW isn't running (bsc#1167773).
- ionic: fix missing pci_release_regions() on error in ionic_probe() (bsc#1167773).
- ionic: fix type complaint in ionic_dev_cmd_clean() (jsc#SLE-16649).
- ionic: monitor fw status generation (bsc#1167773).
- ionic: remove the dbid_inuse bitmap (bsc#1167773).
- ionic: start watchdog after all is setup (bsc#1167773).
- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).
- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).
- iwlwifi: mvm: fix the return type for DSM functions 1 and 2 (git-fixes).
- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).
- kABI: ivtv: restore caps member (git-fixes).
- Kconfig.debug: drop selecting non-existing HARDLOCKUP_DETECTOR_ARCH (git-fixes).
- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).
- KVM: VMX: Fix stale docs for kvm-intel.emulate_invalid_guest_state (git-fixes).
- lan743x: fix rx_napi_poll/interrupt ping-pong (git-fixes).
- lan743x: remove redundant assignment to variable rx_process_result (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- lpfc: Readd update to version 14.2.0.1 (bsc#1197675 bsc#1196478 bsc#1198989) The update was reverted due to some regression on older hardware. These have been fixed in the meantime, thus update the driver.
- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).
- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).
- mac80211: Reset MBSSID parameters upon connection (git-fixes).
- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).
- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).
- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).
- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-fixes).
- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).
- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).
- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).
- media: videobuf2: Fix the size printk format (git-fixes).
- media: vim2m: Register video device after setting up internals (git-fixes).
- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).
- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).
- mm, page_alloc: fix build_zonerefs_node() (git-fixes).
- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (jsc#SLE-15176, jsc#SLE-16387).
- mmc: block: Use generic_cmd6_time when modifying INAND_CMD38_ARG_EXT_CSD (git-fixes).
- mmc: core: Specify timeouts for BKOPS and CACHE_FLUSH for eMMC (git-fixes).
- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- mt76: mt7663s: fix rx buffer refcounting (git-fixes).
- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).
- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).
- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).
- net: bcmgenet: Fix a resource leak in an error handling path in the probe functin (git-fixes).
- net: dsa: lantiq_gswip: Enable GSWIP_MII_CFG_EN also for internal PHYs (git-fixes).
- net: dsa: lantiq_gswip: Fix GSWIP_MII_CFG(p) register access (git-fixes).
- net: ethernet: Fix memleak in ethoc_probe (git-fixes).
- net: ethernet: ti: cpts: fix ethtool output when no ptp_clock registered (git-fixes).
- net: hdlc_ppp: Fix issues when mod_timer is called while timer is running (git-fixes).
- net: hns3: add a check for index in hclge_get_rss_key() (git-fixes).
- net: hns3: clear inited state and stop client after failed to register netdev (bsc#1154353).
- net: hns3: fix bug when PF set the duplicate MAC address for VFs (jsc#SLE-14777).
- net: hns3: fix kernel crash when unload VF while it is being reset (git-fixes).
- net: korina: fix return value (git-fixes).
- net: mana: Add counter for packet dropped by XDP (bsc#1195651).
- net: mana: Add counter for XDP_TX (bsc#1195651).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- net: mana: Reuse XDP dropped page (bsc#1195651).
- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).
- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1183405).
- net: stmmac: dwmac-sun8i: Balance internal PHY power (git-fixes).
- net: stmmac: dwmac-sun8i: Balance internal PHY resource references (git-fixes).
- net: stmmac: dwmac-sun8i: Balance syscon (de)initialization (git-fixes).
- net: stmmac: dwmac-sun8i: Fix probe error handling (git-fixes).
- net/mlx5: Fix a race on command flush flow (jsc#SLE-15172).
- net/mlx5e: Fix the calling of update_buffer_lossy() API (jsc#SLE-15172).
- netdevice: demote the type of some dev_addr_set() helpers (bsc#1200216).
- netfilter: conntrack: connection timeout after re-register (bsc#1199035).
- netfilter: conntrack: move synack init code to helper (bsc#1199035).
- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).
- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).
- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).
- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (bsc#1176447).
- NFC: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).
- NFC: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).
- NFC: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).
- NFC: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).
- NFC: NULL out the dev-&gt;rfkill to prevent UAF (git-fixes).
- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).
- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).
- nl80211: show SSID for P2P_GO interfaces (git-fixes).
- nvdimm/region: always show the 'align' attribute (bsc#1199114).
- nvme-tcp: allow selecting the network interface for connections (bsc#1199670).
- nvme-tcp: use __dev_get_by_name instead dev_get_by_name for OPT_HOST_IFACE (bsc#1199670).
- objtool: Fix type of reloc::addend (git-fixes).
- PCI: aardvark: Clear all MSIs at setup (git-fixes).
- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).
- PCI: Do not enable AtomicOps on VFs (git-fixes).
- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- PCI: imx6: Fix PERST# start-up sequence (git-fixes).
- PCI: iproc: Set affinity mask on MSI interrupts (git-fixes).
- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).
- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).
- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).
- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).
- PCI/PM: Power up all devices during runtime resume (git-fixes).
- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).
- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).
- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).
- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).
- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).
- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).
- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).
- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).
- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).
- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).
- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).
- pinctrl/rockchip: support deferring other gpio params (git-fixes).
- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).
- ping: remove pr_err from ping_lookup (bsc#1195826).
- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).
- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).
- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).
- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).
- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).
- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).
- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).
- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).
- powerpc/xive: Add some error handling code to 'xive_spapr_init()' (git-fixes).
- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).
- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).
- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).
- qlcnic: Fix error code in probe (git-fixes).
- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).
- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).
- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).
- rtc: fix use-after-free on device removal (git-fixes).
- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).
- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).
- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).
- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).
- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)
- sched/topology: Skip updating masks for non-online nodes (bsc#1197446 ltc#183000).
- scsi: dc395x: Fix a missing check on list iterator (git-fixes).
- scsi: fnic: Fix a tracing statement (git-fixes).
- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).
- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).
- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).
- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).
- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).
- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).
- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).
- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045 bsc#1198989 bsc#1197675).
- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).
- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).
- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).
- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).
- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).
- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).
- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).
- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).
- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).
- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).
- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).
- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).
- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).
- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).
- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045 bsc#1198989 bsc#1197675).
- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).
- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).
- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).
- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).
- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).
- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).
- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).
- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).
- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).
- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).
- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).
- scsi: lpfc: Remove unneeded variable (bsc#1200045).
- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).
- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).
- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).
- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).
- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).
- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).
- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).
- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).
- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).
- scsi: lpfc: Zero SLI4 fcp_cmnd buffer's fcpCntl0 field (bsc#1200045).
- scsi: pm8001: Fix abort all task initialization (git-fixes).
- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).
- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).
- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).
- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).
- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).
- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).
- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).
- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).
- scsi: sr: Do not leak information in ioctl (git-fixes).
- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).
- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).
- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).
- scsi: virtio-scsi: Eliminate anonymous module_init &amp; module_exit (git-fixes).
- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).
- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).
- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).
- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).
- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).
- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).
- serial: 8250: core: Remove unneeded &amp;lt;linux/pm_runtime.h&gt; (git-fixes).
- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).
- serial: 8250: pxa: Remove unneeded &amp;lt;linux/pm_runtime.h&gt; (git-fixes).
- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).
- serial: imx: fix overrun interrupts in DMA mode (git-fixes).
- serial: meson: acquire port-&gt;lock in startup() (git-fixes).
- serial: pch: do not overwrite xmit-&gt;buf[0] by x_char (git-fixes).
- serial: rda-uart: Do not allow CS5-6 (git-fixes).
- serial: sh-sci: Do not allow CS5-6 (git-fixes).
- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).
- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).
- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).
- serial: txx9: Do not allow CS5-6 (git-fixes).
- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).
- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).
- smsc911x: allow using IRQ0 (git-fixes).
- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).
- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).
- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).
- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).
- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).
- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).
- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).
- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).
- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).
- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).
- thermal: int340x: Fix attr.show callback prototype (git-fixes).
- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).
- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).
- timekeeping: Really make sure wall_to_monotonic isn't (git-fixes)
- timers: Fix warning condition in __run_timers() (git-fixes)
- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).
- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).
- tracing: Fix potential double free in create_var_ref() (git-fixes).
- tracing: Fix return value of trace_pid_write() (git-fixes).
- tty: fix deadlock caused by calling printk() under tty_port-&gt;lock (git-fixes).
- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).
- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).
- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).
- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).
- usb: cdc-wdm: fix reading stuck on device close (git-fixes).
- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).
- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).
- usb: dwc3: gadget: Return proper request status (git-fixes).
- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).
- usb: ehci-omap: drop unused ehci_read() function (git-fixes).
- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).
- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (bsc#1152489)
- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).
- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).
- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).
- usb: quirks: add a Realtek card reader (git-fixes).
- usb: quirks: add STRING quirk for VCOM device (git-fixes).
- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).
- usb: serial: option: add Fibocom L610 modem (git-fixes).
- usb: serial: option: add Fibocom MA510 modem (git-fixes).
- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).
- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).
- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).
- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).
- usb: storage: karma: fix rio_karma_init return (git-fixes).
- usb: typec: mux: Check dev_set_name() return value (git-fixes).
- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).
- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).
- usb: typec: ucsi: Fix role swapping (git-fixes).
- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).
- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).
- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).
- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).
- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).
- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).
- xhci: increase usb U3 -&gt; U0 link resume timeout from 100ms to 500ms (git-fixes).
- xhci: stop polling roothubs after shutdown (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061840">SUSE bug 1061840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103269">SUSE bug 1103269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118212">SUSE bug 1118212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180100">SUSE bug 1180100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195826">SUSE bug 1195826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196478">SUSE bug 1196478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196570">SUSE bug 1196570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196840">SUSE bug 1196840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197446">SUSE bug 1197446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197472">SUSE bug 1197472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197601">SUSE bug 1197601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197675">SUSE bug 1197675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198438">SUSE bug 1198438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198534">SUSE bug 1198534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198971">SUSE bug 1198971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198989">SUSE bug 1198989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199035">SUSE bug 1199035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199052">SUSE bug 1199052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199114">SUSE bug 1199114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199564">SUSE bug 1199564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199626">SUSE bug 1199626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199631">SUSE bug 1199631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199670">SUSE bug 1199670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199839">SUSE bug 1199839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200019">SUSE bug 1200019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200045">SUSE bug 1200045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200046">SUSE bug 1200046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200192">SUSE bug 1200192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200216">SUSE bug 1200216</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-20008/">CVE-2022-20008</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695330" comment="cluster-md-kmp-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695331" comment="dlm-kmp-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695332" comment="gfs2-kmp-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684718" comment="kernel-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684719" comment="kernel-azure-devel-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695333" comment="kernel-azure-extra-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695334" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695335" comment="kernel-azure-optional-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684720" comment="kernel-devel-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684721" comment="kernel-source-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684722" comment="kernel-syms-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695336" comment="kselftests-kmp-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695337" comment="ocfs2-kmp-azure-5.3.18-150300.38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695338" comment="reiserfs-kmp-azure-5.3.18-150300.38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52734" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195324" ref_url="https://bugzilla.suse.com/1195324" source="BUGZILLA"/>
		<reference ref_id="1199889" ref_url="https://bugzilla.suse.com/1199889" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4091" ref_url="https://www.suse.com/security/cve/CVE-2021-4091/" source="CVE"/>
		<reference ref_id="CVE-2022-1949" ref_url="https://www.suse.com/security/cve/CVE-2022-1949/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011288.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2021-4091: Fixed double free in psearch (bsc#1195324).
- CVE-2022-1949: Fixed full access control bypass with simple crafted query (bsc#1199889).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-14"/>
	<updated date="2022-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195324">SUSE bug 1195324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199889">SUSE bug 1199889</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4091/">CVE-2021-4091</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1949/">CVE-2022-1949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684779" comment="389-ds-1.4.4.19~git38.9951c1101-150300.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684780" comment="389-ds-devel-1.4.4.19~git38.9951c1101-150300.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695339" comment="389-ds-snmp-1.4.4.19~git38.9951c1101-150300.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684781" comment="lib389-1.4.4.19~git38.9951c1101-150300.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684782" comment="libsvrcore0-1.4.4.19~git38.9951c1101-150300.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52735" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1193623" ref_url="https://bugzilla.suse.com/1193623" source="BUGZILLA"/>
		<reference ref_id="1193719" ref_url="https://bugzilla.suse.com/1193719" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GRZCYHIJFWN3FE3P7JJYRY7F7UO2HTA/" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-04"/>
	<updated date="2022-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193623">SUSE bug 1193623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193719">SUSE bug 1193719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661942" comment="libvirt-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661943" comment="libvirt-admin-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661944" comment="libvirt-bash-completion-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661945" comment="libvirt-client-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661946" comment="libvirt-daemon-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661947" comment="libvirt-daemon-config-network-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661948" comment="libvirt-daemon-config-nwfilter-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661949" comment="libvirt-daemon-driver-interface-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661950" comment="libvirt-daemon-driver-libxl-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661951" comment="libvirt-daemon-driver-lxc-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661952" comment="libvirt-daemon-driver-network-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661953" comment="libvirt-daemon-driver-nodedev-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661954" comment="libvirt-daemon-driver-nwfilter-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661955" comment="libvirt-daemon-driver-qemu-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661956" comment="libvirt-daemon-driver-secret-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661957" comment="libvirt-daemon-driver-storage-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661958" comment="libvirt-daemon-driver-storage-core-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661959" comment="libvirt-daemon-driver-storage-disk-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662424" comment="libvirt-daemon-driver-storage-gluster-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661960" comment="libvirt-daemon-driver-storage-iscsi-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661961" comment="libvirt-daemon-driver-storage-iscsi-direct-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661962" comment="libvirt-daemon-driver-storage-logical-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661963" comment="libvirt-daemon-driver-storage-mpath-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661964" comment="libvirt-daemon-driver-storage-rbd-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661965" comment="libvirt-daemon-driver-storage-scsi-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661966" comment="libvirt-daemon-hooks-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661967" comment="libvirt-daemon-lxc-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661968" comment="libvirt-daemon-qemu-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661969" comment="libvirt-daemon-xen-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661970" comment="libvirt-devel-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662425" comment="libvirt-devel-32bit-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661971" comment="libvirt-doc-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661941" comment="libvirt-libs-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661972" comment="libvirt-lock-sanlock-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661973" comment="libvirt-nss-7.1.0-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662426" comment="wireshark-plugin-libvirt-7.1.0-6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52736" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172033" ref_url="https://bugzilla.suse.com/1172033" source="BUGZILLA"/>
		<reference ref_id="1181361" ref_url="https://bugzilla.suse.com/1181361" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13253" ref_url="https://www.suse.com/security/cve/CVE-2020-13253/" source="CVE"/>
		<reference ref_id="CVE-2021-20196" ref_url="https://www.suse.com/security/cve/CVE-2021-20196/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORE7QLMZXD7OV3HIKQUG3SXU2RG6ONFC/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-13253: Fixed an OOB access that could crash the guest resulting in DoS (bsc#1172033)
- CVE-2021-20196: Fixed null pointer dereference that may lead to guest crash (bsc#1181361).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1172033">SUSE bug 1172033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181361">SUSE bug 1181361</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13253/">CVE-2020-13253</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20196/">CVE-2021-20196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664059" comment="qemu-s390-4.2.1-11.34.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52737" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1070955" ref_url="https://bugzilla.suse.com/1070955" source="BUGZILLA"/>
		<reference ref_id="1191770" ref_url="https://bugzilla.suse.com/1191770" source="BUGZILLA"/>
		<reference ref_id="1192167" ref_url="https://bugzilla.suse.com/1192167" source="BUGZILLA"/>
		<reference ref_id="1192902" ref_url="https://bugzilla.suse.com/1192902" source="BUGZILLA"/>
		<reference ref_id="1192903" ref_url="https://bugzilla.suse.com/1192903" source="BUGZILLA"/>
		<reference ref_id="1192904" ref_url="https://bugzilla.suse.com/1192904" source="BUGZILLA"/>
		<reference ref_id="1193466" ref_url="https://bugzilla.suse.com/1193466" source="BUGZILLA"/>
		<reference ref_id="1193905" ref_url="https://bugzilla.suse.com/1193905" source="BUGZILLA"/>
		<reference ref_id="1194093" ref_url="https://bugzilla.suse.com/1194093" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194217" ref_url="https://bugzilla.suse.com/1194217" source="BUGZILLA"/>
		<reference ref_id="1194388" ref_url="https://bugzilla.suse.com/1194388" source="BUGZILLA"/>
		<reference ref_id="1194872" ref_url="https://bugzilla.suse.com/1194872" source="BUGZILLA"/>
		<reference ref_id="1194885" ref_url="https://bugzilla.suse.com/1194885" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195203" ref_url="https://bugzilla.suse.com/1195203" source="BUGZILLA"/>
		<reference ref_id="1195332" ref_url="https://bugzilla.suse.com/1195332" source="BUGZILLA"/>
		<reference ref_id="1195354" ref_url="https://bugzilla.suse.com/1195354" source="BUGZILLA"/>
		<reference ref_id="1196361" ref_url="https://bugzilla.suse.com/1196361" source="BUGZILLA"/>
		<reference ref_id="1198596" ref_url="https://bugzilla.suse.com/1198596" source="BUGZILLA"/>
		<reference ref_id="1198748" ref_url="https://bugzilla.suse.com/1198748" source="BUGZILLA"/>
		<reference ref_id="1199331" ref_url="https://bugzilla.suse.com/1199331" source="BUGZILLA"/>
		<reference ref_id="1199333" ref_url="https://bugzilla.suse.com/1199333" source="BUGZILLA"/>
		<reference ref_id="1199334" ref_url="https://bugzilla.suse.com/1199334" source="BUGZILLA"/>
		<reference ref_id="1199651" ref_url="https://bugzilla.suse.com/1199651" source="BUGZILLA"/>
		<reference ref_id="1199655" ref_url="https://bugzilla.suse.com/1199655" source="BUGZILLA"/>
		<reference ref_id="1199693" ref_url="https://bugzilla.suse.com/1199693" source="BUGZILLA"/>
		<reference ref_id="1199745" ref_url="https://bugzilla.suse.com/1199745" source="BUGZILLA"/>
		<reference ref_id="1199747" ref_url="https://bugzilla.suse.com/1199747" source="BUGZILLA"/>
		<reference ref_id="1199936" ref_url="https://bugzilla.suse.com/1199936" source="BUGZILLA"/>
		<reference ref_id="1200010" ref_url="https://bugzilla.suse.com/1200010" source="BUGZILLA"/>
		<reference ref_id="1200011" ref_url="https://bugzilla.suse.com/1200011" source="BUGZILLA"/>
		<reference ref_id="1200012" ref_url="https://bugzilla.suse.com/1200012" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17087" ref_url="https://www.suse.com/security/cve/CVE-2017-17087/" source="CVE"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3875" ref_url="https://www.suse.com/security/cve/CVE-2021-3875/" source="CVE"/>
		<reference ref_id="CVE-2021-3903" ref_url="https://www.suse.com/security/cve/CVE-2021-3903/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3968" ref_url="https://www.suse.com/security/cve/CVE-2021-3968/" source="CVE"/>
		<reference ref_id="CVE-2021-3973" ref_url="https://www.suse.com/security/cve/CVE-2021-3973/" source="CVE"/>
		<reference ref_id="CVE-2021-3974" ref_url="https://www.suse.com/security/cve/CVE-2021-3974/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4069" ref_url="https://www.suse.com/security/cve/CVE-2021-4069/" source="CVE"/>
		<reference ref_id="CVE-2021-4136" ref_url="https://www.suse.com/security/cve/CVE-2021-4136/" source="CVE"/>
		<reference ref_id="CVE-2021-4166" ref_url="https://www.suse.com/security/cve/CVE-2021-4166/" source="CVE"/>
		<reference ref_id="CVE-2021-4192" ref_url="https://www.suse.com/security/cve/CVE-2021-4192/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0128" ref_url="https://www.suse.com/security/cve/CVE-2022-0128/" source="CVE"/>
		<reference ref_id="CVE-2022-0213" ref_url="https://www.suse.com/security/cve/CVE-2022-0213/" source="CVE"/>
		<reference ref_id="CVE-2022-0261" ref_url="https://www.suse.com/security/cve/CVE-2022-0261/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0359" ref_url="https://www.suse.com/security/cve/CVE-2022-0359/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0392" ref_url="https://www.suse.com/security/cve/CVE-2022-0392/" source="CVE"/>
		<reference ref_id="CVE-2022-0407" ref_url="https://www.suse.com/security/cve/CVE-2022-0407/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="CVE-2022-0696" ref_url="https://www.suse.com/security/cve/CVE-2022-0696/" source="CVE"/>
		<reference ref_id="CVE-2022-1381" ref_url="https://www.suse.com/security/cve/CVE-2022-1381/" source="CVE"/>
		<reference ref_id="CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420/" source="CVE"/>
		<reference ref_id="CVE-2022-1616" ref_url="https://www.suse.com/security/cve/CVE-2022-1616/" source="CVE"/>
		<reference ref_id="CVE-2022-1619" ref_url="https://www.suse.com/security/cve/CVE-2022-1619/" source="CVE"/>
		<reference ref_id="CVE-2022-1620" ref_url="https://www.suse.com/security/cve/CVE-2022-1620/" source="CVE"/>
		<reference ref_id="CVE-2022-1733" ref_url="https://www.suse.com/security/cve/CVE-2022-1733/" source="CVE"/>
		<reference ref_id="CVE-2022-1735" ref_url="https://www.suse.com/security/cve/CVE-2022-1735/" source="CVE"/>
		<reference ref_id="CVE-2022-1771" ref_url="https://www.suse.com/security/cve/CVE-2022-1771/" source="CVE"/>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1796" ref_url="https://www.suse.com/security/cve/CVE-2022-1796/" source="CVE"/>
		<reference ref_id="CVE-2022-1851" ref_url="https://www.suse.com/security/cve/CVE-2022-1851/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1898" ref_url="https://www.suse.com/security/cve/CVE-2022-1898/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2017-17087: Fixed information leak via .swp files (bsc#1070955).
- CVE-2021-3875: Fixed heap-based buffer overflow (bsc#1191770).
- CVE-2021-3903: Fixed heap-based buffer overflow (bsc#1192167).
- CVE-2021-3968: Fixed heap-based buffer overflow (bsc#1192902).
- CVE-2021-3973: Fixed heap-based buffer overflow (bsc#1192903).
- CVE-2021-3974: Fixed use-after-free (bsc#1192904).
- CVE-2021-4069: Fixed use-after-free in ex_open()in src/ex_docmd.c (bsc#1193466).
- CVE-2021-4136: Fixed heap-based buffer overflow (bsc#1193905).
- CVE-2021-4166: Fixed out-of-bounds read (bsc#1194093).
- CVE-2021-4192: Fixed use-after-free (bsc#1194217).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2022-0128: Fixed out-of-bounds read (bsc#1194388).
- CVE-2022-0213: Fixed heap-based buffer overflow (bsc#1194885).
- CVE-2022-0261: Fixed heap-based buffer overflow (bsc#1194872).
- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2022-0359: Fixed heap-based buffer overflow in init_ccline() in ex_getln.c (bsc#1195203).
- CVE-2022-0392: Fixed heap-based buffer overflow (bsc#1195332).
- CVE-2022-0407: Fixed heap-based buffer overflow (bsc#1195354).
- CVE-2022-0696: Fixed NULL pointer dereference (bsc#1196361).
- CVE-2022-1381: Fixed global heap buffer overflow in skip_range (bsc#1198596).
- CVE-2022-1420: Fixed out-of-range pointer offset (bsc#1198748).
- CVE-2022-1616: Fixed use-after-free in append_command (bsc#1199331).
- CVE-2022-1619: Fixed heap-based Buffer Overflow in function cmdline_erase_chars (bsc#1199333).
- CVE-2022-1620: Fixed NULL pointer dereference in function vim_regexec_string (bsc#1199334).
- CVE-2022-1733: Fixed heap-based buffer overflow in cindent.c (bsc#1199655).
- CVE-2022-1735: Fixed heap-based buffer overflow (bsc#1199651).
- CVE-2022-1771: Fixed stack exhaustion (bsc#1199693).
- CVE-2022-1785: Fixed out-of-bounds write (bsc#1199745).
- CVE-2022-1796: Fixed use-after-free in find_pattern_in_path (bsc#1199747).
- CVE-2022-1851: Fixed out-of-bounds read (bsc#1199936).
- CVE-2022-1897: Fixed out-of-bounds write (bsc#1200010).
- CVE-2022-1898: Fixed use-after-free (bsc#1200011).
- CVE-2022-1927: Fixed buffer over-read (bsc#1200012).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070955">SUSE bug 1070955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191770">SUSE bug 1191770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192167">SUSE bug 1192167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192902">SUSE bug 1192902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192903">SUSE bug 1192903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192904">SUSE bug 1192904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193466">SUSE bug 1193466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193905">SUSE bug 1193905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194093">SUSE bug 1194093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194217">SUSE bug 1194217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194388">SUSE bug 1194388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194872">SUSE bug 1194872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194885">SUSE bug 1194885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195203">SUSE bug 1195203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195332">SUSE bug 1195332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195354">SUSE bug 1195354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196361">SUSE bug 1196361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198596">SUSE bug 1198596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198748">SUSE bug 1198748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199331">SUSE bug 1199331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199333">SUSE bug 1199333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199334">SUSE bug 1199334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199651">SUSE bug 1199651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199655">SUSE bug 1199655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199693">SUSE bug 1199693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199745">SUSE bug 1199745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199747">SUSE bug 1199747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199936">SUSE bug 1199936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200010">SUSE bug 1200010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200011">SUSE bug 1200011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200012">SUSE bug 1200012</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17087/">CVE-2017-17087</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3875/">CVE-2021-3875</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3903/">CVE-2021-3903</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3968/">CVE-2021-3968</cve>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3973/">CVE-2021-3973</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3974/">CVE-2021-3974</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4069/">CVE-2021-4069</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4136/">CVE-2021-4136</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4166/">CVE-2021-4166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4192/">CVE-2021-4192</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0128/">CVE-2022-0128</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0213/">CVE-2022-0213</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0261/">CVE-2022-0261</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0359/">CVE-2022-0359</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0392/">CVE-2022-0392</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0407/">CVE-2022-0407</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0696/">CVE-2022-0696</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1381/">CVE-2022-1381</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1616/">CVE-2022-1616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1619/">CVE-2022-1619</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1620/">CVE-2022-1620</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1733/">CVE-2022-1733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1735/">CVE-2022-1735</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1771/">CVE-2022-1771</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1796/">CVE-2022-1796</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1851/">CVE-2022-1851</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1898/">CVE-2022-1898</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684389" comment="gvim-8.2.5038-150000.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684300" comment="vim-8.2.5038-150000.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684301" comment="vim-data-8.2.5038-150000.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684302" comment="vim-data-common-8.2.5038-150000.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684303" comment="vim-small-8.2.5038-150000.5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52738" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-5_1, rubygem-activesupport-5_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185780" ref_url="https://bugzilla.suse.com/1185780" source="BUGZILLA"/>
		<reference ref_id="1196182" ref_url="https://bugzilla.suse.com/1196182" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22904" ref_url="https://www.suse.com/security/cve/CVE-2021-22904/" source="CVE"/>
		<reference ref_id="CVE-2022-23633" ref_url="https://www.suse.com/security/cve/CVE-2022-23633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011300.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-5_1 and rubygem-activesupport-5_1 fixes the following issues:

- CVE-2021-22904: Fixed possible DoS Vulnerability in Action Controller Token Authentication (bsc#1185780)
- CVE-2022-23633: Fixed possible exposure of information vulnerability in Action Pack (bsc#1196182)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-16"/>
	<updated date="2022-06-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185780">SUSE bug 1185780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196182">SUSE bug 1196182</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22904/">CVE-2021-22904</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23633/">CVE-2022-23633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684894" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695340" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684895" comment="ruby2.5-rubygem-activesupport-5_1-5.1.4-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695341" comment="ruby2.5-rubygem-activesupport-doc-5_1-5.1.4-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52739" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1028340" ref_url="https://bugzilla.suse.com/1028340" source="BUGZILLA"/>
		<reference ref_id="1055710" ref_url="https://bugzilla.suse.com/1055710" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1084513" ref_url="https://bugzilla.suse.com/1084513" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1158266" ref_url="https://bugzilla.suse.com/1158266" source="BUGZILLA"/>
		<reference ref_id="1172456" ref_url="https://bugzilla.suse.com/1172456" source="BUGZILLA"/>
		<reference ref_id="1177282" ref_url="https://bugzilla.suse.com/1177282" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1183723" ref_url="https://bugzilla.suse.com/1183723" source="BUGZILLA"/>
		<reference ref_id="1187055" ref_url="https://bugzilla.suse.com/1187055" source="BUGZILLA"/>
		<reference ref_id="1191647" ref_url="https://bugzilla.suse.com/1191647" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195651" ref_url="https://bugzilla.suse.com/1195651" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196367" ref_url="https://bugzilla.suse.com/1196367" source="BUGZILLA"/>
		<reference ref_id="1196426" ref_url="https://bugzilla.suse.com/1196426" source="BUGZILLA"/>
		<reference ref_id="1196999" ref_url="https://bugzilla.suse.com/1196999" source="BUGZILLA"/>
		<reference ref_id="1197219" ref_url="https://bugzilla.suse.com/1197219" source="BUGZILLA"/>
		<reference ref_id="1197343" ref_url="https://bugzilla.suse.com/1197343" source="BUGZILLA"/>
		<reference ref_id="1197663" ref_url="https://bugzilla.suse.com/1197663" source="BUGZILLA"/>
		<reference ref_id="1198400" ref_url="https://bugzilla.suse.com/1198400" source="BUGZILLA"/>
		<reference ref_id="1198516" ref_url="https://bugzilla.suse.com/1198516" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1198687" ref_url="https://bugzilla.suse.com/1198687" source="BUGZILLA"/>
		<reference ref_id="1198742" ref_url="https://bugzilla.suse.com/1198742" source="BUGZILLA"/>
		<reference ref_id="1198777" ref_url="https://bugzilla.suse.com/1198777" source="BUGZILLA"/>
		<reference ref_id="1198825" ref_url="https://bugzilla.suse.com/1198825" source="BUGZILLA"/>
		<reference ref_id="1199012" ref_url="https://bugzilla.suse.com/1199012" source="BUGZILLA"/>
		<reference ref_id="1199063" ref_url="https://bugzilla.suse.com/1199063" source="BUGZILLA"/>
		<reference ref_id="1199314" ref_url="https://bugzilla.suse.com/1199314" source="BUGZILLA"/>
		<reference ref_id="1199399" ref_url="https://bugzilla.suse.com/1199399" source="BUGZILLA"/>
		<reference ref_id="1199426" ref_url="https://bugzilla.suse.com/1199426" source="BUGZILLA"/>
		<reference ref_id="1199505" ref_url="https://bugzilla.suse.com/1199505" source="BUGZILLA"/>
		<reference ref_id="1199507" ref_url="https://bugzilla.suse.com/1199507" source="BUGZILLA"/>
		<reference ref_id="1199605" ref_url="https://bugzilla.suse.com/1199605" source="BUGZILLA"/>
		<reference ref_id="1199650" ref_url="https://bugzilla.suse.com/1199650" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2019-19377" ref_url="https://www.suse.com/security/cve/CVE-2019-19377/" source="CVE"/>
		<reference ref_id="CVE-2019-20811" ref_url="https://www.suse.com/security/cve/CVE-2019-20811/" source="CVE"/>
		<reference ref_id="CVE-2020-26541" ref_url="https://www.suse.com/security/cve/CVE-2020-26541/" source="CVE"/>
		<reference ref_id="CVE-2021-20292" ref_url="https://www.suse.com/security/cve/CVE-2021-20292/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-38208" ref_url="https://www.suse.com/security/cve/CVE-2021-38208/" source="CVE"/>
		<reference ref_id="CVE-2021-39711" ref_url="https://www.suse.com/security/cve/CVE-2021-39711/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1419" ref_url="https://www.suse.com/security/cve/CVE-2022-1419/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP1 kernel was updated.

The following security bugs were fixed:

- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2021-39711: In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1197219).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
- CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456).
- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).
- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).
- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144).
- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bnc#1177282)
- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605).

The following non-security bugs were fixed:

- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bsc#1199399).
- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- net: ena: A typo fix in the file ena_com.h (bsc#1198777).
- net: ena: Add capabilities field with support for ENI stats capability (bsc#1198777).
- net: ena: Add debug prints for invalid req_id resets (bsc#1198777).
- net: ena: add device distinct log prefix to files (bsc#1198777).
- net: ena: add jiffies of last napi call to stats (bsc#1198777).
- net: ena: aggregate doorbell common operations into a function (bsc#1198777).
- net: ena: aggregate stats increase into a function (bsc#1198777).
- net: ena: Change ENI stats support check to use capabilities field (bsc#1198777).
- net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1198777).
- net: ena: Change the name of bad_csum variable (bsc#1198777).
- net: ena: Extract recurring driver reset code into a function (bsc#1198777).
- net: ena: fix coding style nits (bsc#1198777).
- net: ena: fix DMA mapping function issues in XDP (bsc#1198777).
- net: ena: Fix error handling when calculating max IO queues number (bsc#1198777).
- net: ena: fix inaccurate print type (bsc#1198777).
- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1198777).
- net: ena: Fix wrong rx request id by resetting device (bsc#1198777).
- net: ena: Improve error logging in driver (bsc#1198777).
- net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198777).
- net: ena: introduce XDP redirect implementation (bsc#1198777).
- net: ena: make symbol 'ena_alloc_map_page' static (bsc#1198777).
- net: ena: Move reset completion print to the reset function (bsc#1198777).
- net: ena: optimize data access in fast-path code (bsc#1198777).
- net: ena: re-organize code to improve readability (bsc#1198777).
- net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198777).
- net: ena: remove extra words from comments (bsc#1198777).
- net: ena: Remove module param and change message severity (bsc#1198777).
- net: ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198777).
- net: ena: Remove redundant return code check (bsc#1198777).
- net: ena: Remove unused code (bsc#1198777).
- net: ena: store values in their appropriate variables types (bsc#1198777).
- net: ena: Update XDP verdict upon failure (bsc#1198777).
- net: ena: use build_skb() in RX path (bsc#1198777).
- net: ena: use constant value for net_device allocation (bsc#1198777).
- net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198777).
- net: ena: Use pci_sriov_configure_simple() to enable VFs (bsc#1198777).
- net: ena: use xdp_frame in XDP TX flow (bsc#1198777).
- net: ena: use xdp_return_frame() to free xdp frames (bsc#1198777).
- net: mana: Add counter for packet dropped by XDP (bsc#1195651).
- net: mana: Add counter for XDP_TX (bsc#1195651).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- net: mana: Reuse XDP dropped page (bsc#1195651).
- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- powerpc/64: Fix kernel stack 16-byte alignment (bsc#1196999 ltc#196609S git-fixes).
- powerpc/64: Interrupts save PPR on stack rather than thread_struct (bsc#1196999 ltc#196609).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).
- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).
- x86/pm: Save the MSR validity status at context setup (bsc#1114648).
- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1114648).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-17"/>
	<updated date="2022-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028340">SUSE bug 1028340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158266">SUSE bug 1158266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172456">SUSE bug 1172456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177282">SUSE bug 1177282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183723">SUSE bug 1183723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187055">SUSE bug 1187055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191647">SUSE bug 1191647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195651">SUSE bug 1195651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196367">SUSE bug 1196367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196426">SUSE bug 1196426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196999">SUSE bug 1196999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197219">SUSE bug 1197219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197663">SUSE bug 1197663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198400">SUSE bug 1198400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198687">SUSE bug 1198687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198742">SUSE bug 1198742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198777">SUSE bug 1198777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198825">SUSE bug 1198825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199012">SUSE bug 1199012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199063">SUSE bug 1199063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199314">SUSE bug 1199314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199399">SUSE bug 1199399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199605">SUSE bug 1199605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19377/">CVE-2019-19377</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20811/">CVE-2019-20811</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26541/">CVE-2020-26541</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20292/">CVE-2021-20292</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38208/">CVE-2021-38208</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39711/">CVE-2021-39711</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1419/">CVE-2022-1419</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695342" comment="kernel-debug-base-4.12.14-150100.197.114.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009693407" comment="kernel-default-man-4.12.14-150100.197.114.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695343" comment="kernel-kvmsmall-base-4.12.14-150100.197.114.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695344" comment="kernel-vanilla-4.12.14-150100.197.114.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695345" comment="kernel-vanilla-base-4.12.14-150100.197.114.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695346" comment="kernel-vanilla-devel-4.12.14-150100.197.114.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695347" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695348" comment="kernel-zfcpdump-man-4.12.14-150100.197.114.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52740" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-alertmanager (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011314.html" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-alertmanager fixes the following issues:

Update golang-github-prometheus-alertmanager from version 0.21.0 to version 0.23.0 (bsc#1196338, jsc#SLE-24077)

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter
- Update vendor tarball with prometheus/client_golang 1.11.1
- Update required Go version to 1.16
- Use %autosetup macro
- Update to version 0.23.0:
  * Release 0.23.0
  * Release 0.23.0-rc.0
  * amtool: Detect version drift and warn users (#2672)
  * Add ability to skip TLS verification for amtool (#2663)
  * Fix empty isEqual in amtool. (#2668)
  * Fix main tests (#2670)
  * cli: add new template render command (#2538)
  * OpsGenie: refer to alert instead of incident (#2609)
  * Docs: target_match and source_match are DEPRECATED (#2665)
  * Fix test not waiting for cluster member to be ready
- Add go_modules to _service.
- Added hardening to systemd service(s) with a modified prometheus-alertmanager.service (bsc#1181400)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683275" comment="golang-github-prometheus-alertmanager-0.23.0-150100.4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52741" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4IIJDMYKSUHPR6X6ARBPWWQRNNXT4HI/" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664553" comment="log4j-manual-1.2.17-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52742" version="1" class="patch">
	<metadata>
		<title>Security update for node_exporter (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190535" ref_url="https://bugzilla.suse.com/1190535" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011315.html" source="SUSE-SU"/>
		<description>
This security update for golang-github-prometheus-node_exporter provides:

Update golang-github-prometheus-node_exporter from version 1.1.2 to version 1.3.0 (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)

- CVE-2022-21698: Denial of service using InstrumentHandlerCounter
- Update vendor tarball with prometheus/client_golang 1.11.1
- Update to 1.3.0
  * [CHANGE] Add path label to rapl collector #2146
  * [CHANGE] Exclude filesystems under /run/credentials #2157
  * [CHANGE] Add TCPTimeouts to netstat default filter #2189
  * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771
  * [FEATURE] Add darwin powersupply collector #1777
  * [FEATURE] Add support for monitoring GPUs on Linux #1998
  * [FEATURE] Add Darwin thermal collector #2032
  * [FEATURE] Add os release collector #2094
  * [FEATURE] Add netdev.address-info collector #2105
  * [FEATURE] Add clocksource metrics to time collector #2197
  * [ENHANCEMENT] Support glob textfile collector directories #1985
  * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080
  * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165
  * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123
  * [ENHANCEMENT] Add DMI collector #2131
  * [ENHANCEMENT] Add threads metrics to processes collector #2164
  * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169
  * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189
  * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208
  * [BUGFIX] ethtool: Sanitize metric names #2093
  * [BUGFIX] Fix ethtool collector for multiple interfaces #2126
  * [BUGFIX] Fix possible panic on macOS #2133
  * [BUGFIX] Collect flag_info and bug_info only for one core #2156
  * [BUGFIX] Prevent duplicate ethtool metric names #2187
- Update to 1.2.2
  * Bug fixes
     Fix processes collector long int parsing #2112
- Update to 1.2.1
  * Removed
     Remove obsolete capture permission denied error fix already included upstream
  * Bug fixes
     Fix zoneinfo parsing prometheus/procfs#386
     Fix nvme collector log noise #2091
     Fix rapl collector log noise #2092
- Update to 1.2.0
  * Changes
     Rename filesystem collector flags to match other collectors #2012
     Make node_exporter print usage to STDOUT #203
  * Features
     Add conntrack statistics metrics #1155
     Add ethtool stats collector #1832
     Add flag to ignore network speed if it is unknown #1989
     Add tapestats collector for Linux #2044
     Add nvme collector #2062
  * Enhancements
     Add ErrorLog plumbing to promhttp #1887
     Add more Infiniband counters #2019
     netclass: retrieve interface names and filter before parsing #2033
     Add time zone offset metric #2060
  * Bug fixes
     Handle errors from disabled PSI subsystem #1983
     Fix panic when using backwards compatible flags #2000
     Fix wrong value for OpenBSD memory buffer cache #2015
     Only initiate collectors once #2048
     Handle small backwards jumps in CPU idle #2067
- Capture permission denied error for 'energy_uj' file (bsc#1190535)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-20"/>
	<updated date="2022-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190535">SUSE bug 1190535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682887" comment="golang-github-prometheus-node_exporter-1.3.0-150100.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52743" version="1" class="patch">
	<metadata>
		<title>Security update for drbd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011345.html" source="SUSE-SU"/>
		<description>

This update of drbd fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684896" comment="drbd-9.0.29~0+git.9a7bc817-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695349" comment="drbd-kmp-64kb-9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684897" comment="drbd-kmp-default-9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695350" comment="drbd-kmp-preempt-9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695351" comment="drbd-kmp-rt-9.0.29~0+git.9a7bc817_k5.3.18_8.13-150300.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52744" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1177282" ref_url="https://bugzilla.suse.com/1177282" source="BUGZILLA"/>
		<reference ref_id="1184924" ref_url="https://bugzilla.suse.com/1184924" source="BUGZILLA"/>
		<reference ref_id="1198924" ref_url="https://bugzilla.suse.com/1198924" source="BUGZILLA"/>
		<reference ref_id="1199365" ref_url="https://bugzilla.suse.com/1199365" source="BUGZILLA"/>
		<reference ref_id="1199482" ref_url="https://bugzilla.suse.com/1199482" source="BUGZILLA"/>
		<reference ref_id="1200015" ref_url="https://bugzilla.suse.com/1200015" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200206" ref_url="https://bugzilla.suse.com/1200206" source="BUGZILLA"/>
		<reference ref_id="1200207" ref_url="https://bugzilla.suse.com/1200207" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="1200259" ref_url="https://bugzilla.suse.com/1200259" source="BUGZILLA"/>
		<reference ref_id="1200263" ref_url="https://bugzilla.suse.com/1200263" source="BUGZILLA"/>
		<reference ref_id="1200343" ref_url="https://bugzilla.suse.com/1200343" source="BUGZILLA"/>
		<reference ref_id="1200494" ref_url="https://bugzilla.suse.com/1200494" source="BUGZILLA"/>
		<reference ref_id="1200529" ref_url="https://bugzilla.suse.com/1200529" source="BUGZILLA"/>
		<reference ref_id="1200604" ref_url="https://bugzilla.suse.com/1200604" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26541" ref_url="https://www.suse.com/security/cve/CVE-2020-26541/" source="CVE"/>
		<reference ref_id="CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012/" source="CVE"/>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141/" source="CVE"/>
		<reference ref_id="CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-1012: Fixed a small table perturb size in the TCP source port generation algorithm which could leads to information leak. (bsc#1199482).
- CVE-2022-20141: Fixed an use after free due to improper locking. This bug could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. (bnc#1200604)
- CVE-2022-32250: Fixed an use-after-free bug in the netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)
- CVE-2022-1975: Fixed a sleep-in-atomic bug that allows attacker to crash linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bnc#1177282)

The following non-security bugs were fixed:

- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).
- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).
- ACPI: sysfs: Make sparse happy about address space in use (git-fixes).
- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).
- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).
- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).
- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).
- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)
- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).
- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).
- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).
- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).
- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).
- ath9k: fix QCA9561 PA bias level (git-fixes).
- b43: Fix assigning negative value to unsigned variable (git-fixes).
- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).
- blk-mq: fix tag_get wait task can't be awakened (bsc#1200263).
- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).
- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).
- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cfg80211: set custom regdomain after wiphy registration (git-fixes).
- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).
- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).
- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).
- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).
- drivers: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).
- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).
- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).
- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).
- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).
- drm: imx: fix compiler warning with gcc-12 (git-fixes).
- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).
- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).
- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).
- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).
- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).
- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).
- drm/i915: fix i915_globals_exit() section mismatch error (git-fixes).
- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).
- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).
- drm/plane: Move range check for format_count earlier (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).
- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).
- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).
- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).
- ftrace: Clean up hash direct_functions on register failures (git-fixes).
- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).
- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).
- hwmon: Make chip parameter for with_info API mandatory (git-fixes).
- i2c: cadence: Increase timeout per message if necessary (git-fixes).
- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).
- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).
- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).
- Input: goodix - fix spurious key release events (git-fixes).
- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).
- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).
- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).
- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).
- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).
- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).
- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).
- KVM: nVMX: Invalidate all roots when emulating INVVPID without EPT (git-fixes).
- KVM: nVMX: Query current VMCS when determining if MSR bitmaps are in use (git-fixes).
- KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit (git-fixes).
- KVM: nVMX: Unconditionally clear nested.pi_pending on nested VM-Enter (git-fixes).
- KVM: s390: pv: add macros for UVC CC values (git-fixes).
- KVM: s390: pv: avoid double free of sida page (git-fixes).
- KVM: s390: pv: avoid stalls for kvm_s390_pv_init_vm (git-fixes).
- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).
- KVM: VMX: Flush all EPTP/VPID contexts on remote TLB flush (git-fixes).
- KVM: VMX: Use current VMCS to query WAITPKG support for MSR emulation (git-fixes).
- KVM: x86: clflushopt should be treated as a no-op by emulation (git-fixes).
- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).
- KVM: x86: Fix emulation in writing cr8 (git-fixes).
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce (git-fixes).
- KVM: x86: Immediately reset the MMU context when the SMM flag is cleared (git-fixes).
- KVM: x86: Inject #GP if guest attempts to toggle CR4.LA57 in 64-bit mode (git-fixes).
- KVM: x86: Mark CR4.TSD as being possibly owned by the guest (git-fixes).
- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).
- KVM: x86: Toggling CR4.PKE does not load PDPTEs in PAE mode (git-fixes).
- KVM: x86: Toggling CR4.SMAP does not load PDPTEs in PAE mode (git-fixes).
- KVM: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).
- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).
- KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[] (git-fixes).
- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).
- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).
- md: fix an incorrect NULL check in md_reload_sb (git-fixes).
- media: cx25821: Fix the warning when removing the module (git-fixes).
- media: netup_unidvb: Do not leak SPI master in probe error path (git-fixes).
- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).
- media: venus: hfi: avoid null dereference in deinit (git-fixes).
- misc: rtsx: set NULL intfdata when probe fails (git-fixes).
- mmc: block: Fix CQE recovery reset success (git-fixes).
- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).
- modpost: fix removing numeric suffixes (git-fixes).
- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).
- mt76: check return value of mt76_txq_send_burst in mt76_txq_schedule_list (git-fixes).
- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes).
- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).
- NFS: Do not report ENOSPC write errors twice (git-fixes).
- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).
- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).
- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).
- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).
- platform/chrome: cros_ec_proto: Send command again when timeout occurs (git-fixes).
- platform/x86: wmi: Fix driver-&gt;notify() vs -&gt;probe() race (git-fixes).
- platform/x86: wmi: Replace read_takes_no_args with a flags field (git-fixes).
- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- raid5: introduce MD_BROKEN (git-fixes).
- random: Add and use pr_fmt() (bsc#1184924).
- random: remove unnecessary unlikely() (bsc#1184924).
- rtl818x: Prevent using not initialized queues (git-fixes).
- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).
- s390: fix detection of vector enhancements facility 1 vs. vector packed decimal facility (git-fixes).
- s390: fix strrchr() implementation (git-fixes).
- s390/cio: dont call css_wait_for_slow_path() inside a lock (git-fixes).
- s390/cio: Fix the 'type' field in s390_cio_tpi tracepoint (git-fixes).
- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).
- s390/ctcm: fix potential memory leak (git-fixes).
- s390/ctcm: fix variable dereferenced before check (git-fixes).
- s390/dasd: fix data corruption for ESE devices (bsc#1200207 LTC#198454).
- s390/dasd: Fix read for ESE with blksize 4k (bsc#1200206 LTC#198455).
- s390/dasd: Fix read inconsistency for ESE DASD devices (bsc#1200206 LTC#198455).
- s390/dasd: prevent double format of tracks for ESE devices (bsc#1200207 LTC#198454).
- s390/ftrace: fix ftrace_update_ftrace_func implementation (git-fixes).
- s390/lcs: fix variable dereferenced before check (git-fixes).
- s390/mcck: fix invalid KVM guest condition check (git-fixes).
- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).
- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).
- s390/nmi: handle vector validity failures for KVM guests (git-fixes).
- s390/pv: fix the forcing of the swiotlb (git-fixes).
- s390/qdio: cancel the ESTABLISH ccw after timeout (git-fixes).
- s390/qdio: fix roll-back after timeout on ESTABLISH ccw (git-fixes).
- s390/vfio-ap: fix circular lockdep when setting/clearing crypto masks (git-fixes).
- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).
- spi: Introduce device-managed SPI controller allocation (git-fixes).
- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).
- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).
- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).
- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).
- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (git-fixes).
- tty: Fix a possible resource leak in icom_probe (git-fixes).
- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: gadget: do not reset gadget's driver-&gt;bus (git-fixes).
- usb: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).
- usb: host: isp116x: check return value after calling platform_get_resource() (git-fixes).
- usb: new quirk for Dell Gen 2 devices (git-fixes).
- usb: serial: option: add Quectel BG95 modem (git-fixes).
- vfio-ccw: Check initialized flag in cp_init() (git-fixes).
- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).
- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).
- virtio/s390: implement virtio-ccw revision 2 correctly (git-fixes).
- vringh: Fix loop descriptors check in the indirect cases (git-fixes).
- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177282">SUSE bug 1177282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184924">SUSE bug 1184924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198924">SUSE bug 1198924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199365">SUSE bug 1199365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199482">SUSE bug 1199482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200206">SUSE bug 1200206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200207">SUSE bug 1200207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200259">SUSE bug 1200259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200263">SUSE bug 1200263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200343">SUSE bug 1200343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200529">SUSE bug 1200529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200604">SUSE bug 1200604</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26541/">CVE-2020-26541</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695352" comment="cluster-md-kmp-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695353" comment="dlm-kmp-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695354" comment="gfs2-kmp-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684723" comment="kernel-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684724" comment="kernel-azure-devel-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695355" comment="kernel-azure-extra-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695356" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695357" comment="kernel-azure-optional-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684725" comment="kernel-devel-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684726" comment="kernel-source-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684727" comment="kernel-syms-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695358" comment="kselftests-kmp-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695359" comment="ocfs2-kmp-azure-5.3.18-150300.38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695360" comment="reiserfs-kmp-azure-5.3.18-150300.38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52745" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1177282" ref_url="https://bugzilla.suse.com/1177282" source="BUGZILLA"/>
		<reference ref_id="1199365" ref_url="https://bugzilla.suse.com/1199365" source="BUGZILLA"/>
		<reference ref_id="1200015" ref_url="https://bugzilla.suse.com/1200015" source="BUGZILLA"/>
		<reference ref_id="1200143" ref_url="https://bugzilla.suse.com/1200143" source="BUGZILLA"/>
		<reference ref_id="1200144" ref_url="https://bugzilla.suse.com/1200144" source="BUGZILLA"/>
		<reference ref_id="1200206" ref_url="https://bugzilla.suse.com/1200206" source="BUGZILLA"/>
		<reference ref_id="1200207" ref_url="https://bugzilla.suse.com/1200207" source="BUGZILLA"/>
		<reference ref_id="1200249" ref_url="https://bugzilla.suse.com/1200249" source="BUGZILLA"/>
		<reference ref_id="1200259" ref_url="https://bugzilla.suse.com/1200259" source="BUGZILLA"/>
		<reference ref_id="1200263" ref_url="https://bugzilla.suse.com/1200263" source="BUGZILLA"/>
		<reference ref_id="1200268" ref_url="https://bugzilla.suse.com/1200268" source="BUGZILLA"/>
		<reference ref_id="1200529" ref_url="https://bugzilla.suse.com/1200529" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26541" ref_url="https://www.suse.com/security/cve/CVE-2020-26541/" source="CVE"/>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-1966: Fixed an use-after-free bug in the netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)
- CVE-2022-1975: Fixed a sleep-in-atomic bug that allows attacker to crash linux kernel by simulating nfc device from user-space. (bsc#1200143)
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bnc#1177282)
- 
The following non-security bugs were fixed:

- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).
- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).
- ACPI: sysfs: Make sparse happy about address space in use (git-fixes).
- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).
- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).
- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).
- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).
- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).
- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).
- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).
- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).
- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).
- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).
- ath9k: fix QCA9561 PA bias level (git-fixes).
- b43: Fix assigning negative value to unsigned variable (git-fixes).
- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).
- blk-mq: fix tag_get wait task can't be awakened (bsc#1200263).
- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).
- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).
- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
- cfg80211: set custom regdomain after wiphy registration (git-fixes).
- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).
- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).
- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).
- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).
- drivers: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).
- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).
- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).
- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).
- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).
- drm: imx: fix compiler warning with gcc-12 (git-fixes).
- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).
- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).
- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).
- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).
- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).
- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).
- drm/i915: fix i915_globals_exit() section mismatch error (git-fixes).
- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).
- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).
- drm/plane: Move range check for format_count earlier (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).
- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).
- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).
- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).
- ftrace: Clean up hash direct_functions on register failures (git-fixes).
- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).
- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).
- hwmon: Make chip parameter for with_info API mandatory (git-fixes).
- i2c: cadence: Increase timeout per message if necessary (git-fixes).
- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).
- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).
- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).
- Input: goodix - fix spurious key release events (git-fixes).
- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).
- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).
- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).
- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).
- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).
- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).
- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).
- KVM: nVMX: Invalidate all roots when emulating INVVPID without EPT (git-fixes).
- KVM: nVMX: Query current VMCS when determining if MSR bitmaps are in use (git-fixes).
- KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit (git-fixes).
- KVM: nVMX: Unconditionally clear nested.pi_pending on nested VM-Enter (git-fixes).
- KVM: s390: pv: add macros for UVC CC values (git-fixes).
- KVM: s390: pv: avoid double free of sida page (git-fixes).
- KVM: s390: pv: avoid stalls for kvm_s390_pv_init_vm (git-fixes).
- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).
- KVM: VMX: Flush all EPTP/VPID contexts on remote TLB flush (git-fixes).
- KVM: VMX: Use current VMCS to query WAITPKG support for MSR emulation (git-fixes).
- KVM: x86: clflushopt should be treated as a no-op by emulation (git-fixes).
- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).
- KVM: x86: Fix emulation in writing cr8 (git-fixes).
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce (git-fixes).
- KVM: x86: Immediately reset the MMU context when the SMM flag is cleared (git-fixes).
- KVM: x86: Inject #GP if guest attempts to toggle CR4.LA57 in 64-bit mode (git-fixes).
- KVM: x86: Mark CR4.TSD as being possibly owned by the guest (git-fixes).
- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).
- KVM: x86: Toggling CR4.PKE does not load PDPTEs in PAE mode (git-fixes).
- KVM: x86: Toggling CR4.SMAP does not load PDPTEs in PAE mode (git-fixes).
- KVM: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).
- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).
- KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[] (git-fixes).
- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).
- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).
- md: fix an incorrect NULL check in md_reload_sb (git-fixes).
- media: cx25821: Fix the warning when removing the module (git-fixes).
- media: netup_unidvb: Do not leak SPI master in probe error path (git-fixes).
- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).
- media: venus: hfi: avoid null dereference in deinit (git-fixes).
- misc: rtsx: set NULL intfdata when probe fails (git-fixes).
- mmc: block: Fix CQE recovery reset success (git-fixes).
- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).
- modpost: fix removing numeric suffixes (git-fixes).
- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).
- mt76: check return value of mt76_txq_send_burst in mt76_txq_schedule_list (git-fixes).
- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).
- net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes).
- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).
- NFS: Do not report ENOSPC write errors twice (git-fixes).
- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).
- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).
- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).
- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).
- platform/chrome: cros_ec_proto: Send command again when timeout occurs (git-fixes).
- platform/x86: wmi: Fix driver-&gt;notify() vs -&gt;probe() race (git-fixes).
- platform/x86: wmi: Replace read_takes_no_args with a flags field (git-fixes).
- devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).
- raid5: introduce MD_BROKEN (git-fixes).
- rtl818x: Prevent using not initialized queues (git-fixes).
- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).
- s390: fix detection of vector enhancements facility 1 vs. vector packed decimal facility (git-fixes).
- s390: fix strrchr() implementation (git-fixes).
- s390/cio: dont call css_wait_for_slow_path() inside a lock (git-fixes).
- s390/cio: Fix the 'type' field in s390_cio_tpi tracepoint (git-fixes).
- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).
- s390/ctcm: fix potential memory leak (git-fixes).
- s390/ctcm: fix variable dereferenced before check (git-fixes).
- s390/dasd: fix data corruption for ESE devices (bsc#1200207 LTC#198454).
- s390/dasd: Fix read for ESE with blksize 4k (bsc#1200206 LTC#198455).
- s390/dasd: Fix read inconsistency for ESE DASD devices (bsc#1200206 LTC#198455).
- s390/dasd: prevent double format of tracks for ESE devices (bsc#1200207 LTC#198454).
- s390/ftrace: fix ftrace_update_ftrace_func implementation (git-fixes).
- s390/lcs: fix variable dereferenced before check (git-fixes).
- s390/mcck: fix invalid KVM guest condition check (git-fixes).
- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).
- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).
- s390/nmi: handle vector validity failures for KVM guests (git-fixes).
- s390/pv: fix the forcing of the swiotlb (git-fixes).
- s390/qdio: cancel the ESTABLISH ccw after timeout (git-fixes).
- s390/qdio: fix roll-back after timeout on ESTABLISH ccw (git-fixes).
- s390/vfio-ap: fix circular lockdep when setting/clearing crypto masks (git-fixes).
- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).
- spi: Introduce device-managed SPI controller allocation (git-fixes).
- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).
- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).
- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).
- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).
- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (git-fixes).
- tty: Fix a possible resource leak in icom_probe (git-fixes).
- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: gadget: do not reset gadget's driver-&gt;bus (git-fixes).
- usb: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).
- usb: host: isp116x: check return value after calling platform_get_resource() (git-fixes).
- usb: new quirk for Dell Gen 2 devices (git-fixes).
- usb: serial: option: add Quectel BG95 modem (git-fixes).
- vfio-ccw: Check initialized flag in cp_init() (git-fixes).
- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).
- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).
- virtio/s390: implement virtio-ccw revision 2 correctly (git-fixes).
- vringh: Fix loop descriptors check in the indirect cases (git-fixes).
- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177282">SUSE bug 1177282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199365">SUSE bug 1199365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200143">SUSE bug 1200143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200144">SUSE bug 1200144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200206">SUSE bug 1200206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200207">SUSE bug 1200207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200249">SUSE bug 1200249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200259">SUSE bug 1200259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200263">SUSE bug 1200263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200529">SUSE bug 1200529</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26541/">CVE-2020-26541</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695361" comment="cluster-md-kmp-64kb-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684898" comment="cluster-md-kmp-default-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695362" comment="cluster-md-kmp-preempt-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695363" comment="dlm-kmp-64kb-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684899" comment="dlm-kmp-default-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695364" comment="dlm-kmp-preempt-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695365" comment="dtb-al-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695366" comment="dtb-allwinner-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695367" comment="dtb-altera-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695368" comment="dtb-amd-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695369" comment="dtb-amlogic-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695370" comment="dtb-apm-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695371" comment="dtb-arm-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695372" comment="dtb-broadcom-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695373" comment="dtb-cavium-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695374" comment="dtb-exynos-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695375" comment="dtb-freescale-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695376" comment="dtb-hisilicon-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695377" comment="dtb-lg-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695378" comment="dtb-marvell-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695379" comment="dtb-mediatek-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695380" comment="dtb-nvidia-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695381" comment="dtb-qcom-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695382" comment="dtb-renesas-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695383" comment="dtb-rockchip-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695384" comment="dtb-socionext-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695385" comment="dtb-sprd-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695386" comment="dtb-xilinx-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695387" comment="dtb-zte-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695388" comment="gfs2-kmp-64kb-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684900" comment="gfs2-kmp-default-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695389" comment="gfs2-kmp-preempt-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684304" comment="kernel-64kb-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684305" comment="kernel-64kb-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695390" comment="kernel-64kb-extra-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695391" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695392" comment="kernel-64kb-optional-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695393" comment="kernel-debug-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695394" comment="kernel-debug-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695395" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684306" comment="kernel-default-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684307" comment="kernel-default-base-5.3.18-150300.59.76.1.150300.18.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695396" comment="kernel-default-base-rebuild-5.3.18-150300.59.76.1.150300.18.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684308" comment="kernel-default-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695397" comment="kernel-default-extra-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695398" comment="kernel-default-livepatch-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695399" comment="kernel-default-livepatch-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695400" comment="kernel-default-optional-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684309" comment="kernel-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684433" comment="kernel-docs-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695401" comment="kernel-docs-html-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695402" comment="kernel-kvmsmall-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695403" comment="kernel-kvmsmall-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695404" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684310" comment="kernel-macros-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684434" comment="kernel-obs-build-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695405" comment="kernel-obs-qa-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684311" comment="kernel-preempt-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684435" comment="kernel-preempt-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695406" comment="kernel-preempt-extra-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695407" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695408" comment="kernel-preempt-optional-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684436" comment="kernel-source-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695409" comment="kernel-source-vanilla-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684437" comment="kernel-syms-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684312" comment="kernel-zfcpdump-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695410" comment="kselftests-kmp-64kb-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695411" comment="kselftests-kmp-default-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695412" comment="kselftests-kmp-preempt-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695413" comment="ocfs2-kmp-64kb-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684901" comment="ocfs2-kmp-default-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695414" comment="ocfs2-kmp-preempt-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695415" comment="reiserfs-kmp-64kb-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684552" comment="reiserfs-kmp-default-5.3.18-150300.59.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695416" comment="reiserfs-kmp-preempt-5.3.18-150300.59.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52746" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192249" ref_url="https://bugzilla.suse.com/1192249" source="BUGZILLA"/>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011348.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).

- Update to 3.9.13:
  - Core and Builtins
    - gh-92311: Fixed a bug where setting frame.f_lineno to jump
      over a list comprehension could misbehave or crash.
    - gh-92112: Fix crash triggered by an evil custom mro() on
      a metaclass.
    - gh-92036: Fix a crash in subinterpreters related to the
      garbage collector. When a subinterpreter is deleted,
      untrack all objects tracked by its GC. To prevent a crash
      in deallocator functions expecting objects to be tracked by
      the GC, leak a strong reference to these objects on
      purpose, so they are never deleted and their deallocator
      functions are not called. Patch by Victor Stinner.
    - gh-91421: Fix a potential integer overflow in
      _Py_DecodeUTF8Ex.
    - bpo-46775: Some Windows system error codes(&gt;= 10000) are
      now mapped into the correct errno and may now raise
      a subclass of OSError. Patch by Dong-hee Na.
    - bpo-46962: Classes and functions that unconditionally
      declared their docstrings ignoring the
      --without-doc-strings compilation flag no longer do so.
    - The classes affected are pickle.PickleBuffer,
      testcapi.RecursingInfinitelyError, and types.GenericAlias.
    - The functions affected are 24 methods in ctypes.
    - Patch by Oleg Iarygin.
    - bpo-36819: Fix crashes in built-in encoders with error
      handlers that return position less or equal than the
      starting position of non-encodable characters.
  - Library
    - gh-91581: utcfromtimestamp() no longer attempts to resolve
      fold in the pure Python implementation, since the fold is
      never 1 in UTC. In addition to being slightly faster in the
      common case, this also prevents some errors when the
      timestamp is close to datetime.min. Patch by Paul Ganssle.
    - gh-92530: Fix an issue that occurred after interrupting
      threading.Condition.notify().
    - gh-92049: Forbid pickling constants re._constants.SUCCESS
      etc. Previously, pickling did not fail, but the result
      could not be unpickled.
    - bpo-47029: Always close the read end of the pipe used by
      multiprocessing.Queue after the last write of buffered data
      to the write end of the pipe to avoid BrokenPipeError at
      garbage collection and at multiprocessing.Queue.close()
      calls. Patch by G?ry Ogam.
    - gh-91910: Add missing f prefix to f-strings in error
      messages from the multiprocessing and asyncio modules.
    - gh-91810: ElementTree method write() and function
      tostring() now use the text file''s encoding ('UTF-8' if not
      available) instead of locale encoding in XML declaration
      when encoding='unicode' is specified.
    - gh-91832: Add required attribute to argparse.Action repr
      output.
    - gh-91734: Fix OSS audio support on Solaris.
    - gh-91700: Compilation of regular expression containing
      a conditional expression (?(group)...) now raises an
      appropriate re.error if the group number refers to not
      defined group. Previously an internal RuntimeError was
      raised.
    - gh-91676: Fix unittest.IsolatedAsyncioTestCase to shutdown
      the per test event loop executor before returning from its
      run method so that a not yet stopped or garbage collected
      executor state does not persist beyond the test.
    - gh-90568: Parsing \N escapes of Unicode Named Character
      Sequences in a regular expression raises now re.error
      instead of TypeError.
    - gh-91595: Fix the comparison of character and integer
      inside Tools.gdb.libpython.write_repr(). Patch by Yu Liu.
    - gh-90622: Worker processes for
      concurrent.futures.ProcessPoolExecutor are no longer
      spawned on demand (a feature added in 3.9) when the
      multiprocessing context start method is 'fork' as that can
      lead to deadlocks in the child processes due to a fork
      happening while threads are running.
    - gh-91575: Update case-insensitive matching in the re module
      to the latest Unicode version.
    - gh-91581: Remove an unhandled error case in the
      C implementation of calls to datetime.fromtimestamp with no
      time zone (i.e. getting a local time from an epoch
      timestamp). This should have no user-facing effect other
      than giving a possibly more accurate error message when
      called with timestamps that fall on 10000-01-01 in the
      local time. Patch by Paul Ganssle.
    - bpo-34480: Fix a bug where _markupbase raised an
      UnboundLocalError when an invalid keyword was found in
      marked section. Patch by Marek Suscak.
    - bpo-27929: Fix asyncio.loop.sock_connect() to only resolve
      names for socket.AF_INET or socket.AF_INET6 families.
      Resolution may not make sense for other families, like
      socket.AF_BLUETOOTH and socket.AF_UNIX.
    - bpo-43323: Fix errors in the email module if the charset
      itself contains undecodable/unencodable characters.
    - bpo-46787: Fix concurrent.futures.ProcessPoolExecutor
      exception memory leak
    - bpo-46415: Fix ipaddress.ip_{address,interface,network}
      raising TypeError instead of ValueError if given invalid
      tuple as address parameter.
    - bpo-44911: IsolatedAsyncioTestCase will no longer throw an
      exception while cancelling leaked tasks. Patch by Bar
      Harel.
    - bpo-44493: Add missing terminated NUL in sockaddr_un's
      length
    - This was potentially observable when using non-abstract
      AF_UNIX datagram sockets to processes written in another
      programming language.
    - bpo-42627: Fix incorrect parsing of Windows registry proxy
      settings
    - bpo-36073: Raise ProgrammingError instead of segfaulting on
      recursive usage of cursors in sqlite3 converters. Patch by
      Sergey Fedoseev.
  - Documentation
    - gh-91888: Add a new gh role to the documentation to link to
      GitHub issues.
    - gh-91783: Document security issues concerning the use of
      the function shutil.unpack_archive()
    - gh-91547: Remove 'Undocumented modules' page.
    - bpo-44347: Clarify the meaning of dirs_exist_ok, a kwarg of
      shutil.copytree().
    - bpo-38668: Update the introduction to documentation for
      os.path to remove warnings that became irrelevant after the
      implementations of PEP 383 and PEP 529.
    - bpo-47138: Pin Jinja to a version compatible with Sphinx
      version 2.4.4.
    - bpo-46962: All docstrings in code snippets are now wrapped
      into PyDoc_STR() to follow the guideline of PEP 7's
      Documentation Strings paragraph. Patch by Oleg Iarygin.
    - bpo-26792: Improve the docstrings of runpy.run_module() and
      runpy.run_path(). Original patch by Andrew Brezovsky.
    - bpo-45790: Adjust inaccurate phrasing in Defining Extension
      Types: Tutorial about the ob_base field and the macros used
      to access its contents.
    - bpo-42340: Document that in some circumstances
      KeyboardInterrupt may cause the code to enter an
      inconsistent state. Provided a sample workaround to avoid
      it if needed.
    - bpo-41233: Link the errnos referenced in
      Doc/library/exceptions.rst to their respective section in
      Doc/library/errno.rst, and vice versa. Previously this was
      only done for EINTR and InterruptedError. Patch by Yan
      'yyyyyyyan' Orestes.
    - bpo-38056: Overhaul the Error Handlers documentation in
      codecs.
    - bpo-13553: Document tkinter.Tk args.
  - Tests
    - gh-91607: Fix test_concurrent_futures to test the correct
      multiprocessing start method context in several cases where
      the test logic mixed this up.
    - bpo-47205: Skip test for sched_getaffinity() and
      sched_setaffinity() error case on FreeBSD.
    - bpo-29890: Add tests for ipaddress.IPv4Interface and
      ipaddress.IPv6Interface construction with tuple arguments.
      Original patch and tests by louisom.
  - Build
    - bpo-47103: Windows PGInstrument builds now copy a required
      DLL into the output directory, making it easier to run the
      profile stage of a PGO build.
  - Windows
    - bpo-47194: Update zlib to v1.2.12 to resolve
      CVE-2018-25032.
    - bpo-46785: Fix race condition between os.stat() and
      unlinking a file on Windows, by using errors codes returned
      by FindFirstFileW() when appropriate in win32_xstat_impl.
    - bpo-40859: Update Windows build to use xz-5.2.5
  - Tools/Demos
    - gh-91583: Fix regression in the code generated by Argument
      Clinic for functions with the defining_class parameter.

- Update to 3.9.12:
  - bpo-46968: Check for the existence of the 'sys/auxv.h' header
    in faulthandler to avoid compilation problems in systems
    where this header doesn't exist. Patch by Pablo Galindo
  - bpo-47101: hashlib.algorithms_available now lists only
    algorithms that are provided by activated crypto providers on
    OpenSSL 3.0. Legacy algorithms are not listed unless the
    legacy provider has been loaded into the default OSSL
    context.
  - bpo-23691: Protect the re.finditer() iterator from
    re-entering.
  - bpo-42369: Fix thread safety of zipfile._SharedFile.tell() to
    avoid a 'zipfile.BadZipFile: Bad CRC-32 for file' exception
    when reading a ZipFile from multiple threads.
  - bpo-38256: Fix binascii.crc32() when it is compiled to use
    zlib'c crc32 to work properly on inputs 4+GiB in length
    instead of returning the wrong result. The workaround prior
    to this was to always feed the function data in increments
    smaller than 4GiB or to just call the zlib module function.
  - bpo-39394: A warning about inline flags not at the start of
    the regular expression now contains the position of the flag.
  - bpo-47061: Deprecate the various modules listed by PEP 594:
  - aifc, asynchat, asyncore, audioop, cgi, cgitb, chunk, crypt,
    imghdr, msilib, nntplib, nis, ossaudiodev, pipes, smtpd,
    sndhdr, spwd, sunau, telnetlib, uu, xdrlib
  - bpo-2604: Fix bug where doctests using globals would fail
    when run multiple times.
  - bpo-45997: Fix asyncio.Semaphore re-aquiring FIFO order.
  - bpo-47022: The asynchat, asyncore and smtpd modules have been
    deprecated since at least Python 3.6. Their documentation has
    now been updated to note they will removed in Python 3.12
    (PEP 594).
  - bpo-46421: Fix a unittest issue where if the command was
    invoked as python -m unittest and the filename(s) began with
    a dot (.), a ValueError is returned.
  - bpo-40296: Fix supporting generic aliases in pydoc.
  - bpo-14156: argparse.FileType now supports an argument of '-';
    in binary mode, returning the .buffer attribute of
    sys.stdin/sys.stdout as appropriate. Modes including 'x' and
    'a' are treated equivalently to 'w' when argument is '-'.
    Patch contributed by Josh Rosenberg
- Update to 3.9.11:
  - bpo-46852: Rename the private undocumented
    float.__set_format__() method to float.__setformat__() to fix
    a typo introduced in Python 3.7. The method is only used by
    test_float. Patch by Victor Stinner.
  - bpo-46794: Bump up the libexpat version into 2.4.6
  - bpo-46762: Fix an assert failure in debug builds when a '&lt;',
    '&gt;', or '=' is the last character in an f-string that's
    missing a closing right brace.
  - bpo-46732: Correct the docstring for the __bool__() method.
    Patch by Jelle Zijlstra.
  - bpo-40479: Add a missing call to va_end() in
    Modules/_hashopenssl.c.
  - bpo-46615: When iterating over sets internally in
    setobject.c, acquire strong references to the resulting items
    from the set. This prevents crashes in corner-cases of
    various set operations where the set gets mutated.
  - bpo-43721: Fix docstrings of getter, setter, and deleter to
    clarify that they create a new copy of the property.
  - bpo-46503: Fix an assert when parsing some invalid N escape
    sequences in f-strings.
  - bpo-46417: Fix a race condition on setting a type __bases__
    attribute: the internal function add_subclass() now gets the
    PyTypeObject.tp_subclasses member after calling
    PyWeakref_NewRef() which can trigger a garbage collection
    which can indirectly modify PyTypeObject.tp_subclasses. Patch
    by Victor Stinner.
  - bpo-46383: Fix invalid signature of _zoneinfo's module_free
    function to resolve a crash on wasm32-emscripten platform.
  - bpo-43253: Fix a crash when closing transports where the
    underlying socket handle is already invalid on the Proactor
    event loop.
  - bpo-47004: Apply bugfixes from importlib_metadata 4.11.3,
    including bugfix for EntryPoint.extras, which was returning
    match objects and not the extras strings.
  - bpo-46985: Upgrade pip wheel bundled with ensurepip (pip
    22.0.4)
  - bpo-46968: faulthandler: On Linux 5.14 and newer, dynamically
    determine size of signal handler stack size CPython allocates
    using getauxval(AT_MINSIGSTKSZ). This changes allows for
    Python extension's request to Linux kernel to use AMX_TILE
    instruction set on Sapphire Rapids Xeon processor to succeed,
    unblocking use of the ISA in frameworks.
  - bpo-46955: Expose asyncio.base_events.Server as
    asyncio.Server. Patch by Stefan Zabka.
  - bpo-46932: Update bundled libexpat to 2.4.7
  - bpo-25707: Fixed a file leak in
    xml.etree.ElementTree.iterparse() when the iterator is not
    exhausted. Patch by Jacob Walls.
  - bpo-44886: Inherit asyncio proactor datagram transport from
    asyncio.DatagramTransport.
  - bpo-46827: Support UDP sockets in asyncio.loop.sock_connect()
    for selector-based event loops. Patch by Thomas Grainger.
  - bpo-46811: Make test suite support Expat &gt;=2.4.5
  - bpo-46252: Raise TypeError if ssl.SSLSocket is passed to
    transport-based APIs.
  - bpo-46784: Fix libexpat symbols collisions with user
    dynamically loaded or statically linked libexpat in embedded
    Python.
  - bpo-39327: shutil.rmtree() can now work with VirtualBox
    shared folders when running from the guest operating-system.
  - bpo-46756: Fix a bug in
    urllib.request.HTTPPasswordMgr.find_user_password() and
    urllib.request.HTTPPasswordMgrWithPriorAuth.is_authenticated()
    which allowed to bypass authorization. For example, access to
    URI example.org/foobar was allowed if the user was authorized
    for URI example.org/foo.
  - bpo-45863: When the tarfile module creates a pax format
    archive, it will put an integer representation of timestamps
    in the ustar header (if possible) for the benefit of older
    unarchivers, in addition to the existing full-precision
    timestamps in the pax extended header.
  - bpo-46672: Fix NameError in asyncio.gather() when initial
    type check fails.
  - bpo-45948: Fixed a discrepancy in the C implementation of the
    xml.etree.ElementTree module. Now, instantiating an
    xml.etree.ElementTree.XMLParser with a target=None keyword
    provides a default xml.etree.ElementTree.TreeBuilder target
    as the Python implementation does.
  - bpo-46591: Make the IDLE doc URL on the About IDLE dialog
    clickable.
  - bpo-46400: expat: Update libexpat from 2.4.1 to 2.4.4
  - bpo-46487: Add the get_write_buffer_limits method to
    asyncio.transports.WriteTransport and to the SSL transport.
  - bpo-46539: In typing.get_type_hints(), support evaluating
    stringified ClassVar and Final annotations inside Annotated.
    Patch by Gregory Beauregard.
  - bpo-46491: Allow typing.Annotated to wrap typing.Final and
    typing.ClassVar. Patch by Gregory Beauregard.
  - bpo-46436: Fix command-line option -d/--directory in module
    http.server which is ignored when combined with command-line
    option --cgi. Patch by G?ry Ogam.
  - bpo-41403: Make mock.patch() raise a TypeError with
    a relevant error message on invalid arg. Previously it
    allowed a cryptic AttributeError to escape.
  - bpo-46474: In importlib.metadata.EntryPoint.pattern, avoid
    potential REDoS by limiting ambiguity in consecutive
    whitespace.
  - bpo-46469: asyncio generic classes now return
    types.GenericAlias in __class_getitem__ instead of the same
    class.
  - bpo-46434: pdb now gracefully handles help when __doc__ is
    missing, for example when run with pregenerated optimized
    .pyc files.
  - bpo-46333: The __eq__() and __hash__() methods of
    typing.ForwardRef now honor the module parameter of
    typing.ForwardRef. Forward references from different modules
    are now differentiated.
  - bpo-43118: Fix a bug in inspect.signature() that was causing
    it to fail on some subclasses of classes with
    a __text_signature__ referencing module globals. Patch by
    Weipeng Hong.
  - bpo-21987: Fix an issue with tarfile.TarFile.getmember()
    getting a directory name with a trailing slash.
  - bpo-20392: Fix inconsistency with uppercase file extensions
    in MimeTypes.guess_type(). Patch by Kumar Aditya.
  - bpo-46080: Fix exception in argparse help text generation if
    a argparse.BooleanOptionalAction argument's default is
    argparse.SUPPRESS and it has help specified. Patch by Felix
    Fontein.
  - bpo-44439: Fix .write() method of a member file in ZipFile,
    when the input data is an object that supports the buffer
    protocol, the file length may be wrong.
  - bpo-45703: When a namespace package is imported before
    another module from the same namespace is created/installed
    in a different sys.path location while the program is
    running, calling the importlib.invalidate_caches() function
    will now also guarantee the new module is noticed.
  - bpo-24959: Fix bug where unittest sometimes drops frames from
    tracebacks of exceptions raised in tests.
  - bpo-46463: Fixes escape4chm.py script used when building the
    CHM documentation file
  - bpo-46913: Fix test_faulthandler.test_sigfpe() if Python is
    built with undefined behavior sanitizer (UBSAN): disable
    UBSAN on the faulthandler_sigfpe() function. Patch by Victor
    Stinner.
  - bpo-46708: Prevent default asyncio event loop policy
    modification warning after test_asyncio execution.
  - bpo-46616: Ensures test_importlib.test_windows cleans up
    registry keys after completion.
  - bpo-44359: test_ftplib now silently ignores socket errors to
    prevent logging unhandled threading exceptions. Patch by
    Victor Stinner.
  - bpo-46542: Fix a Python crash in test_lib2to3 when using
    Python built in debug mode: limit the recursion limit. Patch
    by Victor Stinner.
  - bpo-46576: test_peg_generator now disables compiler
    optimization when testing compilation of its own C extensions
    to significantly speed up the testing on non-debug builds of
    CPython.
  - bpo-46542: Fix test_json tests checking for RecursionError:
    modify these tests to use support.infinite_recursion(). Patch
    by Victor Stinner.
  - bpo-13886: Skip test_builtin PTY tests on non-ASCII
    characters if the readline module is loaded. The readline
    module changes input() behavior, but test_builtin is not
    intented to test the readline module. Patch by Victor
    Stinner.
  - bpo-38472: Fix GCC detection in setup.py when
    cross-compiling. The C compiler is now run with LC_ALL=C.
    Previously, the detection failed with a German locale.
  - bpo-46513: configure no longer uses AC_C_CHAR_UNSIGNED macro
    and pyconfig.h no longer defines reserved symbol
    __CHAR_UNSIGNED__.
  - bpo-45925: Update Windows installer to use SQLite 3.37.2.
  - bpo-45296: Clarify close, quit, and exit in IDLE. In the File
    menu, 'Close' and 'Exit' are now 'Close Window' (the current
    one) and 'Exit' is now 'Exit IDLE' (by closing all windows).
    In Shell, 'quit()' and 'exit()' mean 'close Shell'. If there
    are no other windows, this also exits IDLE.
  - bpo-45447: Apply IDLE syntax highlighting to pyi files. Patch
    by Alex Waygood and Terry Jan Reedy.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192249">SUSE bug 1192249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684313" comment="libpython3_9-1_0-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695417" comment="libpython3_9-1_0-32bit-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684314" comment="python39-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695418" comment="python39-32bit-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684315" comment="python39-base-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695419" comment="python39-base-32bit-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684316" comment="python39-curses-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684317" comment="python39-dbm-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684318" comment="python39-devel-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695420" comment="python39-doc-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695421" comment="python39-doc-devhelp-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684319" comment="python39-idle-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695422" comment="python39-testsuite-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684320" comment="python39-tk-3.9.13-150300.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684438" comment="python39-tools-3.9.13-150300.4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52747" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200566" ref_url="https://bugzilla.suse.com/1200566" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22967" ref_url="https://www.suse.com/security/cve/CVE-2022-22967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011350.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22967: Fixed missing check for PAM_ACCT_MGM return value that could be used to bypass PAM authentication (bsc#1200566)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200566">SUSE bug 1200566</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22967/">CVE-2022-22967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684321" comment="python3-salt-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684322" comment="salt-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684783" comment="salt-api-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684323" comment="salt-bash-completion-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684784" comment="salt-cloud-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684324" comment="salt-doc-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684785" comment="salt-fish-completion-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684786" comment="salt-master-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684325" comment="salt-minion-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684787" comment="salt-proxy-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684788" comment="salt-ssh-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684789" comment="salt-standalone-formulas-configuration-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684790" comment="salt-syndic-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684838" comment="salt-transactional-update-3004-150300.53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684326" comment="salt-zsh-completion-3004-150300.53.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52748" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197085" ref_url="https://bugzilla.suse.com/1197085" source="BUGZILLA"/>
		<reference ref_id="1200120" ref_url="https://bugzilla.suse.com/1200120" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26981" ref_url="https://www.suse.com/security/cve/CVE-2022-26981/" source="CVE"/>
		<reference ref_id="CVE-2022-31783" ref_url="https://www.suse.com/security/cve/CVE-2022-31783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011357.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes the following issues:

- CVE-2022-26981: fix buffer overrun in compilePassOpcode (bsc#1197085).
- CVE-2022-31783: prevent an invalid memory write in compileRule (bsc#1200120).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197085">SUSE bug 1197085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200120">SUSE bug 1200120</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26981/">CVE-2022-26981</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-31783/">CVE-2022-31783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684390" comment="liblouis-data-3.11.0-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684391" comment="liblouis-devel-3.11.0-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695423" comment="liblouis-doc-3.11.0-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695424" comment="liblouis-tools-3.11.0-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684392" comment="liblouis19-3.11.0-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684393" comment="python3-louis-3.11.0-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52749" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200628" ref_url="https://bugzilla.suse.com/1200628" source="BUGZILLA"/>
		<reference ref_id="1200645" ref_url="https://bugzilla.suse.com/1200645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<reference ref_id="CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011356.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2022-31625: Fixed uninitialized pointers free in Postgres extension. (bsc#1200645)
- CVE-2022-31626: Fixed buffer overflow via user-supplied password when using pdo_mysql extension with mysqlnd driver. (bsc#1200628).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-24"/>
	<updated date="2022-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200628">SUSE bug 1200628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200645">SUSE bug 1200645</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684839" comment="apache2-mod_php7-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684840" comment="php7-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684841" comment="php7-bcmath-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684842" comment="php7-bz2-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684843" comment="php7-calendar-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684844" comment="php7-ctype-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684845" comment="php7-curl-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684846" comment="php7-dba-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684847" comment="php7-devel-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684848" comment="php7-dom-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684715" comment="php7-embed-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684849" comment="php7-enchant-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684850" comment="php7-exif-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684851" comment="php7-fastcgi-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684852" comment="php7-fileinfo-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695425" comment="php7-firebird-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684853" comment="php7-fpm-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684854" comment="php7-ftp-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684855" comment="php7-gd-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684856" comment="php7-gettext-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684857" comment="php7-gmp-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684858" comment="php7-iconv-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684859" comment="php7-intl-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684860" comment="php7-json-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684861" comment="php7-ldap-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684862" comment="php7-mbstring-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684863" comment="php7-mysql-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684864" comment="php7-odbc-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684865" comment="php7-opcache-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684866" comment="php7-openssl-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684867" comment="php7-pcntl-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684868" comment="php7-pdo-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684869" comment="php7-pgsql-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684870" comment="php7-phar-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684871" comment="php7-posix-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684872" comment="php7-readline-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684873" comment="php7-shmop-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684874" comment="php7-snmp-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684875" comment="php7-soap-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684876" comment="php7-sockets-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684877" comment="php7-sodium-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684878" comment="php7-sqlite-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684879" comment="php7-sysvmsg-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684880" comment="php7-sysvsem-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684881" comment="php7-sysvshm-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695426" comment="php7-test-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684882" comment="php7-tidy-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684883" comment="php7-tokenizer-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684884" comment="php7-xmlreader-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684885" comment="php7-xmlrpc-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684886" comment="php7-xmlwriter-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684887" comment="php7-xsl-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684888" comment="php7-zip-7.4.6-150200.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684889" comment="php7-zlib-7.4.6-150200.3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52750" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200748" ref_url="https://bugzilla.suse.com/1200748" source="BUGZILLA"/>
		<reference ref_id="1200750" ref_url="https://bugzilla.suse.com/1200750" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30122" ref_url="https://www.suse.com/security/cve/CVE-2022-30122/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011366.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

- CVE-2022-30122: Fixed crafted multipart POST request may cause a DoS (bsc#1200748)
- CVE-2022-30123: Fixed crafted requests can cause shell escape sequences (bsc#1200750)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-06-27"/>
	<updated date="2022-06-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1200748">SUSE bug 1200748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200750">SUSE bug 1200750</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30122/">CVE-2022-30122</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684902" comment="ruby2.5-rubygem-rack-2.0.8-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695427" comment="ruby2.5-rubygem-rack-doc-2.0.8-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695428" comment="ruby2.5-rubygem-rack-testsuite-2.0.8-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52751" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185637" ref_url="https://bugzilla.suse.com/1185637" source="BUGZILLA"/>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011387.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:
	  
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185637">SUSE bug 1185637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684329" comment="libopenssl-1_1-devel-1.1.1d-150200.11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695446" comment="libopenssl-1_1-devel-32bit-1.1.1d-150200.11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684330" comment="libopenssl1_1-1.1.1d-150200.11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684331" comment="libopenssl1_1-32bit-1.1.1d-150200.11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684332" comment="libopenssl1_1-hmac-1.1.1d-150200.11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684333" comment="libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684334" comment="openssl-1_1-1.1.1d-150200.11.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695447" comment="openssl-1_1-doc-1.1.1d-150200.11.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52752" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1130813" ref_url="https://bugzilla.suse.com/1130813" source="BUGZILLA"/>
		<reference ref_id="1197085" ref_url="https://bugzilla.suse.com/1197085" source="BUGZILLA"/>
		<reference ref_id="1200120" ref_url="https://bugzilla.suse.com/1200120" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26981" ref_url="https://www.suse.com/security/cve/CVE-2022-26981/" source="CVE"/>
		<reference ref_id="CVE-2022-31783" ref_url="https://www.suse.com/security/cve/CVE-2022-31783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011386.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes the following issues:

- CVE-2022-26981: fix buffer overrun in compilePassOpcode (bsc#1197085).
- CVE-2022-31783: prevent an invalid memory write in compileRule (bsc#1200120).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130813">SUSE bug 1130813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197085">SUSE bug 1197085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200120">SUSE bug 1200120</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26981/">CVE-2022-26981</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-31783/">CVE-2022-31783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009693136" comment="liblouis14-3.3.0-150000.4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52753" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197084" ref_url="https://bugzilla.suse.com/1197084" source="BUGZILLA"/>
		<reference ref_id="1198035" ref_url="https://bugzilla.suse.com/1198035" source="BUGZILLA"/>
		<reference ref_id="1198037" ref_url="https://bugzilla.suse.com/1198037" source="BUGZILLA"/>
		<reference ref_id="1198712" ref_url="https://bugzilla.suse.com/1198712" source="BUGZILLA"/>
		<reference ref_id="1199018" ref_url="https://bugzilla.suse.com/1199018" source="BUGZILLA"/>
		<reference ref_id="1199924" ref_url="https://bugzilla.suse.com/1199924" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4206" ref_url="https://www.suse.com/security/cve/CVE-2021-4206/" source="CVE"/>
		<reference ref_id="CVE-2021-4207" ref_url="https://www.suse.com/security/cve/CVE-2021-4207/" source="CVE"/>
		<reference ref_id="CVE-2022-26354" ref_url="https://www.suse.com/security/cve/CVE-2022-26354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011388.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2022-26354: Fixed missing virtqueue detach on error can lead to memory leak (bsc#1198712)
- CVE-2021-4207: Fixed double fetch in qxl_cursor() can lead to heap buffer overflow (bsc#1198037)
- CVE-2021-4206: Fixed integer overflow in cursor_alloc() can lead to heap buffer overflow (bsc#1198035)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197084">SUSE bug 1197084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198035">SUSE bug 1198035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198037">SUSE bug 1198037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198712">SUSE bug 1198712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199018">SUSE bug 1199018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199924">SUSE bug 1199924</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4206/">CVE-2021-4206</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4207/">CVE-2021-4207</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26354/">CVE-2022-26354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684791" comment="qemu-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684792" comment="qemu-SLOF-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695459" comment="qemu-arm-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695460" comment="qemu-audio-alsa-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695461" comment="qemu-audio-pa-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695462" comment="qemu-audio-spice-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684797" comment="qemu-block-curl-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695463" comment="qemu-block-dmg-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695464" comment="qemu-block-gluster-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684798" comment="qemu-block-iscsi-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695465" comment="qemu-block-nfs-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684799" comment="qemu-block-rbd-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684800" comment="qemu-block-ssh-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684801" comment="qemu-chardev-baum-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695466" comment="qemu-chardev-spice-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695467" comment="qemu-extra-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684803" comment="qemu-guest-agent-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695468" comment="qemu-hw-display-qxl-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695469" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695470" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695471" comment="qemu-hw-display-virtio-vga-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695472" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695473" comment="qemu-hw-usb-redirect-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695474" comment="qemu-hw-usb-smartcard-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684810" comment="qemu-ipxe-1.0.0+-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695475" comment="qemu-ivshmem-tools-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684811" comment="qemu-ksm-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684812" comment="qemu-kvm-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684813" comment="qemu-lang-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695476" comment="qemu-linux-user-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695477" comment="qemu-microvm-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695478" comment="qemu-ppc-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695479" comment="qemu-s390x-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684816" comment="qemu-seabios-1.14.0_0_g155821a-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684817" comment="qemu-sgabios-8-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684818" comment="qemu-skiboot-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695480" comment="qemu-testsuite-5.2.0-150300.115.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684346" comment="qemu-tools-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684819" comment="qemu-ui-curses-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695481" comment="qemu-ui-gtk-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695482" comment="qemu-ui-opengl-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695483" comment="qemu-ui-spice-app-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695484" comment="qemu-ui-spice-core-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684824" comment="qemu-vgabios-1.14.0_0_g155821a-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695485" comment="qemu-vhost-user-gpu-5.2.0-150300.115.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695486" comment="qemu-x86-5.2.0-150300.115.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52754" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1153866" ref_url="https://bugzilla.suse.com/1153866" source="BUGZILLA"/>
		<reference ref_id="1200387" ref_url="https://bugzilla.suse.com/1200387" source="BUGZILLA"/>
		<reference ref_id="1200388" ref_url="https://bugzilla.suse.com/1200388" source="BUGZILLA"/>
		<reference ref_id="1200389" ref_url="https://bugzilla.suse.com/1200389" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17540" ref_url="https://www.suse.com/security/cve/CVE-2019-17540/" source="CVE"/>
		<reference ref_id="CVE-2022-32545" ref_url="https://www.suse.com/security/cve/CVE-2022-32545/" source="CVE"/>
		<reference ref_id="CVE-2022-32546" ref_url="https://www.suse.com/security/cve/CVE-2022-32546/" source="CVE"/>
		<reference ref_id="CVE-2022-32547" ref_url="https://www.suse.com/security/cve/CVE-2022-32547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011389.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  - CVE-2019-17540: Fixed heap-based buffer overflow in ReadPSInfo in coders/ps.c. (bsc#1153866)
  - CVE-2022-32545: Fixed an outside the range of representable values of type. (bsc#1200388)
  - CVE-2022-32546: Fixed an outside the range of representable values of type. (bsc#1200389)
  - CVE-2022-32547: Fixed a load of misaligned address at MagickCore/property.c. (bsc#1200387)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-04"/>
	<updated date="2022-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153866">SUSE bug 1153866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200387">SUSE bug 1200387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200388">SUSE bug 1200388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200389">SUSE bug 1200389</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17540/">CVE-2019-17540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32545/">CVE-2022-32545</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32546/">CVE-2022-32546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32547/">CVE-2022-32547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684403" comment="ImageMagick-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684404" comment="ImageMagick-config-7-SUSE-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684405" comment="ImageMagick-config-7-upstream-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684406" comment="ImageMagick-devel-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695488" comment="ImageMagick-devel-32bit-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695489" comment="ImageMagick-doc-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695490" comment="ImageMagick-extra-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684407" comment="libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695491" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684408" comment="libMagick++-devel-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695492" comment="libMagick++-devel-32bit-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684409" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695493" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684410" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695494" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684442" comment="perl-PerlMagick-7.0.7.34-150200.10.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52755" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193184" ref_url="https://bugzilla.suse.com/1193184" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/543MEJC5CUZO2UZUL4R43HGV5KUNNJ4U/" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-28"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193184">SUSE bug 1193184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664290" comment="log4j12-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664306" comment="log4j12-javadoc-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664307" comment="log4j12-manual-1.2.17-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52756" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011399.html" source="SUSE-SU"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684829" comment="dpdk-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684830" comment="dpdk-devel-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695497" comment="dpdk-doc-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695498" comment="dpdk-examples-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684831" comment="dpdk-kmp-default-19.11.4_k5.3.18_150300.59.76-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695499" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_150300.59.76-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684832" comment="dpdk-thunderx-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684833" comment="dpdk-thunderx-devel-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695500" comment="dpdk-thunderx-doc-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695501" comment="dpdk-thunderx-examples-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684834" comment="dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.76-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695502" comment="dpdk-thunderx-kmp-preempt-19.11.4_k5.3.18_150300.59.76-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695503" comment="dpdk-thunderx-tools-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684835" comment="dpdk-tools-19.11.4-150300.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684836" comment="libdpdk-20_0-19.11.4-150300.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52757" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011405.html" source="SUSE-SU"/>
		<description>

This update of dpdk fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-05"/>
	<updated date="2022-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695496" comment="libdpdk-18_11-18.11.9-150100.4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52758" version="1" class="patch">
	<metadata>
		<title>Security update for conmon, libcontainers-common, libseccomp, podman (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1176804" ref_url="https://bugzilla.suse.com/1176804" source="BUGZILLA"/>
		<reference ref_id="1177598" ref_url="https://bugzilla.suse.com/1177598" source="BUGZILLA"/>
		<reference ref_id="1181640" ref_url="https://bugzilla.suse.com/1181640" source="BUGZILLA"/>
		<reference ref_id="1182998" ref_url="https://bugzilla.suse.com/1182998" source="BUGZILLA"/>
		<reference ref_id="1188520" ref_url="https://bugzilla.suse.com/1188520" source="BUGZILLA"/>
		<reference ref_id="1188914" ref_url="https://bugzilla.suse.com/1188914" source="BUGZILLA"/>
		<reference ref_id="1193166" ref_url="https://bugzilla.suse.com/1193166" source="BUGZILLA"/>
		<reference ref_id="1193273" ref_url="https://bugzilla.suse.com/1193273" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-3602" ref_url="https://www.suse.com/security/cve/CVE-2021-3602/" source="CVE"/>
		<reference ref_id="CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
		<description>
This update for conmon, libcontainers-common, libseccomp, podman fixes the following issues:

podman was updated to 3.4.4.

Security issues fixed:


- fix CVE-2021-41190 [bsc#1193273], opencontainers: OCI manifest and index parsing confusion
- fix CVE-2021-4024  [bsc#1193166], podman machine spawns gvproxy with port binded to all IPs
- fix CVE-2021-20199 [bsc#1181640], Remote traffic to rootless containers is seen as orginating from localhost

- Add: Provides: podman:/usr/bin/podman-remote subpackage for a clearer upgrade
  path from podman &lt; 3.1.2

Update to version 3.4.4:

  * Bugfixes

    - Fixed a bug where the podman exec command would, under some circumstances,
      print a warning message about failing to move conmon to the appropriate cgroup (#12535).
    - Fixed a bug where named volumes created as part of container creation
      (e.g. podman run --volume avolume:/a/mountpoint or similar) would be
      mounted with incorrect permissions (#12523).
    - Fixed a bug where the podman-remote create and podman-remote run commands
      did not properly handle the --entrypoint='' option (to clear the container's entrypoint) (#12521).

- Update to version 3.4.3:

  * Security

    - This release addresses CVE-2021-4024, where the podman machine command opened the gvproxy API (used to forward ports to podman machine VMs) to the public internet on port 7777.
    - This release addresses CVE-2021-41190, where incomplete specification of behavior regarding image manifests could lead to inconsistent decoding on different clients.

  * Features

    - The --secret type=mount option to podman create and podman run supports a new option, target=, which specifies where in the container the secret will be mounted (#12287).

  * Bugfixes

    - Fixed a bug where rootless Podman would occasionally print warning messages about failing to move the pause process to a new cgroup (#12065).
    - Fixed a bug where the podman run and podman create commands would, when pulling images, still require TLS even with registries set to Insecure via config file (#11933).
    - Fixed a bug where the podman generate systemd command generated units that depended on multi-user.target, which has been removed from some distributions (#12438).
    - Fixed a bug where Podman could not run containers with images that had /etc/ as a symlink (#12189).
    - Fixed a bug where the podman logs -f command would, when using the journald logs backend, exit immediately if the container had previously been restarted (#12263).
    - Fixed a bug where, in containers on VMs created by podman machine, the host.containers.internal name pointed to the VM, not the host system (#11642).
    - Fixed a bug where containers and pods created by the podman play kube command in VMs managed by podman machine would not automatically forward ports from the host machine (#12248).
    - Fixed a bug where podman machine init would fail on OS X when GNU Coreutils was installed (#12329).
    - Fixed a bug where podman machine start would exit before SSH on the started VM was accepting connections (#11532).
    - Fixed a bug where the podman run command with signal proxying (--sig-proxy) enabled could print an error if it attempted to send a signal to a container that had just exited (#8086).
    - Fixed a bug where the podman stats command would not return correct information for containers running Systemd as PID1 (#12400).
    - Fixed a bug where the podman image save command would fail on OS X when writing the image to STDOUT (#12402).
    - Fixed a bug where the podman ps command did not properly handle PS arguments which contained whitespace (#12452).
    - Fixed a bug where the podman-remote wait command could fail to detect that the container exited and return an error under some circumstances (#12457).
    - Fixed a bug where the Windows MSI installer for podman-remote would break the PATH environment variable by adding an extra ' (#11416).

  * API

    - The Libpod Play Kube endpoint now also accepts ConfigMap YAML as part of its payload, and will use provided any ConfigMap to configure provided pods and services.
    - Fixed a bug where the Compat Create endpoint for Containers would not always create the container's working directory if it did not exist (#11842).
    - Fixed a bug where the Compat Create endpoint for Containers returned an incorrect error message with 404 errors when the requested image was not found (#12315).
    - Fixed a bug where the Compat Create endpoint for Containers did not properly handle the HostConfig.Mounts field (#12419).
    - Fixed a bug where the Compat Archive endpoint for Containers did not properly report errors when the operation failed (#12420).
    - Fixed a bug where the Compat Build endpoint for Images ignored the layers query parameter (for caching intermediate layers from the build) (#12378).
    - Fixed a bug where the Compat Build endpoint for Images did not report errors in a manner compatible with Docker (#12392).
    - Fixed a bug where the Compat Build endpoint for Images would fail to build if the context directory was a symlink (#12409).
    - Fixed a bug where the Compat List endpoint for Images included manifest lists (and not just images) in returned results (#12453).

- Update to version 3.4.2:

  * Fixed a bug where podman tag could not tag manifest lists (#12046).
  * Fixed a bug where built-in volumes specified by images would not be
    created correctly under some circumstances.
  * Fixed a bug where, when using Podman Machine on OS X, containers in pods
    did not have working port forwarding from the host (#12207).
  * Fixed a bug where the podman network reload command command on containers
    using the slirp4netns network mode and the rootlessport port forwarding
    driver would make an unnecessary attempt to restart rootlessport
    on containers that did not forward ports.
  * Fixed a bug where the podman generate kube command would generate YAML
    including some unnecessary (set to default) fields (e.g. empty SELinux and
    DNS configuration blocks, and the privileged flag when set to false) (#11995).
  * Fixed a bug where the podman pod rm command could, if interrupted at the right moment,
    leave a reference to an already-removed infra container behind (#12034).
  * Fixed a bug where the podman pod rm command would not remove pods with
    more than one container if all containers save for the infra container
    were stopped unless --force was specified (#11713).
  * Fixed a bug where the --memory flag to podman run and podman create did
    not accept a limit of 0 (which should specify unlimited memory) (#12002).
  * Fixed a bug where the remote Podman client's podman build command could
    attempt to build a Dockerfile in the working directory of the podman
    system service instance instead of the Dockerfile specified by the user (#12054).
  * Fixed a bug where the podman logs --tail command could function improperly
    (printing more output than requested) when the journald log driver was used.
  * Fixed a bug where containers run using the slirp4netns network mode with
    IPv6 enabled would not have IPv6 connectivity until several seconds after they started (#11062).
  * Fixed a bug where some Podman commands could cause an extra dbus-daemon
    process to be created (#9727).
  * Fixed a bug where rootless Podman would sometimes print warnings
    about a failure to move the pause process into a given CGroup (#12065).
  * Fixed a bug where the checkpointed field in podman inspect on a container
    was not set to false after a container was restored.
  * Fixed a bug where the podman system service command would print
    overly-verbose logs about request IDs (#12181).
  * Fixed a bug where Podman could, when creating a new container without a name
    explicitly specified by the user, sometimes use an auto-generated name already
    in use by another container if multiple containers were being created in parallel (#11735).

Update to version 3.4.1:

  * Bugfixes

    - Fixed a bug where podman machine init could, under some circumstances,
      create invalid machine configurations which could not be started (#11824).
    - Fixed a bug where the podman machine list command would not properly
      populate some output fields.
    - Fixed a bug where podman machine rm could leave dangling sockets from
      the removed machine (#11393).
    - Fixed a bug where podman run --pids-limit=-1 was not supported (it now
      sets the PID limit in the container to unlimited) (#11782).
    - Fixed a bug where podman run and podman attach could throw errors about
      a closed network connection when STDIN was closed by the client (#11856).
    - Fixed a bug where the podman stop command could fail when run on a
      container that had another podman stop command run on it previously.
    - Fixed a bug where the --sync flag to podman ps was nonfunctional.
    - Fixed a bug where the Windows and OS X remote clients' podman stats
      command would fail (#11909).
    - Fixed a bug where the podman play kube command did not properly handle
      environment variables whose values contained an = (#11891).
    - Fixed a bug where the podman generate kube command could generate
      invalid annotations when run on containers with volumes that use SELinux
      relabelling (:z or :Z) (#11929).
    - Fixed a bug where the podman generate kube command would generate YAML
      including some unnecessary (set to default) fields (e.g. user and group,
      entrypoint, default protocol for forwarded ports) (#11914, #11915, and #11965).
    - Fixed a bug where the podman generate kube command could, under some
      circumstances, generate YAML including an invalid targetPort field for
      forwarded ports (#11930).
    - Fixed a bug where rootless Podman's podman info command could, under
      some circumstances, not read available CGroup controllers (#11931).
    - Fixed a bug where podman container checkpoint --export would fail to
      checkpoint any container created with --log-driver=none (#11974).

  * API

    - Fixed a bug where the Compat Create endpoint for Containers could panic
      when no options were passed to a bind mount of tmpfs (#11961).

Update to version 3.4.0:

  * Features

    - Pods now support init containers! Init containers are containers which run before the rest of the pod starts. There are two types of init containers: 'always', which always run before the pod is started, and 'once', which only run the first time the pod starts and are subsequently removed. They can be added using the podman create command's --init-ctr option.
    - Support for init containers has also been added to podman play kube and podman generate kube - init containers contained in Kubernetes YAML will be created as Podman init containers, and YAML generated by Podman will include any init containers created.
    - The podman play kube command now supports building images. If the --build option is given and a directory with the name of the specified image exists in the current working directory and contains a valid Containerfile or Dockerfile, the image will be built and used for the container.
    - The podman play kube command now supports a new option, --teardown, which removes any pods and containers created by the given Kubernetes YAML.
    - The podman generate kube command now generates annotations for SELinux mount options on volume (:z and :Z) that are respected by the podman play kube command.
    - A new command has been added, podman pod logs, to return logs for all containers in a pod at the same time.
    - Two new commands have been added, podman volume export (to export a volume to a tar file) and podman volume import) (to populate a volume from a given tar file).
    - The podman auto-update command now supports simple rollbacks. If a container fails to start after an automatic update, it will be rolled back to the previous image and restarted again.
    - Pods now share their user namespace by default, and the podman pod create command now supports the --userns option. This allows rootless pods to be created with the --userns=keep-id option.
    - The podman pod ps command now supports a new filter with its --filter option, until, which returns pods created before a given timestamp.
    - The podman image scp command has been added. This command allows images to be transferred between different hosts.
    - The podman stats command supports a new option, --interval, to specify the amount of time before the information is refreshed.
    - The podman inspect command now includes ports exposed (but not published) by containers (e.g. ports from --expose when --publish-all is not specified).
    - The podman inspect command now has a new boolean value, Checkpointed, which indicates that a container was stopped as a result of a podman container checkpoint operation.
    - Volumes created by podman volume create now support setting quotas when run atop XFS. The size and inode options allow the maximum size and maximum number of inodes consumed by a volume to be limited.
    - The podman info command now outputs information on what log drivers, network drivers, and volume plugins are available for use (#11265).
    - The podman info command now outputs the current log driver in use, and the variant and codename of the distribution in use.
    - The parameters of the VM created by podman machine init (amount of disk space, memory, CPUs) can now be set in containers.conf.
    - The podman machine ls command now shows additional information (CPUs, memory, disk size) about VMs managed by podman machine.
    - The podman ps command now includes healthcheck status in container state for containers that have healthchecks (#11527).

  * Changes

    - The podman build command has a new alias, podman buildx, to improve compatibility with Docker. We have already added support for many docker buildx flags to podman build and aim to continue to do so.
    - Cases where Podman is run without a user session or a writable temporary files directory will now produce better error messages.
    - The default log driver has been changed from file to journald. The file driver did not properly support log rotation, so this should lead to a better experience. If journald is not available on the system, Podman will automatically revert to the file.
    - Podman no longer depends on ip for removing networks (#11403).
    - The deprecated --macvlan flag to podman network create now warns when it is used. It will be removed entirely in the Podman 4.0 release.
    - The podman machine start command now prints a message when the VM is successfully started.
    - The podman stats command can now be used on containers that are paused.
    - The podman unshare command will now return the exit code of the command that was run in the user namespace (assuming the command was successfully run).
    - Successful healthchecks will no longer add a healthy line to the system log to reduce log spam.
    - As a temporary workaround for a lack of shortname prompts in the Podman remote client, VMs created by podman machine now default to only using the docker.io registry.

  * Bugfixes

    - Fixed a bug where whitespace in the definition of sysctls (particularly default sysctls specified in containers.conf) would cause them to be parsed incorrectly.
    - Fixed a bug where the Windows remote client improperly validated volume paths (#10900).
    - Fixed a bug where the first line of logs from a container run with the journald log driver could be skipped.
    - Fixed a bug where images created by podman commit did not include ports exposed by the container.
    - Fixed a bug where the podman auto-update command would ignore the io.containers.autoupdate.authfile label when pulling images (#11171).
    - Fixed a bug where the --workdir option to podman create and podman run could not be set to a directory where a volume was mounted (#11352).
    - Fixed a bug where systemd socket-activation did not properly work with systemd-managed Podman containers (#10443).
    - Fixed a bug where environment variable secrets added to a container were not available to exec sessions launched in the container.
    - Fixed a bug where rootless containers could fail to start the rootlessport port-forwarding service when XDG_RUNTIME_DIR was set to a long path.
    - Fixed a bug where arguments to the --systemd option to podman create and podman run were case-sensitive (#11387).
    - Fixed a bug where the podman manifest rm command would also remove images referenced by the manifest, not just the manifest itself (#11344).
    - Fixed a bug where the Podman remote client on OS X would not function properly if the TMPDIR environment variable was not set (#11418).
    - Fixed a bug where the /etc/hosts file was not guaranteed to contain an entry for localhost (this is still not guaranteed if --net=host is used; such containers will exactly match the host's /etc/hosts) (#11411).
    - Fixed a bug where the podman machine start command could print warnings about unsupported CPU features (#11421).
    - Fixed a bug where the podman info command could segfault when accessing cgroup information.
    - Fixed a bug where the podman logs -f command could hang when a container exited (#11461).
    - Fixed a bug where the podman generate systemd command could not be used on containers that specified a restart policy (#11438).
    - Fixed a bug where the remote Podman client's podman build command would fail to build containers if the UID and GID on the client were higher than 65536 (#11474).
    - Fixed a bug where the remote Podman client's podman build command would fail to build containers if the context directory was a symlink (#11732).
    - Fixed a bug where the --network flag to podman play kube was not properly parsed when a non-bridge network configuration was specified.
    - Fixed a bug where the podman inspect command could error when the container being inspected was removed as it was being inspected (#11392).
    - Fixed a bug where the podman play kube command ignored the default pod infra image specified in containers.conf.
    - Fixed a bug where the --format option to podman inspect was nonfunctional under some circumstances (#8785).
    - Fixed a bug where the remote Podman client's podman run and podman exec commands could skip a byte of output every 8192 bytes (#11496).
    - Fixed a bug where the podman stats command would print nonsensical results if the container restarted while it was running (#11469).
    - Fixed a bug where the remote Podman client would error when STDOUT was redirected on a Windows client (#11444).
    - Fixed a bug where the podman run command could return 0 when the application in the container exited with 125 (#11540).
    - Fixed a bug where containers with --restart=always set using the rootlessport port-forwarding service could not be restarted automatically.
    - Fixed a bug where the --cgroups=split option to podman create and podman run was silently discarded if the container was part of a pod.
    - Fixed a bug where the podman container runlabel command could fail if the image name given included a tag.
    - Fixed a bug where Podman could add an extra 127.0.0.1 entry to /etc/hosts under some circumstances (#11596).
    - Fixed a bug where the remote Podman client's podman untag command did not properly handle tags including a digest (#11557).
    - Fixed a bug where the --format option to podman ps did not properly support the table argument for tabular output.
    - Fixed a bug where the --filter option to podman ps did not properly handle filtering by healthcheck status (#11687).
    - Fixed a bug where the podman run and podman start --attach commands could race when retrieving the exit code of a container that had already been removed resulting in an error (e.g. by an external podman rm -f) (#11633).
    - Fixed a bug where the podman generate kube command would add default environment variables to generated YAML.
    - Fixed a bug where the podman generate kube command would add the default CMD from the image to generated YAML (#11672).
    - Fixed a bug where the podman rm --storage command could fail to remove containers under some circumstances (#11207).
    - Fixed a bug where the podman machine ssh command could fail when run on Linux (#11731).
    - Fixed a bug where the podman stop command would error when used on a container that was already stopped (#11740).
    - Fixed a bug where renaming a container in a pod using the podman rename command, then removing the pod using podman pod rm, could cause Podman to believe the new name of the container was permanently in use, despite the container being removed (#11750).

  * API

    - The Libpod Pull endpoint for Images now has a new query parameter, quiet, which (when set to true) suppresses image pull progress reports (#10612).
    - The Compat Events endpoint now includes several deprecated fields from the Docker v1.21 API for improved compatibility with older clients.
    - The Compat List and Inspect endpoints for Images now prefix image IDs with sha256: for improved Docker compatibility (#11623).
    - The Compat Create endpoint for Containers now properly sets defaults for healthcheck-related fields (#11225).
    - The Compat Create endpoint for Containers now supports volume options provided by the Mounts field (#10831).
    - The Compat List endpoint for Secrets now supports a new query parameter, filter, which allows returned results to be filtered.
    - The Compat Auth endpoint now returns the correct response code (500 instead of 400) when logging into a registry fails.
    - The Version endpoint now includes information about the OCI runtime and Conmon in use (#11227).
    - Fixed a bug where the X-Registry-Config header was not properly handled, leading to errors when pulling images (#11235).
    - Fixed a bug where invalid query parameters could cause a null pointer dereference when creating error messages.
    - Logging of API requests and responses at trace level has been greatly improved, including the addition of an X-Reference-Id header to correlate requests and responses (#10053).

Update to version 3.3.1:

  * Bugfixes

    - Fixed a bug where unit files created by podman generate systemd could
      not cleanup shut down containers when stopped by systemctl stop (#11304).
    - Fixed a bug where podman machine commands would not properly locate
      the gvproxy binary in some circumstances.
    - Fixed a bug where containers created as part of a pod using the
      --pod-id-file option would not join the pod's network namespace (#11303).
    - Fixed a bug where Podman, when using the systemd cgroups driver,
      could sometimes leak dbus sessions.
    - Fixed a bug where the until filter to podman logs and podman events
      was improperly handled, requiring input to be negated (#11158).
    - Fixed a bug where rootless containers using CNI networking run on
      systems using systemd-resolved for DNS would fail to start if resolved
      symlinked /etc/resolv.conf to an absolute path (#11358).

  * API

    - A large number of potential file descriptor leaks from improperly closing
      client connections have been fixed.

Update to version 3.3.0:

  * Fix network aliases with network id
  * machine: compute sha256 as we read the image file
  * machine: check for file exists instead of listing directory
  * pkg/bindings/images.nTar(): slashify hdr.Name values
  * Volumes: Only remove from DB if plugin removal succeeds
  * For compatibility, ignore Content-Type
  * [v3.3] Bump c/image 5.15.2, buildah v1.22.3
  * Implement SD-NOTIFY proxy in conmon
  * Fix rootless cni dns without systemd stub resolver
  * fix rootlessport flake
  * Skip stats test in CGv1 container environments
  * Fix AVC denials in tests of volume mounts
  * Restore buildah-bud test requiring new images
  * Revert '.cirrus.yml: use fresh images for all VMs'
  * Fix device tests using ls test files
  * Enhance priv. dev. check
  * Workaround host availability of /dev/kvm
  * Skip cgroup-parent test due to frequent flakes
  * Cirrus: Fix not uploading logformatter html

Switch to crun (bsc#1188914)

Update to version 3.2.3:

  * Bump to v3.2.3
  * Update release notes for v3.2.3
  * vendor containers/common@v0.38.16
  * vendor containers/buildah@v1.21.3
  * Fix race conditions in rootless cni setup
  * CNI-in-slirp4netns: fix bind-mount for /run/systemd/resolve/stub-resolv.conf
  * Make rootless-cni setup more robust
  * Support uid,gid,mode options for secrets
  * vendor containers/common@v0.38.15
  * [CI:DOCS] podman search: clarify that results depend on implementation
  * vendor containers/common@v0.38.14
  * vendor containers/common@v0.38.13
  * [3.2] vendor containers/common@v0.38.12
  * Bump README to v3.2.2
  * Bump to v3.2.3-dev

- Update to version 3.2.2:
  * Bump to v3.2.2
  * fix systemcontext to use correct TMPDIR
  * Scrub podman commands to use report package
  * Fix volumes with uid and gid options
  * Vendor in c/common v0.38.11
  * Initial release notes for v3.2.2
  * Fix restoring of privileged containers
  * Fix handling of podman-remote build --device
  * Add support for podman remote build -f - .
  * Fix panic condition in cgroups.getAvailableControllers
  * Fix permissions on initially created named volumes
  * Fix building static podman-remote
  * add correct slirp ip to /etc/hosts
  * disable tty-size exec checks in system tests
  * Fix resize race with podman exec -it
  * Fix documentation of the --format option of podman push
  * Fix systemd-resolved detection.
  * Health Check is not handled in the compat LibpodToContainerJSON
  * Do not use inotify for OCICNI
  * getContainerNetworkInfo: lock netNsCtr before sync
  * [NO TESTS NEEDED] Create /etc/mtab with the correct ownership
  * Create the /etc/mtab file if does not exists
  * [v3.2] cp: do not allow dir-&gt;file copying
  * create: support images with invalid platform
  * vendor containers/common@v0.38.10
  * logs: k8s-file: restore poll sleep
  * logs: k8s-file: fix spurious error logs
  * utils: move message from warning to debug
  * Bump to v3.2.2-dev

- Update to version 3.2.1:
  * Bump to v3.2.1
  * Updated release notes for v3.2.1
  * Fix network connect race with docker-compose
  * Revert 'Ensure minimum API version is set correctly in tests'
  * Fall back to string for dockerfile parameter
  * remote events: fix --stream=false
  * [CI:DOCS] fix incorrect network remove api doc
  * remote: always send resize before the container starts
  * remote events: support labels
  * remote pull: cancel pull when connection is closed
  * Fix network prune api docs
  * Improve systemd-resolved detection
  * logs: k8s-file: fix race
  * Fix image prune --filter cmd behavior
  * Several shell completion fixes
  * podman-remote build should handle -f option properly
  * System tests: deal with crun 0.20.1
  * Fix build tags for pkg/machine...
  * Fix pre-checkpointing
  * container: ignore named hierarchies
  * [v3.2] vendor containers/common@v0.38.9
  * rootless: fix fast join userns path
  * [v3.2] vendor containers/common@v0.38.7
  * [v3.2] vendor containers/common@v0.38.6
  * Correct qemu options for Intel macs
  * Ensure minimum API version is set correctly in tests
  * Bump to v3.2.1-dev

- Update to version 3.2.0:
  * Bump to v3.2.0
  * Fix network create macvlan with subnet option
  * Final release notes updates for v3.2.0
  * add ipv6 nameservers only when the container has ipv6 enabled
  * Use request context instead of background
  * [v.3.2] events: support disjunctive filters
  * System tests: add :Z to volume mounts
  * generate systemd: make mounts portable
  * vendor containers/storage@v1.31.3
  * vendor containers/common@v0.38.5
  * Bump to v3.2.0-dev
  * Bump to v3.2.0-RC3
  * Update release notes for v3.2.0-RC3
  * Fix race on podman start --all
  * Fix race condition in running ls container in a pod
  * docs: --cert-dir: point to containers-certs.d(5)
  * Handle hard links in different directories
  * Improve OCI Runtime error
  * Handle hard links in remote builds
  * Podman info add support for status of cgroup controllers
  * Drop container does not exist on removal to debugf
  * Downgrade API service routing table logging
  * add libimage events
  * docs: generate systemd: XDG_RUNTIME_DIR
  * Fix problem copying files when container is in host pid namespace
  * Bump to v3.2.0-dev
  * Bump to v3.2.0-RC2
  * update c/common
  * Update Cirrus DEST_BRANCH to v3.2
  * Updated vendors of c/image, c/storage, Buildah
  * Initial release notes for v3.2.0-RC2
  * Add script for identifying commits in release branches
  * Add host.containers.internal entry into container's etc/hosts
  * image prune: remove unused images only with `--all`
  * podman network reload add rootless support
  * Use more recent `stale` release...
  * network tutorial: update with rootless cni changes
  * [CI:DOCS] Update first line in intro page
  * Use updated VM images + updated automation tooling
  * auto-update service: prune images
  * make vendor
  * fix system upgrade tests
  * Print 'extracting' only on compressed file
  * podman image tree: restore previous behavior
  * fix network restart always test
  * fix incorrect log driver in podman container image
  * Add support for cli network prune --filter flag
  * Move filter parsing to common utils
  * Bump github.com/containers/storage from 1.30.2 to 1.30.3
  * Update nix pin with `make nixpkgs`
  * [CI:DOCS] hack/bats - new helper for running system tests
  * fix restart always with slirp4netns
  * Bump github.com/opencontainers/runc from 1.0.0-rc93 to 1.0.0-rc94
  * Bump github.com/coreos/go-systemd/v22 from 22.3.1 to 22.3.2
  * Add host.serviceIsRemote to podman info results
  * Add client disconnect to build handler loop
  * Remove obsolete skips
  * Fix podman-remote build --rm=false ...
  * fix: improved 'containers/{name}/wait' endpoint
  * Bump github.com/containers/storage from 1.30.1 to 1.30.2
  * Add envars to the generated systemd unit
  * fix: use UTC Time Stamps in response JSON
  * fix container startup for empty pidfile
  * Kube like pods should share ipc,net,uts by default
  * fix: compat API 'images/get' for multiple images
  * Revert escaped double dash man page flag syntax
  * Report Download complete in Compatibility mode
  * Add documentation on short-names
  * Bump github.com/docker/docker
  * Adds support to preserve auto update labels in generate and play kube
  * [CI:DOCS] Stop conversion of `--` into en dash
  * Revert Patch to relabel if selinux not enabled
  * fix per review request
  * Add support for environment variable secrets
  * fix pre review request
  * Fix infinite loop in isPathOnVolume
  * Add containers.conf information for changing defaults
  * CI: run rootless tests under ubuntu
  * Fix wrong macvlan PNG in networking doc.
  * Add restart-policy to container filters &amp; --filter to podman start
  * Fixes docker-compose cannot set static ip when use ipam
  * channel: simplify implementation
  * build: improve regex for iidfile
  * Bump github.com/onsi/gomega from 1.11.0 to 1.12.0
  * cgroup: fix rootless --cgroup-parent with pods
  * fix: docker APIv2 `images/get`
  * codespell cleanup
  * Minor podmanimage docs updates.
  * Fix handling of runlabel IMAGE and NAME
  * Bump to v3.2.0-dev
  * Bump to v3.2.0-rc1
  * rootless: improve automatic range split
  * podman: set volatile storage flag for --rm containers
  * Bump github.com/onsi/ginkgo from 1.16.1 to 1.16.2
  * Bump github.com/containers/image/v5 from 5.11.1 to 5.12.0
  * migrate Podman to containers/common/libimage
  * Add filepath glob support to --security-opt unmask
  * Force log_driver to k8s-file for containers in containers
  * add --mac-address to podman play kube
  * compat api: Networks must be empty instead of null
  * System tests: honor $OCI_RUNTIME (for CI)
  * is this a bug?
  * system test image: add arm64v8 image
  * Fix troubleshooting documentation on handling sublemental groups.
  * Add --all to podman start
  * Fix variable reference typo. in multi-arch image action
  * cgroup: always honor --cgroup-parent with cgroupfs
  * Bump github.com/uber/jaeger-client-go
  * Don't require tests for github-actions &amp; metadata
  * Detect if in podman machine virtual vm
  * Fix multi-arch image workflow typo
  * [CI:DOCS] Add titles to remote docs (windows)
  * Remove unused VolumeList* structs
  * Cirrus: Update F34beta -&gt; F34
  * Update container image docs + fix unstable execution
  * Bump github.com/containers/storage from 1.30.0 to 1.30.1
  * TODO complete
  * Docker returns 'die' status rather then 'died' status
  * Check if another VM is running on machine start
  * [CI:DOCS] Improve titles of command HTML pages
  * system tests: networking: fix another race condition
  * Use seccomp_profile as default profile if defined in containers.conf
  * Bump github.com/json-iterator/go from 1.1.10 to 1.1.11
  * Vendored
  * Autoupdate local label functional
  * System tests: fix two race conditions
  * Add more documentation on conmon
  * Allow docker volume create API to pass without name
  * Cirrus: Update Ubuntu images to 21.04
  * Skip blkio-weight test when no kernel BFQ support
  * rootless: Tell the user what was led to the error, not just what it is
  * Add troubleshooting advice about the --userns option.
  * Fix images prune filter until
  * Fix logic for pushing stable multi-arch images
  * Fixes generate kube incorrect when bind-mounting '/' and '/root'
  * libpod/image: unit tests: don't use system's registries.conf.d
  * runtime: create userns when CAP_SYS_ADMIN is not present
  * rootless: attempt to copy current mappings first
  * [CI:DOCS] Restore missing content to manpages
  * [CI:DOCS] Fix Markdown layout bugs
  * Fix podman ps --filter ancestor to match exact ImageName/ImageID
  * Add machine-enabled to containers.conf for machine
  * Several multi-arch image build/push fixes
  * Add podman run --timeout option
  * Parse slirp4netns net options with compat api
  * Fix rootlesskit port forwarder with custom slirp cidr
  * Fix removal race condition in ListContainers
  * Add github-action workflow to build/push multi-arch
  * rootless: if root is not sub?id raise a debug message
  * Bump github.com/containers/common from 0.36.0 to 0.37.0
  * Add go template shell completion for --format
  * Add --group-add keep-groups: suplimentary groups into container
  * Fixes from make codespell
  * Typo fix to usage text of --compress option
  * corrupt-image test: fix an oops
  * Add --noheading flag to all list commands
  * Bump github.com/containers/storage from 1.29.0 to 1.30.0
  * Bump github.com/containers/image/v5 from 5.11.0 to 5.11.1
  * [CI:DOCS] Fix Markdown table layout bugs
  * podman-remote should show podman.sock info
  * rmi: don't break when the image is missing a manifest
  * [CI:DOCS] Rewrite --uidmap doc in podman-create.1.md and podman-run.1.md
  * Add support for CDI device configuration
  * [CI:DOCS] Add missing dash to verbose option
  * Bump github.com/uber/jaeger-client-go
  * Remove an advanced layer diff function
  * Ensure mount destination is clean, no trailing slash
  * add it for inspect pidfile
  * [CI:DOCS] Fix introduction page typo
  * support pidfile on container restore
  * fix start it
  * skip pidfile test on remote
  * improve document
  * set pidfile default value int containerconfig
  * add pidfile in inspection
  * add pidfile it for container start
  * skip pidfile it on remote
  * Modify according to comments
  * WIP: drop test requirement
  * runtime: bump required conmon version
  * runtime: return findConmon to libpod
  * oci: drop ExecContainerCleanup
  * oci: use `--full-path` option for conmon
  * use AttachSocketPath when removing conmon files
  * hide conmon-pidfile flag on remote mode
  * Fix possible panic in libpod/image/prune.go
  * add --ip to podman play kube
  * add flag autocomplete
  * add ut
  * add flag '--pidfile' for podman create/run
  * Add network bindings tests: remove and list
  * Fix build with GO111MODULE=off
  * system tests: build --pull-never: deal with flakes
  * compose test: diagnose flakes v3
  * podman play kube apply correct log driver
  * Fixes podman-remote save to directories does not work
  * Bump github.com/rootless-containers/rootlesskit from 0.14.1 to 0.14.2
  * Update documentation of podman-run to reflect volume 'U' option
  * Fix flake on failed podman-remote build : try 2
  * compose test: ongoing efforts to diagnose flakes
  * Test that we don't error out on advertised --log-level values
  * At trace log level, print error text using %+v instead of %v
  * pkg/errorhandling.JoinErrors: don't throw away context for lone errors
  * Recognize --log-level=trace
  * Fix flake on failed podman-remote build
  * System tests: fix racy podman-inspect
  * Fixes invalid expression in save command
  * Bump github.com/containers/common from 0.35.4 to 0.36.0
  * Update nix pin with `make nixpkgs`
  * compose test: try to get useful data from flakes
  * Remove in-memory state implementation
  * Fix message about runtime to show only the actual runtime
  * System tests: setup: better cleanup of stray images
  * Bump github.com/containers/ocicrypt from 1.1.0 to 1.1.1
  * Reflect current state of prune implementation in docs
  * Do not delete container twice
  * [CI:DOCS] Correct status code for /pods/create
  * vendor in containers/storage v1.29.0
  * cgroup: do not set cgroup parent when rootless and cgroupfs
  * Overhaul Makefile binary and release worflows
  * Reorganize Makefile with sections and guide
  * Simplify Makefile help target
  * Don't shell to obtain current directory
  * Remove unnecessary/not-needed release.txt target
  * Fix incorrect version number output
  * Exclude .gitignore from test req.
  * Fix handling of $NAME and $IMAGE in runlabel
  * Update podman image Dockerfile to support Podman in container
  * Bump github.com/containers/image/v5 from 5.10.5 to 5.11.0
  * Fix slashes in socket URLs
  * Add network prune filters support to bindings
  * Add support for play/generate kube volumes
  * Update manifest API endpoints
  * Fix panic when not giving a machine name for ssh
  * cgroups: force 64 bits to ParseUint
  * Bump k8s.io/api from 0.20.5 to 0.21.0
  * [CI:DOCS] Fix formatting of podman-build man page
  * buildah-bud tests: simplify
  * Add missing return
  * Bump github.com/onsi/ginkgo from 1.16.0 to 1.16.1
  * speed up CI handling of images
  * Volumes prune endpoint should use only prune filters
  * Cirrus: Use Fedora 34beta images
  * Bump go.sum + Makefile for golang 1.16
  * Exempt Makefile changes from test requirements
  * Adjust libpod API Container Wait documentation to the code
  * [CI:DOCS] Update swagger definition of inspect manifest
  * use updated ubuntu images
  * podman unshare: add --rootless-cni to join the ns
  * Update swagger-check
  * swagger: remove name wildcards
  * Update buildah-bud diffs
  * Handle podman-remote --arch, --platform, --os
  * buildah-bud tests: handle go pseudoversions, plus...
  * Fix flaking rootless compose test
  * rootless cni add /usr/sbin to PATH if not present
  * System tests: special case for RHEL: require runc
  * Add --requires flag to podman run/create
  * [CI:DOCS] swagger-check: compare operations
  * [CI:DOCS] Polish swagger OpertionIDs
  * [NO TESTS NEEDED] Update nix pin with `make nixpkgs`
  * Ensure that `--userns=keep-id` sets user in config
  * [CI:DOCS] Set all operation id to be compatibile
  * Move operationIds to swagger:operation line
  * swagger: add operationIds that match with docker
  * Cirrus: Make use of shared get_ci_vm container
  * Don't relabel volumes if running in a privileged container
  * Allow users to override default storage opts with --storage-opt
  * Add support for podman --context default
  * Verify existence of auth file if specified
  * fix machine naming conventions
  * Initial network bindings tests
  * Update release notes to indicate CVE fix
  * Move socket activation check into init() and set global condition.
  * Bump github.com/onsi/ginkgo from 1.15.2 to 1.16.0
  * Http api tests for network prune with until filter
  * podman-run.1.md, podman-create.1.md : Adjust Markdown layout for --userns
  * Fix typos --uidmapping and --gidmapping
  * Add transport and destination info to manifest doc
  * Bump github.com/rootless-containers/rootlesskit from 0.14.0 to 0.14.1
  * Add default template functions
  * Fix missing podman-remote build options
  * Bump github.com/coreos/go-systemd/v22 from 22.3.0 to 22.3.1
  * Add ssh connection to root user
  * Add rootless docker-compose test to the CI
  * Use the slrip4netns dns in the rootless cni ns
  * Cleanup the rootless cni namespace
  * Add new docker-compose test for two networks
  * Make the docker-compose test work rootless
  * Remove unused rootless-cni-infra container files
  * Only use rootless RLK when the container has ports
  * Fix dnsname test
  * Enable rootless network connect/disconnect
  * Move slirp4netns functions into an extra file
  * Fix pod infra container cni network setup
  * Add rootless support for cni and --uidmap
  * rootless cni without infra container
  * Recreate until container prune tests for bindings
  * Remove --execute from podman machine ssh
  * Fixed podman-remote --network flag
  * Makefile: introduce install.docker-full
  * Makefile: ensure install.docker creates BINDIR
  * Fix unmount doc reference in image.rst
  * Should send the OCI runtime path not just the name to buildah
  * podman machine shell completion
  * Fix handling of remove --log-rusage param
  * Fix bindings prune containers flaky test
  * [CI:DOCS] Add local html build info to docs/README.md
  * Add podman machine list
  * Trim white space from /top endpoint results
  * Remove semantic version suffices from API calls
  * podman machine init --ignition-path
  * Document --volume from podman-remote run/create client
  * Update main branch to reflect the release of v3.1.0
  * Silence podman network reload errors with iptables-nft
  * Containers prune endpoint should use only prune filters
  * resolve proper aarch64 image names
  * APIv2 basic test: relax APIVersion check
  * Add machine support for qemu-system-aarch64
  * podman machine init user input
  * manpage xref: helpful diagnostic for unescaped dash-dash
  * Bump to v3.2.0-dev
  * swagger: update system version response body
  * buildah-bud tests: reenable pull-never test
  * [NO TESTS NEEDED] Shrink the size of podman-remote
  * Add powershell completions
  * [NO TESTS NEEDED] Drop Warning to Info, if cgroups not mounted
  * Fix long option format on docs.podman.io
  * system tests: friendier messages for 2-arg is()
  * service: use LISTEN_FDS
  * man pages: correct seccomp-policy label
  * rootless: use is_fd_inherited
  * podman generate systemd --new do not duplicate params
  * play kube: add support for env vars defined from secrets
  * play kube: support optional/mandatory env var from config map
  * play kube: prepare supporting other env source than config maps
  * Add machine support for more Linux distros
  * [NO TESTS NEEDED] Use same function podman-remote rmi as podman
  * Podman machine enhancements
  * Add problematic volume name to kube play error messages
  * Fix podman build --pull-never
  * [NO TESTS NEEDED] Fix for kernel without CONFIG_USER_NS
  * [NO TESTS NEEDED] Turn on podman-remote build --isolation
  * Fix list pods filter handling in libpod api
  * Remove resize race condition
  * [NO TESTS NEEDED] Vendor in containers/buildah v1.20.0
  * Use TMPDIR when commiting images
  * Add RequiresMountsFor= to systemd generate
  * Bump github.com/vbauerster/mpb/v6 from 6.0.2 to 6.0.3
  * Fix swapped dimensions from terminal.GetSize
  * Rename podman machine create to init and clean up
  * Correct json field name
  * system tests: new interactive tests
  * Improvements for machine
  * libpod/image: unit tests: use a `registries.conf` for aliases
  * libpod/image: unit tests: defer cleanup
  * libpod/image: unit tests: use `require.NoError`
  * Add --execute flag to podman machine ssh
  * introduce podman machine
  * Podman machine CLI and interface stub
  * Support multi doc yaml for generate/play kube
  * Fix filters in image http compat/libpod api endpoints
  * Bump github.com/containers/common from 0.35.3 to 0.35.4
  * Bump github.com/containers/storage from 1.28.0 to 1.28.1
  * Check if stdin is a term in --interactive --tty mode
  * [NO TESTS NEEDED] Remove /tmp/containers-users-* files on reboot
  * [NO TESTS NEEDED] Fix rootless volume plugins
  * Ensure manually-created volumes have correct ownership
  * Bump github.com/rootless-containers/rootlesskit
  * Unification of until filter across list/prune endpoints
  * Unification of label filter across list/prune endpoints
  * fixup
  * fix: build endpoint for compat API
  * [CI:DOCS] Add note to mappings for user/group userns in build
  * Bump k8s.io/api from 0.20.1 to 0.20.5
  * Validate passed in timezone from tz option
  * WIP: run buildah bud tests using podman
  * Fix containers list/prune http api filter behaviour
  * Generate Kubernetes PersistentVolumeClaims from named volumes

- Update to version 3.1.2:
  * Bump to v3.1.2
  * Update release notes for v3.1.2
  * Ensure mount destination is clean, no trailing slash
  * Fixes podman-remote save to directories does not work
  * [CI:DOCS] Add missing dash to verbose option
  * [CI:DOCS] Fix Markdown table layout bugs
  * [CI:DOCS] Rewrite --uidmap doc in podman-create.1.md and podman-run.1.md
  * rmi: don't break when the image is missing a manifest
  * Bump containers/image to v5.11.1
  * Bump github.com/coreos/go-systemd from 22.2.0 to 22.3.1
  * Fix lint
  * Bump to v3.1.2-dev
- Split podman-remote into a subpackage
- Add missing scriptlets for systemd units
- Escape macros in comments
- Drop some obsolete workarounds, including %{go_nostrip}

- Update to version 3.1.1:
  * Bump to v3.1.1
  * Update release notes for v3.1.1
  * podman play kube apply correct log driver
  * Fix build with GO111MODULE=off
  * [CI:DOCS] Set all operation id to be compatibile
  * Move operationIds to swagger:operation line
  * swagger: add operationIds that match with docker
  * Fix missing podman-remote build options
  * [NO TESTS NEEDED] Shrink the size of podman-remote
  * Move socket activation check into init() and set global condition.
  * rootless: use is_fd_inherited
  * Recreate until container prune tests for bindings
  * System tests: special case for RHEL: require runc
  * Document --volume from podman-remote run/create client
  * Containers prune endpoint should use only prune filters
  * Trim white space from /top endpoint results
  * Fix unmount doc reference in image.rst
  * Fix handling of remove --log-rusage param
  * Makefile: introduce install.docker-full
  * Makefile: ensure install.docker creates BINDIR
  * Should send the OCI runtime path not just the name to buildah
  * Fixed podman-remote --network flag
  * podman-run.1.md, podman-create.1.md : Adjust Markdown layout for --userns
  * Fix typos --uidmapping and --gidmapping
  * Add default template functions
  * Don't relabel volumes if running in a privileged container
  * Allow users to override default storage opts with --storage-opt
  * Add transport and destination info to manifest doc
  * Verify existence of auth file if specified
  * Ensure that `--userns=keep-id` sets user in config
  * [CI:DOCS] Update swagger definition of inspect manifest
  * Volumes prune endpoint should use only prune filters
  * Adjust libpod API Container Wait documentation to the code
  * Add missing return
  * [CI:DOCS] Fix formatting of podman-build man page
  * cgroups: force 64 bits to ParseUint
  * Fix slashes in socket URLs
  * [CI:DOCS] Correct status code for /pods/create
  * cgroup: do not set cgroup parent when rootless and cgroupfs
  * Reflect current state of prune implementation in docs
  * Do not delete container twice
  * Test that we don't error out on advertised --log-level values
  * At trace log level, print error text using %+v instead of %v
  * pkg/errorhandling.JoinErrors: don't throw away context for lone errors
  * Recognize --log-level=trace
  * Fix message about runtime to show only the actual runtime
  * Fix handling of $NAME and $IMAGE in runlabel
  * Fix flake on failed podman-remote build : try 2
  * Fix flake on failed podman-remote build
  * Update documentation of podman-run to reflect volume 'U' option
  * Fixes invalid expression in save command
  * Fix possible panic in libpod/image/prune.go
  * Update all containers/ project vendors
  * Fix tests
  * Bump to v3.1.1-dev

- Update to version 3.1.0:
  * Bump to v3.1.0
  * Fix test failure
  * Update release notes for v3.1.0 final release
  * [NO TESTS NEEDED] Turn on podman-remote build --isolation
  * Fix long option format on docs.podman.io
  * Fix containers list/prune http api filter behaviour
  * [CI:DOCS] Add note to mappings for user/group userns in build
  * Validate passed in timezone from tz option
  * Generate Kubernetes PersistentVolumeClaims from named volumes
  * libpod/image: unit tests: use a `registries.conf` for aliases
- Require systemd 241 or newer due to podman dependency go-systemd v22,
  otherwise build will fail with unknown C name errors

- Create docker subpackage to allow replacing docker with
  corresponding aliases to podman.

- Update to v3.0.1
  * Changes
    - Several frequently-occurring WARN level log messages have been downgraded to INFO or DEBUG to not clutter terminal output.
Bugfixes
    - Fixed a bug where the Created field of podman ps --format=json was formatted as a string instead of an Unix timestamp (integer) (#9315).
    - Fixed a bug where failing lookups of individual layers during the podman images command would cause the whole command to fail without printing output.
    - Fixed a bug where --cgroups=split did not function properly on cgroups v1 systems.
    - Fixed a bug where mounting a volume over an directory in the container that existed, but was empty, could fail (#9393).
    - Fixed a bug where mounting a volume over a directory in the container that existed could copy the entirety of the container's rootfs, instead of just the directory mounted over, into the volume (#9415).
    - Fixed a bug where Podman would treat the --entrypoint=[''] option to podman run and podman create as a literal empty string in the entrypoint, when instead it should have been ignored (#9377).
    - Fixed a bug where Podman would set the HOME environment variable to '' when the container ran as a user without an assigned home directory (#9378).
    - Fixed a bug where specifying a pod infra image that had no tags (by using its ID) would cause podman pod create to panic (#9374).
    - Fixed a bug where the --runtime option was not properly handled by the podman build command (#9365).
    - Fixed a bug where Podman would incorrectly print an error message related to the remote API when the remote API was not in use and starting Podman failed.
    - Fixed a bug where Podman would change ownership of a container's working directory, even if it already existed (#9387).
    - Fixed a bug where the podman generate systemd --new command would incorrectly escape %t when generating the path for the PID file (#9373).
    - Fixed a bug where Podman could, when run inside a Podman container with the host's containers/storage directory mounted into the container, erroneously detect a reboot and reset container state if the temporary directory was not also mounted in (#9191).
    - Fixed a bug where some options of the podman build command (including but not limited to --jobs) were nonfunctional (#9247).
  * API
    - Fixed a breaking change to the Libpod Wait API for Containers where the Conditions parameter changed type in Podman v3.0 (#9351).
    - Fixed a bug where the Compat Create endpoint for Containers did not properly handle forwarded ports that did not specify a host port.
    - Fixed a bug where the Libpod Wait endpoint for Containers could write duplicate headers after an error occurred.
    - Fixed a bug where the Compat Create endpoint for Images would not pull images that already had a matching tag present locally, even if a more recent version was available at the registry (#9232).
    - The Compat Create endpoint for Images has had its compatibility with Docker improved, allowing its use with the docker-java library.
  * Misc
    - Updated Buildah to v1.19.4
    - Updated the containers/storage library to v1.24.6
- Changes from v3.0.0
  * Features
    - Podman now features initial support for Docker Compose.
    - Added the podman rename command, which allows containers to be renamed after they are created (#1925).
    - The Podman remote client now supports the podman copy command.
    - A new command, podman network reload, has been added. This command will re-configure the network of all running containers, and can be used to recreate firewall rules lost when the system firewall was reloaded (e.g. via firewall-cmd --reload).
    - Podman networks now have IDs. They can be seen in podman network ls and can be used when removing and inspecting networks. Existing networks receive IDs automatically.
    - Podman networks now also support labels. They can be added via the --label option to network create, and podman network ls can filter labels based on them.
    - The podman network create command now supports setting bridge MTU and VLAN through the --opt option (#8454).
    - The podman container checkpoint and podman container restore commands can now checkpoint and restore containers that include volumes.
    - The podman container checkpoint command now supports the --with-previous and --pre-checkpoint options, and the podman container restore command now support the --import-previous option. These add support for two-step checkpointing with lowered dump times.
    - The podman push command can now push manifest lists. Podman will first attempt to push as an image, then fall back to pushing as a manifest list if that fails.
    - The podman generate kube command can now be run on multiple containers at once, and will generate a single pod containing all of them.
    - The podman generate kube and podman play kube commands now support Kubernetes DNS configuration, and will preserve custom DNS configuration when exporting or importing YAML (#9132).
    - The podman generate kube command now properly supports generating YAML for containers and pods creating using host networking (--net=host) (#9077).
    - The podman kill command now supports a --cidfile option to kill containers given a file containing the container's ID (#8443).
    - The podman pod create command now supports the --net=none option (#9165).
    - The podman volume create command can now specify volume UID and GID as options with the UID and GID fields passed to the the --opt option.
    - Initial support has been added for Docker Volume Plugins. Podman can now define available plugins in containers.conf and use them to create volumes with podman volume create --driver.
    - The podman run and podman create commands now support a new option, --platform, to specify the platform of the image to be used when creating the container.
    - The --security-opt option to podman run and podman create now supports the systempaths=unconfined option to unrestrict access to all paths in the container, as well as mask and unmask options to allow more granular restriction of container paths.
    - The podman stats --format command now supports a new format specified, MemUsageBytes, which prints the raw bytes of memory consumed by a container without human-readable formatting #8945.
    - The podman ps command can now filter containers based on what pod they are joined to via the pod filter (#8512).
    - The podman pod ps command can now filter pods based on what networks they are joined to via the network filter.
    The podman pod ps command can now print information on what networks a pod is joined to via the .Networks specifier to the --format option.
    - The podman system prune command now supports filtering what containers, pods, images, and volumes will be pruned.
    - The podman volume prune commands now supports filtering what volumes will be pruned.
    - The podman system prune command now includes information on space reclaimed (#8658).
    - The podman info command will now properly print information about packages in use on Gentoo and Arch systems.
    - The containers.conf file now contains an option for disabling creation of a new kernel keyring on container creation (#8384).
    - The podman image sign command can now sign multi-arch images by producing a signature for each image in a given manifest list.
    - The podman image sign command, when run as rootless, now supports per-user registry configuration files in $HOME/.config/containers/registries.d.
    - Configuration options for slirp4netns can now be set system-wide via the NetworkCmdOptions configuration option in containers.conf.
    - The MTU of slirp4netns can now be configured via the mtu= network command option (e.g. podman run --net slirp4netns:mtu=9000).
  * Security
    - A fix for CVE-2021-20199 is included. Podman between v1.8.0 and v2.2.1 used 127.0.0.1 as the source address for all traffic forwarded into rootless containers by a forwarded port; this has been changed to address the issue.
  * Changes
    - Shortname aliasing support has now been turned on by default. All Podman commands that must pull an image will, if a TTY is available, prompt the user about what image to pull.
    - The podman load command no longer accepts a NAME[:TAG] argument. The presence of this argument broke CLI compatibility with Docker by making docker load commands unusable with Podman (#7387).
    - The Go bindings for the HTTP API have been rewritten with a focus on limiting dependency footprint and improving extensibility. Read more here.
    - The legacy Varlink API has been completely removed from Podman.
    - The default log level for Podman has been changed from Error to Warn.
    - The podman network create command can now create macvlan networks using the --driver macvlan option for Docker compatibility. The existing --macvlan flag has been deprecated and will be removed in Podman 4.0 some time next year.
    - The podman inspect command has had the LogPath and LogTag fields moved into the LogConfig structure (from the root of the Inspect structure). The maximum size of the log file is also included.
    - The podman generate systemd command no longer generates unit files using the deprecated KillMode=none option (#8615).
    - The podman stop command now releases the container lock while waiting for it to stop - as such, commands like podman ps will no longer block until podman stop completes (#8501).
    - Networks created with podman network create --internal no longer use the dnsname plugin. This configuration never functioned as expected.
    - Error messages for the remote Podman client have been improved when it cannot connect to a Podman service.
    - Error messages for podman run when an invalid SELinux is specified have been improved.
    - Rootless Podman features improved support for containers with a single user mapped into the rootless user namespace.
    - Pod infra containers now respect default sysctls specified in containers.conf allowing for advanced configuration of the namespaces they will share.
    - SSH public key handling for remote Podman has been improved.
  * Bugfixes
    - Fixed a bug where the podman history --no-trunc command would truncate the Created By field (#9120).
    - Fixed a bug where root containers that did not explicitly specify a CNI network to join did not generate an entry for the network in use in the Networks field of the output of podman inspect (#6618).
    - Fixed a bug where, under some circumstances, container working directories specified by the image (via the WORKDIR instruction) but not present in the image, would not be created (#9040).
    - Fixed a bug where the podman generate systemd command would generate invalid unit files if the container was creating using a command line that included doubled braces ({{ and }}), e.g. --log-opt-tag={{.Name}} (#9034).
    - Fixed a bug where the podman generate systemd --new command could generate unit files including invalid Podman commands if the container was created using merged short options (e.g. podman run -dt) (#8847).
    - Fixed a bug where the podman generate systemd --new command could generate unit files that did not handle Podman commands including some special characters (e.g. $) (#9176
    - Fixed a bug where rootless containers joining CNI networks could not set a static IP address (#7842).
    - Fixed a bug where rootless containers joining CNI networks could not set network aliases (#8567).
    - Fixed a bug where the remote client could, under some circumstances, not include the Containerfile when sending build context to the server (#8374).
    - Fixed a bug where rootless Podman did not mount /sys as a new sysfs in some circumstances where it was acceptable.
    - Fixed a bug where rootless containers that both joined a user namespace and a CNI networks would cause a segfault. These options are incompatible and now return an error.
    - Fixed a bug where the podman play kube command did not properly handle CMD and ARGS from images (#8803).
    - Fixed a bug where the podman play kube command did not properly handle environment variables from images (#8608).
    - Fixed a bug where the podman play kube command did not properly print errors that occurred when starting containers.
    - Fixed a bug where the podman play kube command errored when hostNetwork was used (#8790).
    - Fixed a bug where the podman play kube command would always pull images when the :latest tag was specified, even if the image was available locally (#7838).
    - Fixed a bug where the podman play kube command did not properly handle SELinux configuration, rending YAML with custom SELinux configuration unusable (#8710).
    - Fixed a bug where the podman generate kube command incorrectly populated the args and command fields of generated YAML (#9211).
    - Fixed a bug where containers in a pod would create a duplicate entry in the pod's shared /etc/hosts file every time the container restarted (#8921).
    - Fixed a bug where the podman search --list-tags command did not support the --format option (#8740).
    - Fixed a bug where the http_proxy option in containers.conf was not being respected, and instead was set unconditionally to true (#8843).
    - Fixed a bug where rootless Podman could, on systems with a recent Conmon and users with a long username, fail to attach to containers (#8798).
    - Fixed a bug where the podman images command would break and fail to display any images if an empty manifest list was present in storage (#8931).
    - Fixed a bug where locale environment variables were not properly passed on to Conmon.
    - Fixed a bug where Podman would not build on the MIPS architecture (#8782).
    - Fixed a bug where rootless Podman could fail to properly configure user namespaces for rootless containers when the user specified a --uidmap option that included a mapping beginning with UID 0.
    - Fixed a bug where the podman logs command using the k8s-file backend did not properly handle partial log lines with a length of 1 (#8879).
    - Fixed a bug where the podman logs command with the --follow option did not properly handle log rotation (#8733).
    - Fixed a bug where user-specified HOSTNAME environment variables were overwritten by Podman (#8886).
    - Fixed a bug where Podman would applied default sysctls from containers.conf in too many situations (e.g. applying network sysctls when the container shared its network with a pod).
    - Fixed a bug where Podman did not properly handle cases where a secondary image store was in use and an image was present in both the secondary and primary stores (#8176).
    - Fixed a bug where systemd-managed rootless Podman containers where the user in the container was not root could fail as the container's PID file was not accessible to systemd on the host (#8506).
    - Fixed a bug where the --privileged option to podman run and podman create would, under some circumstances, not disable Seccomp (#8849).
    - Fixed a bug where the podman exec command did not properly add capabilities when the container or exec session were run with --privileged.
    - Fixed a bug where rootless Podman would use the --enable-sandbox option to slirp4netns unconditionally, even when pivot_root was disabled, rendering slirp4netns unusable when pivot_root was disabled (#8846).
    - Fixed a bug where podman build --logfile did not actually write the build's log to the logfile.
    - Fixed a bug where the podman system service command did not close STDIN, and could display user-interactive prompts (#8700).
    - Fixed a bug where the podman system reset command could, under some circumstances, remove all the contents of the XDG_RUNTIME_DIR directory (#8680).
    - Fixed a bug where the podman network create command created CNI configurations that did not include a default gateway (#8748).
    - Fixed a bug where the podman.service systemd unit provided by default used the wrong service type, and would cause systemd to not correctly register the service as started (#8751).
    - Fixed a bug where, if the TMPDIR environment variable was set for the container engine in containers.conf, it was being ignored.
    - Fixed a bug where the podman events command did not properly handle future times given to the --until option (#8694).
    - Fixed a bug where the podman logs command wrote container STDERR logs to STDOUT instead of STDERR (#8683).
    - Fixed a bug where containers created from an image with multiple tags would report that they were created from the wrong tag (#8547).
    - Fixed a bug where container capabilities were not set properly when the --cap-add=all and --user options to podman create and podman run were combined.
    - Fixed a bug where the --layers option to podman build was nonfunctional (#8643).
    - Fixed a bug where the podman system prune command did not act recursively, and thus would leave images, containers, pods, and volumes present that would be removed by a subsequent call to podman system prune (#7990).
    - Fixed a bug where the --publish option to podman run and podman create did not properly handle ports specified as a range of ports with no host port specified (#8650).
    - Fixed a bug where --format did not support JSON output for individual fields (#8444).
    - Fixed a bug where the podman stats command would fail when run on root containers using the slirp4netns network mode (#7883).
    - Fixed a bug where the Podman remote client would ask for a password even if the server's SSH daemon did not support password authentication (#8498).
    - Fixed a bug where the podman stats command would fail if the system did not support one or more of the cgroup controllers Podman supports (#8588).
    - Fixed a bug where the --mount option to podman create and podman run did not ignore the consistency mount option.
    - Fixed a bug where failures during the resizing of a container's TTY would print the wrong error.
    - Fixed a bug where the podman network disconnect command could cause the podman inspect command to fail for a container until it was restarted (#9234).
    - Fixed a bug where containers created from a read-only rootfs (using the --rootfs option to podman create and podman run) would fail (#9230).
    - Fixed a bug where specifying Go templates to the --format option to multiple Podman commands did not support the join function (#8773).
    - Fixed a bug where the podman rmi command could, when run in parallel on multiple images, return layer not known errors (#6510).
    - Fixed a bug where the podman inspect command on containers displayed unlimited ulimits incorrectly (#9303).
    - Fixed a bug where Podman would fail to start when a volume was mounted over a directory in a container that contained symlinks that terminated outside the directory and its subdirectories (#6003).
API
    - Libpod API version has been bumped to v3.0.0.
    - All Libpod Pod APIs have been modified to properly report errors with individual containers. Cases where the operation as a whole succeeded but individual containers failed now report an HTTP 409 error (#8865).
    - The Compat API for Containers now supports the Rename and Copy APIs.
    - Fixed a bug where the Compat Prune APIs (for volumes, containers, and images) did not return the amount of space reclaimed in their responses.
    - Fixed a bug where the Compat and Libpod Exec APIs for Containers would drop errors that occurred prior to the exec session successfully starting (e.g. a 'no such file' error if an invalid executable was passed) (#8281)
    - Fixed a bug where the Volumes field in the Compat Create API for Containers was being ignored (#8649).
    - Fixed a bug where the NetworkMode field in the Compat Create API for Containers was not handling some values, e.g. container:, correctly.
    - Fixed a bug where the Compat Create API for Containers did not set container name properly.
    - Fixed a bug where containers created using the Compat Create API unconditionally used Kubernetes file logging (the default specified in containers.conf is now used).
    - Fixed a bug where the Compat Inspect API for Containers could include container states not recognized by Docker.
    - Fixed a bug where Podman did not properly clean up after calls to the Events API when the journald backend was in use, resulting in a leak of file descriptors (#8864).
    - Fixed a bug where the Libpod Pull endpoint for Images could fail with an index out of range error under certain circumstances (#8870).
    - Fixed a bug where the Libpod Exists endpoint for Images could panic.
    - Fixed a bug where the Compat List API for Containers did not support all filters (#8860).
    - Fixed a bug where the Compat List API for Containers did not properly populate the Status field.
    - Fixed a bug where the Compat and Libpod Resize APIs for Containers ignored the height and width parameters (#7102).
    - Fixed a bug where the Compat Search API for Images returned an incorrectly-formatted JSON response (#8758).
    - Fixed a bug where the Compat Load API for Images did not properly clean up temporary files.
    - Fixed a bug where the Compat Create API for Networks could panic when an empty IPAM configuration was specified.
    - Fixed a bug where the Compat Inspect and List APIs for Networks did not include Scope.
    - Fixed a bug where the Compat Wait endpoint for Containers did not support the same wait conditions that Docker did.
  * Misc
    - Updated Buildah to v1.19.2
    - Updated the containers/storage library to v1.24.5
    - Updated the containers/image library to v5.10.2
    - Updated the containers/common library to v0.33.4

- Update to v2.2.1
  * Changes
    - Due to a conflict with a previously-removed field, we were forced to
      modify the way image volumes (mounting images into containers using
      --mount type=image) were handled in the database.
      As a result, containers created in Podman 2.2.0 with image volume
       will not have them in v2.2.1, and these containers will need to be re-created.
  * Bugfixes
    - Fixed a bug where rootless Podman would, on systems without the
      XDG_RUNTIME_DIR environment variable defined, use an incorrect path
      for the PID file of the Podman pause process, causing Podman to fail
      to start (#8539).
    - Fixed a bug where containers created using Podman v1.7 and earlier were
      unusable in Podman due to JSON decode errors (#8613).
    - Fixed a bug where Podman could retrieve invalid cgroup paths, instead
      of erroring, for containers that were not running.
    - Fixed a bug where the podman system reset command would print a warning
      about a duplicate shutdown handler being registered.
    - Fixed a bug where rootless Podman would attempt to mount sysfs in
      circumstances where it was not allowed; some OCI runtimes (notably
      crun) would fall back to alternatives and not fail, but others
      (notably runc) would fail to run containers.
    - Fixed a bug where the podman run and podman create commands would fail
      to create containers from untagged images (#8558).
    - Fixed a bug where remote Podman would prompt for a password even when
      the server did not support password authentication (#8498).
    - Fixed a bug where the podman exec command did not move the Conmon
      process for the exec session into the correct cgroup.
    - Fixed a bug where shell completion for the ancestor option to
      podman ps --filter did not work correctly.
    - Fixed a bug where detached containers would not properly clean themselves
      up (or remove themselves if --rm was set) if the Podman command that
      created them was invoked with --log-level=debug.
  * API
    - Fixed a bug where the Compat Create endpoint for Containers did not
      properly handle the Binds and Mounts parameters in HostConfig.
    - Fixed a bug where the Compat Create endpoint for Containers
      ignored the Name query parameter.
    - Fixed a bug where the Compat Create endpoint for Containers did not
      properly handle the 'default' value for NetworkMode (this value is
      used extensively by docker-compose) (#8544).
    - Fixed a bug where the Compat Build endpoint for Images would sometimes
      incorrectly use the target query parameter as the image's tag.
  * Misc
    - Podman v2.2.0 vendored a non-released, custom version of the
      github.com/spf13/cobra package; this has been reverted to the latest
      upstream release to aid in packaging.
    - Updated the containers/image library to v5.9.0

- Update to v2.2.0
 * Features
  - Experimental support for shortname aliasing has been added. This is not enabled by default, but can be turned on by setting the environment variable CONTAINERS_SHORT_NAME_ALIASING to on. Documentation is available here and here.
  - Initial support has been added for the podman network connect and podman network disconnect commands, which allow existing containers to modify what networks they are connected to. At present, these commands can only be used on running containers that did not specify --network=none when they were created.
  - The podman run command now supports the --network-alias option to set network aliases (additional names the container can be accessed at from other containers via DNS if the dnsname CNI plugin is in use). Aliases can also be added and removed using the new podman network connect and podman network disconnect commands. Please note that this requires a new release (v1.1.0) of the dnsname plugin, and will only work on newly-created CNI networks.
  - The podman generate kube command now features support for exporting container's memory and CPU limits (#7855).
  - The podman play kube command now features support for setting CPU and Memory limits for containers (#7742).
  - The podman play kube command now supports persistent volumes claims using Podman named volumes.
  - The podman play kube command now supports Kubernetes configmaps via the --configmap option (#7567).
  - The podman play kube command now supports a --log-driver option to set the log driver for created containers.
  - The podman play kube command now supports a --start option, enabled by default, to start the pod after creating it. This allows for podman play kube to be more easily used in systemd unitfiles.
  - The podman network create command now supports the --ipv6 option to enable dual-stack IPv6 networking for created networks (#7302).
  - The podman inspect command can now inspect pods, networks, and volumes, in addition to containers and images (#6757).
  - The --mount option for podman run and podman create now supports a new type, image, to mount the contents of an image into the container at a given location.
  - The Bash and ZSH completions have been completely reworked and have received significant enhancements! Additionally, support for Fish completions and completions for the podman-remote executable have been added.
  - The --log-opt option for podman create and podman run now supports the max-size option to set the maximum size for a container's logs (#7434).
  - The --network option to the podman pod create command now allows pods to be configured to use slirp4netns networking, even when run as root (#6097).
  - The podman pod stop, podman pod pause, podman pod unpause, and podman pod kill commands now work on multiple containers in parallel and should be significantly faster.
  - The podman search command now supports a --list-tags option to list all available tags for a single image in a single repository.
  - The podman search command can now output JSON using the --format=json option.
  - The podman diff and podman mount commands now work with all containers in the storage library, including those not created by Podman. This allows them to be used with Buildah and CRI-O containers.
  - The podman container exists command now features a --external option to check if a container exists not just in Podman, but also in the storage library. This will allow Podman to identify Buildah and CRI-O containers.
  - The --tls-verify and --authfile options have been enabled for use with remote Podman.
  - The /etc/hosts file now includes the container's name and hostname (both pointing to localhost) when the container is run with --net=none (#8095).
  - The podman events command now supports filtering events based on the labels of the container they occurred on using the --filter label=key=value option.
  - The podman volume ls command now supports filtering volumes based on their labels using the --filter label=key=value option.
  - The --volume and --mount options to podman run and podman create now support two new mount propagation options, unbindable and runbindable.
  - The name and id filters for podman pod ps now match based on a regular expression, instead of requiring an exact match.
  - The podman pod ps command now supports a new filter status, that matches pods in a certain state.
 * Changes
  - The podman network rm --force command will now also remove pods that are using the network (#7791).
  - The podman volume rm, podman network rm, and podman pod rm commands now return exit code 1 if the object specified for removal does not exist, and exit code 2 if the object is in use and the --force option was not given.
  - If /dev/fuse is passed into Podman containers as a device, Podman will open it before starting the container to ensure that the kernel module is loaded on the host and the device is usable in the container.
  - Global Podman options that were not supported with remote operation have been removed from podman-remote (e.g. --cgroup-manager, --storage-driver).
  - Many errors have been changed to remove repetition and be more clear as to what has gone wrong.
  - The --storage option to podman rm is now enabled by default, with slightly changed semantics. If the given container does not exist in Podman but does exist in the storage library, it will be removed even without the --storage option. If the container exists in Podman it will be removed normally. The --storage option for podman rm is now deprecated and will be removed in a future release.
  - The --storage option to podman ps has been renamed to --external. An alias has been added so the old form of the option will continue to work.
  - Podman now delays the SIGTERM and SIGINT signals during container creation to ensure that Podman is not stopped midway through creating a container resulting in potential resource leakage (#7941).
  - The podman save command now strips signatures from images it is exporting, as the formats we export to do not support signatures (#7659).
  - A new Degraded state has been added to pods. Pods that have some, but not all, of their containers running are now considered to be Degraded instead of Running.
  - Podman will now print a warning when conflicting network options related to port forwarding (e.g. --publish and --net=host) are specified when creating a container.
  - The --restart on-failure and --rm options for containers no longer conflict. When both are specified, the container will be restarted if it exits with a non-zero error code, and removed if it exits cleanly (#7906).
  - Remote Podman will no longer use settings from the client's containers.conf; defaults will instead be provided by the server's containers.conf (#7657).
  - The podman network rm command now has a new alias, podman network remove (#8402).
 * Bugfixes
  - Fixed a bug where podman load on the remote client did not error when attempting to load a directory, which is not yet supported for remote use.
  - Fixed a bug where rootless Podman could hang when the newuidmap binary was not installed (#7776).
  - Fixed a bug where the --pull option to podman run, podman create, and podman build did not match Docker's behavior.
  - Fixed a bug where sysctl settings from the containers.conf configuration file were applied, even if the container did not join the namespace associated with a sysctl.
  - Fixed a bug where Podman would not return the text of errors encounted when trying to run a healthcheck for a container.
  - Fixed a bug where Podman was accidentally setting the containers environment variable in addition to the expected container environment variable.
  - Fixed a bug where rootless Podman using CNI networking did not properly clean up DNS entries for removed containers (#7789).
  - Fixed a bug where the podman untag --all command was not supported with remote Podman.
  - Fixed a bug where the podman system service command could time out even if active attach connections were present (#7826).
  - Fixed a bug where the podman system service command would sometimes never time out despite no active connections being present.
  - Fixed a bug where Podman's handling of capabilities, specifically inheritable, did not match Docker's.
  - Fixed a bug where podman run would fail if the image specified was a manifest list and had already been pulled (#7798).
  - Fixed a bug where Podman did not take search registries into account when looking up images locally (#6381).
  - Fixed a bug where the podman manifest inspect command would fail for images that had already been pulled (#7726).
  - Fixed a bug where rootless Podman would not add supplemental GIDs to containers when when a user, but not a group, was set via the --user option to podman create and podman run and sufficient GIDs were available to add the groups (#7782).
  - Fixed a bug where remote Podman commands did not properly handle cases where the user gave a name that could also be a short ID for a pod or container (#7837).
  - Fixed a bug where podman image prune could leave images ready to be pruned after podman image prune was run (#7872).
  - Fixed a bug where the podman logs command with the journald log driver would not read all available logs (#7476).
  - Fixed a bug where the --rm and --restart options to podman create and podman run did not conflict when a restart policy that is not on-failure was chosen (#7878).
  - Fixed a bug where the --format 'table {{ .Field }}' option to numerous Podman commands ceased to function on Podman v2.0 and up.
  - Fixed a bug where pods did not properly share an SELinux label between their containers, resulting in containers being unable to see the processes of other containers when the pod shared a PID namespace (#7886).
  - Fixed a bug where the --namespace option to podman ps did not work with the remote client (#7903).
  - Fixed a bug where rootless Podman incorrectly calculated the number of UIDs available in the container if multiple different ranges of UIDs were specified.
  - Fixed a bug where the /etc/hosts file would not be correctly populated for containers in a user namespace (#7490).
  - Fixed a bug where the podman network create and podman network remove commands could race when run in parallel, with unpredictable results (#7807).
  - Fixed a bug where the -p option to podman run, podman create, and podman pod create would, when given only a single number (e.g. -p 80), assign the same port for both host and container, instead of generating a random host port (#7947).
  - Fixed a bug where Podman containers did not properly store the cgroup manager they were created with, causing them to stop functioning after the cgroup manager was changed in containers.conf or with the --cgroup-manager option (#7830).
  - Fixed a bug where the podman inspect command did not include information on the CNI networks a container was connected to if it was not running.
  - Fixed a bug where the podman attach command would not print a newline after detaching from the container (#7751).
  - Fixed a bug where the HOME environment variable was not set properly in containers when the --userns=keep-id option was set (#8004).
  - Fixed a bug where the podman container restore command could panic when the container in question was in a pod (#8026).
  - Fixed a bug where the output of the podman image trust show --raw command was not properly formatted.
  - Fixed a bug where the podman runlabel command could panic if a label to run was not given (#8038).
  - Fixed a bug where the podman run and podman start --attach commands would exit with an error when the user detached manually using the detach keys on remote Podman (#7979).
  - Fixed a bug where rootless CNI networking did not use the dnsname CNI plugin if it was not available on the host, despite it always being available in the container used for rootless networking (#8040).
  - Fixed a bug where Podman did not properly handle cases where an OCI runtime is specified by its full path, and could revert to using another OCI runtime with the same binary path that existed in the system $PATH on subsequent invocations.
  - Fixed a bug where the --net=host option to podman create and podman run would cause the /etc/hosts file to be incorrectly populated (#8054).
  - Fixed a bug where the podman inspect command did not include container network information when the container shared its network namespace (IE, joined a pod or another container's network namespace via --net=container:...) (#8073).
  - Fixed a bug where the podman ps command did not include information on all ports a container was publishing.
  - Fixed a bug where the podman build command incorrectly forwarded STDIN into build containers from RUN instructions.
  - Fixed a bug where the podman wait command's --interval option did not work when units were not specified for the duration (#8088).
  - Fixed a bug where the --detach-keys and --detach options could be passed to podman create despite having no effect (and not making sense in that context).
  - Fixed a bug where Podman could not start containers if running on a system without a /etc/resolv.conf file (which occurs on some WSL2 images) (#8089).
  - Fixed a bug where the --extract option to podman cp was nonfunctional.
  - Fixed a bug where the --cidfile option to podman run would, when the container was not run with --detach, only create the file after the container exited (#8091).
  - Fixed a bug where the podman images and podman images -a commands could panic and not list any images when certain improperly-formatted images were present in storage (#8148).
  - Fixed a bug where the podman events command could, when the journald events backend was in use, become nonfunctional when a badly-formatted event or a log message that container certain string was present in the journal (#8125).
  - Fixed a bug where remote Podman would, when using SSH transport, not authenticate to the server using hostkeys when connecting on a port other than 22 (#8139).
  - Fixed a bug where the podman attach command would not exit when containers stopped (#8154).
  - Fixed a bug where Podman did not properly clean paths before verifying them, resulting in Podman refusing to start if the root or temporary directories were specified with extra trailing / characters (#8160).
  - Fixed a bug where remote Podman did not support hashed hostnames in the known_hosts file on the host for establishing connections (#8159).
  - Fixed a bug where the podman image exists command would return non-zero (false) when multiple potential matches for the given name existed.
  - Fixed a bug where the podman manifest inspect command on images that are not manifest lists would error instead of inspecting the image (#8023).
  - Fixed a bug where the podman system service command would fail if the directory the Unix socket was to be created inside did not exist (#8184).
  - Fixed a bug where pods that shared the IPC namespace (which is done by default) did not share a /dev/shm filesystem between all containers in the pod (#8181).
  - Fixed a bug where filters passed to podman volume list were not inclusive (#6765).
  - Fixed a bug where the podman volume create command would fail when the volume's data directory already existed (as might occur when a volume was not completely removed) (#8253).
  - Fixed a bug where the podman run and podman create commands would deadlock when trying to create a container that mounted the same named volume at multiple locations (e.g. podman run -v testvol:/test1 -v testvol:/test2) (#8221).
  - Fixed a bug where the parsing of the --net option to podman build was incorrect (#8322).
  - Fixed a bug where the podman build command would print the ID of the built image twice when using remote Podman (#8332).
  - Fixed a bug where the podman stats command did not show memory limits for containers (#8265).
  - Fixed a bug where the podman pod inspect command printed the static MAC address of the pod in a non-human-readable format (#8386).
  - Fixed a bug where the --tls-verify option of the podman play kube command had its logic inverted (false would enforce the use of TLS, true would disable it).
  - Fixed a bug where the podman network rm command would error when trying to remove macvlan networks and rootless CNI networks (#8491).
  - Fixed a bug where Podman was not setting sane defaults for missing XDG_ environment variables.
  - Fixed a bug where remote Podman would check if volume paths to be mounted in the container existed on the host, not the server (#8473).
  - Fixed a bug where the podman manifest create and podman manifest add commands on local images would drop any images in the manifest not pulled by the host.
  - Fixed a bug where networks made by podman network create did not include the tuning plugin, and as such did not support setting custom MAC addresses (#8385).
  - Fixed a bug where container healthchecks did not use $PATH when searching for the Podman executable to run the healthcheck.
  - Fixed a bug where the --ip-range option to podman network create did not properly handle non-classful subnets when calculating the last usable IP for DHCP assignment (#8448).
  - Fixed a bug where the podman container ps alias for podman ps was missing (#8445).
 * API
  - The Compat Create endpoint for Container has received a major refactor to share more code with the Libpod Create endpoint, and should be significantly more stable.
  - A Compat endpoint for exporting multiple images at once, GET /images/get, has been added (#7950).
  - The Compat Network Connect and Network Disconnect endpoints have been added.
  - Endpoints that deal with image registries now support a X-Registry-Config header to specify registry authentication configuration.
  - The Compat Create endpoint for images now properly supports specifying images by digest.
  - The Libpod Build endpoint for images now supports an httpproxy query parameter which, if set to true, will forward the server's HTTP proxy settings into the build container for RUN instructions.
  - The Libpod Untag endpoint for images will now remove all tags for the given image if no repository and tag are specified for removal.
  - Fixed a bug where the Ping endpoint misspelled a header name (Libpod-Buildha-Version instead of Libpod-Buildah-Version).
  - Fixed a bug where the Ping endpoint sent an extra newline at the end of its response where Docker did not.
  - Fixed a bug where the Compat Logs endpoint for containers did not send a newline character after each log line.
  - Fixed a bug where the Compat Logs endpoint for containers would mangle line endings to change newline characters to add a preceding carriage return (#7942).
  - Fixed a bug where the Compat Inspect endpoint for Containers did not properly list the container's stop signal (#7917).
  - Fixed a bug where the Compat Inspect endpoint for Containers formatted the container's create time incorrectly (#7860).
  - Fixed a bug where the Compat Inspect endpoint for Containers did not include the container's Path, Args, and Restart Count.
  - Fixed a bug where the Compat Inspect endpoint for Containers prefixed added and dropped capabilities with CAP_ (Docker does not do so).
  - Fixed a bug where the Compat Info endpoint for the Engine did not include configured registries.
  - Fixed a bug where the server could panic if a client closed a connection midway through an image pull (#7896).
  - Fixed a bug where the Compat Create endpoint for volumes returned an error when a volume with the same name already existed, instead of succeeding with a 201 code (#7740).
  - Fixed a bug where a client disconnecting from the Libpod or Compat events endpoints could result in the server using 100% CPU (#7946).
  - Fixed a bug where the 'no such image' error message sent by the Compat Inspect endpoint for Images returned a 404 status code with an error that was improperly formatted for Docker compatibility.
  - Fixed a bug where the Compat Create endpoint for networks did not properly set a default for the driver parameter if it was not provided by the client.
  - Fixed a bug where the Compat Inspect endpoint for images did not populate the RootFS field of the response.
  - Fixed a bug where the Compat Inspect endpoint for images would omit the ParentId field if the image had no parent, and the Created field if the image did not have a creation time.
  - Fixed a bug where the Compat Remove endpoint for Networks did not support the Force query parameter.

- add dependency to timezone package or podman fails to build a
- Correct invalid use of %{_libexecdir} to ensure files should be in /usr/lib
SELinux support [jsc#SMO-15]


libseccomp was updated to release 2.5.3:

* Update the syscall table for Linux v5.15
* Fix issues with multiplexed syscalls on mipsel introduced in v2.5.2
* Document that seccomp_rule_add() may return -EACCES

Update to release 2.5.2

* Update the syscall table for Linux v5.14-rc7                                                                    
* Add a function, get_notify_fd(), to the Python bindings to
  get the nofication file descriptor.
* Consolidate multiplexed syscall handling for all
  architectures into one location.
* Add multiplexed syscall support to PPC and MIPS
* The meaning of SECCOMP_IOCTL_NOTIF_ID_VALID changed within
  the kernel. libseccomp's fd notification logic was modified
  to support the kernel's previous and new usage of
  SECCOMP_IOCTL_NOTIF_ID_VALID.

update to 2.5.1:

* Fix a bug where seccomp_load() could only be called once
* Change the notification fd handling to only request a notification fd if
* the filter has a _NOTIFY action
* Add documentation about SCMP_ACT_NOTIFY to the seccomp_add_rule(3) manpage
* Clarify the maintainers' GPG keys

Update to release 2.5.0

* Add support for the seccomp user notifications, see the
  seccomp_notify_alloc(3), seccomp_notify_receive(3),
  seccomp_notify_respond(3) manpages for more information
* Add support for new filter optimization approaches, including a balanced
  tree optimization, see the SCMP_FLTATR_CTL_OPTIMIZE filter attribute for
  more information
* Add support for the 64-bit RISC-V architecture
* Performance improvements when adding new rules to a filter thanks to the
  use of internal shadow transactions and improved syscall lookup tables
* Properly document the libseccomp API return values and include them in the
  stable API promise
* Improvements to the s390 and s390x multiplexed syscall handling
* Multiple fixes and improvements to the libseccomp manpages
* Moved from manually maintained syscall tables to an automatically generated
  syscall table in CSV format
* Update the syscall tables to Linux v5.8.0-rc5
* Python bindings and build now default to Python 3.x
* Improvements to the tests have boosted code coverage to over 93%

Update to release 2.4.3

* Add list of authorized release signatures to README.md
* Fix multiplexing issue with s390/s390x shm* syscalls
* Remove the static flag from libseccomp tools compilation
* Add define for __SNR_ppoll
* Fix potential memory leak identified by clang in the
  scmp_bpf_sim tool

Update to release 2.4.2

* Add support for io-uring related system calls


conmon was updated to version 2.0.30:

  * Remove unreachable code path
  * exit: report if the exit command was killed
  * exit: fix race zombie reaper
  * conn_sock: allow watchdog messages through the notify socket proxy
  * seccomp: add support for seccomp notify

Update to version 2.0.29:

  * Reset OOM score back to 0 for container runtime
  * call functions registered with atexit on SIGTERM
  * conn_sock: fix potential segfault

Update to version 2.0.27:

  * Add CRI-O integration test GitHub action
  * exec: don't fail on EBADFD
  * close_fds: fix close of external fds
  * Add arm64 static build binary

Update to version 2.0.26:

  * conn_sock: do not fail on EAGAIN
  * fix segfault from a double freed pointer
  * Fix a bug where conmon could never spawn a container, because
    a disagreement between the caller and itself on where the attach
    socket was.
  * improve --full-attach to ignore the socket-dir directly. that
    means callers don't need to specify a socket dir at all (and
    can remove it)
  * add full-attach option to allow callers to not truncate a very
    long path for the attach socket
  * close only opened FDs
  * set locale to inherit environment

Update to version 2.0.22:

  * added man page
  * attach: always chdir
  * conn_sock: Explicitly free a heap-allocated string
  * refactor I/O and add SD_NOTIFY proxy support

Update to version 2.0.21:

  * protect against kill(-1)
  * Makefile: enable debuginfo generation
  * Remove go.sum file and add go.mod
  * Fail if conmon config could not be written
  * nix: remove double definition for e2fsprogs
  * Speedup static build by utilizing CI cache on `/nix` folder
  * Fix nix build for failing e2fsprogs tests
  * test: fix CI
  * Use Podman for building

libcontainers-common was updated to include:

- common 0.44.0
- image 5.16.0
- podman 3.3.1
- storage 1.36.0
(changes too long to list)

CVEs fixed: CVE-2020-14370,CVE-2020-15157,CVE-2021-20199,CVE-2021-20291,CVE-2021-3602
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176804">SUSE bug 1176804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177598">SUSE bug 1177598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181640">SUSE bug 1181640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182998">SUSE bug 1182998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188520">SUSE bug 1188520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188914">SUSE bug 1188914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193166">SUSE bug 1193166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193273">SUSE bug 1193273</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3602/">CVE-2021-3602</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669747" comment="conmon-2.0.30-150300.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669744" comment="libcontainers-common-20210626-150300.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669745" comment="libseccomp-devel-2.5.3-150300.10.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669860" comment="libseccomp-tools-2.5.3-150300.10.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669746" comment="libseccomp2-2.5.3-150300.10.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669861" comment="libseccomp2-32bit-2.5.3-150300.10.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669748" comment="podman-3.4.4-150300.9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669749" comment="podman-cni-config-3.4.4-150300.9.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52759" version="1" class="patch">
	<metadata>
		<title>Security update for s390-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011421.html" source="SUSE-SU"/>
		<description>

This update of s390-tools fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684347" comment="libekmfweb1-2.15.1-150300.8.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684348" comment="libekmfweb1-devel-2.15.1-150300.8.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684349" comment="osasnmpd-2.15.1-150300.8.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684350" comment="s390-tools-2.15.1-150300.8.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684351" comment="s390-tools-hmcdrvfs-2.15.1-150300.8.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684352" comment="s390-tools-zdsfs-2.15.1-150300.8.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52760" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):

- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-06"/>
	<updated date="2022-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698553" comment="MozillaFirefox-91.11.0-150200.152.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699771" comment="MozillaFirefox-branding-upstream-91.11.0-150200.152.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699436" comment="MozillaFirefox-devel-91.11.0-150200.152.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698555" comment="MozillaFirefox-translations-common-91.11.0-150200.152.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698556" comment="MozillaFirefox-translations-other-91.11.0-150200.152.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52761" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

  - CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
  - CVE-2022-2226: An email with a mismatching OpenPGP signature date was accepted as valid (bmo#1775441)
  - CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
  - CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
  - CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
  - CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
  - CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
  - CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
  - CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
  - CVE-2022-34484: Memory safety bugs fixed in Thunderbird 91.11 and Thunderbird 102 (bmo#1763634, bmo#1772651)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699772" comment="MozillaThunderbird-91.11.0-150200.8.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699773" comment="MozillaThunderbird-translations-common-91.11.0-150200.8.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699774" comment="MozillaThunderbird-translations-other-91.11.0-150200.8.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52762" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199166" ref_url="https://bugzilla.suse.com/1199166" source="BUGZILLA"/>
		<reference ref_id="1200550" ref_url="https://bugzilla.suse.com/1200550" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011468.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684553" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695431" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684554" comment="libopenssl10-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684555" comment="libopenssl1_0_0-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695432" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695433" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695434" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695435" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695436" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684556" comment="openssl-1_0_0-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695437" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695438" comment="openssl-1_0_0-doc-1.0.2p-150000.3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52763" version="1" class="patch">
	<metadata>
		<title>Security update for fwupd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011469.html" source="SUSE-SU"/>
		<description>

This update of fwupd fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695487" comment="dfu-tool-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684395" comment="fwupd-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684396" comment="fwupd-devel-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684397" comment="fwupd-lang-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684398" comment="fwupdtpmevlog-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684399" comment="libfwupd2-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684400" comment="libfwupdplugin1-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684401" comment="typelib-1_0-Fwupd-2_0-1.5.8-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684402" comment="typelib-1_0-FwupdPlugin-1_0-1.5.8-150300.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52764" version="1" class="patch">
	<metadata>
		<title>Security update for resource-agents (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1146691" ref_url="https://bugzilla.suse.com/1146691" source="BUGZILLA"/>
		<reference ref_id="1196164" ref_url="https://bugzilla.suse.com/1196164" source="BUGZILLA"/>
		<reference ref_id="1199766" ref_url="https://bugzilla.suse.com/1199766" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011471.html" source="SUSE-SU"/>
		<description>
This update for resource-agents fixes the following issues:

- Predictable log file in /tmp in mariadb.in (bsc#1146691).
- Allow aws-vpc-move-ip to specify an interface label to distinguish the IP address (bsc#1199766)
- Implement options to disable DAD and to allow sending NA in the background (bsc#1196164)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146691">SUSE bug 1146691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196164">SUSE bug 1196164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199766">SUSE bug 1199766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698671" comment="ldirectord-4.8.0+git30.d0077df0-150300.8.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698672" comment="monitoring-plugins-metadata-4.8.0+git30.d0077df0-150300.8.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698673" comment="resource-agents-4.8.0+git30.d0077df0-150300.8.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52765" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200735" ref_url="https://bugzilla.suse.com/1200735" source="BUGZILLA"/>
		<reference ref_id="1200737" ref_url="https://bugzilla.suse.com/1200737" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206/" source="CVE"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011473.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-32206: HTTP compression denial of service (bsc#1200735)
- CVE-2022-32208: FTP-KRB bad message verification (bsc#1200737)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200735">SUSE bug 1200735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200737">SUSE bug 1200737</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698460" comment="curl-7.66.0-150200.4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698461" comment="libcurl-devel-7.66.0-150200.4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699775" comment="libcurl-devel-32bit-7.66.0-150200.4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698462" comment="libcurl4-7.66.0-150200.4.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698463" comment="libcurl4-32bit-7.66.0-150200.4.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52766" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201099" ref_url="https://bugzilla.suse.com/1201099" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011472.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2022-2097: Fixed partial missing encryption in AES OCB mode (bsc#1201099).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-07"/>
	<updated date="2022-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201099">SUSE bug 1201099</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698464" comment="libopenssl-1_1-devel-1.1.1d-150200.11.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699776" comment="libopenssl-1_1-devel-32bit-1.1.1d-150200.11.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698465" comment="libopenssl1_1-1.1.1d-150200.11.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698466" comment="libopenssl1_1-32bit-1.1.1d-150200.11.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698467" comment="libopenssl1_1-hmac-1.1.1d-150200.11.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698468" comment="libopenssl1_1-hmac-32bit-1.1.1d-150200.11.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698469" comment="openssl-1_1-1.1.1d-150200.11.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699777" comment="openssl-1_1-doc-1.1.1d-150200.11.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52767" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011486.html" source="SUSE-SU"/>
		<description>

This update of fwupdate fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684356" comment="fwupdate-12-150100.11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684357" comment="fwupdate-devel-12-150100.11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684358" comment="fwupdate-efi-12-150100.11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684359" comment="libfwup1-12-150100.11.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52768" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker and runc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192051" ref_url="https://bugzilla.suse.com/1192051" source="BUGZILLA"/>
		<reference ref_id="1199460" ref_url="https://bugzilla.suse.com/1199460" source="BUGZILLA"/>
		<reference ref_id="1199565" ref_url="https://bugzilla.suse.com/1199565" source="BUGZILLA"/>
		<reference ref_id="1200088" ref_url="https://bugzilla.suse.com/1200088" source="BUGZILLA"/>
		<reference ref_id="1200145" ref_url="https://bugzilla.suse.com/1200145" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<reference ref_id="CVE-2022-31030" ref_url="https://www.suse.com/security/cve/CVE-2022-31030/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011489.html" source="SUSE-SU"/>
		<description>
This update for containerd, docker and runc fixes the following issues:

containerd:

- CVE-2022-31030: Fixed denial of service via invocation of the ExecSync API (bsc#1200145)

docker:

- Update to Docker 20.10.17-ce. See upstream changelog online at
  https://docs.docker.com/engine/release-notes/#201017. (bsc#1200145)

runc:

Update to runc v1.1.3.

Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.1.3.

* Our seccomp `-ENOSYS` stub now correctly handles multiplexed syscalls on
  s390 and s390x. This solves the issue where syscalls the host kernel did not
  support would return `-EPERM` despite the existence of the `-ENOSYS` stub
  code (this was due to how s390x does syscall multiplexing).
* Retry on dbus disconnect logic in libcontainer/cgroups/systemd now works as
  intended; this fix does not affect runc binary itself but is important for
  libcontainer users such as Kubernetes.
* Inability to compile with recent clang due to an issue with duplicate
  constants in libseccomp-golang.
* When using systemd cgroup driver, skip adding device paths that don't exist,
  to stop systemd from emitting warnings about those paths.
* Socket activation was failing when more than 3 sockets were used.
* Various CI fixes.
* Allow to bind mount /proc/sys/kernel/ns_last_pid to inside container.
- Fixed issues with newer syscalls (namely faccessat2) on older kernels on s390(x) caused by
  that platform's syscall multiplexing semantics. (bsc#1192051 bsc#1199565)

Update to runc v1.1.2.

Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.1.2.

Security issue fixed:

- CVE-2022-29162: A bug was found in runc where runc exec --cap executed processes with
  non-empty inheritable Linux process capabilities, creating an atypical Linux
  environment. (bsc#1199460)

- `runc spec` no longer sets any inheritable capabilities in the created
  example OCI spec (`config.json`) file.

Update to runc v1.1.1.

Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.1.1.

* runc run/start can now run a container with read-only /dev in OCI spec,
  rather than error out. (#3355)
* runc exec now ensures that --cgroup argument is a sub-cgroup. (#3403)
  libcontainer systemd v2 manager no longer errors out if one of the files
  listed in /sys/kernel/cgroup/delegate do not exist in container's
  cgroup. (#3387, #3404)
* Loosen OCI spec validation to avoid bogus 'Intel RDT is not supported'
  error. (#3406)
* libcontainer/cgroups no longer panics in cgroup v1 managers if stat
  of /sys/fs/cgroup/unified returns an error other than ENOENT. (#3435)

Update to runc v1.1.0.

Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.1.0.

- libcontainer will now refuse to build without the nsenter package being
  correctly compiled (specifically this requires CGO to be enabled). This
  should avoid folks accidentally creating broken runc binaries (and
  incorrectly importing our internal libraries into their projects). (#3331)

Update to runc v1.1.0~rc1.

Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.1.0-rc.1.

+ Add support for RDMA cgroup added in Linux 4.11.
* runc exec now produces exit code of 255 when the exec failed.
  This may help in distinguishing between runc exec failures
  (such as invalid options, non-running container or non-existent
  binary etc.) and failures of the command being executed.
+ runc run: new --keep option to skip removal exited containers artefacts.
  This might be useful to check the state (e.g. of cgroup controllers) after
  the container has￼exited.
+ seccomp: add support for SCMP_ACT_KILL_PROCESS and SCMP_ACT_KILL_THREAD
  (the latter is just an alias for SCMP_ACT_KILL).
+ seccomp: add support for SCMP_ACT_NOTIFY (seccomp actions). This allows
  users to create sophisticated seccomp filters where syscalls can be
  efficiently emulated by privileged processes on the host.
+ checkpoint/restore: add an option (--lsm-mount-context) to set
  a different LSM mount context on restore.
+ intelrdt: support ClosID parameter.
+ runc exec --cgroup: an option to specify a (non-top) in-container cgroup
  to use for the process being executed.
+ cgroup v1 controllers now support hybrid hierarchy (i.e. when on a cgroup v1
  machine a cgroup2 filesystem is mounted to /sys/fs/cgroup/unified, runc
  run/exec now adds the container to the appropriate cgroup under it).
+ sysctl: allow slashes in sysctl names, to better match sysctl(8)'s
  behaviour.
+ mounts: add support for bind-mounts which are inaccessible after switching
  the user namespace. Note that this does not permit the container any
  additional access to the host filesystem, it simply allows containers to
  have bind-mounts configured for paths the user can access but have
  restrictive access control settings for other users.
+ Add support for recursive mount attributes using mount_setattr(2). These
  have the same names as the proposed mount(8) options -- just prepend r
  to the option name (such as rro).
+ Add runc features subcommand to allow runc users to detect what features
  runc has been built with. This includes critical information such as
  supported mount flags, hook names, and so on. Note that the output of this
  command is subject to change and will not be considered stable until runc
  1.2 at the earliest. The runtime-spec specification for this feature is
  being developed in opencontainers/runtime-spec#1130.
* system: improve performance of /proc/$pid/stat parsing.
* cgroup2: when /sys/fs/cgroup is configured as a read-write mount, change
  the ownership of certain cgroup control files (as per
  /sys/kernel/cgroup/delegate) to allow for proper deferral to the container
  process.
* runc checkpoint/restore: fixed for containers with an external bind mount
  which destination is a symlink.
* cgroup: improve openat2 handling for cgroup directory handle hardening.
  runc delete -f now succeeds (rather than timing out) on a paused
  container.
* runc run/start/exec now refuses a frozen cgroup (paused container in case of
  exec). Users can disable this using --ignore-paused.
- Update version data embedded in binary to correctly include the git commit of the release.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192051">SUSE bug 1192051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199460">SUSE bug 1199460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199565">SUSE bug 1199565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200088">SUSE bug 1200088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200145">SUSE bug 1200145</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31030/">CVE-2022-31030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684369" comment="containerd-1.6.6-150000.73.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684370" comment="containerd-ctr-1.6.6-150000.73.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684371" comment="docker-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684372" comment="docker-bash-completion-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684373" comment="docker-fish-completion-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695439" comment="docker-kubic-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695440" comment="docker-kubic-bash-completion-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695441" comment="docker-kubic-fish-completion-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695442" comment="docker-kubic-kubeadm-criconfig-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695443" comment="docker-kubic-zsh-completion-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695444" comment="docker-zsh-completion-20.10.17_ce-150000.166.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684374" comment="runc-1.1.3-150000.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52769" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200338" ref_url="https://bugzilla.suse.com/1200338" source="BUGZILLA"/>
		<reference ref_id="1200340" ref_url="https://bugzilla.suse.com/1200340" source="BUGZILLA"/>
		<reference ref_id="1200341" ref_url="https://bugzilla.suse.com/1200341" source="BUGZILLA"/>
		<reference ref_id="1200345" ref_url="https://bugzilla.suse.com/1200345" source="BUGZILLA"/>
		<reference ref_id="1200348" ref_url="https://bugzilla.suse.com/1200348" source="BUGZILLA"/>
		<reference ref_id="1200350" ref_url="https://bugzilla.suse.com/1200350" source="BUGZILLA"/>
		<reference ref_id="1200352" ref_url="https://bugzilla.suse.com/1200352" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

  - CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
  - CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
  - CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
  - CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
  - CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
  - CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
  - CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684353" comment="apache2-2.4.51-150200.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684826" comment="apache2-devel-2.4.51-150200.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684827" comment="apache2-doc-2.4.51-150200.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684716" comment="apache2-event-2.4.51-150200.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695495" comment="apache2-example-pages-2.4.51-150200.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684354" comment="apache2-prefork-2.4.51-150200.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684355" comment="apache2-utils-2.4.51-150200.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684828" comment="apache2-worker-2.4.51-150200.3.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52770" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011485.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-08"/>
	<updated date="2022-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684335" comment="libpython2_7-1_0-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695448" comment="libpython2_7-1_0-32bit-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684336" comment="python-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695449" comment="python-32bit-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684337" comment="python-base-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695450" comment="python-base-32bit-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684728" comment="python-curses-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695451" comment="python-demo-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684729" comment="python-devel-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695452" comment="python-doc-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695453" comment="python-doc-pdf-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684730" comment="python-gdbm-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695454" comment="python-idle-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684394" comment="python-tk-2.7.18-150000.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684731" comment="python-xml-2.7.18-150000.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52771" version="1" class="patch">
	<metadata>
		<title>Security update for libnbd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195636" ref_url="https://bugzilla.suse.com/1195636" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0485" ref_url="https://www.suse.com/security/cve/CVE-2022-0485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011500.html" source="SUSE-SU"/>
		<description>
This update for libnbd fixes the following issues:

- CVE-2022-0485: Fixed nbdcopy failure if NBD read or write fails (bsc#1195636).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-11"/>
	<updated date="2022-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195636">SUSE bug 1195636</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0485/">CVE-2022-0485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670273" comment="libnbd-1.9.3-150300.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670274" comment="libnbd-bash-completion-1.9.3-150300.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670275" comment="libnbd-devel-1.9.3-150300.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670276" comment="libnbd0-1.9.3-150300.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670277" comment="nbdfuse-1.9.3-150300.8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52772" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011499.html" source="SUSE-SU"/>
		<description>

This update of crash fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-11"/>
	<updated date="2022-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698562" comment="crash-7.2.9-150300.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698563" comment="crash-devel-7.2.9-150300.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699778" comment="crash-doc-7.2.9-150300.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699779" comment="crash-eppic-7.2.9-150300.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699780" comment="crash-gcore-7.2.9-150300.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698564" comment="crash-kmp-64kb-7.2.9_k5.3.18_150300.59.76-150300.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698565" comment="crash-kmp-default-7.2.9_k5.3.18_150300.59.76-150300.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699781" comment="crash-kmp-preempt-7.2.9_k5.3.18_150300.59.76-150300.23.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52773" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198919" ref_url="https://bugzilla.suse.com/1198919" source="BUGZILLA"/>
		<reference ref_id="1198921" ref_url="https://bugzilla.suse.com/1198921" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24882" ref_url="https://www.suse.com/security/cve/CVE-2022-24882/" source="CVE"/>
		<reference ref_id="CVE-2022-24883" ref_url="https://www.suse.com/security/cve/CVE-2022-24883/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011503.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2022-24882: Fixed incorrect check parameters in NTLM (bsc#1198919).
- CVE-2022-24883: Fixed authentication against invalid SAM files (bsc#1198921).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-11"/>
	<updated date="2022-07-11"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1198919">SUSE bug 1198919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198921">SUSE bug 1198921</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24882/">CVE-2022-24882</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24883/">CVE-2022-24883</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699782" comment="freerdp-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699783" comment="freerdp-devel-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699784" comment="freerdp-proxy-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699785" comment="freerdp-server-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699786" comment="freerdp-wayland-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699787" comment="libfreerdp2-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699788" comment="libuwac0-0-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699789" comment="libwinpr2-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699790" comment="uwac0-0-devel-2.1.2-150200.15.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699791" comment="winpr2-devel-2.1.2-150200.15.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52774" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198511" ref_url="https://bugzilla.suse.com/1198511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011505.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module (bsc#1198511).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-11"/>
	<updated date="2022-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698470" comment="libpython3_6m1_0-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699792" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698471" comment="python3-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698472" comment="python3-base-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698473" comment="python3-curses-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698474" comment="python3-dbm-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698475" comment="python3-devel-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699793" comment="python3-doc-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699794" comment="python3-doc-devhelp-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698476" comment="python3-idle-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699795" comment="python3-testsuite-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698477" comment="python3-tk-3.6.15-150300.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698566" comment="python3-tools-3.6.15-150300.10.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52775" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199232" ref_url="https://bugzilla.suse.com/1199232" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011510.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-12"/>
	<updated date="2022-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684361" comment="libpcre1-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684362" comment="libpcre1-32bit-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684363" comment="libpcre16-0-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695507" comment="libpcre16-0-32bit-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684364" comment="libpcrecpp0-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684365" comment="libpcrecpp0-32bit-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684366" comment="libpcreposix0-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695508" comment="libpcreposix0-32bit-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684367" comment="pcre-devel-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695509" comment="pcre-devel-static-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695510" comment="pcre-doc-8.45-150000.20.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684368" comment="pcre-tools-8.45-150000.20.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52776" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194179" ref_url="https://bugzilla.suse.com/1194179" source="BUGZILLA"/>
		<reference ref_id="1194181" ref_url="https://bugzilla.suse.com/1194181" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011517.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-2319: Fixed out-of-bounds access in _CheckSetSections() (ZDI-CAN-16062) (bsc#1194179).
- CVE-2022-2320: Fixed out-of-bounds access in CheckSetDeviceIndicators() (ZDI-CAN-16070) (bsc#1194181). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-12"/>
	<updated date="2022-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194179">SUSE bug 1194179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194181">SUSE bug 1194181</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698478" comment="xorg-x11-server-1.20.3-150200.22.5.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698479" comment="xorg-x11-server-extra-1.20.3-150200.22.5.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698567" comment="xorg-x11-server-sdk-1.20.3-150200.22.5.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699796" comment="xorg-x11-server-source-1.20.3-150200.22.5.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699797" comment="xorg-x11-server-wayland-1.20.3-150200.22.5.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52777" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1179195" ref_url="https://bugzilla.suse.com/1179195" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1192761" ref_url="https://bugzilla.suse.com/1192761" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194013" ref_url="https://bugzilla.suse.com/1194013" source="BUGZILLA"/>
		<reference ref_id="1195504" ref_url="https://bugzilla.suse.com/1195504" source="BUGZILLA"/>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1196901" ref_url="https://bugzilla.suse.com/1196901" source="BUGZILLA"/>
		<reference ref_id="1197362" ref_url="https://bugzilla.suse.com/1197362" source="BUGZILLA"/>
		<reference ref_id="1197754" ref_url="https://bugzilla.suse.com/1197754" source="BUGZILLA"/>
		<reference ref_id="1198020" ref_url="https://bugzilla.suse.com/1198020" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1199489" ref_url="https://bugzilla.suse.com/1199489" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200217" ref_url="https://bugzilla.suse.com/1200217" source="BUGZILLA"/>
		<reference ref_id="1200263" ref_url="https://bugzilla.suse.com/1200263" source="BUGZILLA"/>
		<reference ref_id="1200442" ref_url="https://bugzilla.suse.com/1200442" source="BUGZILLA"/>
		<reference ref_id="1200571" ref_url="https://bugzilla.suse.com/1200571" source="BUGZILLA"/>
		<reference ref_id="1200599" ref_url="https://bugzilla.suse.com/1200599" source="BUGZILLA"/>
		<reference ref_id="1200600" ref_url="https://bugzilla.suse.com/1200600" source="BUGZILLA"/>
		<reference ref_id="1200608" ref_url="https://bugzilla.suse.com/1200608" source="BUGZILLA"/>
		<reference ref_id="1200619" ref_url="https://bugzilla.suse.com/1200619" source="BUGZILLA"/>
		<reference ref_id="1200622" ref_url="https://bugzilla.suse.com/1200622" source="BUGZILLA"/>
		<reference ref_id="1200692" ref_url="https://bugzilla.suse.com/1200692" source="BUGZILLA"/>
		<reference ref_id="1200806" ref_url="https://bugzilla.suse.com/1200806" source="BUGZILLA"/>
		<reference ref_id="1200807" ref_url="https://bugzilla.suse.com/1200807" source="BUGZILLA"/>
		<reference ref_id="1200809" ref_url="https://bugzilla.suse.com/1200809" source="BUGZILLA"/>
		<reference ref_id="1200810" ref_url="https://bugzilla.suse.com/1200810" source="BUGZILLA"/>
		<reference ref_id="1200813" ref_url="https://bugzilla.suse.com/1200813" source="BUGZILLA"/>
		<reference ref_id="1200816" ref_url="https://bugzilla.suse.com/1200816" source="BUGZILLA"/>
		<reference ref_id="1200820" ref_url="https://bugzilla.suse.com/1200820" source="BUGZILLA"/>
		<reference ref_id="1200821" ref_url="https://bugzilla.suse.com/1200821" source="BUGZILLA"/>
		<reference ref_id="1200822" ref_url="https://bugzilla.suse.com/1200822" source="BUGZILLA"/>
		<reference ref_id="1200825" ref_url="https://bugzilla.suse.com/1200825" source="BUGZILLA"/>
		<reference ref_id="1200828" ref_url="https://bugzilla.suse.com/1200828" source="BUGZILLA"/>
		<reference ref_id="1200829" ref_url="https://bugzilla.suse.com/1200829" source="BUGZILLA"/>
		<reference ref_id="1200925" ref_url="https://bugzilla.suse.com/1200925" source="BUGZILLA"/>
		<reference ref_id="1201050" ref_url="https://bugzilla.suse.com/1201050" source="BUGZILLA"/>
		<reference ref_id="1201080" ref_url="https://bugzilla.suse.com/1201080" source="BUGZILLA"/>
		<reference ref_id="1201143" ref_url="https://bugzilla.suse.com/1201143" source="BUGZILLA"/>
		<reference ref_id="1201147" ref_url="https://bugzilla.suse.com/1201147" source="BUGZILLA"/>
		<reference ref_id="1201149" ref_url="https://bugzilla.suse.com/1201149" source="BUGZILLA"/>
		<reference ref_id="1201160" ref_url="https://bugzilla.suse.com/1201160" source="BUGZILLA"/>
		<reference ref_id="1201171" ref_url="https://bugzilla.suse.com/1201171" source="BUGZILLA"/>
		<reference ref_id="1201177" ref_url="https://bugzilla.suse.com/1201177" source="BUGZILLA"/>
		<reference ref_id="1201193" ref_url="https://bugzilla.suse.com/1201193" source="BUGZILLA"/>
		<reference ref_id="1201222" ref_url="https://bugzilla.suse.com/1201222" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-4157" ref_url="https://www.suse.com/security/cve/CVE-2021-4157/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).

The following non-security bugs were fixed:

- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- arm64: ftrace: fix branch range checks (git-fixes)
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ata: libata: add qc-&gt;flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bio: fix page leak bio_add_hw_page failure (git-fixes).
- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)
- blk-mq: update hctx-&gt;dispatch_busy in case of real scheduler (git-fixes).
- block: advance iov_iter on bio_add_hw_page failure (git-fixes).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).
- block: Fix kABI in blk-merge.c (bsc#1198020).
- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).
- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).
- cifs: avoid parallel session setups on same channel (bsc#1200217).
- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).
- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).
- cifs: call helper functions for marking channels for reconnect (bsc#1200217).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).
- cifs: check for smb1 in open_cached_dir() (bsc#1200217).
- cifs: check reconnects for channels of active tcons too (bsc#1200217).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).
- cifs: clean up an inconsistent indenting (bsc#1200217).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).
- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).
- cifs: fix handlecache and multiuser (bsc#1200217).
- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).
- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).
- cifs: fix minor compile warning (bsc#1200217).
- cifs: fix missed refcounting of ipc tcon (bsc#1200217).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).
- cifs: fix potential deadlock in direct reclaim (bsc#1200217).
- cifs: fix potential double free during failed mount (bsc#1200217).
- cifs: fix potential race with cifsd thread (bsc#1200217).
- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).
- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).
- cifs: fix the connection state transitions with multichannel (bsc#1200217).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).
- cifs: fix workstation_name for multiuser mounts (bsc#1200217).
- cifs: force new session setup and tcon for dfs (bsc#1200217).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).
- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).
- cifs: make status checks in version independent callers (bsc#1200217).
- cifs: mark sessions for reconnection in helper function (bsc#1200217).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).
- cifs: move superblock magic defitions to magic.h (bsc#1200217).
- cifs: potential buffer overflow in handling symlinks (bsc#1200217).
- cifs: print TIDs as hex (bsc#1200217).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).
- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).
- cifs: release cached dentries only if mount is complete (bsc#1200217).
- cifs: remove check of list iterator against head past the loop body (bsc#1200217).
- cifs: remove redundant assignment to pointer p (bsc#1200217).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).
- cifs: remove repeated state change in dfs tree connect (bsc#1200217).
- cifs: remove unused variable ses_selected (bsc#1200217).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).
- cifs: return the more nuanced writeback error on close() (bsc#1200217).
- cifs: sanitize multiple delimiters in prepath (bsc#1200217).
- cifs: serialize all mount attempts (bsc#1200217).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).
- cifs: skip trailing separators of prefix paths (bsc#1200217).
- cifs: smbd: fix typo in comment (bsc#1200217).
- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).
- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).
- cifs: update internal module number (bsc#1193629).
- cifs: update internal module number (bsc#1200217).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).
- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).
- cifs: use new enum for ses_status (bsc#1200217).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).
- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gtp: use icmp_ndo_send helper (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- iomap: iomap_write_failed fix (bsc#1200829).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI fix of sysctl_run_estimation (git-fixes).
- kabi: nvme workaround header include (bsc#1201193).
- kabi/severities: ignore KABI for NVMe target (bsc#1192761)
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- move devm_allocate to end of structure for kABI (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: ieee802154: ca8210: Stop leaking skb's (git-fixes).
- net: lantiq: Add locking for TX DMA channel (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm/region: Fix default alignment for small regions (git-fixes).
- nvme: add CNTRLTYPE definitions for 'identify controller' (bsc#1192761).
- nvme: Add connect option 'discovery' (bsc#1192761).
- nvme: add new discovery log page entry definitions (bsc#1192761).
- nvme: display correct subsystem NQN (bsc#1192761).
- nvme: expose subsystem type in sysfs attribute 'subsystype' (bsc#1192761).
- nvme: kabi fix nvme subsystype change (bsc#1192761)
- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).
- nvmet: add nvmet_req_subsys() helper (bsc#1192761).
- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).
- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).
- nvmet: fix freeing unallocated p2pmem (git-fixes).
- nvmet: make discovery NQN configurable (bsc#1192761).
- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).
- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).
- nvmet: register discovery subsystem as 'current' (bsc#1192761).
- nvmet: set 'CNTRLTYPE' in the identify controller data (bsc#1192761).
- nvmet: switch check for subsystem type (bsc#1192761).
- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- Revert 'block: Fix a lockdep complaint triggered by request queue flushing' (git-fixes).
- scsi: core: Show SCMD_LAST in text form (git-fixes).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).
- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).
- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).
- scsi: sd: Signal drive managed SMR disks (git-fixes).
- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).
- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).
- scsi: sd_zbc: Improve zone revalidation (git-fixes).
- scsi: sd_zbc: Remove unused inline functions (git-fixes).
- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).
- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).
- smb3: add mount parm nosparse (bsc#1200217).
- smb3: add trace point for lease not found issue (bsc#1200217).
- smb3: add trace point for oplock not found (bsc#1200217).
- smb3: check for null tcon (bsc#1200217).
- smb3: cleanup and clarify status of tree connections (bsc#1200217).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).
- smb3: fix snapshot mount option (bsc#1200217).
- smb3 improve error message when mount options conflict with posix (bsc#1200217).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).
- smb3 move more common protocol header definitions to smbfs_common (bsc#1200217).
- smb3: send NTLMSSP version information (bsc#1200217).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).
- SUNRPC: Fix the calculation of xdr-&gt;end in xdr_get_next_encode_buffer() (git-fixes).
- sunvnet: use icmp_ndo_send helper (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).
- veth: fix races around rq-&gt;rx_notify_masked (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode-&gt;i_io_list not be protected by inode-&gt;i_lock error (bsc#1200821).
- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-12"/>
	<updated date="2022-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179195">SUSE bug 1179195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192761">SUSE bug 1192761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194013">SUSE bug 1194013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195504">SUSE bug 1195504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197362">SUSE bug 1197362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197754">SUSE bug 1197754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198020">SUSE bug 1198020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199489">SUSE bug 1199489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200217">SUSE bug 1200217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200263">SUSE bug 1200263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200442">SUSE bug 1200442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200571">SUSE bug 1200571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200599">SUSE bug 1200599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200600">SUSE bug 1200600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200608">SUSE bug 1200608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200619">SUSE bug 1200619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200622">SUSE bug 1200622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200692">SUSE bug 1200692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200806">SUSE bug 1200806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200807">SUSE bug 1200807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200809">SUSE bug 1200809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200810">SUSE bug 1200810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200813">SUSE bug 1200813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200816">SUSE bug 1200816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200820">SUSE bug 1200820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200821">SUSE bug 1200821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200822">SUSE bug 1200822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200825">SUSE bug 1200825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200828">SUSE bug 1200828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200829">SUSE bug 1200829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200925">SUSE bug 1200925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201080">SUSE bug 1201080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201143">SUSE bug 1201143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201147">SUSE bug 1201147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201149">SUSE bug 1201149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201160">SUSE bug 1201160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201171">SUSE bug 1201171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201177">SUSE bug 1201177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201193">SUSE bug 1201193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201222">SUSE bug 1201222</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4157/">CVE-2021-4157</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699798" comment="cluster-md-kmp-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699799" comment="dlm-kmp-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699800" comment="gfs2-kmp-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698628" comment="kernel-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698629" comment="kernel-azure-devel-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699801" comment="kernel-azure-extra-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699802" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699803" comment="kernel-azure-optional-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698630" comment="kernel-devel-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698631" comment="kernel-source-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698632" comment="kernel-syms-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699804" comment="kselftests-kmp-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699805" comment="ocfs2-kmp-azure-5.3.18-150300.38.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699806" comment="reiserfs-kmp-azure-5.3.18-150300.38.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52778" version="1" class="patch">
	<metadata>
		<title>Security update for oracleasm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198581" ref_url="https://bugzilla.suse.com/1198581" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011551.html" source="SUSE-SU"/>
		<description>

This update of oracleasm fixes the following issue:

- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-14"/>
	<updated date="2022-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198581">SUSE bug 1198581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009695504" comment="oracleasm-kmp-64kb-2.0.8_k5.3.18_150300.59.76-150300.19.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684837" comment="oracleasm-kmp-default-2.0.8_k5.3.18_150300.59.76-150300.19.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695505" comment="oracleasm-kmp-preempt-2.0.8_k5.3.18_150300.59.76-150300.19.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695506" comment="oracleasm-kmp-rt-2.0.8_k5.3.18_8.13-150300.19.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52779" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyJWT (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199756" ref_url="https://bugzilla.suse.com/1199756" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29217" ref_url="https://www.suse.com/security/cve/CVE-2022-29217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011552.html" source="SUSE-SU"/>
		<description>
This update for python-PyJWT fixes the following issues:

- CVE-2022-29217: Fixed key confusion through non-blocklisted public key format (bsc#1199756).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-14"/>
	<updated date="2022-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199756">SUSE bug 1199756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29217/">CVE-2022-29217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684717" comment="python2-PyJWT-1.7.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684360" comment="python3-PyJWT-1.7.1-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52780" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180065" ref_url="https://bugzilla.suse.com/1180065" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29362" ref_url="https://www.suse.com/security/cve/CVE-2020-29362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011556.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29362: Fixed a 4 byte overread in p11_rpc_buffer_get_byte_array which could lead to crashes (bsc#1180065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-15"/>
	<updated date="2022-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180065">SUSE bug 1180065</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29362/">CVE-2020-29362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698480" comment="libp11-kit0-0.23.2-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698481" comment="libp11-kit0-32bit-0.23.2-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698482" comment="p11-kit-0.23.2-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698624" comment="p11-kit-32bit-0.23.2-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698483" comment="p11-kit-devel-0.23.2-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698484" comment="p11-kit-nss-trust-0.23.2-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699807" comment="p11-kit-nss-trust-32bit-0.23.2-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698485" comment="p11-kit-tools-0.23.2-150000.4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52781" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194013" ref_url="https://bugzilla.suse.com/1194013" source="BUGZILLA"/>
		<reference ref_id="1196901" ref_url="https://bugzilla.suse.com/1196901" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200571" ref_url="https://bugzilla.suse.com/1200571" source="BUGZILLA"/>
		<reference ref_id="1200599" ref_url="https://bugzilla.suse.com/1200599" source="BUGZILLA"/>
		<reference ref_id="1200604" ref_url="https://bugzilla.suse.com/1200604" source="BUGZILLA"/>
		<reference ref_id="1200605" ref_url="https://bugzilla.suse.com/1200605" source="BUGZILLA"/>
		<reference ref_id="1200608" ref_url="https://bugzilla.suse.com/1200608" source="BUGZILLA"/>
		<reference ref_id="1200619" ref_url="https://bugzilla.suse.com/1200619" source="BUGZILLA"/>
		<reference ref_id="1200692" ref_url="https://bugzilla.suse.com/1200692" source="BUGZILLA"/>
		<reference ref_id="1200762" ref_url="https://bugzilla.suse.com/1200762" source="BUGZILLA"/>
		<reference ref_id="1201050" ref_url="https://bugzilla.suse.com/1201050" source="BUGZILLA"/>
		<reference ref_id="1201080" ref_url="https://bugzilla.suse.com/1201080" source="BUGZILLA"/>
		<reference ref_id="1201251" ref_url="https://bugzilla.suse.com/1201251" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-4157" ref_url="https://www.suse.com/security/cve/CVE-2021-4157/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141/" source="CVE"/>
		<reference ref_id="CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740/" source="CVE"/>
		<reference ref_id="CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741/" source="CVE"/>
		<reference ref_id="CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).

The following non-security bugs were fixed:

- exec: Force single empty string when argv is empty (bsc#1200571).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-15"/>
	<updated date="2022-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194013">SUSE bug 1194013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200571">SUSE bug 1200571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200599">SUSE bug 1200599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200604">SUSE bug 1200604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200605">SUSE bug 1200605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200608">SUSE bug 1200608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200619">SUSE bug 1200619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200692">SUSE bug 1200692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201080">SUSE bug 1201080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201251">SUSE bug 1201251</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4157/">CVE-2021-4157</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699808" comment="kernel-debug-base-4.12.14-150100.197.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699324" comment="kernel-default-man-4.12.14-150100.197.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699809" comment="kernel-kvmsmall-base-4.12.14-150100.197.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699810" comment="kernel-vanilla-4.12.14-150100.197.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699811" comment="kernel-vanilla-base-4.12.14-150100.197.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699812" comment="kernel-vanilla-devel-4.12.14-150100.197.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699813" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699814" comment="kernel-zfcpdump-man-4.12.14-150100.197.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52782" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1201326" ref_url="https://bugzilla.suse.com/1201326" source="BUGZILLA"/>
		<reference ref_id="1201327" ref_url="https://bugzilla.suse.com/1201327" source="BUGZILLA"/>
		<reference ref_id="1201328" ref_url="https://bugzilla.suse.com/1201328" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011578.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2022-32212: Fixed DNS rebinding in --inspect via invalid IP addresses (bsc#1201328).
- CVE-2022-32213: Fixed HTTP request smuggling due to flawed parsing of Transfer-Encoding (bsc#1201325).
- CVE-2022-32214: Fixed HTTP request smuggling due to improper delimiting of header fields (bsc#1201326).
- CVE-2022-32215: Fixed HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (bsc#1201327).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-18"/>
	<updated date="2022-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201326">SUSE bug 1201326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201327">SUSE bug 1201327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201328">SUSE bug 1201328</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698663" comment="nodejs14-14.20.0-150200.15.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698664" comment="nodejs14-devel-14.20.0-150200.15.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698665" comment="nodejs14-docs-14.20.0-150200.15.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698666" comment="npm14-14.20.0-150200.15.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52783" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1201326" ref_url="https://bugzilla.suse.com/1201326" source="BUGZILLA"/>
		<reference ref_id="1201327" ref_url="https://bugzilla.suse.com/1201327" source="BUGZILLA"/>
		<reference ref_id="1201328" ref_url="https://bugzilla.suse.com/1201328" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011580.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- CVE-2022-32212: Fixed DNS rebinding in --inspect via invalid IP addresses (bsc#1201328).
- CVE-2022-32213: Fixed HTTP request smuggling due to flawed parsing of Transfer-Encoding (bsc#1201325).
- CVE-2022-32214: Fixed HTTP request smuggling due to improper delimiting of header fields (bsc#1201326).
- CVE-2022-32215: Fixed HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (bsc#1201327).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-18"/>
	<updated date="2022-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201326">SUSE bug 1201326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201327">SUSE bug 1201327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201328">SUSE bug 1201328</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698667" comment="nodejs12-12.22.12-150200.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698668" comment="nodejs12-devel-12.22.12-150200.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698669" comment="nodejs12-docs-12.22.12-150200.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698670" comment="npm12-12.22.12-150200.4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52784" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot23 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201267" ref_url="https://bugzilla.suse.com/1201267" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30550" ref_url="https://www.suse.com/security/cve/CVE-2022-30550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011607.html" source="SUSE-SU"/>
		<description>
This update for dovecot23 fixes the following issues:

- CVE-2022-30550: Fixed privilege escalation in dovecot when similar master and non-master passdbs are used (bsc#1201267).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-20"/>
	<updated date="2022-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201267">SUSE bug 1201267</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-30550/">CVE-2022-30550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698650" comment="dovecot23-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698651" comment="dovecot23-backend-mysql-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698652" comment="dovecot23-backend-pgsql-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698653" comment="dovecot23-backend-sqlite-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698654" comment="dovecot23-devel-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698655" comment="dovecot23-fts-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698656" comment="dovecot23-fts-lucene-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698657" comment="dovecot23-fts-solr-2.3.15-150200.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698658" comment="dovecot23-fts-squat-2.3.15-150200.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52785" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201221" ref_url="https://bugzilla.suse.com/1201221" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22662" ref_url="https://www.suse.com/security/cve/CVE-2022-22662/" source="CVE"/>
		<reference ref_id="CVE-2022-22677" ref_url="https://www.suse.com/security/cve/CVE-2022-22677/" source="CVE"/>
		<reference ref_id="CVE-2022-26710" ref_url="https://www.suse.com/security/cve/CVE-2022-26710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011626.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.4 (bsc#1201221):

- CVE-2022-22662: Processing maliciously crafted web content may disclose sensitive user information.
- CVE-2022-22677: The video in a webRTC call may be interrupted if the audio capture gets interrupted.
- CVE-2022-26710: Processing maliciously crafted web content may lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201221">SUSE bug 1201221</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22662/">CVE-2022-22662</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22677/">CVE-2022-22677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26710/">CVE-2022-26710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698524" comment="libjavascriptcoregtk-4_0-18-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699883" comment="libjavascriptcoregtk-4_0-18-32bit-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698525" comment="libwebkit2gtk-4_0-37-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699884" comment="libwebkit2gtk-4_0-37-32bit-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698526" comment="libwebkit2gtk3-lang-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698558" comment="typelib-1_0-JavaScriptCore-4_0-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698559" comment="typelib-1_0-WebKit2-4_0-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698560" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699885" comment="webkit-jsc-4-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698527" comment="webkit2gtk-4_0-injected-bundles-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698561" comment="webkit2gtk3-devel-2.36.4-150200.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699886" comment="webkit2gtk3-minibrowser-2.36.4-150200.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52786" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u332 - April 2022 CPU (icedtea-3.23.0)

- CVE-2022-21426: Better XPath expression handling (bsc#1198672)
- CVE-2022-21443: Improved Object Identification (bsc#1198675)
- CVE-2022-21434: Better invocation handler handling (bsc#1198674)
- CVE-2022-21476: Improve Santuario processing (bsc#1198671)
- CVE-2022-21496: Improve URL supports (bsc#1198673)

And further Security fixes, Import of OpenJDK 8 u332, Backports and Bug fixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698590" comment="java-1_8_0-openjdk-1.8.0.332-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699821" comment="java-1_8_0-openjdk-accessibility-1.8.0.332-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698591" comment="java-1_8_0-openjdk-demo-1.8.0.332-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698592" comment="java-1_8_0-openjdk-devel-1.8.0.332-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698593" comment="java-1_8_0-openjdk-headless-1.8.0.332-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699822" comment="java-1_8_0-openjdk-javadoc-1.8.0.332-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699823" comment="java-1_8_0-openjdk-src-1.8.0.332-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52787" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192079" ref_url="https://bugzilla.suse.com/1192079" source="BUGZILLA"/>
		<reference ref_id="1192080" ref_url="https://bugzilla.suse.com/1192080" source="BUGZILLA"/>
		<reference ref_id="1192086" ref_url="https://bugzilla.suse.com/1192086" source="BUGZILLA"/>
		<reference ref_id="1192087" ref_url="https://bugzilla.suse.com/1192087" source="BUGZILLA"/>
		<reference ref_id="1192228" ref_url="https://bugzilla.suse.com/1192228" source="BUGZILLA"/>
		<reference ref_id="1198486" ref_url="https://bugzilla.suse.com/1198486" source="BUGZILLA"/>
		<reference ref_id="1200027" ref_url="https://bugzilla.suse.com/1200027" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011637.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Various FIPS 140-3 related fixes were backported from SUSE Linux Enterprise 15 SP4:

- Makes the PBKDF known answer test compliant with NIST SP800-132. (bsc#1192079). 
- FIPS: Add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck()
  (bsc#1198980).
- FIPS: mark algorithms as approved/non-approved according to security policy
  (bsc#1191546, bsc#1201298).
- FIPS: remove hard disabling of unapproved algorithms. This requirement is now
  fulfilled by the service level indicator (bsc#1200325).
- Run test suite at build time, and make it pass (bsc#1198486).
- FIPS: skip algorithms that are hard disabled in FIPS mode.
- Prevent expired PayPalEE cert from failing the tests.
- Allow checksumming to be disabled, but only if we entered FIPS mode
  due to NSS_FIPS being set, not if it came from /proc.
- FIPS: Make the PBKDF known answer test compliant with NIST SP800-132.
- Update FIPS validation string to version-release format.
- FIPS: remove XCBC MAC from list of FIPS approved algorithms.
- Enable NSS_ENABLE_FIPS_INDICATORS and set NSS_FIPS_MODULE_ID
  for build.
- FIPS: claim 3DES unapproved in FIPS mode (bsc#1192080).
- FIPS: allow testing of unapproved algorithms (bsc#1192228).
- FIPS: add version indicators. (bmo#1729550, bsc#1192086).
- FIPS: fix some secret clearing (bmo#1697303, bsc#1192087).

Version update to NSS 3.79:

- Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
- Update mercurial in clang-format docker image.
- Use of uninitialized pointer in lg_init after alloc fail.
- selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
- Add SECMOD_LockedModuleHasRemovableSlots.
- Fix secasn1d parsing of indefinite SEQUENCE inside indefinite GROUP.
- Added RFC8422 compliant TLS &lt;= 1.2 undefined/compressed ECPointFormat extension alerts.
- TLS 1.3 Server: Send protocol_version alert on unsupported ClientHello.legacy_version.
- Correct invalid record inner and outer content type alerts.
- NSS does not properly import or export pkcs12 files with large passwords and pkcs5v2 encoding.
- improve error handling after nssCKFWInstance_CreateObjectHandle.
- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.
- NSS 3.79 should depend on NSPR 4.34   

Version update to NSS 3.78.1:

- Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple

Version update to NSS 3.78:

- Added TLS 1.3 zero-length inner plaintext checks and tests, zero-length record/fragment handling tests.
- Reworked overlong record size checks and added TLS1.3 specific boundaries.
- Add ECH Grease Support to tstclnt
- Add a strict variant of moz::pkix::CheckCertHostname.
- Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
- Make SEC_PKCS12EnableCipher succeed
- Update zlib in NSS to 1.2.12.

Version update to NSS 3.77:

- Fix link to TLS page on wireshark wiki
- Add two D-TRUST 2020 root certificates.
- Add Telia Root CA v2 root certificate.
- Remove expired explicitly distrusted certificates from certdata.txt.
- support specific RSA-PSS parameters in mozilla::pkix
- Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
- Remove token member from NSSSlot struct.
- Provide secure variants of mpp_pprime and mpp_make_prime.
- Support UTF-8 library path in the module spec string.
- Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
- Update googletest to 1.11.0
- Add SetTls13GreaseEchSize to experimental API.
- TLS 1.3 Illegal legacy_version handling/alerts.
- Fix calculation of ECH HRR Transcript.
- Allow ld path to be set as environment variable.
- Ensure we don't read uninitialized memory in ssl gtests.
- Fix DataBuffer Move Assignment.
- internal_error alert on Certificate Request with sha1+ecdsa in TLS 1.3
- rework signature verification in mozilla::pkix

Version update to NSS 3.76.1

- Remove token member from NSSSlot struct.
- Hold tokensLock through nssToken_GetSlot calls in nssTrustDomain_GetActiveSlots.
- Check return value of PK11Slot_GetNSSToken.
- Use Wycheproof JSON for RSASSA-PSS
- Add SHA256 fingerprint comments to old certdata.txt entries.
- Avoid truncating files in nss-release-helper.py.
- Throw illegal_parameter alert for illegal extensions in handshake message.

Version update to NSS 3.75

- Make DottedOIDToCode.py compatible with python3.
- Avoid undefined shift in SSL_CERT_IS while fuzzing.
- Remove redundant key type check.
- Update ABI expectations to match ECH changes.
- Enable CKM_CHACHA20.
- check return on NSS_NoDB_Init and NSS_Shutdown.
- Run ECDSA test vectors from bltest as part of the CI tests.
- Add ECDSA test vectors to the bltest command line tool.
- Allow to build using clang's integrated assembler.
- Allow to override python for the build.
- test HKDF output rather than input.
- Use ASSERT macros to end failed tests early.
- move assignment operator for DataBuffer.
- Add test cases for ECH compression and unexpected extensions in SH.
- Update tests for ECH-13.
- Tidy up error handling.
- Add tests for ECH HRR Changes.
- Server only sends GREASE HRR extension if enabled by preference.
- Update generation of the Associated Data for ECH-13.
- When ECH is accepted, reject extensions which were only advertised in the Outer Client Hello.
- Allow for compressed, non-contiguous, extensions.
- Scramble the PSK extension in CHOuter.
- Split custom extension handling for ECH.
- Add ECH-13 HRR Handling.
- Client side ECH padding.
- Stricter ClientHelloInner Decompression.
- Remove ECH_inner extension, use new enum format.
- Update the version number for ECH-13 and adjust the ECHConfig size.

Version update to NSS 3.74

- mozilla::pkix: support SHA-2 hashes in CertIDs in OCSP responses
- Ensure clients offer consistent ciphersuites after HRR
- NSS does not properly restrict server keys based on policy
- Set nssckbi version number to 2.54
- Replace Google Trust Services LLC (GTS) R4 root certificate
- Replace Google Trust Services LLC (GTS) R3 root certificate
- Replace Google Trust Services LLC (GTS) R2 root certificate
- Replace Google Trust Services LLC (GTS) R1 root certificate
- Replace GlobalSign ECC Root CA R4
- Remove Expired Root Certificates - DST Root CA X3
- Remove Expiring Cybertrust Global Root and GlobalSign root certificates
- Add renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root certificate
- Add iTrusChina ECC root certificate
- Add iTrusChina RSA root certificate
- Add ISRG Root X2 root certificate
- Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
- Avoid a clang 13 unused variable warning in opt build
- Check for missing signedData field
- Ensure DER encoded signatures are within size limits

- enable key logging option (boo#1195040)

Version update to NSS 3.73.1:

- Add SHA-2 support to mozilla::pkix's OSCP implementation

Version update to NSS 3.73

- check for missing signedData field.
- Ensure DER encoded signatures are within size limits.
- NSS needs FiPS 140-3 version indicators.
- pkix_CacheCert_Lookup doesn't return cached certs
- sunset Coverity from NSS

Fixed MFSA 2021-51 (bsc#1193170) CVE-2021-43527: Memory corruption via DER-encoded DSA and RSA-PSS signatures

Version update to NSS 3.72

- Fix nsinstall parallel failure.
- Increase KDF cache size to mitigate perf regression in about:logins

Version update to NSS 3.71

- Set nssckbi version number to 2.52.
- Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
- Import of PKCS#12 files with Camellia encryption is not supported
- Add HARICA Client ECC Root CA 2021.
- Add HARICA Client RSA Root CA 2021.
- Add HARICA TLS ECC Root CA 2021.
- Add HARICA TLS RSA Root CA 2021.
- Add TunTrust Root CA certificate to NSS.

Version update to NSS 3.70

- Update test case to verify fix.
- Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
- Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
- Avoid using a lookup table in nssb64d.
- Use HW accelerated SHA2 on AArch64 Big Endian.
- Change default value of enableHelloDowngradeCheck to true.
- Cache additional PBE entries.
- Read HPKE vectors from official JSON.

Version update to NSS 3.69.1:

- Disable DTLS 1.0 and 1.1 by default
- integrity checks in key4.db not happening on private components with AES_CBC

NSS 3.69:

- Disable DTLS 1.0 and 1.1 by default (backed out again)
- integrity checks in key4.db not happening on private components with AES_CBC (backed out again)
- SSL handling of signature algorithms ignores environmental invalid algorithms.
- sqlite 3.34 changed it's open semantics, causing nss failures.
- Gtest update changed the gtest reports, losing gtest details in all.sh reports.
- NSS incorrectly accepting 1536 bit DH primes in FIPS mode
- SQLite calls could timeout in starvation situations.
- Coverity/cpp scanner errors found in nss 3.67
- Import the NSS documentation from MDN in nss/doc.
- NSS using a tempdir to measure sql performance not active

Version Update to 3.68.4 (bsc#1200027)

- CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.  (bmo#1767590)


Mozilla NSPR was updated to version 4.34:

* add an API that returns a preferred loopback IP on hosts that have two IP stacks available.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-22"/>
	<updated date="2022-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192079">SUSE bug 1192079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192080">SUSE bug 1192080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192086">SUSE bug 1192086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192087">SUSE bug 1192087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192228">SUSE bug 1192228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198486">SUSE bug 1198486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698489" comment="libfreebl3-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698490" comment="libfreebl3-32bit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698491" comment="libfreebl3-hmac-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698492" comment="libfreebl3-hmac-32bit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698493" comment="libsoftokn3-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698494" comment="libsoftokn3-32bit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698495" comment="libsoftokn3-hmac-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698496" comment="libsoftokn3-hmac-32bit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698497" comment="mozilla-nspr-4.34-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698498" comment="mozilla-nspr-32bit-4.34-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698499" comment="mozilla-nspr-devel-4.34-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698500" comment="mozilla-nss-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698501" comment="mozilla-nss-32bit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698502" comment="mozilla-nss-certs-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698503" comment="mozilla-nss-certs-32bit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698504" comment="mozilla-nss-devel-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698505" comment="mozilla-nss-sysinit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699820" comment="mozilla-nss-sysinit-32bit-3.79-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698506" comment="mozilla-nss-tools-3.79-150000.3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52788" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196125" ref_url="https://bugzilla.suse.com/1196125" source="BUGZILLA"/>
		<reference ref_id="1201225" ref_url="https://bugzilla.suse.com/1201225" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011648.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2022-34903: Fixed a status injection vulnerability (bsc#1201225).
- Use AES as default cipher instead of 3DES when we are in FIPS mode. (bsc#1196125)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-25"/>
	<updated date="2022-07-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196125">SUSE bug 1196125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201225">SUSE bug 1201225</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009700996" comment="dirmngr-2.2.27-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700997" comment="gpg2-2.2.27-150300.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700998" comment="gpg2-lang-2.2.27-150300.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52789" version="1" class="patch">
	<metadata>
		<title>Security update for logrotate (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192449" ref_url="https://bugzilla.suse.com/1192449" source="BUGZILLA"/>
		<reference ref_id="1200278" ref_url="https://bugzilla.suse.com/1200278" source="BUGZILLA"/>
		<reference ref_id="1200802" ref_url="https://bugzilla.suse.com/1200802" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011649.html" source="SUSE-SU"/>
		<description>
This update for logrotate fixes the following issues:

Security issues fixed:

- Improved coredump handing for SUID binaries (bsc#1192449).

Non-security issues fixed:

- Fixed 'logrotate emits unintended warning: keyword size not properly separated, found 0x3d' (bsc#1200278, bsc#1200802).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-25"/>
	<updated date="2022-07-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192449">SUSE bug 1192449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200278">SUSE bug 1200278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200802">SUSE bug 1200802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698528" comment="logrotate-3.13.0-150000.4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52790" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1179195" ref_url="https://bugzilla.suse.com/1179195" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1184924" ref_url="https://bugzilla.suse.com/1184924" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1192761" ref_url="https://bugzilla.suse.com/1192761" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194013" ref_url="https://bugzilla.suse.com/1194013" source="BUGZILLA"/>
		<reference ref_id="1195504" ref_url="https://bugzilla.suse.com/1195504" source="BUGZILLA"/>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1196901" ref_url="https://bugzilla.suse.com/1196901" source="BUGZILLA"/>
		<reference ref_id="1197362" ref_url="https://bugzilla.suse.com/1197362" source="BUGZILLA"/>
		<reference ref_id="1197754" ref_url="https://bugzilla.suse.com/1197754" source="BUGZILLA"/>
		<reference ref_id="1198020" ref_url="https://bugzilla.suse.com/1198020" source="BUGZILLA"/>
		<reference ref_id="1198924" ref_url="https://bugzilla.suse.com/1198924" source="BUGZILLA"/>
		<reference ref_id="1199482" ref_url="https://bugzilla.suse.com/1199482" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1199489" ref_url="https://bugzilla.suse.com/1199489" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200217" ref_url="https://bugzilla.suse.com/1200217" source="BUGZILLA"/>
		<reference ref_id="1200263" ref_url="https://bugzilla.suse.com/1200263" source="BUGZILLA"/>
		<reference ref_id="1200343" ref_url="https://bugzilla.suse.com/1200343" source="BUGZILLA"/>
		<reference ref_id="1200442" ref_url="https://bugzilla.suse.com/1200442" source="BUGZILLA"/>
		<reference ref_id="1200571" ref_url="https://bugzilla.suse.com/1200571" source="BUGZILLA"/>
		<reference ref_id="1200599" ref_url="https://bugzilla.suse.com/1200599" source="BUGZILLA"/>
		<reference ref_id="1200600" ref_url="https://bugzilla.suse.com/1200600" source="BUGZILLA"/>
		<reference ref_id="1200604" ref_url="https://bugzilla.suse.com/1200604" source="BUGZILLA"/>
		<reference ref_id="1200605" ref_url="https://bugzilla.suse.com/1200605" source="BUGZILLA"/>
		<reference ref_id="1200608" ref_url="https://bugzilla.suse.com/1200608" source="BUGZILLA"/>
		<reference ref_id="1200619" ref_url="https://bugzilla.suse.com/1200619" source="BUGZILLA"/>
		<reference ref_id="1200622" ref_url="https://bugzilla.suse.com/1200622" source="BUGZILLA"/>
		<reference ref_id="1200692" ref_url="https://bugzilla.suse.com/1200692" source="BUGZILLA"/>
		<reference ref_id="1200806" ref_url="https://bugzilla.suse.com/1200806" source="BUGZILLA"/>
		<reference ref_id="1200807" ref_url="https://bugzilla.suse.com/1200807" source="BUGZILLA"/>
		<reference ref_id="1200809" ref_url="https://bugzilla.suse.com/1200809" source="BUGZILLA"/>
		<reference ref_id="1200810" ref_url="https://bugzilla.suse.com/1200810" source="BUGZILLA"/>
		<reference ref_id="1200813" ref_url="https://bugzilla.suse.com/1200813" source="BUGZILLA"/>
		<reference ref_id="1200816" ref_url="https://bugzilla.suse.com/1200816" source="BUGZILLA"/>
		<reference ref_id="1200820" ref_url="https://bugzilla.suse.com/1200820" source="BUGZILLA"/>
		<reference ref_id="1200821" ref_url="https://bugzilla.suse.com/1200821" source="BUGZILLA"/>
		<reference ref_id="1200822" ref_url="https://bugzilla.suse.com/1200822" source="BUGZILLA"/>
		<reference ref_id="1200825" ref_url="https://bugzilla.suse.com/1200825" source="BUGZILLA"/>
		<reference ref_id="1200828" ref_url="https://bugzilla.suse.com/1200828" source="BUGZILLA"/>
		<reference ref_id="1200829" ref_url="https://bugzilla.suse.com/1200829" source="BUGZILLA"/>
		<reference ref_id="1200925" ref_url="https://bugzilla.suse.com/1200925" source="BUGZILLA"/>
		<reference ref_id="1201050" ref_url="https://bugzilla.suse.com/1201050" source="BUGZILLA"/>
		<reference ref_id="1201080" ref_url="https://bugzilla.suse.com/1201080" source="BUGZILLA"/>
		<reference ref_id="1201143" ref_url="https://bugzilla.suse.com/1201143" source="BUGZILLA"/>
		<reference ref_id="1201147" ref_url="https://bugzilla.suse.com/1201147" source="BUGZILLA"/>
		<reference ref_id="1201149" ref_url="https://bugzilla.suse.com/1201149" source="BUGZILLA"/>
		<reference ref_id="1201160" ref_url="https://bugzilla.suse.com/1201160" source="BUGZILLA"/>
		<reference ref_id="1201171" ref_url="https://bugzilla.suse.com/1201171" source="BUGZILLA"/>
		<reference ref_id="1201177" ref_url="https://bugzilla.suse.com/1201177" source="BUGZILLA"/>
		<reference ref_id="1201193" ref_url="https://bugzilla.suse.com/1201193" source="BUGZILLA"/>
		<reference ref_id="1201222" ref_url="https://bugzilla.suse.com/1201222" source="BUGZILLA"/>
		<reference ref_id="1201644" ref_url="https://bugzilla.suse.com/1201644" source="BUGZILLA"/>
		<reference ref_id="1201664" ref_url="https://bugzilla.suse.com/1201664" source="BUGZILLA"/>
		<reference ref_id="1201672" ref_url="https://bugzilla.suse.com/1201672" source="BUGZILLA"/>
		<reference ref_id="1201673" ref_url="https://bugzilla.suse.com/1201673" source="BUGZILLA"/>
		<reference ref_id="1201676" ref_url="https://bugzilla.suse.com/1201676" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-4157" ref_url="https://www.suse.com/security/cve/CVE-2021-4157/" source="CVE"/>
		<reference ref_id="CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141/" source="CVE"/>
		<reference ref_id="CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).

The following non-security bugs were fixed:

- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)
- arm64: ftrace: fix branch range checks (git-fixes)
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ata: libata: add qc-&gt;flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bio: fix page leak bio_add_hw_page failure (git-fixes).
- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762) 
- blk-mq: update hctx-&gt;dispatch_busy in case of real scheduler (git-fixes).
- block: advance iov_iter on bio_add_hw_page failure (git-fixes).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).
- block: Fix kABI in blk-merge.c (bsc#1198020).
- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).
- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).
- cifs: avoid parallel session setups on same channel (bsc#1200217).
- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).
- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).
- cifs: call helper functions for marking channels for reconnect (bsc#1200217).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).
- cifs: check for smb1 in open_cached_dir() (bsc#1200217).
- cifs: check reconnects for channels of active tcons too (bsc#1200217).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).
- cifs: clean up an inconsistent indenting (bsc#1200217).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).
- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).
- cifs: fix handlecache and multiuser (bsc#1200217).
- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).
- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).
- cifs: fix minor compile warning (bsc#1200217).
- cifs: fix missed refcounting of ipc tcon (bsc#1200217).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).
- cifs: fix potential deadlock in direct reclaim (bsc#1200217).
- cifs: fix potential double free during failed mount (bsc#1200217).
- cifs: fix potential race with cifsd thread (bsc#1200217).
- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).
- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).
- cifs: fix the connection state transitions with multichannel (bsc#1200217).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).
- cifs: fix workstation_name for multiuser mounts (bsc#1200217).
- cifs: force new session setup and tcon for dfs (bsc#1200217).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).
- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).
- cifs: make status checks in version independent callers (bsc#1200217).
- cifs: mark sessions for reconnection in helper function (bsc#1200217).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).
- cifs: move superblock magic defitions to magic.h (bsc#1200217).
- cifs: potential buffer overflow in handling symlinks (bsc#1200217).
- cifs: print TIDs as hex (bsc#1200217).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).
- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).
- cifs: release cached dentries only if mount is complete (bsc#1200217).
- cifs: remove check of list iterator against head past the loop body (bsc#1200217).
- cifs: remove redundant assignment to pointer p (bsc#1200217).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).
- cifs: remove repeated state change in dfs tree connect (bsc#1200217).
- cifs: remove unused variable ses_selected (bsc#1200217).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).
- cifs: return the more nuanced writeback error on close() (bsc#1200217).
- cifs: sanitize multiple delimiters in prepath (bsc#1200217).
- cifs: serialize all mount attempts (bsc#1200217).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).
- cifs: skip trailing separators of prefix paths (bsc#1200217).
- cifs: smbd: fix typo in comment (bsc#1200217).
- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).
- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).
- cifs: update internal module number (bsc#1193629).
- cifs: update internal module number (bsc#1200217).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).
- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).
- cifs: use new enum for ses_status (bsc#1200217).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).
- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gtp: use icmp_ndo_send helper (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- iomap: iomap_write_failed fix (bsc#1200829).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI fix of sysctl_run_estimation (git-fixes).
- kabi: nvme workaround header include (bsc#1201193).
- kabi/severities: ignore KABI for NVMe target (bsc#1192761)
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- move devm_allocate to end of structure for kABI (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: ieee802154: ca8210: Stop leaking skb's (git-fixes).
- net: lantiq: Add locking for TX DMA channel (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm/region: Fix default alignment for small regions (git-fixes).
- nvme: add CNTRLTYPE definitions for 'identify controller' (bsc#1192761).
- nvme: Add connect option 'discovery' (bsc#1192761).
- nvme: add new discovery log page entry definitions (bsc#1192761).
- nvme: display correct subsystem NQN (bsc#1192761).
- nvme: expose subsystem type in sysfs attribute 'subsystype' (bsc#1192761).
- nvme: kabi fix nvme subsystype change (bsc#1192761)
- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).
- nvmet: add nvmet_req_subsys() helper (bsc#1192761).
- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).
- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).
- nvmet: fix freeing unallocated p2pmem (git-fixes).
- nvmet: make discovery NQN configurable (bsc#1192761).
- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).
- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).
- nvmet: register discovery subsystem as 'current' (bsc#1192761).
- nvmet: set 'CNTRLTYPE' in the identify controller data (bsc#1192761).
- nvmet: switch check for subsystem type (bsc#1192761).
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- random: Add and use pr_fmt() (bsc#1184924).
- random: remove unnecessary unlikely() (bsc#1184924).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- Revert 'block: Fix a lockdep complaint triggered by request queue flushing' (git-fixes).
- scsi: core: Show SCMD_LAST in text form (git-fixes).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).
- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).
- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).
- scsi: sd: Signal drive managed SMR disks (git-fixes).
- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).
- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).
- scsi: sd_zbc: Improve zone revalidation (git-fixes).
- scsi: sd_zbc: Remove unused inline functions (git-fixes).
- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).
- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).
- smb3: add mount parm nosparse (bsc#1200217).
- smb3: add trace point for lease not found issue (bsc#1200217).
- smb3: add trace point for oplock not found (bsc#1200217).
- smb3: check for null tcon (bsc#1200217).
- smb3: cleanup and clarify status of tree connections (bsc#1200217).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).
- smb3: fix snapshot mount option (bsc#1200217).
- smb3 improve error message when mount options conflict with posix (bsc#1200217).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).
- smb3: move more common protocol header definitions to smbfs_common (bsc#1200217).
- smb3: send NTLMSSP version information (bsc#1200217).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).
- SUNRPC: Fix the calculation of xdr-&gt;end in xdr_get_next_encode_buffer() (git-fixes).
- sunvnet: use icmp_ndo_send helper (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).
- veth: fix races around rq-&gt;rx_notify_masked (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode-&gt;i_io_list not be protected by inode-&gt;i_lock error (bsc#1200821).
- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).
- x86/entry: Remove skip_r11rcx (bsc#1201644).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-26"/>
	<updated date="2022-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179195">SUSE bug 1179195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184924">SUSE bug 1184924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192761">SUSE bug 1192761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194013">SUSE bug 1194013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195504">SUSE bug 1195504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197362">SUSE bug 1197362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197754">SUSE bug 1197754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198020">SUSE bug 1198020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198924">SUSE bug 1198924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199482">SUSE bug 1199482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199489">SUSE bug 1199489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200217">SUSE bug 1200217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200263">SUSE bug 1200263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200343">SUSE bug 1200343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200442">SUSE bug 1200442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200571">SUSE bug 1200571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200599">SUSE bug 1200599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200600">SUSE bug 1200600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200604">SUSE bug 1200604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200605">SUSE bug 1200605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200608">SUSE bug 1200608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200619">SUSE bug 1200619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200622">SUSE bug 1200622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200692">SUSE bug 1200692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200806">SUSE bug 1200806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200807">SUSE bug 1200807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200809">SUSE bug 1200809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200810">SUSE bug 1200810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200813">SUSE bug 1200813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200816">SUSE bug 1200816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200820">SUSE bug 1200820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200821">SUSE bug 1200821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200822">SUSE bug 1200822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200825">SUSE bug 1200825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200828">SUSE bug 1200828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200829">SUSE bug 1200829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200925">SUSE bug 1200925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201080">SUSE bug 1201080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201143">SUSE bug 1201143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201147">SUSE bug 1201147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201149">SUSE bug 1201149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201160">SUSE bug 1201160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201171">SUSE bug 1201171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201177">SUSE bug 1201177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201193">SUSE bug 1201193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201222">SUSE bug 1201222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201644">SUSE bug 1201644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201664">SUSE bug 1201664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201672">SUSE bug 1201672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201673">SUSE bug 1201673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201676">SUSE bug 1201676</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4157/">CVE-2021-4157</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701899" comment="cluster-md-kmp-64kb-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701852" comment="cluster-md-kmp-default-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701900" comment="cluster-md-kmp-preempt-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701901" comment="dlm-kmp-64kb-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701853" comment="dlm-kmp-default-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701902" comment="dlm-kmp-preempt-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701903" comment="dtb-al-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701904" comment="dtb-allwinner-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701905" comment="dtb-altera-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701906" comment="dtb-amd-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701907" comment="dtb-amlogic-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701908" comment="dtb-apm-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701909" comment="dtb-arm-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701910" comment="dtb-broadcom-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701911" comment="dtb-cavium-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701912" comment="dtb-exynos-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701913" comment="dtb-freescale-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701914" comment="dtb-hisilicon-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701915" comment="dtb-lg-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701916" comment="dtb-marvell-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701917" comment="dtb-mediatek-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701918" comment="dtb-nvidia-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701919" comment="dtb-qcom-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701920" comment="dtb-renesas-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701921" comment="dtb-rockchip-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701922" comment="dtb-socionext-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701923" comment="dtb-sprd-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701924" comment="dtb-xilinx-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701925" comment="dtb-zte-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701926" comment="gfs2-kmp-64kb-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701854" comment="gfs2-kmp-default-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701927" comment="gfs2-kmp-preempt-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701828" comment="kernel-64kb-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701829" comment="kernel-64kb-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701928" comment="kernel-64kb-extra-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701929" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701930" comment="kernel-64kb-optional-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701931" comment="kernel-debug-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701932" comment="kernel-debug-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701933" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701830" comment="kernel-default-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701831" comment="kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701934" comment="kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701832" comment="kernel-default-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701935" comment="kernel-default-extra-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701936" comment="kernel-default-livepatch-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701937" comment="kernel-default-livepatch-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701938" comment="kernel-default-optional-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701833" comment="kernel-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701841" comment="kernel-docs-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701939" comment="kernel-docs-html-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701940" comment="kernel-kvmsmall-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701941" comment="kernel-kvmsmall-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701942" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701834" comment="kernel-macros-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701842" comment="kernel-obs-build-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701943" comment="kernel-obs-qa-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701835" comment="kernel-preempt-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701843" comment="kernel-preempt-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701944" comment="kernel-preempt-extra-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701945" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701946" comment="kernel-preempt-optional-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701844" comment="kernel-source-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701947" comment="kernel-source-vanilla-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701845" comment="kernel-syms-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701836" comment="kernel-zfcpdump-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701948" comment="kselftests-kmp-64kb-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701949" comment="kselftests-kmp-default-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701950" comment="kselftests-kmp-preempt-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701951" comment="ocfs2-kmp-64kb-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701855" comment="ocfs2-kmp-default-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701952" comment="ocfs2-kmp-preempt-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701953" comment="reiserfs-kmp-64kb-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701846" comment="reiserfs-kmp-default-5.3.18-150300.59.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701954" comment="reiserfs-kmp-preempt-5.3.18-150300.59.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52791" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201431" ref_url="https://bugzilla.suse.com/1201431" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011656.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-26"/>
	<updated date="2022-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698580" comment="git-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698581" comment="git-arch-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698530" comment="git-core-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699890" comment="git-credential-gnome-keyring-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699891" comment="git-credential-libsecret-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698582" comment="git-cvs-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698583" comment="git-daemon-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698584" comment="git-doc-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698585" comment="git-email-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698586" comment="git-gui-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699892" comment="git-p4-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698587" comment="git-svn-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698588" comment="git-web-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698589" comment="gitk-2.35.3-150300.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698531" comment="perl-Git-2.35.3-150300.10.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52792" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192489" ref_url="https://bugzilla.suse.com/1192489" source="BUGZILLA"/>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1201326" ref_url="https://bugzilla.suse.com/1201326" source="BUGZILLA"/>
		<reference ref_id="1201327" ref_url="https://bugzilla.suse.com/1201327" source="BUGZILLA"/>
		<reference ref_id="1201328" ref_url="https://bugzilla.suse.com/1201328" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011658.html" source="SUSE-SU"/>
		<description>
This update for nodejs16 fixes the following issues:

- CVE-2022-32212: Fixed DNS rebinding in --inspect via invalid IP addresses (bsc#1201328).
- CVE-2022-32213: Fixed HTTP request smuggling due to flawed parsing of Transfer-Encoding (bsc#1201325).
- CVE-2022-32214: Fixed HTTP request smuggling due to improper delimiting of header fields (bsc#1201326).
- CVE-2022-32215: Fixed HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (bsc#1201327).

The following non-security bug was fixed:

- Add buildtime version check to determine if we need patched
  openssl Requires: or already in upstream. (bsc#1192489)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-26"/>
	<updated date="2022-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192489">SUSE bug 1192489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201326">SUSE bug 1201326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201327">SUSE bug 1201327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201328">SUSE bug 1201328</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698659" comment="nodejs16-16.16.0-150300.7.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698660" comment="nodejs16-devel-16.16.0-150300.7.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698661" comment="nodejs16-docs-16.16.0-150300.7.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698662" comment="npm16-16.16.0-150300.7.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52793" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185923" ref_url="https://bugzilla.suse.com/1185923" source="BUGZILLA"/>
		<reference ref_id="1186654" ref_url="https://bugzilla.suse.com/1186654" source="BUGZILLA"/>
		<reference ref_id="1200907" ref_url="https://bugzilla.suse.com/1200907" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33620" ref_url="https://www.suse.com/security/cve/CVE-2021-33620/" source="CVE"/>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011655.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2021-46784: Fixed DoS when processing gopher server responses. (bsc#1200907)
- CVE-2021-33620: Fixed DoS in HTTP Response processing (bsc#1185923, bsc#1186654)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-26"/>
	<updated date="2022-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185923">SUSE bug 1185923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186654">SUSE bug 1186654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200907">SUSE bug 1200907</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33620/">CVE-2021-33620</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698649" comment="squid-4.17-150000.5.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52794" version="1" class="patch">
	<metadata>
		<title>Security update for python-M2Crypto (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178829" ref_url="https://bugzilla.suse.com/1178829" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011682.html" source="SUSE-SU"/>
		<description>
This update for python-M2Crypto fixes the following issues:

- CVE-2020-25657: Fixed Bleichenbacher timing attacks in the RSA decryption API (bsc#1178829).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-27"/>
	<updated date="2022-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178829">SUSE bug 1178829</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699889" comment="python-M2Crypto-doc-0.35.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698637" comment="python2-M2Crypto-0.35.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698529" comment="python3-M2Crypto-0.35.2-150000.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52795" version="1" class="patch">
	<metadata>
		<title>Security update for aws-iam-authenticator (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201395" ref_url="https://bugzilla.suse.com/1201395" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2385" ref_url="https://www.suse.com/security/cve/CVE-2022-2385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011707.html" source="SUSE-SU"/>
		<description>
This update for aws-iam-authenticator fixes the following issues:

- CVE-2022-2385: Fixed AccessKeyID validation bypass (bsc#1201395).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201395">SUSE bug 1201395</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2385/">CVE-2022-2385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701140" comment="aws-iam-authenticator-0.5.3-150000.1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52796" version="1" class="patch">
	<metadata>
		<title>Security update for ldb, samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196224" ref_url="https://bugzilla.suse.com/1196224" source="BUGZILLA"/>
		<reference ref_id="1198255" ref_url="https://bugzilla.suse.com/1198255" source="BUGZILLA"/>
		<reference ref_id="1199247" ref_url="https://bugzilla.suse.com/1199247" source="BUGZILLA"/>
		<reference ref_id="1199734" ref_url="https://bugzilla.suse.com/1199734" source="BUGZILLA"/>
		<reference ref_id="1200556" ref_url="https://bugzilla.suse.com/1200556" source="BUGZILLA"/>
		<reference ref_id="1200964" ref_url="https://bugzilla.suse.com/1200964" source="BUGZILLA"/>
		<reference ref_id="1201490" ref_url="https://bugzilla.suse.com/1201490" source="BUGZILLA"/>
		<reference ref_id="1201492" ref_url="https://bugzilla.suse.com/1201492" source="BUGZILLA"/>
		<reference ref_id="1201493" ref_url="https://bugzilla.suse.com/1201493" source="BUGZILLA"/>
		<reference ref_id="1201495" ref_url="https://bugzilla.suse.com/1201495" source="BUGZILLA"/>
		<reference ref_id="1201496" ref_url="https://bugzilla.suse.com/1201496" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2031" ref_url="https://www.suse.com/security/cve/CVE-2022-2031/" source="CVE"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<reference ref_id="CVE-2022-32744" ref_url="https://www.suse.com/security/cve/CVE-2022-32744/" source="CVE"/>
		<reference ref_id="CVE-2022-32745" ref_url="https://www.suse.com/security/cve/CVE-2022-32745/" source="CVE"/>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<description>
This update for ldb, samba fixes the following issues:

- CVE-2022-32746: Fixed a use-after-free occurring in database audit logging (bsc#1201490).
- CVE-2022-32745: Fixed a remote server crash with an LDAP add or modify request (bsc#1201492).
- CVE-2022-2031: Fixed AD restrictions bypass associated with changing passwords (bsc#1201495).
- CVE-2022-32742: Fixed a memory leak in SMB1 (bsc#1201496).
- CVE-2022-32744: Fixed an arbitrary password change request for any AD user (bsc#1201493).

The following security bugs were fixed:

samba was updated to 4.15.8:

* Use pathref fd instead of io fd in vfs_default_durable_cookie;
  (bso#15042);
* Setting fruit:resource = stream in vfs_fruit causes a panic;
  (bso#15099);
* Add support for bind 9.18; (bso#14986);
* logging dsdb audit to specific files does not work; (bso#15076);
* vfs_gpfs with vfs_shadowcopy2 fail to restore file if original
  file had been deleted; (bso#15069);
* netgroups support removed; (bso#15087); (bsc#1199247);
* net ads info shows LDAP Server: 0.0.0.0 depending on contacted
  server; (bso#14674); (bsc#1199734);
* waf produces incorrect names for python extensions with Python
  3.11; (bso#15071);
* smbclient commands del &amp; deltree fail with
  NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100);
  (bsc#1200556);
* vfs_gpfs recalls=no option prevents listing files; (bso#15055);
* waf produces incorrect names for python extensions with Python
  3.11; (bso#15071);
* Compile error in source3/utils/regedit_hexedit.c; (bso#15091);
* ldconfig: /lib64/libsmbconf.so.0 is not a symbolic link;
  (bso#15108);
* smbd doesn't handle UPNs for looking up names; (bso#15054);
* Out-by-4 error in smbd read reply max_send clamp; (bso#14443);

- Move pdb backends from package samba-libs to package
  samba-client-libs and remove samba-libs requirement from
  samba-winbind; (bsc#1200964); (bsc#1198255);
- Use the canonical realm name to refresh the Kerberos tickets;
  (bsc#1196224); (bso#14979);
- Fix  smbclient commands del &amp; deltree failing with
  NT_STATUS_OBJECT_PATH_NOT_FOUND with DFS; (bso#15100);
  (bsc#1200556).

ldb was updated to version 2.4.3

* Fix build problems, waf produces incorrect names for python extensions; (bso#15071);
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196224">SUSE bug 1196224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198255">SUSE bug 1198255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199247">SUSE bug 1199247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199734">SUSE bug 1199734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200556">SUSE bug 1200556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200964">SUSE bug 1200964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201490">SUSE bug 1201490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201492">SUSE bug 1201492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201493">SUSE bug 1201493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201495">SUSE bug 1201495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201496">SUSE bug 1201496</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2031/">CVE-2022-2031</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32744/">CVE-2022-32744</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32745/">CVE-2022-32745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703378" comment="ctdb-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703462" comment="ctdb-pcp-pmda-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703347" comment="ldb-tools-2.4.3-150300.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703348" comment="libldb-devel-2.4.3-150300.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703349" comment="libldb2-2.4.3-150300.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703350" comment="libldb2-32bit-2.4.3-150300.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703351" comment="libsamba-policy-devel-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703352" comment="libsamba-policy-python3-devel-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703353" comment="libsamba-policy0-python3-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703463" comment="libsamba-policy0-python3-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703464" comment="libsamba-policy0-python3-64bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703354" comment="python3-ldb-2.4.3-150300.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703465" comment="python3-ldb-32bit-2.4.3-150300.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703355" comment="python3-ldb-devel-2.4.3-150300.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703356" comment="samba-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703377" comment="samba-ad-dc-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703357" comment="samba-ad-dc-libs-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703358" comment="samba-ad-dc-libs-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703359" comment="samba-ceph-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703360" comment="samba-client-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703361" comment="samba-client-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703466" comment="samba-client-64bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703362" comment="samba-client-libs-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703363" comment="samba-client-libs-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703364" comment="samba-devel-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703365" comment="samba-devel-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703467" comment="samba-doc-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703366" comment="samba-dsdb-modules-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703367" comment="samba-gpupdate-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703368" comment="samba-ldb-ldap-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703369" comment="samba-libs-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703370" comment="samba-libs-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703468" comment="samba-libs-64bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703371" comment="samba-libs-python3-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703469" comment="samba-libs-python3-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703470" comment="samba-libs-python3-64bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703372" comment="samba-python3-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703471" comment="samba-test-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703373" comment="samba-tool-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703374" comment="samba-winbind-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703375" comment="samba-winbind-libs-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703376" comment="samba-winbind-libs-32bit-4.15.8+git.500.d5910280cc7-150300.3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52797" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-tzinfo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201835" ref_url="https://bugzilla.suse.com/1201835" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31163" ref_url="https://www.suse.com/security/cve/CVE-2022-31163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011712.html" source="SUSE-SU"/>
		<description>
This update for rubygem-tzinfo fixes the following issues:

- CVE-2022-31163: Fixed relative path traversal vulnerability that allows TZInfo::Timezone.get to load arbitrary files (bsc#1201835).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201835">SUSE bug 1201835</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31163/">CVE-2022-31163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702144" comment="ruby2.5-rubygem-tzinfo-1.2.4-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702281" comment="ruby2.5-rubygem-tzinfo-doc-1.2.4-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702282" comment="ruby2.5-rubygem-tzinfo-testsuite-1.2.4-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52798" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1199965" ref_url="https://bugzilla.suse.com/1199965" source="BUGZILLA"/>
		<reference ref_id="1199966" ref_url="https://bugzilla.suse.com/1199966" source="BUGZILLA"/>
		<reference ref_id="1200549" ref_url="https://bugzilla.suse.com/1200549" source="BUGZILLA"/>
		<reference ref_id="1201394" ref_url="https://bugzilla.suse.com/1201394" source="BUGZILLA"/>
		<reference ref_id="1201469" ref_url="https://bugzilla.suse.com/1201469" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362/" source="CVE"/>
		<reference ref_id="CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363/" source="CVE"/>
		<reference ref_id="CVE-2022-26364" ref_url="https://www.suse.com/security/cve/CVE-2022-26364/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26363, CVE-2022-26364: Fixed insufficient care with non-coherent mappings (XSA-402) (bsc#1199966).
- CVE-2022-21123, CVE-2022-21125, CVE-2022-21166: Fixed MMIO stale data vulnerabilities on x86 (XSA-404) (bsc#1200549).
- CVE-2022-26362: Fixed a race condition in typeref acquisition (XSA-401) (bsc#1199965).
- CVE-2022-33745: Fixed insufficient TLB flush for x86 PV guests in shadow mode (XSA-408) (bsc#1201394).
- CVE-2022-23816, CVE-2022-23825, CVE-2022-29900: Fixed RETBLEED vulnerability, arbitrary speculative code execution with return instructions (XSA-407) (bsc#1201469).

Fixed several upstream bugs (bsc#1027519). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-07-29"/>
	<updated date="2022-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199965">SUSE bug 1199965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199966">SUSE bug 1199966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201394">SUSE bug 1201394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26364/">CVE-2022-26364</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702559" comment="xen-4.14.5_04-150300.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702560" comment="xen-devel-4.14.5_04-150300.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702561" comment="xen-doc-html-4.14.5_04-150300.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702562" comment="xen-libs-4.14.5_04-150300.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702563" comment="xen-libs-32bit-4.14.5_04-150300.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702564" comment="xen-tools-4.14.5_04-150300.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702565" comment="xen-tools-domU-4.14.5_04-150300.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702482" comment="xen-tools-xendomains-wait-disk-4.14.5_04-150300.3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52799" version="1" class="patch">
	<metadata>
		<title>Security update for booth (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201946" ref_url="https://bugzilla.suse.com/1201946" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2553" ref_url="https://www.suse.com/security/cve/CVE-2022-2553/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011729.html" source="SUSE-SU"/>
		<description>
This update for booth fixes the following issues:

- CVE-2022-2553: authfile directive in booth config file is completely ignored (bsc#1201946).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-01"/>
	<updated date="2022-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201946">SUSE bug 1201946</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2553/">CVE-2022-2553</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702704" comment="booth-1.0-150300.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703346" comment="booth-test-1.0-150300.18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52800" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011731.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.12.0 ESR (bsc#1201758):

- CVE-2022-36319: Mouse Position spoofing with CSS transforms
- CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-01"/>
	<updated date="2022-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702473" comment="MozillaFirefox-91.12.0-150200.152.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702566" comment="MozillaFirefox-branding-upstream-91.12.0-150200.152.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702567" comment="MozillaFirefox-devel-91.12.0-150200.152.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702475" comment="MozillaFirefox-translations-common-91.12.0-150200.152.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702476" comment="MozillaFirefox-translations-other-91.12.0-150200.152.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52801" version="1" class="patch">
	<metadata>
		<title>Security update for dwarves and elfutils (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033085" ref_url="https://bugzilla.suse.com/1033085" source="BUGZILLA"/>
		<reference ref_id="1033086" ref_url="https://bugzilla.suse.com/1033086" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1033090" ref_url="https://bugzilla.suse.com/1033090" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1104264" ref_url="https://bugzilla.suse.com/1104264" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107066" ref_url="https://bugzilla.suse.com/1107066" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146/" source="CVE"/>
		<reference ref_id="CVE-2019-7148" ref_url="https://www.suse.com/security/cve/CVE-2019-7148/" source="CVE"/>
		<reference ref_id="CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<description>
This update for dwarves and elfutils fixes the following issues:

elfutils was updated to version 0.177 (jsc#SLE-24501):
  
- elfclassify: New tool to analyze ELF objects.
- readelf: Print DW_AT_data_member_location as decimal offset.
             Decode DW_AT_discr_list block attributes.
- libdw: Add DW_AT_GNU_numerator, DW_AT_GNU_denominator and DW_AT_GNU_bias.
- libdwelf: Add dwelf_elf_e_machine_string.
            dwelf_elf_begin now only returns NULL when there is an error
            reading or decompressing a file. If the file is not an ELF file
            an ELF handle of type ELF_K_NONE is returned.
- backends: Add support for C-SKY.
  
Update to version 0.176:

- build: Add new --enable-install-elfh option.
         Do NOT use this for system installs (it overrides glibc elf.h).
- backends: riscv improved core file and return value location support.
- Fixes:
  - CVE-2019-7146, CVE-2019-7148, CVE-2019-7149, CVE-2019-7664 - CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bsc#1123685)
  - CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (CVE is a bit misleading, as this is not a bug in libelf as described) (bsc#1125007)
  
Update to version 0.175:
  
- readelf: Handle mutliple .debug_macro sections.
           Recognize and parse GNU Property, NT_VERSION and
           GNU Build Attribute ELF Notes.
- strip: Handle SHT_GROUP correctly.
         Add strip --reloc-debug-sections-only option.
         Handle relocations against GNU compressed sections.
- libdwelf: New function dwelf_elf_begin.
- libcpu: Recognize bpf jump variants BPF_JLT, BPF_JLE, BPF_JSLT
            and BPF_JSLE.
    backends: RISCV handles ADD/SUB relocations.
              Handle SHT_X86_64_UNWIND.
  - CVE-2018-18521: arlib: Divide-by-zero vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bsc#1112723)
  - CVE-2018-18310: Invalid Address Read problem in dwfl_segment_report_module.c (bsc#1111973)
  - CVE-2018-18520: eu-size: Bad handling of ar files inside are files (bsc#1112726)
  
Update to version 0.174:
  
- libelf, libdw and all tools now handle extended shnum and
  shstrndx correctly.
  
- elfcompress: Don't rewrite input file if no section data needs
               updating. Try harder to keep same file mode bits
               (suid) on rewrite.
- strip: Handle mixed (out of order) allocated/non-allocated sections.
- unstrip: Handle SHT_GROUP sections.
- backends: RISCV and M68K now have backend implementations to
            generate CFI based backtraces.
- Fixes:
  - CVE-2018-16402: libelf: denial of service/double free on an attempt to decompress the same section twice (bsc#1107066) Double-free crash in nm and readelf
  - CVE-2018-16403: heap buffer overflow in readelf (bsc#1107067)
  - CVE-2018-16062: heap-buffer-overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bsc#1106390)
    
Update to version 0.173:
  
- More fixes for crashes and hangs found by afl-fuzz. In particular various
  functions now detect and break infinite loops caused by bad DIE tree cycles.
- readelf: Will now lookup the size and signedness of constant value types
           to display them correctly (and not just how they were encoded).
- libdw: New function dwarf_next_lines to read CU-less .debug_line data.
         dwarf_begin_elf now accepts ELF files containing just .debug_line
         or .debug_frame sections (which can be read without needing a DIE
         tree from the .debug_info section).
         Removed dwarf_getscn_info, which was never implemented.
- backends: Handle BPF simple relocations.
            The RISCV backends now handles ABI specific CFI and knows about
            RISCV register types and names.
  
Update to version 0.172:
  
- Various bug fixes in libdw and eu-readelf dealing with bad DWARF5 data.
  Thanks to running the afl fuzzer on eu-readelf and various testcases.
  
Update to version 0.171:
  
- DWARF5 and split dwarf, including GNU DebugFission, are supported now.
  Data can be read from the new DWARF sections .debug_addr, .debug_line_str,
  .debug_loclists, .debug_str_offsets and .debug_rnglists.  Plus the new
  DWARF5 and GNU DebugFission encodings of the existing .debug sections.
  Also in split DWARF .dwo (DWARF object) files.  This support is mostly
  handled by existing functions (dwarf_getlocation*, dwarf_getsrclines,
  dwarf_ranges, dwarf_form*, etc.) now returning the data from the new
  sections and data formats.  But some new functions have been added
  to more easily get information about skeleton and split compile units
  (dwarf_get_units and dwarf_cu_info), handle new attribute data
  (dwarf_getabbrevattr_data) and to keep references to Dwarf_Dies
  that might come from different sections or files (dwarf_die_addr_die).
- Not yet supported are .dwp (Dwarf Package) and .sup (Dwarf Supplementary)
  files, the .debug_names index, the .debug_cu_index and .debug_tu_index
  sections. Only a single .debug_info (and .debug_types) section are
  currently handled.
- readelf: Handle all new DWARF5 sections.
           --debug-dump=info+ will show split unit DIEs when found.
           --dwarf-skeleton can be used when inspecting a .dwo file.
     Recognizes GNU locviews with --debug-dump=loc.
- libdw: New functions dwarf_die_addr_die, dwarf_get_units,
         dwarf_getabbrevattr_data and dwarf_cu_info.
         libdw will now try to resolve the alt file on first use of
         an alt attribute FORM when not set yet with dwarf_set_alt.
         dwarf_aggregate_size() now works with multi-dimensional arrays.
- libdwfl: Use process_vm_readv when available instead of ptrace.
  backends: Add a RISC-V backend.
  
  There were various improvements to build on Windows.
  The sha1 and md5 implementations have been removed, they weren't used.

Update to version 0.170:

- libdw: Added new DWARF5 attribute, tag, character encoding, language code,
         calling convention, defaulted member function and macro constants
         to dwarf.h.
	 New functions dwarf_default_lower_bound and dwarf_line_file.
  	 dwarf_peel_type now handles DWARF5 immutable, packed and shared tags.
  	 dwarf_getmacros now handles DWARF5 .debug_macro sections.
- strip: Add -R, --remove-section=SECTION and --keep-section=SECTION.
- backends: The bpf disassembler is now always build on all platforms.

Update to version 0.169:

- backends: Add support for EM_PPC64 GNU_ATTRIBUTES.
            Frame pointer unwinding fallback support for i386, x86_64, aarch64.
- translations: Update Polish translation.
  - CVE-2017-7611: elfutils: DoS (heap-based buffer over-read and application crash) via a crafted ELF file (bsc#1033088)
  - CVE-2017-7610: elflint: heap-based buffer overflow in check_group (bsc#1033087)
  - CVE-2017-7609: memory allocation failure in __libelf_decompress (bsc#1033086)
  - CVE-2017-7607: heap-based buffer overflow in handle_gnu_hashi (readelf.c) (bsc#1033084)
  - CVE-2017-7608: heap-based buffer overflow in ebl_object_note_type_name (eblobjnotetypename.c) (bsc#1033085)
  - CVE-2017-7613: elfutils: denial of service (memory consumption) via a crafted ELF file (bsc#1033090)
  - CVE-2017-7612: elfutils: denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (bsc#1033089)
- Don't make elfutils recommend elfutils-lang as elfutils-lang
  already supplements elfutils.

dwarves is shipped new in version 1.22 to provide tooling for use by the Linux Kernel BTF verification framework.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-01"/>
	<updated date="2022-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033086">SUSE bug 1033086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104264">SUSE bug 1104264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107066">SUSE bug 1107066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7148/">CVE-2019-7148</cve>
	<cve impact="low" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698532" comment="dwarves-1.22-150300.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698533" comment="elfutils-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698534" comment="elfutils-lang-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698535" comment="libasm-devel-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698536" comment="libasm1-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699893" comment="libasm1-32bit-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698537" comment="libdw-devel-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698538" comment="libdw1-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698539" comment="libdw1-32bit-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698540" comment="libdwarves-devel-1.22-150300.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698541" comment="libdwarves-devel-32bit-1.22-150300.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698542" comment="libdwarves1-1.22-150300.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698543" comment="libdwarves1-32bit-1.22-150300.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698544" comment="libebl-devel-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698545" comment="libebl-plugins-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698546" comment="libebl-plugins-32bit-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698547" comment="libelf-devel-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699894" comment="libelf-devel-32bit-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698548" comment="libelf1-0.177-150300.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698549" comment="libelf1-32bit-0.177-150300.11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52802" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199653" ref_url="https://bugzilla.suse.com/1199653" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30067" ref_url="https://www.suse.com/security/cve/CVE-2022-30067/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011735.html" source="SUSE-SU"/>
		<description>
This update for gimp fixes the following issues:

- CVE-2022-30067: Fixed uncontrolled memory consumption via crafted XCF file (bsc#1199653).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-01"/>
	<updated date="2022-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199653">SUSE bug 1199653</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30067/">CVE-2022-30067</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695429" comment="gimp-plugins-python-2.10.12-150200.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52803" version="1" class="patch">
	<metadata>
		<title>Security update for mokutil (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:2638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011752.html" source="SUSE-SU"/>
		<description>
This update for mokutil fixes the following issues:

- Adds SBAT revocation support to mokutil. (bsc#1198458)

New options added (see manpage):

- mokutil --sbat

  List all entries in SBAT.

- mokutil --set-sbat-policy  (latest | previous | delete)
  To set the SBAT acceptance policy.

- mokutil --list-sbat-revocations

  To list the current SBAT revocations.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009695445" comment="mokutil-0.4.0-150200.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52804" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186918" ref_url="https://bugzilla.suse.com/1186918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34557" ref_url="https://www.suse.com/security/cve/CVE-2021-34557/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011753.html" source="SUSE-SU"/>
		<description>
This update for xscreensaver fixes the following issues:

- CVE-2021-34557: Fixed potential crash and unlock while disconnecting video output with more than 10 monitors (bsc#1186918)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186918">SUSE bug 1186918</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34557/">CVE-2021-34557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698508" comment="xscreensaver-5.44-150000.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698509" comment="xscreensaver-data-5.44-150000.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699824" comment="xscreensaver-data-extra-5.44-150000.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698510" comment="xscreensaver-lang-5.44-150000.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52805" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201174" ref_url="https://bugzilla.suse.com/1201174" source="BUGZILLA"/>
		<reference ref_id="1201175" ref_url="https://bugzilla.suse.com/1201175" source="BUGZILLA"/>
		<reference ref_id="1201176" ref_url="https://bugzilla.suse.com/1201176" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056/" source="CVE"/>
		<reference ref_id="CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057/" source="CVE"/>
		<reference ref_id="CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011757.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-2056: Fixed a division by zero denial of service (bsc#1201176).
- CVE-2022-2057: Fixed a division by zero denial of service (bsc#1201175).
- CVE-2022-2058: Fixed a division by zero denial of service (bsc#1201174).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1201174">SUSE bug 1201174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201175">SUSE bug 1201175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201176">SUSE bug 1201176</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698522" comment="libtiff-devel-4.0.9-150000.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699882" comment="libtiff-devel-32bit-4.0.9-150000.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698523" comment="libtiff5-4.0.9-150000.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698557" comment="libtiff5-32bit-4.0.9-150000.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698627" comment="tiff-4.0.9-150000.45.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52806" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1164384" ref_url="https://bugzilla.suse.com/1164384" source="BUGZILLA"/>
		<reference ref_id="1199235" ref_url="https://bugzilla.suse.com/1199235" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20454" ref_url="https://www.suse.com/security/cve/CVE-2019-20454/" source="CVE"/>
		<reference ref_id="CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011755.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

- CVE-2019-20454: Fixed out-of-bounds read in JIT mode when \X is used in non-UTF mode (bsc#1164384).
- CVE-2022-1587: Fixed out-of-bounds read due to bug in recursions (bsc#1199235).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164384">SUSE bug 1164384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199235">SUSE bug 1199235</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20454/">CVE-2019-20454</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701251" comment="libpcre2-16-0-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701335" comment="libpcre2-16-0-32bit-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701252" comment="libpcre2-32-0-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701336" comment="libpcre2-32-0-32bit-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701253" comment="libpcre2-8-0-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701337" comment="libpcre2-8-0-32bit-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701254" comment="libpcre2-posix2-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701338" comment="libpcre2-posix2-32bit-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701255" comment="pcre2-devel-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701339" comment="pcre2-devel-static-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701340" comment="pcre2-doc-10.31-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701341" comment="pcre2-tools-10.31-150000.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52807" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1198670" ref_url="https://bugzilla.suse.com/1198670" source="BUGZILLA"/>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="1201643" ref_url="https://bugzilla.suse.com/1201643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 7 Fix Pack 10 [bsc#1201643]

- CVE-2022-21476 (bsc#1198671), CVE-2022-21449 (bsc#1198670),
  CVE-2022-21496 (bsc#1198673), CVE-2022-21434 (bsc#1198674),
  CVE-2022-21426 (bsc#1198672), CVE-2022-21443 (bsc#1198675),
  CVE-2021-35561 (bsc#1191912), CVE-2022-21299 (bsc#1194931).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198670">SUSE bug 1198670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701256" comment="java-1_8_0-ibm-1.8.0_sr7.10-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701342" comment="java-1_8_0-ibm-32bit-1.8.0_sr7.10-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701257" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.10-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701343" comment="java-1_8_0-ibm-demo-1.8.0_sr7.10-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701258" comment="java-1_8_0-ibm-devel-1.8.0_sr7.10-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701344" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr7.10-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701259" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.10-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701345" comment="java-1_8_0-ibm-src-1.8.0_sr7.10-150000.3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52808" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201214" ref_url="https://bugzilla.suse.com/1201214" source="BUGZILLA"/>
		<reference ref_id="1201745" ref_url="https://bugzilla.suse.com/1201745" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33967" ref_url="https://www.suse.com/security/cve/CVE-2022-33967/" source="CVE"/>
		<reference ref_id="CVE-2022-34835" ref_url="https://www.suse.com/security/cve/CVE-2022-34835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011764.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

- CVE-2022-33967: Fixed heap overflow in squashfs filesystem implementation (bsc#1201745).
- CVE-2022-34835: Fixed stack buffer overflow vulnerability in i2c md command (bsc#1201214).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201214">SUSE bug 1201214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201745">SUSE bug 1201745</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-33967/">CVE-2022-33967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34835/">CVE-2022-34835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702201" comment="u-boot-avnetultra96rev1-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702202" comment="u-boot-avnetultra96rev1-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702203" comment="u-boot-bananapim64-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702204" comment="u-boot-bananapim64-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702205" comment="u-boot-dragonboard410c-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702206" comment="u-boot-dragonboard410c-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702207" comment="u-boot-dragonboard820c-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702208" comment="u-boot-dragonboard820c-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702209" comment="u-boot-evb-rk3399-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702210" comment="u-boot-evb-rk3399-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702211" comment="u-boot-firefly-rk3399-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702212" comment="u-boot-firefly-rk3399-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702213" comment="u-boot-geekbox-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702214" comment="u-boot-geekbox-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702215" comment="u-boot-hikey-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702216" comment="u-boot-hikey-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702217" comment="u-boot-khadas-vim-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702218" comment="u-boot-khadas-vim-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702219" comment="u-boot-khadas-vim2-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702220" comment="u-boot-khadas-vim2-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702221" comment="u-boot-libretech-ac-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702222" comment="u-boot-libretech-ac-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702223" comment="u-boot-libretech-cc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702224" comment="u-boot-libretech-cc-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702225" comment="u-boot-ls1012afrdmqspi-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702226" comment="u-boot-ls1012afrdmqspi-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702227" comment="u-boot-mvebudb-88f3720-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702228" comment="u-boot-mvebudb-88f3720-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702229" comment="u-boot-mvebudbarmada8k-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702230" comment="u-boot-mvebudbarmada8k-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702231" comment="u-boot-mvebuespressobin-88f3720-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702232" comment="u-boot-mvebuespressobin-88f3720-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702233" comment="u-boot-mvebumcbin-88f8040-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702234" comment="u-boot-mvebumcbin-88f8040-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702235" comment="u-boot-nanopia64-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702236" comment="u-boot-nanopia64-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702237" comment="u-boot-odroid-c2-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702238" comment="u-boot-odroid-c2-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702239" comment="u-boot-odroid-c4-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702240" comment="u-boot-odroid-c4-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702241" comment="u-boot-odroid-n2-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702242" comment="u-boot-odroid-n2-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702243" comment="u-boot-orangepipc2-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702244" comment="u-boot-orangepipc2-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702245" comment="u-boot-p2371-2180-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702246" comment="u-boot-p2371-2180-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702247" comment="u-boot-p2771-0000-500-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702248" comment="u-boot-p2771-0000-500-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702249" comment="u-boot-p3450-0000-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702250" comment="u-boot-p3450-0000-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702251" comment="u-boot-pine64plus-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702252" comment="u-boot-pine64plus-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702253" comment="u-boot-pinebook-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702254" comment="u-boot-pinebook-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702255" comment="u-boot-pinebook-pro-rk3399-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702256" comment="u-boot-pinebook-pro-rk3399-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702257" comment="u-boot-pineh64-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702258" comment="u-boot-pineh64-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702259" comment="u-boot-pinephone-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702260" comment="u-boot-pinephone-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702261" comment="u-boot-poplar-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702262" comment="u-boot-poplar-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702263" comment="u-boot-rock-pi-4-rk3399-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702264" comment="u-boot-rock-pi-4-rk3399-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702265" comment="u-boot-rock64-rk3328-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702266" comment="u-boot-rock64-rk3328-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702267" comment="u-boot-rock960-rk3399-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702268" comment="u-boot-rock960-rk3399-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702269" comment="u-boot-rockpro64-rk3399-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702270" comment="u-boot-rockpro64-rk3399-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702271" comment="u-boot-rpi3-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702272" comment="u-boot-rpi3-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702273" comment="u-boot-rpi4-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702274" comment="u-boot-rpi4-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702141" comment="u-boot-rpiarm64-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702142" comment="u-boot-rpiarm64-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702143" comment="u-boot-tools-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702275" comment="u-boot-xilinxzynqmpvirt-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702276" comment="u-boot-xilinxzynqmpvirt-doc-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702277" comment="u-boot-xilinxzynqmpzcu102rev10-2021.01-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702278" comment="u-boot-xilinxzynqmpzcu102rev10-doc-2021.01-150300.7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52809" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201214" ref_url="https://bugzilla.suse.com/1201214" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-34835" ref_url="https://www.suse.com/security/cve/CVE-2022-34835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011763.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

- CVE-2022-34835: Fixed stack buffer overflow vulnerability in i2c md command (bsc#1201214).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-03"/>
	<updated date="2022-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201214">SUSE bug 1201214</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34835/">CVE-2022-34835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702279" comment="u-boot-xilinxzynqmpgeneric-2020.01-150200.10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702280" comment="u-boot-xilinxzynqmpgeneric-doc-2020.01-150200.10.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52810" version="1" class="patch">
	<metadata>
		<title>Security update for harfbuzz (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200900" ref_url="https://bugzilla.suse.com/1200900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011800.html" source="SUSE-SU"/>
		<description>
This update for harfbuzz fixes the following issues:

- CVE-2022-33068: Fixed a integer overflow in hb-ot-shape-fallback.cc (bsc#1200900).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200900">SUSE bug 1200900</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702134" comment="harfbuzz-devel-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702197" comment="harfbuzz-tools-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702135" comment="libharfbuzz-gobject0-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702198" comment="libharfbuzz-gobject0-32bit-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702136" comment="libharfbuzz-icu0-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702199" comment="libharfbuzz-icu0-32bit-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702137" comment="libharfbuzz-subset0-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702200" comment="libharfbuzz-subset0-32bit-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702138" comment="libharfbuzz0-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702139" comment="libharfbuzz0-32bit-2.6.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702140" comment="typelib-1_0-HarfBuzz-0_0-2.6.4-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52811" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188514" ref_url="https://bugzilla.suse.com/1188514" source="BUGZILLA"/>
		<reference ref_id="1201830" ref_url="https://bugzilla.suse.com/1201830" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36978" ref_url="https://www.suse.com/security/cve/CVE-2021-36978/" source="CVE"/>
		<reference ref_id="CVE-2022-34503" ref_url="https://www.suse.com/security/cve/CVE-2022-34503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011797.html" source="SUSE-SU"/>
		<description>
This update for qpdf fixes the following issues:

- CVE-2022-34503: Fixed a heap buffer overflow via the function QPDF:processXRefStream (bsc#1201830).
- CVE-2021-36978: Fixed heap-based buffer overflow in Pl_ASCII85Decoder::write (bsc#1188514).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188514">SUSE bug 1188514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201830">SUSE bug 1201830</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36978/">CVE-2021-36978</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34503/">CVE-2022-34503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702972" comment="libqpdf21-8.0.2-150000.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52812" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1201434" ref_url="https://bugzilla.suse.com/1201434" source="BUGZILLA"/>
		<reference ref_id="1201436" ref_url="https://bugzilla.suse.com/1201436" source="BUGZILLA"/>
		<reference ref_id="1201437" ref_url="https://bugzilla.suse.com/1201437" source="BUGZILLA"/>
		<reference ref_id="1201440" ref_url="https://bugzilla.suse.com/1201440" source="BUGZILLA"/>
		<reference ref_id="1201443" ref_url="https://bugzilla.suse.com/1201443" source="BUGZILLA"/>
		<reference ref_id="1201444" ref_url="https://bugzilla.suse.com/1201444" source="BUGZILLA"/>
		<reference ref_id="1201445" ref_url="https://bugzilla.suse.com/1201445" source="BUGZILLA"/>
		<reference ref_id="1201447" ref_url="https://bugzilla.suse.com/1201447" source="BUGZILLA"/>
		<reference ref_id="1201448" ref_url="https://bugzilla.suse.com/1201448" source="BUGZILLA"/>
		<reference ref_id="1202035" ref_url="https://bugzilla.suse.com/1202035" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to go version 1.17.13 (bsc#1190649):

- CVE-2022-32189: encoding/gob, math/big: decoding big.Float and big.Rat can panic (bsc#1202035).
- CVE-2022-30635: encoding/gob: stack exhaustion in Decoder.Decode (bsc#1201444).
- CVE-2022-30631: compress/gzip: stack exhaustion in Reader.Read (bsc#1201437).
- CVE-2022-1962: go/parser: stack exhaustion in all Parse* functions (bsc#1201448).
- CVE-2022-28131: encoding/xml: stack exhaustion in Decoder.Skip (bsc#1201443).
- CVE-2022-1705: net/http: improper sanitization of Transfer-Encoding header (bsc#1201434)
- CVE-2022-30630: io/fs: stack exhaustion in Glob (bsc#1201447).
- CVE-2022-32148: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (bsc#1201436)
- CVE-2022-30632: path/filepath: stack exhaustion in Glob (bsc#1201445).
- CVE-2022-30633: encoding/xml: stack exhaustion in Unmarshal (bsc#1201440).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201434">SUSE bug 1201434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201436">SUSE bug 1201436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201437">SUSE bug 1201437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201440">SUSE bug 1201440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201443">SUSE bug 1201443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201444">SUSE bug 1201444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201445">SUSE bug 1201445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201447">SUSE bug 1201447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201448">SUSE bug 1201448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202035">SUSE bug 1202035</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703646" comment="go1.17-1.17.13-150000.1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703647" comment="go1.17-doc-1.17.13-150000.1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703527" comment="go1.17-race-1.17.13-150000.1.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52813" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1201434" ref_url="https://bugzilla.suse.com/1201434" source="BUGZILLA"/>
		<reference ref_id="1201436" ref_url="https://bugzilla.suse.com/1201436" source="BUGZILLA"/>
		<reference ref_id="1201437" ref_url="https://bugzilla.suse.com/1201437" source="BUGZILLA"/>
		<reference ref_id="1201440" ref_url="https://bugzilla.suse.com/1201440" source="BUGZILLA"/>
		<reference ref_id="1201443" ref_url="https://bugzilla.suse.com/1201443" source="BUGZILLA"/>
		<reference ref_id="1201444" ref_url="https://bugzilla.suse.com/1201444" source="BUGZILLA"/>
		<reference ref_id="1201445" ref_url="https://bugzilla.suse.com/1201445" source="BUGZILLA"/>
		<reference ref_id="1201447" ref_url="https://bugzilla.suse.com/1201447" source="BUGZILLA"/>
		<reference ref_id="1201448" ref_url="https://bugzilla.suse.com/1201448" source="BUGZILLA"/>
		<reference ref_id="1202035" ref_url="https://bugzilla.suse.com/1202035" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

Update to go version 1.18.5 (bsc#1193742):

- CVE-2022-32189: encoding/gob, math/big: decoding big.Float and big.Rat can panic (bsc#1202035).
- CVE-2022-1705: net/http: improper sanitization of Transfer-Encoding header (bsc#1201434)
- CVE-2022-32148: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (bsc#1201436)
- CVE-2022-30631: compress/gzip: stack exhaustion in Reader.Read (bsc#1201437).
- CVE-2022-30633: encoding/xml: stack exhaustion in Unmarshal (bsc#1201440).
- CVE-2022-28131: encoding/xml: stack exhaustion in Decoder.Skip (bsc#1201443).
- CVE-2022-30635: encoding/gob: stack exhaustion in Decoder.Decode (bsc#1201444).
- CVE-2022-30632: path/filepath: stack exhaustion in Glob (bsc#1201445).
- CVE-2022-30630: io/fs: stack exhaustion in Glob (bsc#1201447).
- CVE-2022-1962: go/parser: stack exhaustion in all Parse* functions (bsc#1201448).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201434">SUSE bug 1201434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201436">SUSE bug 1201436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201437">SUSE bug 1201437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201440">SUSE bug 1201440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201443">SUSE bug 1201443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201444">SUSE bug 1201444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201445">SUSE bug 1201445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201447">SUSE bug 1201447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201448">SUSE bug 1201448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202035">SUSE bug 1202035</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703528" comment="go1.18-1.18.5-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703529" comment="go1.18-doc-1.18.5-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703530" comment="go1.18-race-1.18.5-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52814" version="1" class="patch">
	<metadata>
		<title>Security update for python-ujson (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201254" ref_url="https://bugzilla.suse.com/1201254" source="BUGZILLA"/>
		<reference ref_id="1201255" ref_url="https://bugzilla.suse.com/1201255" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31116" ref_url="https://www.suse.com/security/cve/CVE-2022-31116/" source="CVE"/>
		<reference ref_id="CVE-2022-31117" ref_url="https://www.suse.com/security/cve/CVE-2022-31117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011803.html" source="SUSE-SU"/>
		<description>
This update for python-ujson fixes the following issues:

- CVE-2022-31116: Fixed improper decoding of escaped surrogate characters (bsc#1201255).
- CVE-2022-31117: Fixed a double free while reallocating a buffer for string decoding (bsc#1201254).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-04"/>
	<updated date="2022-08-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201254">SUSE bug 1201254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201255">SUSE bug 1201255</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31116/">CVE-2022-31116</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31117/">CVE-2022-31117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702703" comment="python2-ujson-1.35-150100.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702702" comment="python3-ujson-1.35-150100.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52815" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201716" ref_url="https://bugzilla.suse.com/1201716" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2476" ref_url="https://www.suse.com/security/cve/CVE-2022-2476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011810.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2022-2476: Fixed a Null pointer dereference in wvunpack (bsc#1201716).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-05"/>
	<updated date="2022-08-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1201716">SUSE bug 1201716</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2476/">CVE-2022-2476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701400" comment="libwavpack1-5.4.0-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701475" comment="libwavpack1-32bit-5.4.0-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701401" comment="wavpack-5.4.0-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701402" comment="wavpack-devel-5.4.0-150000.4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52816" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

Update to upstream tag jdk-11.0.16+8 (July 2022 CPU)

- CVE-2022-21540: Improve class compilation (bsc#1201694)
- CVE-2022-21541: Enhance MethodHandle invocations (bsc#1201692)
- CVE-2022-34169: Improve Xalan supports (bsc#1201684)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-09"/>
	<updated date="2022-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701837" comment="java-11-openjdk-11.0.16.0-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701955" comment="java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701838" comment="java-11-openjdk-demo-11.0.16.0-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701839" comment="java-11-openjdk-devel-11.0.16.0-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701840" comment="java-11-openjdk-headless-11.0.16.0-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701850" comment="java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701851" comment="java-11-openjdk-jmods-11.0.16.0-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701956" comment="java-11-openjdk-src-11.0.16.0-150000.3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52817" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198627" ref_url="https://bugzilla.suse.com/1198627" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024348.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-09"/>
	<updated date="2022-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198627">SUSE bug 1198627</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701010" comment="libncurses5-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701011" comment="libncurses5-32bit-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701000" comment="libncurses6-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701001" comment="libncurses6-32bit-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701002" comment="ncurses-devel-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701009" comment="ncurses-devel-32bit-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701003" comment="ncurses-utils-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701012" comment="ncurses5-devel-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701107" comment="ncurses5-devel-32bit-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701004" comment="tack-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701005" comment="terminfo-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701006" comment="terminfo-base-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701007" comment="terminfo-iterm-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701008" comment="terminfo-screen-6.1-150000.5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52818" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1198829" ref_url="https://bugzilla.suse.com/1198829" source="BUGZILLA"/>
		<reference ref_id="1199364" ref_url="https://bugzilla.suse.com/1199364" source="BUGZILLA"/>
		<reference ref_id="1199647" ref_url="https://bugzilla.suse.com/1199647" source="BUGZILLA"/>
		<reference ref_id="1199665" ref_url="https://bugzilla.suse.com/1199665" source="BUGZILLA"/>
		<reference ref_id="1199670" ref_url="https://bugzilla.suse.com/1199670" source="BUGZILLA"/>
		<reference ref_id="1200521" ref_url="https://bugzilla.suse.com/1200521" source="BUGZILLA"/>
		<reference ref_id="1200598" ref_url="https://bugzilla.suse.com/1200598" source="BUGZILLA"/>
		<reference ref_id="1200644" ref_url="https://bugzilla.suse.com/1200644" source="BUGZILLA"/>
		<reference ref_id="1200651" ref_url="https://bugzilla.suse.com/1200651" source="BUGZILLA"/>
		<reference ref_id="1200762" ref_url="https://bugzilla.suse.com/1200762" source="BUGZILLA"/>
		<reference ref_id="1200910" ref_url="https://bugzilla.suse.com/1200910" source="BUGZILLA"/>
		<reference ref_id="1201196" ref_url="https://bugzilla.suse.com/1201196" source="BUGZILLA"/>
		<reference ref_id="1201206" ref_url="https://bugzilla.suse.com/1201206" source="BUGZILLA"/>
		<reference ref_id="1201251" ref_url="https://bugzilla.suse.com/1201251" source="BUGZILLA"/>
		<reference ref_id="1201381" ref_url="https://bugzilla.suse.com/1201381" source="BUGZILLA"/>
		<reference ref_id="1201429" ref_url="https://bugzilla.suse.com/1201429" source="BUGZILLA"/>
		<reference ref_id="1201458" ref_url="https://bugzilla.suse.com/1201458" source="BUGZILLA"/>
		<reference ref_id="1201635" ref_url="https://bugzilla.suse.com/1201635" source="BUGZILLA"/>
		<reference ref_id="1201636" ref_url="https://bugzilla.suse.com/1201636" source="BUGZILLA"/>
		<reference ref_id="1201644" ref_url="https://bugzilla.suse.com/1201644" source="BUGZILLA"/>
		<reference ref_id="1201664" ref_url="https://bugzilla.suse.com/1201664" source="BUGZILLA"/>
		<reference ref_id="1201672" ref_url="https://bugzilla.suse.com/1201672" source="BUGZILLA"/>
		<reference ref_id="1201673" ref_url="https://bugzilla.suse.com/1201673" source="BUGZILLA"/>
		<reference ref_id="1201676" ref_url="https://bugzilla.suse.com/1201676" source="BUGZILLA"/>
		<reference ref_id="1201846" ref_url="https://bugzilla.suse.com/1201846" source="BUGZILLA"/>
		<reference ref_id="1201930" ref_url="https://bugzilla.suse.com/1201930" source="BUGZILLA"/>
		<reference ref_id="1201940" ref_url="https://bugzilla.suse.com/1201940" source="BUGZILLA"/>
		<reference ref_id="1201954" ref_url="https://bugzilla.suse.com/1201954" source="BUGZILLA"/>
		<reference ref_id="1201956" ref_url="https://bugzilla.suse.com/1201956" source="BUGZILLA"/>
		<reference ref_id="1201958" ref_url="https://bugzilla.suse.com/1201958" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557/" source="CVE"/>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656/" source="CVE"/>
		<reference ref_id="CVE-2022-1116" ref_url="https://www.suse.com/security/cve/CVE-2022-1116/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166/" source="CVE"/>
		<reference ref_id="CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365/" source="CVE"/>
		<reference ref_id="CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581/" source="CVE"/>
		<reference ref_id="CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250/" source="CVE"/>
		<reference ref_id="CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740/" source="CVE"/>
		<reference ref_id="CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741/" source="CVE"/>
		<reference ref_id="CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-36946: Fixed an incorrect packet trucation operation which could lead to denial of service (bnc#1201940).
- CVE-2022-29581: Fixed improper update of reference count in net/sched that could cause root privilege escalation (bnc#1199665).
- CVE-2022-20166: Fixed several possible memory safety issues due to unsafe operations (bsc#1200598).
- CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of TTYs that could lead to a use-after-free (bnc#1201429).
- CVE-2021-33655: Fixed an out of bounds write by ioctl cmd FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-33656: Fixed an out of bounds write related to ioctl cmd PIO_FONT (bnc#1201636).
- CVE-2022-21505: Fixed a kernel lockdown bypass via IMA policy (bsc#1201458).
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TTY subsystem (bnc#1198829).
- CVE-2022-1116: Fixed an integer overflow vulnerability in io_uring which allowed a local attacker to escalate privileges to root (bnc#1199647).- CVE-2022-2318: Fixed a use-after-free vulnerability in the timer handler in Rose subsystem that allowed unprivileged attackers to crash the system (bsc#1201251).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).

The following non-security bugs were fixed:

- Fixed a system crash related to the recent RETBLEED mitigation (bsc#1201644, bsc#1201664, bsc#1201672, bsc#1201673, bsc#1201676).
- qla2xxx: drop patch which prevented nvme port discovery (bsc#1200651 bsc#1200644 bsc#1201954 bsc#1201958).
- kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
- bpf, cpumap: Remove rcpu pointer from cpu_map_build_skb signature (bsc#1199364).
- bpf: enable BPF type format (BTF) (jsc#SLE-24559).
- nfs: avoid NULL pointer dereference when there is unflushed data (bsc#1201196).
- hv_netvsc: Add (more) validation for untrusted Hyper-V values (bsc#1199364).
- hv_netvsc: Add comment of netvsc_xdp_xmit() (bsc#1199364).
- hv_netvsc: Add support for XDP_REDIRECT (bsc#1199364).
- hv_netvsc: Copy packets sent by Hyper-V out of the receive buffer (bsc#1199364).
- hv_netvsc: Fix validation in netvsc_linkstatus_callback() (bsc#1199364).
- kvm/emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
- lkdtm: Disable return thunks in rodata.c (bsc#1178134).
- net, xdp: Introduce __xdp_build_skb_from_frame utility routine (bsc#1199364).
- net, xdp: Introduce xdp_build_skb_from_frame utility routine (bsc#1199364).
- nvme: consider also host_iface when checking ip options (bsc#1199670).
- powerpc/mobility: wait for memory transfer to complete (bsc#1201846 ltc#198761).
- powerpc/pseries/mobility: set NMI watchdog factor during an LPM (bsc#1201846 ltc#198761).
- powerpc/watchdog: introduce a NMI watchdog's factor (bsc#1201846 ltc#198761).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956 bsc#1200521).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).
- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).
- scsi: qla2xxx: Fix imbalance vha-&gt;vref_count (bsc#1201958).
- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).
- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).
- scsi: qla2xxx: Update manufacturer details (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).
- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).
- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).
- watchdog: export lockup_detector_reconfigure (bsc#1201846 ltc#198761).
- x86/bugs: Remove apostrophe typo (bsc#1178134).
- x86/entry: Remove skip_r11rcx (bsc#1201644).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1178134).
- xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue (bsc#1201381).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2022-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199364">SUSE bug 1199364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199647">SUSE bug 1199647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199665">SUSE bug 1199665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199670">SUSE bug 1199670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200521">SUSE bug 1200521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200598">SUSE bug 1200598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200644">SUSE bug 1200644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200651">SUSE bug 1200651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201196">SUSE bug 1201196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201206">SUSE bug 1201206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201251">SUSE bug 1201251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201381">SUSE bug 1201381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201429">SUSE bug 1201429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201458">SUSE bug 1201458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201636">SUSE bug 1201636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201644">SUSE bug 1201644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201664">SUSE bug 1201664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201672">SUSE bug 1201672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201673">SUSE bug 1201673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201676">SUSE bug 1201676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201846">SUSE bug 1201846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201930">SUSE bug 1201930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201954">SUSE bug 1201954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201956">SUSE bug 1201956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201958">SUSE bug 1201958</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1116/">CVE-2022-1116</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705805" comment="cluster-md-kmp-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705806" comment="dlm-kmp-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705807" comment="gfs2-kmp-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705633" comment="kernel-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705634" comment="kernel-azure-devel-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705808" comment="kernel-azure-extra-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705809" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705810" comment="kernel-azure-optional-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705635" comment="kernel-devel-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705636" comment="kernel-source-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705637" comment="kernel-syms-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705811" comment="kselftests-kmp-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705812" comment="ocfs2-kmp-azure-5.3.18-150300.38.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705813" comment="reiserfs-kmp-azure-5.3.18-150300.38.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52819" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011886.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 91.12
  * changed: Support for Google Talk chat accounts removed
  * fixed: OpenPGP signatures were broken when 'Primary Password'
    dialog remained open
  * fixed: Various security fixes

- Security fixes (MFSA 2022-31) (bsc#1201758):
  - CVE-2022-36319: Fixed mouse Position spoofing with CSS transforms (bmo#1737722)
  - CVE-2022-36318: Fixed directory indexes for bundled resources reflected URL parameters (bmo#1771774)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2022-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703652" comment="MozillaThunderbird-91.12.0-150200.8.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703653" comment="MozillaThunderbird-translations-common-91.12.0-150200.8.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703654" comment="MozillaThunderbird-translations-other-91.12.0-150200.8.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52820" version="1" class="patch">
	<metadata>
		<title>Security update for python-codecov (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201494" ref_url="https://bugzilla.suse.com/1201494" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10800" ref_url="https://www.suse.com/security/cve/CVE-2019-10800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011881.html" source="SUSE-SU"/>
		<description>
This update for python-codecov fixes the following issues:

- CVE-2019-10800: Fixed sanitization of gcov arguments before being being provided to the popen method (bsc#1201494).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2022-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201494">SUSE bug 1201494</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10800/">CVE-2019-10800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699895" comment="python2-codecov-2.0.15-150100.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699896" comment="python3-codecov-2.0.15-150100.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52821" version="1" class="patch">
	<metadata>
		<title>Security update for libnbd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195636" ref_url="https://bugzilla.suse.com/1195636" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0485" ref_url="https://www.suse.com/security/cve/CVE-2022-0485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011883.html" source="SUSE-SU"/>
		<description>
This update for libnbd fixes the following issues:

- CVE-2022-0485: Fixed a missing error handling that may create corrupted destination image (bsc#1195636).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2022-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195636">SUSE bug 1195636</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0485/">CVE-2022-0485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701957" comment="libnbd-1.12.4-150300.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701958" comment="libnbd-bash-completion-1.12.4-150300.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701959" comment="libnbd-devel-1.12.4-150300.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701960" comment="libnbd0-1.12.4-150300.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701961" comment="nbdfuse-1.12.4-150300.8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52822" version="1" class="patch">
	<metadata>
		<title>Test update for SUSE:SLE-15-SP2:Update (security) (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194507" ref_url="https://bugzilla.suse.com/1194507" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCAASO7BUECWSWSJG3BJNIXSTKXZ4UYT/" source="SUSE-SU"/>
		<description>
This is a security test update for SUSE:SLE-15-SP2:Update		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194507">SUSE bug 1194507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664857" comment="update-test-security-5.1-33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52823" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198976" ref_url="https://bugzilla.suse.com/1198976" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29869" ref_url="https://www.suse.com/security/cve/CVE-2022-29869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011910.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-29869: Fixed verbose messages on option parsing causing information leak (bsc#1198976).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-12"/>
	<updated date="2022-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198976">SUSE bug 1198976</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29869/">CVE-2022-29869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698511" comment="cifs-utils-6.9-150100.5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698512" comment="cifs-utils-devel-6.9-150100.5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699825" comment="pam_cifscreds-6.9-150100.5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52824" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201980" ref_url="https://bugzilla.suse.com/1201980" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32792" ref_url="https://www.suse.com/security/cve/CVE-2022-32792/" source="CVE"/>
		<reference ref_id="CVE-2022-32816" ref_url="https://www.suse.com/security/cve/CVE-2022-32816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011922.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.36.5 (bsc#1201980):
  - Add support for PAC proxy in the WebDriver implementation.
  - Fix video playback when loaded through custom URIs, this fixes
    video playback in the Yelp documentation browser.
  - Fix WebKitWebView::context-menu when using GTK4.
  - Fix LTO builds with GCC.
  - Fix several crashes and rendering issues.
  
- Security fixes:
  - CVE-2022-32792: Fixed processing maliciously crafted web content may lead to
    arbitrary code execution.
  - CVE-2022-32816: Fixed visiting a website that frames malicious content may lead to
    UI spoofing.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201980">SUSE bug 1201980</bugzilla>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32792/">CVE-2022-32792</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32816/">CVE-2022-32816</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009703517" comment="libjavascriptcoregtk-4_0-18-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703648" comment="libjavascriptcoregtk-4_0-18-32bit-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703518" comment="libwebkit2gtk-4_0-37-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703649" comment="libwebkit2gtk-4_0-37-32bit-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703519" comment="libwebkit2gtk3-lang-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703521" comment="typelib-1_0-JavaScriptCore-4_0-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703522" comment="typelib-1_0-WebKit2-4_0-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703523" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703650" comment="webkit-jsc-4-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703520" comment="webkit2gtk-4_0-injected-bundles-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703524" comment="webkit2gtk3-devel-2.36.5-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703651" comment="webkit2gtk3-minibrowser-2.36.5-150200.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52825" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1166458" ref_url="https://bugzilla.suse.com/1166458" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10109" ref_url="https://www.suse.com/security/cve/CVE-2020-10109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011921.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2020-10109: Fixed an HTTP request smuggling issue (bsc#1166458).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166458">SUSE bug 1166458</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10109/">CVE-2020-10109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704489" comment="python-Twisted-doc-19.10.0-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704490" comment="python2-Twisted-19.10.0-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704356" comment="python3-Twisted-19.10.0-150200.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52826" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1195926" ref_url="https://bugzilla.suse.com/1195926" source="BUGZILLA"/>
		<reference ref_id="1198484" ref_url="https://bugzilla.suse.com/1198484" source="BUGZILLA"/>
		<reference ref_id="1198829" ref_url="https://bugzilla.suse.com/1198829" source="BUGZILLA"/>
		<reference ref_id="1200442" ref_url="https://bugzilla.suse.com/1200442" source="BUGZILLA"/>
		<reference ref_id="1200598" ref_url="https://bugzilla.suse.com/1200598" source="BUGZILLA"/>
		<reference ref_id="1200910" ref_url="https://bugzilla.suse.com/1200910" source="BUGZILLA"/>
		<reference ref_id="1201429" ref_url="https://bugzilla.suse.com/1201429" source="BUGZILLA"/>
		<reference ref_id="1201635" ref_url="https://bugzilla.suse.com/1201635" source="BUGZILLA"/>
		<reference ref_id="1201636" ref_url="https://bugzilla.suse.com/1201636" source="BUGZILLA"/>
		<reference ref_id="1201644" ref_url="https://bugzilla.suse.com/1201644" source="BUGZILLA"/>
		<reference ref_id="1201926" ref_url="https://bugzilla.suse.com/1201926" source="BUGZILLA"/>
		<reference ref_id="1201930" ref_url="https://bugzilla.suse.com/1201930" source="BUGZILLA"/>
		<reference ref_id="1201940" ref_url="https://bugzilla.suse.com/1201940" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557/" source="CVE"/>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-36557: Fixed race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could lead to a use-after-free (bnc#1201429).
- CVE-2020-36558: Fixed race condition involving VT_RESIZEX that could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT (bnc#1201636).
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).
- CVE-2022-20166: Fixed possible out of bounds write due to sprintf unsafety that could cause local escalation of privilege (bnc#1200598).
- CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940).

The following non-security bugs were fixed:

- cifs: On cifs_reconnect, resolve the hostname again (bsc#1201926).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1201926).
- cifs: To match file servers, make sure the server hostname matches (bsc#1201926).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1201926).
- cifs: set a minimum of 120s for next dns resolution (bsc#1201926).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1201926).
- kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
- kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
- rpm/*.spec.in: remove backtick usage
- rpm/constraints.in: skip SLOW_DISK workers for kernel-source
- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)
- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)
- rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926, bsc#1198484)
- x86/entry: Remove skip_r11rcx (bsc#1201644).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-16"/>
	<updated date="2022-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195926">SUSE bug 1195926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198484">SUSE bug 1198484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200442">SUSE bug 1200442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200598">SUSE bug 1200598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201429">SUSE bug 1201429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201636">SUSE bug 1201636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201644">SUSE bug 1201644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201926">SUSE bug 1201926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201930">SUSE bug 1201930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704482" comment="kernel-debug-base-4.12.14-150100.197.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704433" comment="kernel-default-man-4.12.14-150100.197.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704483" comment="kernel-kvmsmall-base-4.12.14-150100.197.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704484" comment="kernel-vanilla-4.12.14-150100.197.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704485" comment="kernel-vanilla-base-4.12.14-150100.197.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704486" comment="kernel-vanilla-devel-4.12.14-150100.197.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704487" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704488" comment="kernel-zfcpdump-man-4.12.14-150100.197.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52827" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1139519" ref_url="https://bugzilla.suse.com/1139519" source="BUGZILLA"/>
		<reference ref_id="1183572" ref_url="https://bugzilla.suse.com/1183572" source="BUGZILLA"/>
		<reference ref_id="1183574" ref_url="https://bugzilla.suse.com/1183574" source="BUGZILLA"/>
		<reference ref_id="1188571" ref_url="https://bugzilla.suse.com/1188571" source="BUGZILLA"/>
		<reference ref_id="1191227" ref_url="https://bugzilla.suse.com/1191227" source="BUGZILLA"/>
		<reference ref_id="1191532" ref_url="https://bugzilla.suse.com/1191532" source="BUGZILLA"/>
		<reference ref_id="1192684" ref_url="https://bugzilla.suse.com/1192684" source="BUGZILLA"/>
		<reference ref_id="1193690" ref_url="https://bugzilla.suse.com/1193690" source="BUGZILLA"/>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="1195048" ref_url="https://bugzilla.suse.com/1195048" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="CVE-2021-20316" ref_url="https://www.suse.com/security/cve/CVE-2021-20316/" source="CVE"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-43566" ref_url="https://www.suse.com/security/cve/CVE-2021-43566/" source="CVE"/>
		<reference ref_id="CVE-2021-44141" ref_url="https://www.suse.com/security/cve/CVE-2021-44141/" source="CVE"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="CVE-2022-0336" ref_url="https://www.suse.com/security/cve/CVE-2022-0336/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
		<description>


- CVE-2021-44141: Information leak via symlinks of existance of
  files or directories outside of the exported share; (bso#14911);
  (bsc#1193690);
- CVE-2021-44142: Out-of-bounds heap read/write vulnerability
  in VFS module vfs_fruit allows code execution; (bso#14914);
  (bsc#1194859);
- CVE-2022-0336: Samba AD users with permission to write to an
  account can impersonate arbitrary services; (bso#14950);
  (bsc#1195048);

samba was updated to 4.15.4 (jsc#SLE-23329);

* Duplicate SMB file_ids leading to Windows client cache
  poisoning; (bso#14928);
* Failed to parse NTLMv2_RESPONSE length 95 - Buffer Size Error -
  NT_STATUS_BUFFER_TOO_SMALL; (bso#14932);
* kill_tcp_connections does not work; (bso#14934);
* Can't connect to Windows shares not requiring authentication
  using KDE/Gnome; (bso#14935);
* smbclient -L doesn't set 'client max protocol' to NT1 before
  calling the 'Reconnecting with SMB1 for workgroup listing'
  path; (bso#14939);
* Cross device copy of the crossrename module always fails;
  (bso#14940);
* symlinkat function from VFS cap module always fails with an
  error; (bso#14941);
* Fix possible fsp pointer deference; (bso#14942);
* Missing pop_sec_ctx() in error path inside close_directory();
  (bso#14944);
* 'smbd --build-options' no longer works without an smb.conf file;
  (bso#14945);

Samba was updated to version 4.15.3 

+ CVE-2021-43566: Symlink race error can allow directory creation
  outside of the exported share; (bsc#1139519);
+ CVE-2021-20316: Symlink race error can allow metadata read and
  modify outside of the exported share; (bsc#1191227);
- Reorganize libs packages. Split samba-libs into samba-client-libs,
  samba-libs, samba-winbind-libs and samba-ad-dc-libs, merging samba
  public libraries depending on internal samba libraries into these
  packages as there were dependency problems everytime one of these
  public libraries changed its version (bsc#1192684). The devel
  packages are merged into samba-devel.
- Rename package samba-core-devel to samba-devel
- Update the symlink create by samba-dsdb-modules to private samba
  ldb modules following libldb2 changes from /usr/lib64/ldb/samba to
  /usr/lib64/ldb2/modules/ldb/samba

krb5 was updated to 1.16.3 to 1.19.2

* Fix a denial of service attack against the KDC encrypted challenge code; (CVE-2021-36222);
* Fix a memory leak when gss_inquire_cred() is called without a credential handle.

Changes from 1.19.1:

* Fix a linking issue with Samba.
* Better support multiple pkinit_identities values by checking whether
  certificates can be loaded for each value.

Changes from 1.19

Administrator experience
  * When a client keytab is present, the GSSAPI krb5 mech will refresh
    credentials even if the current credentials were acquired manually.
  * It is now harder to accidentally delete the K/M entry from a KDB.
Developer experience
  * gss_acquire_cred_from() now supports the 'password' and 'verify'
    options, allowing credentials to be acquired via password and
    verified using a keytab key.
  * When an application accepts a GSS security context, the new
    GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor
    both provided matching channel bindings.
  * Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self requests
    to identify the desired client principal by certificate.
  * PKINIT certauth modules can now cause the hw-authent flag to be set
    in issued tickets.
  * The krb5_init_creds_step() API will now issue the same password
    expiration warnings as krb5_get_init_creds_password().
Protocol evolution
  * Added client and KDC support for Microsoft's Resource-Based Constrained
    Delegation, which allows cross-realm S4U2Proxy requests. A third-party
    database module is required for KDC support.
  * kadmin/admin is now the preferred server principal name for kadmin
    connections, and the host-based form is no longer created by default.
    The client will still try the host-based form as a fallback.
  * Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT
    extension, which causes channel bindings to be required for the
    initiator if the acceptor provided them. The client will send this
    option if the client_aware_gss_bindings profile option is set.
User experience
  * kinit will now issue a warning if the des3-cbc-sha1 encryption type is
    used in the reply. This encryption type will be deprecated and removed
    in future releases.
  * Added kvno flags --out-cache, --no-store, and --cached-only
    (inspired by Heimdal's kgetcred).

Changes from 1.18.3
* Fix a denial of service vulnerability when decoding Kerberos
  protocol messages.
* Fix a locking issue with the LMDB KDB module which could cause
  KDC and kadmind processes to lose access to the database.
* Fix an assertion failure when libgssapi_krb5 is repeatedly loaded
  and unloaded while libkrb5support remains loaded.

Changes from 1.18.2
* Fix a SPNEGO regression where an acceptor using the default credential
  would improperly filter mechanisms, causing a negotiation failure.
* Fix a bug where the KDC would fail to issue tickets if the local krbtgt
  principal's first key has a single-DES enctype.
* Add stub functions to allow old versions of OpenSSL libcrypto to link
  against libkrb5.
* Fix a NegoEx bug where the client name and delegated credential might
  not be reported.

Changes from 1.18.1
* Fix a crash when qualifying short hostnames when the system has
  no primary DNS domain.
* Fix a regression when an application imports 'service@' as a GSS
  host-based name for its acceptor credential handle.
* Fix KDC enforcement of auth indicators when they are modified by
  the KDB module.
* Fix removal of require_auth string attributes when the LDAP KDB
  module is used.
* Fix a compile error when building with musl libc on Linux.
* Fix a compile error when building with gcc 4.x.
* Change the KDC constrained delegation precedence order for consistency
  with Windows KDCs.

Changes from 1.18
Administrator experience:
  * Remove support for single-DES encryption types.
  * Change the replay cache format to be more efficient and robust.
    Replay cache filenames using the new format end with '.rcache2'
    by default.
  * setuid programs will automatically ignore environment variables
    that normally affect krb5 API functions, even if the caller does
    not use krb5_init_secure_context().
  * Add an 'enforce_ok_as_delegate' krb5.conf relation to disable
    credential forwarding during GSSAPI authentication unless the KDC
    sets the ok-as-delegate bit in the service ticket.
  * Use the permitted_enctypes krb5.conf setting as the default value
    for default_tkt_enctypes and default_tgs_enctypes.
Developer experience:
  * Implement krb5_cc_remove_cred() for all credential cache types.
  * Add the krb5_pac_get_client_info() API to get the client account
    name from a PAC.
Protocol evolution:
  * Add KDC support for S4U2Self requests where the user is identified
    by X.509 certificate. (Requires support for certificate lookup from
    a third-party KDB module.)
  * Remove support for an old ('draft 9') variant of PKINIT.
  * Add support for Microsoft NegoEx. (Requires one or more third-party
    GSS modules implementing NegoEx mechanisms.)
User experience:
  * Add support for 'dns_canonicalize_hostname=fallback', causing
    host-based principal names to be tried first without DNS
    canonicalization, and again with DNS canonicalization if the
    un-canonicalized server is not found.
  * Expand single-component hostnames in host-based principal names
    when DNS canonicalization is not used, adding the system's first DNS
    search path as a suffix. Add a 'qualify_shortname' krb5.conf relation
    to override this suffix or disable expansion.
  * Honor the transited-policy-checked ticket flag on application servers,
    eliminating the requirement to configure capaths on servers in some
    scenarios.
Code quality:
  * The libkrb5 serialization code (used to export and import krb5 GSS
    security contexts) has been simplified and made type-safe.
  * The libkrb5 code for creating KRB-PRIV, KRB-SAFE, and KRB-CRED
    messages has been revised to conform to current coding practices.
  * The test suite has been modified to work with macOS System Integrity
    Protection enabled.
  * The test suite incorporates soft-pkcs11 so that PKINIT PKCS11 support
    can always be tested.

Changes from 1.17.1
* Fix a bug preventing 'addprinc -randkey -kvno' from working in kadmin.
* Fix a bug preventing time skew correction from working when a KCM
  credential cache is used.

Changes from 1.17:
Administrator experience:
* A new Kerberos database module using the Lightning Memory-Mapped
  Database library (LMDB) has been added.  The LMDB KDB module should
  be more performant and more robust than the DB2 module, and may
  become the default module for new databases in a future release.
* 'kdb5_util dump' will no longer dump policy entries when specific
  principal names are requested.
Developer experience:
* The new krb5_get_etype_info() API can be used to retrieve enctype,
  salt, and string-to-key parameters from the KDC for a client
  principal.
* The new GSS_KRB5_NT_ENTERPRISE_NAME name type allows enterprise
  principal names to be used with GSS-API functions.
* KDC and kadmind modules which call com_err() will now write to the
  log file in a format more consistent with other log messages.
* Programs which use large numbers of memory credential caches should
  perform better.
Protocol evolution:
* The SPAKE pre-authentication mechanism is now supported.  This
  mechanism protects against password dictionary attacks without
  requiring any additional infrastructure such as certificates.  SPAKE
  is enabled by default on clients, but must be manually enabled on
  the KDC for this release.
* PKINIT freshness tokens are now supported.  Freshness tokens can
  protect against scenarios where an attacker uses temporary access to
  a smart card to generate authentication requests for the future.
* Password change operations now prefer TCP over UDP, to avoid
  spurious error messages about replays when a response packet is
  dropped.
* The KDC now supports cross-realm S4U2Self requests when used with a
  third-party KDB module such as Samba's.  The client code for
  cross-realm S4U2Self requests is also now more robust.
User experience:
* The new ktutil addent -f flag can be used to fetch salt information
  from the KDC for password-based keys.
* The new kdestroy -p option can be used to destroy a credential cache
  within a collection by client principal name.
* The Kerberos man page has been restored, and documents the
  environment variables that affect programs using the Kerberos
  library.
Code quality:
* Python test scripts now use Python 3.
* Python test scripts now display markers in verbose output, making it
  easier to find where a failure occurred within the scripts.
* The Windows build system has been simplified and updated to work
  with more recent versions of Visual Studio.  A large volume of
  unused Windows-specific code has been removed.  Visual Studio 2013
  or later is now required.

- Build with full Cyrus SASL support. Negotiating SASL credentials with
  an EXTERNAL bind mechanism requires interaction. Kerberos provides its
  own interaction function that skips all interaction, thus preventing the
  mechanism from working.
ldb was updated to version 2.4.1 (jsc#SLE-23329);

- Release 2.4.1

  + Corrected python behaviour for 'in' for LDAP attributes
    contained as part of ldb.Message; (bso#14845);
  + Fix memory handling in ldb.msg_diff; (bso#14836);

- Release 2.4.0

  + pyldb: Fix Message.items() for a message containing elements
  + pyldb: Add test for Message.items()
  + tests: Use ldbsearch '--scope instead of '-s'
  + Change page size of guidindexpackv1.ldb
  + Use a 1MiB lmdb so the test also passes on aarch64 CentOS stream
  + attrib_handler casefold: simplify space dropping
  + fix ldb_comparison_fold off-by-one overrun
  + CVE-2020-27840: pytests: move Dn.validate test to ldb
  + CVE-2020-27840 ldb_dn: avoid head corruption in ldb_dn_explode
  + CVE-2021-20277 ldb/attrib_handlers casefold: stay in bounds
  + CVE-2021-20277 ldb tests: ldb_match tests with extra spaces
  + improve comments for ldb_module_connect_backend()
  + test/ldb_tdb: correct introductory comments
  + ldb.h: remove undefined async_ctx function signatures
  + correct comments in attrib_handers val_to_int64
  + dn tests use cmocka print functions
  + ldb_match: remove redundant check
  + add tests for ldb_wildcard_compare
  + ldb_match: trailing chunk must match end of string
  + pyldb: catch potential overflow error in py_timestring
  + ldb: remove some 'if PY3's in tests

talloc was updated to 2.3.3:

+ various bugfixes
+ python: Ensure reference counts are properly incremented
+ Change pytalloc source to LGPL
+ Upgrade waf to 2.0.18 to fix a cross-compilation issue;
   (bso#13846).

tdb was updated to version 1.4.4:

+ various bugfixes

tevent was updated to version 0.11.0:

+ Add custom tag to events
+ Add event trace api

sssd was updated to:

- Fix tests test_copy_ccache &amp; test_copy_keytab for later versions of krb5
- Update the private ldb modules installation following libldb2 
  changes from /usr/lib64/ldb/samba to /usr/lib64/ldb2/modules/ldb/samba

apparmor was updated to:

- Cater for changes to ldb packaging to allow parallel installation with libldb (bsc#1192684).
- add profile for samba-bgqd (bsc#1191532).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-08"/>
	<updated date="2022-02-08"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1139519">SUSE bug 1139519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191227">SUSE bug 1191227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191532">SUSE bug 1191532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192684">SUSE bug 1192684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193690">SUSE bug 1193690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195048">SUSE bug 1195048</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20316/">CVE-2021-20316</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43566/">CVE-2021-43566</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44141/">CVE-2021-44141</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0336/">CVE-2022-0336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665442" comment="apache2-mod_apparmor-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665340" comment="apparmor-abstractions-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665341" comment="apparmor-docs-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665342" comment="apparmor-parser-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665343" comment="apparmor-parser-lang-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665344" comment="apparmor-profiles-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665345" comment="apparmor-utils-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665346" comment="apparmor-utils-lang-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665452" comment="ctdb-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666478" comment="ctdb-pcp-pmda-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665347" comment="krb5-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665348" comment="krb5-32bit-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665349" comment="krb5-client-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665350" comment="krb5-devel-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666479" comment="krb5-devel-32bit-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666480" comment="krb5-mini-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666481" comment="krb5-mini-devel-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665443" comment="krb5-plugin-kdb-ldap-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665351" comment="krb5-plugin-preauth-otp-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665352" comment="krb5-plugin-preauth-pkinit-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665353" comment="krb5-plugin-preauth-spake-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665444" comment="krb5-server-1.19.2-150300.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665354" comment="ldb-tools-2.4.1-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665355" comment="libapparmor-devel-2.13.6-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665356" comment="libapparmor1-2.13.6-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665357" comment="libapparmor1-32bit-2.13.6-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665358" comment="libipa_hbac-devel-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665359" comment="libipa_hbac0-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665360" comment="libldb-devel-2.4.1-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665361" comment="libldb2-2.4.1-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665362" comment="libldb2-32bit-2.4.1-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666482" comment="libnfsidmap-sss-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665363" comment="libsamba-policy-devel-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665364" comment="libsamba-policy-python3-devel-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665365" comment="libsamba-policy0-python3-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666483" comment="libsamba-policy0-python3-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666484" comment="libsamba-policy0-python3-64bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665366" comment="libsss_certmap-devel-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665367" comment="libsss_certmap0-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665368" comment="libsss_idmap-devel-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665369" comment="libsss_idmap0-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665370" comment="libsss_nss_idmap-devel-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665371" comment="libsss_nss_idmap0-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665372" comment="libsss_simpleifp-devel-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665373" comment="libsss_simpleifp0-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665374" comment="libtalloc-devel-2.3.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665375" comment="libtalloc2-2.3.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665376" comment="libtalloc2-32bit-2.3.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665377" comment="libtdb-devel-1.4.4-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665378" comment="libtdb1-1.4.4-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665379" comment="libtdb1-32bit-1.4.4-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665380" comment="libtevent-devel-0.11.0-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665381" comment="libtevent0-0.11.0-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665382" comment="libtevent0-32bit-0.11.0-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665383" comment="pam_apparmor-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665384" comment="pam_apparmor-32bit-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665385" comment="perl-apparmor-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665386" comment="python3-apparmor-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666485" comment="python3-ipa_hbac-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665387" comment="python3-ldb-2.4.1-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666486" comment="python3-ldb-32bit-2.4.1-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665388" comment="python3-ldb-devel-2.4.1-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666487" comment="python3-sss-murmur-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666488" comment="python3-sss_nss_idmap-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665389" comment="python3-sssd-config-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665390" comment="python3-talloc-2.3.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666489" comment="python3-talloc-32bit-2.3.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665391" comment="python3-talloc-devel-2.3.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665392" comment="python3-tdb-1.4.4-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666490" comment="python3-tdb-32bit-1.4.4-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665393" comment="python3-tevent-0.11.0-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666491" comment="python3-tevent-32bit-0.11.0-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666492" comment="ruby-apparmor-2.13.6-150300.3.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665394" comment="samba-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665441" comment="samba-ad-dc-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665395" comment="samba-ad-dc-libs-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665396" comment="samba-ad-dc-libs-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665397" comment="samba-ceph-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665398" comment="samba-client-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665399" comment="samba-client-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666493" comment="samba-client-64bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665400" comment="samba-client-libs-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665401" comment="samba-client-libs-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665402" comment="samba-devel-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665403" comment="samba-devel-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666494" comment="samba-doc-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665404" comment="samba-dsdb-modules-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665405" comment="samba-gpupdate-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665406" comment="samba-ldb-ldap-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665407" comment="samba-libs-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665408" comment="samba-libs-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666495" comment="samba-libs-64bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665409" comment="samba-libs-python3-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666496" comment="samba-libs-python3-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666497" comment="samba-libs-python3-64bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665410" comment="samba-python3-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666498" comment="samba-test-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665411" comment="samba-tool-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665412" comment="samba-winbind-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665413" comment="samba-winbind-libs-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665414" comment="samba-winbind-libs-32bit-4.15.4+git.324.8332acf1a63-150300.3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665415" comment="sssd-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665416" comment="sssd-ad-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665417" comment="sssd-common-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665418" comment="sssd-dbus-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665419" comment="sssd-ipa-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665420" comment="sssd-krb5-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665421" comment="sssd-krb5-common-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665422" comment="sssd-ldap-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665423" comment="sssd-proxy-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665424" comment="sssd-tools-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666499" comment="sssd-wbclient-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666500" comment="sssd-wbclient-devel-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665425" comment="sssd-winbind-idmap-1.16.1-150300.23.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665426" comment="talloc-man-2.3.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665427" comment="tdb-tools-1.4.4-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665428" comment="tevent-man-0.11.0-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52828" version="1" class="patch">
	<metadata>
		<title>Recommended update for aws-efs-utils, python-ansi2html, python-py, python-pytest-html, python-pytest-metadata, python-pytest-rerunfailures, python-coverage, python-oniconfig, python-unittest-mixins (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195916" ref_url="https://bugzilla.suse.com/1195916" source="BUGZILLA"/>
		<reference ref_id="1196696" ref_url="https://bugzilla.suse.com/1196696" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011928.html" source="SUSE-SU"/>
		<description>
This update for aws-efs-utils, python-ansi2html, python-py, python-pytest-html, python-pytest-metadata, python-pytest-rerunfailures fixes the following issues:

- Update in SLE-15 (bsc#1196696, bsc#1195916, jsc#SLE-23972)

- Remove redundant python3 dependency from Requires
- Update regular expression to fix python shebang
- Style is enforced upstream and triggers unnecessary build version requirements
- Allow specifying fs_id in cloudwatch log group name
- Includes fix for stunnel path
- Added hardening to systemd service(s). 
- Raise minimal pytest version
- Fix typo in the ansi2html Requires
- Cleanup with spec-cleaner
- Make sure the tests are really executed
- Remove useless devel dependency
- Multiprocessing support in Python 3.8 was broken, but is now fixed
- Bumpy the URL to point to github rather than to docs

		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-17"/>
	<updated date="2022-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195916">SUSE bug 1195916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196696">SUSE bug 1196696</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009699815" comment="python-atomicwrites-doc-1.1.5-150000.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698634" comment="python2-apipkg-1.4-150000.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698625" comment="python2-atomicwrites-1.1.5-150000.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698626" comment="python2-coverage-4.5.4-150000.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698636" comment="python2-py-1.10.0-150000.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699816" comment="python2-pycodestyle-2.5.0-150000.3.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699817" comment="python2-pyflakes-2.1.1-150000.3.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698486" comment="python3-apipkg-1.4-150000.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698633" comment="python3-atomicwrites-1.1.5-150000.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698568" comment="python3-coverage-4.5.4-150000.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698488" comment="python3-py-1.10.0-150000.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699818" comment="python3-pycodestyle-2.5.0-150000.3.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699819" comment="python3-pyflakes-2.1.1-150000.3.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52829" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199978" ref_url="https://bugzilla.suse.com/1199978" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46790" ref_url="https://www.suse.com/security/cve/CVE-2021-46790/" source="CVE"/>
		<reference ref_id="CVE-2022-30783" ref_url="https://www.suse.com/security/cve/CVE-2022-30783/" source="CVE"/>
		<reference ref_id="CVE-2022-30784" ref_url="https://www.suse.com/security/cve/CVE-2022-30784/" source="CVE"/>
		<reference ref_id="CVE-2022-30785" ref_url="https://www.suse.com/security/cve/CVE-2022-30785/" source="CVE"/>
		<reference ref_id="CVE-2022-30786" ref_url="https://www.suse.com/security/cve/CVE-2022-30786/" source="CVE"/>
		<reference ref_id="CVE-2022-30787" ref_url="https://www.suse.com/security/cve/CVE-2022-30787/" source="CVE"/>
		<reference ref_id="CVE-2022-30788" ref_url="https://www.suse.com/security/cve/CVE-2022-30788/" source="CVE"/>
		<reference ref_id="CVE-2022-30789" ref_url="https://www.suse.com/security/cve/CVE-2022-30789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011933.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

Updated to version 2022.5.17 (bsc#1199978):
- CVE-2022-30783: Fixed an issue where messages between NTFS-3G and
  the kernel could be intercepted when using libfuse-lite.
- CVE-2022-30784: Fixed a memory exhaustion issue when opening a
  crafted NTFS image.
- CVE-2022-30785: Fixed a bug where arbitrary memory read and write
  operations could be achieved whe using libfuse-lite.
- CVE-2022-30786: Fixed a memory corruption issue when opening a
  crafted NTFS image.
- CVE-2022-30787: Fixed an integer underflow which enabled arbitrary
  memory read operations when using libfuse-lite.
- CVE-2022-30788: Fixed a memory corruption issue when opening a
  crafted NTFS image.
- CVE-2022-30789: Fixed a memory corruption issue when opening a
  crafted NTFS image.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-17"/>
	<updated date="2022-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199978">SUSE bug 1199978</bugzilla>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46790/">CVE-2021-46790</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30783/">CVE-2022-30783</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30784/">CVE-2022-30784</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30785/">CVE-2022-30785</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30786/">CVE-2022-30786</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30787/">CVE-2022-30787</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30788/">CVE-2022-30788</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30789/">CVE-2022-30789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704222" comment="libntfs-3g-devel-2022.5.17-150000.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704223" comment="libntfs-3g87-2022.5.17-150000.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704224" comment="ntfs-3g-2022.5.17-150000.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704225" comment="ntfsprogs-2022.5.17-150000.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704226" comment="ntfsprogs-extra-2022.5.17-150000.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52830" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182428" ref_url="https://bugzilla.suse.com/1182428" source="BUGZILLA"/>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="1197284" ref_url="https://bugzilla.suse.com/1197284" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1227" ref_url="https://www.suse.com/security/cve/CVE-2022-1227/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

Updated to version 3.4.7:
- CVE-2022-1227: Fixed an issue that could allow an attacker to publish
  a malicious image to a public registry and run arbitrary code in the
  victim's context via the 'podman top' command (bsc#1182428).
- CVE-2022-27191: Fixed a potential crash via SSH under specific
  configurations (bsc#1197284).
- CVE-2022-21698: Fixed a potential denial of service that affected
  servers that used Prometheus instrumentation (bsc#1196338).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-18"/>
	<updated date="2022-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182428">SUSE bug 1182428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197284">SUSE bug 1197284</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1227/">CVE-2022-1227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705631" comment="podman-3.4.7-150300.9.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705632" comment="podman-cni-config-3.4.7-150300.9.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52831" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="1189368" ref_url="https://bugzilla.suse.com/1189368" source="BUGZILLA"/>
		<reference ref_id="1191601" ref_url="https://bugzilla.suse.com/1191601" source="BUGZILLA"/>
		<reference ref_id="1191602" ref_url="https://bugzilla.suse.com/1191602" source="BUGZILLA"/>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1201326" ref_url="https://bugzilla.suse.com/1201326" source="BUGZILLA"/>
		<reference ref_id="1201327" ref_url="https://bugzilla.suse.com/1201327" source="BUGZILLA"/>
		<reference ref_id="1201328" ref_url="https://bugzilla.suse.com/1201328" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

- CVE-2021-22930, CVE-2021-22940: Fixed two memory corruption issues
  during HTTP/2 stream cancellation (bsc#1188917, bsc#1189368).
- CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2021-22960,
  CVE-2021-22959: Fixed multiple HTTP request smuggling issues in
  the underlying HTTP parser (bsc#1201325, bsc#1201326, bsc#1201327, 
  bsc#1191602, bsc#1191601).
- CVE-2022-32212: Fixed a DNS rebinding issue caused by improper IPv4
  validation (bsc#1201328).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-19"/>
	<updated date="2022-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191601">SUSE bug 1191601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191602">SUSE bug 1191602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201326">SUSE bug 1201326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201327">SUSE bug 1201327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201328">SUSE bug 1201328</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706147" comment="nodejs10-10.24.1-150000.1.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706148" comment="nodejs10-devel-10.24.1-150000.1.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706130" comment="nodejs10-docs-10.24.1-150000.1.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706149" comment="npm10-10.24.1-150000.1.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52832" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Updated to version jdk8u345 (icedtea-3.24.0)
    - CVE-2022-21540: Fixed a potential Java sandbox bypass (bsc#1201694).
    - CVE-2022-21541: Fixed a potential Java sandbox bypass (bsc#1201692).
    - CVE-2022-34169: Fixed an issue where arbitrary bytecode could
      be executed via a malicious stylesheet (bsc#1201684).

- Non-security fixes:
    - Allowed for customization of PKCS12 keystores (bsc#1195163).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-19"/>
	<updated date="2022-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704729" comment="java-1_8_0-openjdk-1.8.0.345-150000.3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704769" comment="java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704730" comment="java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704731" comment="java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704732" comment="java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704770" comment="java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704771" comment="java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52833" version="1" class="patch">
	<metadata>
		<title>Security update for systemd-presets-common-SUSE (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199524" ref_url="https://bugzilla.suse.com/1199524" source="BUGZILLA"/>
		<reference ref_id="1200485" ref_url="https://bugzilla.suse.com/1200485" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1706" ref_url="https://www.suse.com/security/cve/CVE-2022-1706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011963.html" source="SUSE-SU"/>
		<description>
This update for systemd-presets-common-SUSE fixes the following issues:

- CVE-2022-1706: Fixed accessible configs from unprivileged containers in VMs running on VMware products (bsc#1199524).

The following non-security bugs were fixed:

- Modify branding-preset-states to fix systemd-presets-common-SUSE
  not enabling new user systemd service preset configuration just
  as it handles system service presets. By passing an (optional)
  second parameter 'user', the save/apply-changes commands now
  work with user services instead of system ones (bsc#1200485)

- Add the wireplumber user service preset to enable it by default
  in SLE15-SP4 where it replaced pipewire-media-session, but keep
  pipewire-media-session preset so we don't have to branch the
  systemd-presets-common-SUSE package for SP4 (bsc#1200485)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-22"/>
	<updated date="2022-08-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199524">SUSE bug 1199524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200485">SUSE bug 1200485</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1706/">CVE-2022-1706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698507" comment="systemd-presets-common-SUSE-15-150100.8.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52834" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201213" ref_url="https://bugzilla.suse.com/1201213" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33103" ref_url="https://www.suse.com/security/cve/CVE-2022-33103/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011962.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

- CVE-2022-33103: Fixed a flaw in the squashfs subsystem that could
  lead to arbitrary code execution (bsc#1201213).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-22"/>
	<updated date="2022-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201213">SUSE bug 1201213</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33103/">CVE-2022-33103</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704491" comment="u-boot-avnetultra96rev1-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704492" comment="u-boot-avnetultra96rev1-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704493" comment="u-boot-bananapim64-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704494" comment="u-boot-bananapim64-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704495" comment="u-boot-dragonboard410c-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704496" comment="u-boot-dragonboard410c-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704497" comment="u-boot-dragonboard820c-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704498" comment="u-boot-dragonboard820c-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704499" comment="u-boot-evb-rk3399-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704500" comment="u-boot-evb-rk3399-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704501" comment="u-boot-firefly-rk3399-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704502" comment="u-boot-firefly-rk3399-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704503" comment="u-boot-geekbox-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704504" comment="u-boot-geekbox-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704505" comment="u-boot-hikey-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704506" comment="u-boot-hikey-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704507" comment="u-boot-khadas-vim-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704508" comment="u-boot-khadas-vim-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704509" comment="u-boot-khadas-vim2-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704510" comment="u-boot-khadas-vim2-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704511" comment="u-boot-libretech-ac-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704512" comment="u-boot-libretech-ac-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704513" comment="u-boot-libretech-cc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704514" comment="u-boot-libretech-cc-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704515" comment="u-boot-ls1012afrdmqspi-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704516" comment="u-boot-ls1012afrdmqspi-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704517" comment="u-boot-mvebudb-88f3720-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704518" comment="u-boot-mvebudb-88f3720-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704519" comment="u-boot-mvebudbarmada8k-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704520" comment="u-boot-mvebudbarmada8k-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704521" comment="u-boot-mvebuespressobin-88f3720-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704522" comment="u-boot-mvebuespressobin-88f3720-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704523" comment="u-boot-mvebumcbin-88f8040-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704524" comment="u-boot-mvebumcbin-88f8040-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704525" comment="u-boot-nanopia64-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704526" comment="u-boot-nanopia64-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704527" comment="u-boot-odroid-c2-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704528" comment="u-boot-odroid-c2-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704529" comment="u-boot-odroid-c4-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704530" comment="u-boot-odroid-c4-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704531" comment="u-boot-odroid-n2-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704532" comment="u-boot-odroid-n2-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704533" comment="u-boot-orangepipc2-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704534" comment="u-boot-orangepipc2-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704535" comment="u-boot-p2371-2180-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704536" comment="u-boot-p2371-2180-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704537" comment="u-boot-p2771-0000-500-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704538" comment="u-boot-p2771-0000-500-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704539" comment="u-boot-p3450-0000-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704540" comment="u-boot-p3450-0000-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704541" comment="u-boot-pine64plus-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704542" comment="u-boot-pine64plus-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704543" comment="u-boot-pinebook-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704544" comment="u-boot-pinebook-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704545" comment="u-boot-pinebook-pro-rk3399-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704546" comment="u-boot-pinebook-pro-rk3399-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704547" comment="u-boot-pineh64-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704548" comment="u-boot-pineh64-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704549" comment="u-boot-pinephone-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704550" comment="u-boot-pinephone-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704551" comment="u-boot-poplar-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704552" comment="u-boot-poplar-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704553" comment="u-boot-rock-pi-4-rk3399-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704554" comment="u-boot-rock-pi-4-rk3399-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704555" comment="u-boot-rock64-rk3328-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704556" comment="u-boot-rock64-rk3328-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704557" comment="u-boot-rock960-rk3399-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704558" comment="u-boot-rock960-rk3399-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704559" comment="u-boot-rockpro64-rk3399-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704560" comment="u-boot-rockpro64-rk3399-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704561" comment="u-boot-rpi3-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704562" comment="u-boot-rpi3-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704563" comment="u-boot-rpi4-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704564" comment="u-boot-rpi4-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704353" comment="u-boot-rpiarm64-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704354" comment="u-boot-rpiarm64-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704355" comment="u-boot-tools-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704565" comment="u-boot-xilinxzynqmpvirt-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704566" comment="u-boot-xilinxzynqmpvirt-doc-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704567" comment="u-boot-xilinxzynqmpzcu102rev10-2021.01-150300.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704568" comment="u-boot-xilinxzynqmpzcu102rev10-doc-2021.01-150300.7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52835" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rails-html-sanitizer (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201183" ref_url="https://bugzilla.suse.com/1201183" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32209" ref_url="https://www.suse.com/security/cve/CVE-2022-32209/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011964.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rails-html-sanitizer fixes the following issues:

- CVE-2022-32209: Fixed a potential content injection under specific
  configurations (bsc#1201183).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-22"/>
	<updated date="2022-08-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201183">SUSE bug 1201183</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32209/">CVE-2022-32209</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707098" comment="ruby2.5-rubygem-rails-html-sanitizer-1.0.4-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707364" comment="ruby2.5-rubygem-rails-html-sanitizer-doc-1.0.4-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707365" comment="ruby2.5-rubygem-rails-html-sanitizer-testsuite-1.0.4-150000.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52836" version="1" class="patch">
	<metadata>
		<title>Security update for perl-HTTP-Daemon (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201157" ref_url="https://bugzilla.suse.com/1201157" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31081" ref_url="https://www.suse.com/security/cve/CVE-2022-31081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011970.html" source="SUSE-SU"/>
		<description>
This update for perl-HTTP-Daemon fixes the following issues:

- CVE-2022-31081: Fixed request smuggling in HTTP::Daemon (bsc#1201157).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-23"/>
	<updated date="2022-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201157">SUSE bug 1201157</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31081/">CVE-2022-31081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700999" comment="perl-HTTP-Daemon-6.01-150000.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52837" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1196616" ref_url="https://bugzilla.suse.com/1196616" source="BUGZILLA"/>
		<reference ref_id="1198829" ref_url="https://bugzilla.suse.com/1198829" source="BUGZILLA"/>
		<reference ref_id="1199364" ref_url="https://bugzilla.suse.com/1199364" source="BUGZILLA"/>
		<reference ref_id="1199647" ref_url="https://bugzilla.suse.com/1199647" source="BUGZILLA"/>
		<reference ref_id="1199665" ref_url="https://bugzilla.suse.com/1199665" source="BUGZILLA"/>
		<reference ref_id="1199670" ref_url="https://bugzilla.suse.com/1199670" source="BUGZILLA"/>
		<reference ref_id="1200015" ref_url="https://bugzilla.suse.com/1200015" source="BUGZILLA"/>
		<reference ref_id="1200521" ref_url="https://bugzilla.suse.com/1200521" source="BUGZILLA"/>
		<reference ref_id="1200598" ref_url="https://bugzilla.suse.com/1200598" source="BUGZILLA"/>
		<reference ref_id="1200644" ref_url="https://bugzilla.suse.com/1200644" source="BUGZILLA"/>
		<reference ref_id="1200651" ref_url="https://bugzilla.suse.com/1200651" source="BUGZILLA"/>
		<reference ref_id="1200762" ref_url="https://bugzilla.suse.com/1200762" source="BUGZILLA"/>
		<reference ref_id="1200910" ref_url="https://bugzilla.suse.com/1200910" source="BUGZILLA"/>
		<reference ref_id="1201196" ref_url="https://bugzilla.suse.com/1201196" source="BUGZILLA"/>
		<reference ref_id="1201206" ref_url="https://bugzilla.suse.com/1201206" source="BUGZILLA"/>
		<reference ref_id="1201251" ref_url="https://bugzilla.suse.com/1201251" source="BUGZILLA"/>
		<reference ref_id="1201381" ref_url="https://bugzilla.suse.com/1201381" source="BUGZILLA"/>
		<reference ref_id="1201429" ref_url="https://bugzilla.suse.com/1201429" source="BUGZILLA"/>
		<reference ref_id="1201442" ref_url="https://bugzilla.suse.com/1201442" source="BUGZILLA"/>
		<reference ref_id="1201458" ref_url="https://bugzilla.suse.com/1201458" source="BUGZILLA"/>
		<reference ref_id="1201635" ref_url="https://bugzilla.suse.com/1201635" source="BUGZILLA"/>
		<reference ref_id="1201636" ref_url="https://bugzilla.suse.com/1201636" source="BUGZILLA"/>
		<reference ref_id="1201644" ref_url="https://bugzilla.suse.com/1201644" source="BUGZILLA"/>
		<reference ref_id="1201645" ref_url="https://bugzilla.suse.com/1201645" source="BUGZILLA"/>
		<reference ref_id="1201664" ref_url="https://bugzilla.suse.com/1201664" source="BUGZILLA"/>
		<reference ref_id="1201672" ref_url="https://bugzilla.suse.com/1201672" source="BUGZILLA"/>
		<reference ref_id="1201673" ref_url="https://bugzilla.suse.com/1201673" source="BUGZILLA"/>
		<reference ref_id="1201676" ref_url="https://bugzilla.suse.com/1201676" source="BUGZILLA"/>
		<reference ref_id="1201846" ref_url="https://bugzilla.suse.com/1201846" source="BUGZILLA"/>
		<reference ref_id="1201930" ref_url="https://bugzilla.suse.com/1201930" source="BUGZILLA"/>
		<reference ref_id="1201940" ref_url="https://bugzilla.suse.com/1201940" source="BUGZILLA"/>
		<reference ref_id="1201954" ref_url="https://bugzilla.suse.com/1201954" source="BUGZILLA"/>
		<reference ref_id="1201956" ref_url="https://bugzilla.suse.com/1201956" source="BUGZILLA"/>
		<reference ref_id="1201958" ref_url="https://bugzilla.suse.com/1201958" source="BUGZILLA"/>
		<reference ref_id="1202154" ref_url="https://bugzilla.suse.com/1202154" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557/" source="CVE"/>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656/" source="CVE"/>
		<reference ref_id="CVE-2022-1116" ref_url="https://www.suse.com/security/cve/CVE-2022-1116/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166/" source="CVE"/>
		<reference ref_id="CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365/" source="CVE"/>
		<reference ref_id="CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639/" source="CVE"/>
		<reference ref_id="CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581/" source="CVE"/>
		<reference ref_id="CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250/" source="CVE"/>
		<reference ref_id="CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740/" source="CVE"/>
		<reference ref_id="CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741/" source="CVE"/>
		<reference ref_id="CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-36516: Fixed TCP session data injection vulnerability via the mixed IPID assignment method (bnc#1196616).
- CVE-2020-36557: Fixed race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could lead to a use-after-free (bnc#1201429).
- CVE-2020-36558: Fixed race condition involving VT_RESIZEX that could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT (bnc#1201636).
- CVE-2022-1116: Fixed a integer overflow vulnerability in io_uring which allowed a local attacker to cause memory corruption and escalate privileges to root (bnc#1199647).
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-2639: Fixed integer underflow that could lead to out-of-bounds write in reserve_sfa_size() (bsc#1202154).
- CVE-2022-20166: Fixed possible out of bounds write due to sprintf unsafety that could cause local escalation of privilege (bnc#1200598)
- CVE-2022-21505: Fixed kexec lockdown bypass with IMA policy (bsc#1201458).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2022-29581: Fixed improper update of Reference Count in net/sched that could cause root privilege escalation (bnc#1199665).
- CVE-2022-32250: Fixed user-after-free in net/netfilter/nf_tables_api.c that could allow local privilege escalation (bnc#1200015).
- CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940).

The following non-security bugs were fixed:

- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: hda - Add fixup for Dell Latitidue E5430 (git-fixes).
- ALSA: hda/conexant: Apply quirk for another HP ProDesk 600 G3 model (git-fixes).
- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).
- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc221 (git-fixes).
- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).
- ASoC: Intel: Skylake: Correct the handling of fmt_config flexible array (git-fixes).
- ASoC: Intel: Skylake: Correct the ssp rate discovery in skl_get_ssp_clks() (git-fixes).
- ASoC: Remove unused hw_write_t type (git-fixes).
- ASoC: cs47l15: Fix event generation for low power mux control (git-fixes).
- ASoC: madera: Fix event generation for OUT1 demux (git-fixes).
- ASoC: madera: Fix event generation for rate controls (git-fixes).
- ASoC: ops: Fix off by one in range control validation (git-fixes).
- ASoC: sgtl5000: Fix noise on shutdown/remove (git-fixes).
- ASoC: wm5110: Fix DRE control (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- FDDI: defxx: Bail out gracefully with unassigned PCI resource for CSR (git-fixes).
- FDDI: defxx: Make MMIO the configuration default except for EISA (git-fixes).
- Fixed a system crash related to the recent RETBLEED mitigation (bsc#1201644, bsc#1201664, bsc#1201672, bsc#1201673, bsc#1201676).
- Fixed battery detection problem on macbooks (bnc#1201206).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- KVM/emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
- KVM: VMX: Add non-canonical check on writes to RTIT address MSRs (git-fixes).
- KVM: VMX: Do not freeze guest when event delivery causes an APIC-access exit (git-fixes).
- KVM: apic: avoid calculating pending eoi from an uninitialized val (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: arm64: Fix definition of PAGE_HYP_DEVICE (git-fixes)
- KVM: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
- KVM: nVMX: avoid NULL pointer dereference with incorrect EVMCS GPAs (git-fixes).
- KVM: nVMX: handle nested posted interrupts when apicv is disabled for L1 (git-fixes).
- KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh() (git-fixes).
- KVM: x86: Do not let userspace set host-reserved cr4 bits (git-fixes).
- KVM: x86: Fix split-irqchip vs interrupt injection window request (git-fixes).
- KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks (git-fixes).
- KVM: x86: Update vCPU's hv_clock before back to guest when tsc_offset is adjusted (git-fixes).
- KVM: x86: handle !lapic_in_kernel case in kvm_cpu_*_extint (git-fixes).
- NFC: nxp-nci: do not print header length mismatch on i2c error (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PM: runtime: Remove link state checks in rpm_get/put_supplier() (git-fixes).
- Sort in RETbleed backport into the sorted section Now that it is upstream..
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- USB: serial: ftdi_sio: add Belimo device ids (git-fixes).
- amd-xgbe: Update DMA coherency values (git-fixes).
- arm64 module: set plt* section addresses to 0x0 (git-fixes)
- arm64: Extend workaround for erratum 1024718 to all versions of (git-fixes)
- arm64: asm: Add new-style position independent function annotations (git-fixes)
- arm64: compat: Ensure upper 32 bits of x0 are zero on syscall return (git-fixes)
- arm64: dts: marvell: armada-37xx: Set pcie_reset_pin to gpio function (git-fixes)
- arm64: dts: marvell: espressobin: Add ethernet switch aliases (git-fixes)
- arm64: dts: marvell: espressobin: add ethernet alias (git-fixes)
- arm64: dts: mcbin: support 2W SFP modules (git-fixes)
- arm64: fix compat syscall return truncation (git-fixes)
- arm64: fix inline asm in load_unaligned_zeropad() (git-fixes)
- arm64: mm: Do not invalidate FROM_DEVICE buffers at start of DMA (git-fixes)
- arm64: module: remove (NOLOAD) from linker script (git-fixes)
- arm64: module: rework special section handling (git-fixes)
- arm64: perf: Report the PC value in REGS_ABI_32 mode (git-fixes)
- arm64: ptrace: Consistently use pseudo-singlestep exceptions (git-fixes)
- arm64: ptrace: Override SPSR.SS when single-stepping is enabled (git-fixes)
- arm64: stackleak: fix current_top_of_stack() (git-fixes)
- arm64: uprobe: Return EOPNOTSUPP for AARCH32 instruction probing (git-fixes)
- arm64: vdso: Avoid ISB after reading from cntvct_el0 (git-fixes)
- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ax88179_178a: add ethtool_op_get_ts_info() (git-fixes).
- blk-zoned: allow BLKREPORTZONE without CAP_SYS_ADMIN (git-fixes).
- blk-zoned: allow zone management send operations without CAP_SYS_ADMIN (git-fixes).
- block/compat_ioctl: fix range check in BLKGETSIZE (git-fixes).
- block: Fix fsync always failed if once failed (git-fixes).
- block: Fix wrong offset in bio_truncate() (git-fixes).
- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).
- block: do not delete queue kobject before its children (git-fixes).
- block: drbd: drbd_nl: Make conversion to 'enum drbd_ret_code' explicit (git-fixes).
- bpf, cpumap: Remove rcpu pointer from cpu_map_build_skb signature (bsc#1199364).
- bpf: Add config to allow loading modules with BTF mismatches (jsc#SLE-24559).
- bpf: Add in-kernel split BTF support (jsc#SLE-24559).
- bpf: Assign ID to vmlinux BTF and return extra info for BTF in GET_OBJ_INFO (jsc#SLE-24559).
- bpf: Keep module's btf_data_size intact after load (jsc#SLE-24559).
- bpf: Load and verify kernel module BTFs (jsc#SLE-24559).
- bpf: Provide function to get vmlinux BTF information (jsc#SLE-24559).
- bpf: Sanitize BTF data pointer after module is loaded (jsc#SLE-24559).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: gs_usb: gs_usb_open/close(): fix memory leak (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- config: enable DEBUG_INFO_BTF This option allows users to access the btf type information for vmlinux but not kernel modules.
- cpuidle: PSCI: Move the `has_lpi` check to the beginning of the (git-fixes)
- crypto: qat - disable registration of algorithms (git-fixes).
- crypto: qat - fix memory leak in RSA (git-fixes).
- crypto: qat - remove dma_free_coherent() for DH (git-fixes).
- crypto: qat - remove dma_free_coherent() for RSA (git-fixes).
- crypto: qat - set to zero DH parameters before free (git-fixes).
- cxgb4: Fix the -Wmisleading-indentation warning (git-fixes).
- dm btree remove: assign new_root only when removal succeeds (git-fixes).
- dm btree remove: fix use after free in rebalance_children() (git-fixes).
- dm bufio: subtract the number of initial sectors in dm_bufio_get_device_size (git-fixes).
- dm crypt: Avoid percpu_counter spinlock contention in crypt_page_alloc() (git-fixes).
- dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS (git-fixes).
- dm crypt: make printing of the key constant-time (git-fixes).
- dm integrity: conditionally disable 'recalculate' feature (git-fixes).
- dm integrity: fix a crash if 'recalculate' used without 'internal_hash' (git-fixes).
- dm integrity: fix error code in dm_integrity_ctr() (git-fixes).
- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).
- dm integrity: fix the maximum number of arguments (git-fixes).
- dm mirror log: round up region bitmap size to BITS_PER_LONG (git-fixes).
- dm persistent data: packed struct should have an aligned() attribute too (git-fixes).
- dm raid: fix inconclusive reshape layout on fast raid4/5/6 table reload sequences (git-fixes).
- dm snapshot: fix crash with transient storage and zero chunk size (git-fixes).
- dm snapshot: flush merged data before committing metadata (git-fixes).
- dm snapshot: properly fix a crash when an origin has no snapshots (git-fixes).
- dm space map common: fix division bug in sm_ll_find_free_block() (git-fixes).
- dm stats: add cond_resched when looping over entries (git-fixes).
- dm verity: fix FEC for RS roots unaligned to block size (git-fixes).
- dm: fix mempool NULL pointer race when completing IO (git-fixes).
- dmaengine: at_xdma: handle errors of at_xdmac_alloc_desc() correctly (git-fixes).
- dmaengine: imx-sdma: Allow imx8m for imx7 FW revs (git-fixes).
- dmaengine: pl330: Fix lockdep warning about non-static key (git-fixes).
- dmaengine: ti: Add missing put_device in ti_dra7_xbar_route_allocate (git-fixes).
- dmaengine: ti: Fix refcount leak in ti_dra7_xbar_route_allocate (git-fixes).
- do not call utsname() after -&gt;nsproxy is NULL (bsc#1201196).
- drbd: fix potential silent data corruption (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drivers/net: Fix kABI in tun.c (git-fixes).
- drivers: net: fix memory leak in atusb_probe (git-fixes).
- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/i915/gt: Serialize TLB invalidates with GT resets (git-fixes).
- drm/i915/selftests: fix a couple IS_ERR() vs NULL tests (git-fixes).
- drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector() (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/panfrost: Fix shrinker list corruption by madvise IOCTL (git-fixes).
- drm/panfrost: Put mapping instead of shmem obj on panfrost_mmu_map_fault_addr() error (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- fbcon: Disallow setting font bigger than screen size (git-fixes).
- fbcon: Prevent that screen size is smaller than font size (git-fixes).
- fbdev: fbmem: Fix logo center image dx issue (git-fixes).
- fbmem: Check virtual screen sizes in fb_set_var() (git-fixes).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- ftgmac100: Restart MAC HW once (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: pca953x: only use single read/write for No AI mode (git-fixes).
- gpio: pca953x: use the correct range when do regmap sync (git-fixes).
- gpio: pca953x: use the correct register address when regcache sync during init (git-fixes).
- hex2bin: make the function hex_to_bin constant-time (git-fixes).
- hv_netvsc: Add (more) validation for untrusted Hyper-V values (bsc#1199364).
- hv_netvsc: Add comment of netvsc_xdp_xmit() (bsc#1199364).
- hv_netvsc: Add support for XDP_REDIRECT (bsc#1199364).
- hv_netvsc: Copy packets sent by Hyper-V out of the receive buffer (bsc#1199364).
- hv_netvsc: Fix validation in netvsc_linkstatus_callback() (bsc#1199364).
- i2c: Fix a potential use after free (git-fixes).
- i2c: cadence: Change large transfer count reset logic to be unconditional (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: cadence: Unregister the clk notifier in error path (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- ida: do not use BUG_ON() for debugging (git-fixes).
- igb: Enable RSS for Intel I211 Ethernet Controller (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- ima: Fix a potential integer overflow in ima_appraise_measurement (git-fixes).
- ima: Fix potential memory leak in ima_init_crypto() (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- kABI workaround for rtsx_usb (git-fixes).
- kabi: create module private struct to hold btf size/data (jsc#SLE-24559).
- kbuild: Build kernel module BTFs if BTF is enabled and pahole supports it (jsc#SLE-24559).
- kbuild: Skip module BTF generation for out-of-tree external modules (jsc#SLE-24559).
- kbuild: add marker for build log of *.mod.o (jsc#SLE-24559).
- kbuild: drop $(wildcard $^) check in if_changed* for faster rebuild (jsc#SLE-24559).
- kbuild: rebuild modules when module linker scripts are updated (jsc#SLE-24559).
- kbuild: rename any-prereq to newer-prereqs (jsc#SLE-24559).
- kbuild: split final module linking out into Makefile.modfinal (jsc#SLE-24559).
- lib/string.c: implement stpcpy (git-fixes).
- linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check (git-fixes).
- linux/random.h: Remove arch_has_random, arch_has_random_seed (git-fixes).
- linux/random.h: Use false with bool (git-fixes).
- lkdtm: Disable return thunks in rodata.c (bsc#1178134).
- macvlan: remove redundant null check on data (git-fixes).
- md/bitmap: wait for external bitmap writes to complete during tear down (git-fixes).
- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).
- md: Set prev_flush_start and flush_bio in an atomic way (git-fixes).
- md: bcache: check the return value of kzalloc() in detached_dev_do_request() (git-fixes).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: rc: increase rc-mm tolerance and add debug message (git-fixes).
- media: rtl28xxu: Add support for PROlectrix DV107669 DVB-T dongle (git-fixes).
- media: rtl28xxu: add missing sleep before probing slave demod (git-fixes).
- media: rtl28xxu: set keymap for Astrometa DVB-T2 (git-fixes).
- media: smipcie: fix interrupt handling and IR timeout (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: usb: dvb-usb-v2: rtl28xxu: convert to use i2c_new_client_device() (git-fixes).
- media: v4l2-mem2mem: always consider OUTPUT queue during poll (git-fixes).
- media: v4l2-mem2mem: reorder checks in v4l2_m2m_poll() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memregion: Fix memregion_free() fallback definition (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- misc: rtsx_usb: fix use of dma mapped buffer for usb bulk transfer (git-fixes).
- misc: rtsx_usb: set return value in rsp_buf alloc err path (git-fixes).
- misc: rtsx_usb: use separate command and response buffers (git-fixes).
- mm/slub: add missing TID updates on slab deactivation (git-fixes).
- mm: fix page reference leak in soft_offline_page() (git fixes (mm/memory-failure)).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- net, xdp: Introduce __xdp_build_skb_from_frame utility routine (bsc#1199364).
- net, xdp: Introduce xdp_build_skb_from_frame utility routine (bsc#1199364).
- net/mlx5e: When changing XDP program without reset, take refs for XSK RQs (git-fixes).
- net/sonic: Fix some resource leaks in error handling paths (git-fixes).
- net: ag71xx: remove unnecessary MTU reservation (git-fixes).
- net: allwinner: Fix some resources leak in the error handling path of the probe and in the remove function (git-fixes).
- net: amd-xgbe: Fix NETDEV WATCHDOG transmit queue timeout warning (git-fixes).
- net: amd-xgbe: Fix network fluctuations when using 1G BELFUSE SFP (git-fixes).
- net: amd-xgbe: Reset link when the link never comes back (git-fixes).
- net: amd-xgbe: Reset the PHY rx data path when mailbox command timeout (git-fixes).
- net: axienet: Handle deferred probe on clock properly (git-fixes).
- net: dsa: bcm_sf2: Qualify phydev-&gt;dev_flags based on port (git-fixes).
- net: dsa: bcm_sf2: put device node before return (git-fixes).
- net: dsa: lantiq_gswip: Exclude RMII from modes that report 1 GbE (git-fixes).
- net: dsa: lantiq_gswip: Let GSWIP automatically set the xMII clock (git-fixes).
- net: enetc: fix incorrect TPID when receiving 802.1ad tagged packets (git-fixes).
- net: enetc: keep RX ring consumer index in sync with hardware (git-fixes).
- net: evaluate net.ipv4.conf.all.proxy_arp_pvlan (git-fixes).
- net: evaluate net.ipvX.conf.all.ignore_routes_with_linkdown (git-fixes).
- net: hns3: fix error mask definition of flow director (git-fixes).
- net: hso: bail out on interrupt URB allocation failure (git-fixes).
- net: lapbether: Remove netif_start_queue / netif_stop_queue (git-fixes).
- net: ll_temac: Fix potential NULL dereference in temac_probe() (git-fixes).
- net: ll_temac: Use devm_platform_ioremap_resource_byname() (git-fixes).
- net: macb: add function to disable all macb clocks (git-fixes).
- net: macb: restore cmp registers on resume path (git-fixes).
- net: macb: unprepare clocks in case of failure (git-fixes).
- net: mscc: Fix OF_MDIO config check (git-fixes).
- net: mvneta: Remove per-cpu queue mapping for Armada 3700 (git-fixes).
- net: rose: fix UAF bug caused by rose_t0timer_expiry (git-fixes).
- net: stmmac: dwmac-sun8i: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: stmmac: fix CBS idleslope and sendslope calculation (git-fixes).
- net: stmmac: fix incorrect DMA channel intr enable setting of EQoS v4.10 (git-fixes).
- net: stmmac: fix watchdog timeout during suspend/resume stress test (git-fixes).
- net: stmmac: stop each tx channel independently (git-fixes).
- net: tun: set tun-&gt;dev-&gt;addr_len during TUNSETLINK processing (git-fixes).
- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).
- net: usb: ax88179_178a: add MCT usb 3.0 adapter (git-fixes).
- net: usb: ax88179_178a: add Toshiba usb 3.0 adapter (git-fixes).
- net: usb: ax88179_178a: remove redundant assignment to variable ret (git-fixes).
- net: usb: ax88179_178a: write mac to hardware in get_mac_addr (git-fixes).
- net: usb: qmi_wwan: add Telit 0x1060 composition (git-fixes).
- net: usb: qmi_wwan: add Telit 0x1070 composition (git-fixes).
- net: usb: use eth_hw_addr_set() (git-fixes).
- nvme: consider also host_iface when checking ip options (bsc#1199670).
- octeontx2-af: fix memory leak of lmac and lmac-&gt;name (git-fixes).
- pinctrl: sunxi: a83t: Fix NAND function name for some pins (git-fixes).
- pinctrl: sunxi: sunxi_pconf_set: use correct offset (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: hp-wmi: Ignore Sanitization Mode event (git-fixes).
- power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe (git-fixes).
- powerpc/mobility: wait for memory transfer to complete (bsc#1201846 ltc#198761).
- powerpc/pseries/mobility: set NMI watchdog factor during an LPM (bsc#1201846 ltc#198761).
- powerpc/watchdog: introduce a NMI watchdog's factor (bsc#1201846 ltc#198761).
- profiling: fix shift-out-of-bounds bugs (git fixes).
- qla2xxx: drop patch which prevented nvme port discovery (bsc#1200651 bsc#1200644 bsc#1201954 bsc#1201958).
- r8169: fix accessing unset transport header (git-fixes).
- random: document add_hwgenerator_randomness() with other input functions (git-fixes).
- random: fix typo in comments (git-fixes).
- random: remove useless header comment (git fixes).
- raw: Fix a data-race around sysctl_raw_l3mdev_accept (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- rpm/kernel-binary.spec.in: Require dwarves &gt;= 1.22 on SLE15-SP3 or newer Dwarves 1.22 or newer is required to build kernels with BTF information embedded in modules.
- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)
- sched/fair: Revise comment about lb decision matrix (git fixes (sched/fair)).
- sched/membarrier: fix missing local execution of ipi_sync_rq_state() (git fixes (sched/membarrier)).
- scripts: dummy-tools, add pahole (jsc#SLE-24559).
- scsi: core: Fix error handling of scsi_host_alloc() (git-fixes).
- scsi: core: Fix failure handling of scsi_add_host_with_dma() (git-fixes).
- scsi: core: Only put parent device if host state differs from SHOST_CREATED (git-fixes).
- scsi: core: Put .shost_dev in failure path if host state changes to RUNNING (git-fixes).
- scsi: core: Put LLD module refcnt after SCSI device is released (git-fixes).
- scsi: core: Retry I/O for Notify (Enable Spinup) Required error (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956 bsc#1200521).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).
- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).
- scsi: qla2xxx: Fix imbalance vha-&gt;vref_count (bsc#1201958).
- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).
- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).
- scsi: qla2xxx: Update manufacturer details (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).
- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).
- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).
- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).
- scsi: sd: Fix potential NULL pointer dereference (git-fixes).
- scsi: ufs: Release clock if DMA map fails (git-fixes).
- scsi: ufs: handle cleanup correctly on devm_reset_control_get error (git-fixes).
- serial: 8250: fix return error code in serial8250_request_std_resource() (git-fixes).
- serial: pl011: UPSTAT_AUTORTS requires .throttle/unthrottle (git-fixes).
- serial: stm32: Clear prev values before setting RTS delays (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soc: ixp4xx/npe: Fix unused match warning (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- spi: &amp;lt;linux/spi/spi.h&gt;: add missing struct kernel-doc entry (git-fixes).
- spi: amd: Limit max transfer and message size (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- sysctl: Fix data races in proc_dointvec() (git-fixes).
- sysctl: Fix data races in proc_dointvec_jiffies() (git-fixes).
- sysctl: Fix data races in proc_dointvec_minmax() (git-fixes).
- sysctl: Fix data races in proc_douintvec() (git-fixes).
- sysctl: Fix data races in proc_douintvec_minmax() (git-fixes).
- sysctl: Fix data-races in proc_dointvec_ms_jiffies() (git-fixes).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation (git fixes (kernel/time)).
- usb: dwc3: add cancelled reasons for dwc3 requests (git-fixes).
- usb: dwc3: gadget: Fix event pending check (git-fixes).
- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- usb: typec: add missing uevent when partner support PD (git-fixes).
- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- usb: xhci: tegra: Fix error check (git-fixes).
- usbnet: fix memory leak in error case (git-fixes).
- video: of_display_timing.h: include errno.h (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- virtio_mmio: Add missing PM calls to freeze/restore (git-fixes).
- virtio_mmio: Restore guest page size on resume (git-fixes).
- watchdog: export lockup_detector_reconfigure (bsc#1201846 ltc#198761).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211: fix queue selection for mesh/OCB interfaces (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- x86/bugs: Remove apostrophe typo (bsc#1178134).
- x86/kvmclock: Move this_cpu_pvti into kvmclock.h (git-fixes).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1178134).
- xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue (bsc#1201381).
- xen: detect uninitialized xenbus in xenbus_init (git-fixes).
- xen: do not continue xenstore initialization in case of errors (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-23"/>
	<updated date="2022-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196616">SUSE bug 1196616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199364">SUSE bug 1199364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199647">SUSE bug 1199647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199665">SUSE bug 1199665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199670">SUSE bug 1199670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200521">SUSE bug 1200521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200598">SUSE bug 1200598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200644">SUSE bug 1200644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200651">SUSE bug 1200651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201196">SUSE bug 1201196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201206">SUSE bug 1201206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201251">SUSE bug 1201251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201381">SUSE bug 1201381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201429">SUSE bug 1201429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201442">SUSE bug 1201442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201458">SUSE bug 1201458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201636">SUSE bug 1201636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201644">SUSE bug 1201644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201645">SUSE bug 1201645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201664">SUSE bug 1201664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201672">SUSE bug 1201672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201673">SUSE bug 1201673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201676">SUSE bug 1201676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201846">SUSE bug 1201846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201930">SUSE bug 1201930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201954">SUSE bug 1201954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201956">SUSE bug 1201956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201958">SUSE bug 1201958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202154">SUSE bug 1202154</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1116/">CVE-2022-1116</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706405" comment="cluster-md-kmp-64kb-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706096" comment="cluster-md-kmp-default-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706406" comment="cluster-md-kmp-preempt-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706407" comment="dlm-kmp-64kb-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706097" comment="dlm-kmp-default-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706408" comment="dlm-kmp-preempt-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706409" comment="dtb-al-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706410" comment="dtb-allwinner-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706411" comment="dtb-altera-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706412" comment="dtb-amd-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706413" comment="dtb-amlogic-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706414" comment="dtb-apm-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706415" comment="dtb-arm-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706416" comment="dtb-broadcom-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706417" comment="dtb-cavium-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706418" comment="dtb-exynos-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706419" comment="dtb-freescale-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706420" comment="dtb-hisilicon-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706421" comment="dtb-lg-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706422" comment="dtb-marvell-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706423" comment="dtb-mediatek-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706424" comment="dtb-nvidia-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706425" comment="dtb-qcom-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706426" comment="dtb-renesas-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706427" comment="dtb-rockchip-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706428" comment="dtb-socionext-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706429" comment="dtb-sprd-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706430" comment="dtb-xilinx-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706431" comment="dtb-zte-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706432" comment="gfs2-kmp-64kb-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706098" comment="gfs2-kmp-default-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706433" comment="gfs2-kmp-preempt-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705841" comment="kernel-64kb-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705842" comment="kernel-64kb-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706434" comment="kernel-64kb-extra-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706435" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706436" comment="kernel-64kb-optional-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706437" comment="kernel-debug-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706438" comment="kernel-debug-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706439" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705843" comment="kernel-default-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705844" comment="kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706440" comment="kernel-default-base-rebuild-5.3.18-150300.59.90.1.150300.18.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705845" comment="kernel-default-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706441" comment="kernel-default-extra-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706442" comment="kernel-default-livepatch-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706443" comment="kernel-default-livepatch-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706444" comment="kernel-default-optional-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705846" comment="kernel-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705853" comment="kernel-docs-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706445" comment="kernel-docs-html-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706446" comment="kernel-kvmsmall-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706447" comment="kernel-kvmsmall-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706448" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705847" comment="kernel-macros-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705854" comment="kernel-obs-build-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706449" comment="kernel-obs-qa-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705848" comment="kernel-preempt-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705855" comment="kernel-preempt-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706450" comment="kernel-preempt-extra-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706451" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706452" comment="kernel-preempt-optional-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705856" comment="kernel-source-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706453" comment="kernel-source-vanilla-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705857" comment="kernel-syms-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705849" comment="kernel-zfcpdump-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706454" comment="kselftests-kmp-64kb-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706455" comment="kselftests-kmp-default-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706456" comment="kselftests-kmp-preempt-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706457" comment="ocfs2-kmp-64kb-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706099" comment="ocfs2-kmp-default-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706458" comment="ocfs2-kmp-preempt-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706459" comment="reiserfs-kmp-64kb-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705858" comment="reiserfs-kmp-default-5.3.18-150300.59.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706460" comment="reiserfs-kmp-preempt-5.3.18-150300.59.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52838" version="1" class="patch">
	<metadata>
		<title>Security update for gfbgraph (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189850" ref_url="https://bugzilla.suse.com/1189850" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39358" ref_url="https://www.suse.com/security/cve/CVE-2021-39358/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011975.html" source="SUSE-SU"/>
		<description>
This update for gfbgraph fixes the following issues:

- CVE-2021-39358: Fixed missing TLS certificate verification (bsc#1189850). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-23"/>
	<updated date="2022-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189850">SUSE bug 1189850</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39358/">CVE-2021-39358</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706480" comment="gfbgraph-devel-0.2.3-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706481" comment="libgfbgraph-0_2-0-0.2.3-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706482" comment="typelib-1_0-GFBGraph-0_2-0.2.3-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52839" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011983.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: Fixed an issue which could allow clients to cause a
  denial of service by repeatedly renegotiating a connection (bsc#1181686).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707088" comment="libspice-server-devel-0.14.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707089" comment="libspice-server1-0.14.3-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52840" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202020" ref_url="https://bugzilla.suse.com/1202020" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011981.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2022-2509: Fixed a double free issue during PKCS7 verification (bsc#1202020).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202020">SUSE bug 1202020</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705623" comment="gnutls-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705814" comment="gnutls-guile-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705624" comment="libgnutls-devel-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705815" comment="libgnutls-devel-32bit-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705625" comment="libgnutls30-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705626" comment="libgnutls30-32bit-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705627" comment="libgnutls30-hmac-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705628" comment="libgnutls30-hmac-32bit-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705629" comment="libgnutlsxx-devel-3.6.7-150200.14.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705630" comment="libgnutlsxx28-3.6.7-150200.14.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52841" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194704" ref_url="https://bugzilla.suse.com/1194704" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0204" ref_url="https://www.suse.com/security/cve/CVE-2022-0204/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011982.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2022-0204: Fixed a buffer overflow in the implementation of the
  gatt protocol (bsc#1194704).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2022-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194704">SUSE bug 1194704</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-0204/">CVE-2022-0204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706678" comment="bluez-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706754" comment="bluez-auto-enable-devices-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706755" comment="bluez-cups-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706679" comment="bluez-deprecated-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706681" comment="bluez-devel-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706756" comment="bluez-devel-32bit-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706757" comment="bluez-test-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706680" comment="libbluetooth3-5.55-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706758" comment="libbluetooth3-32bit-5.55-150300.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52842" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191895" ref_url="https://bugzilla.suse.com/1191895" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41159" ref_url="https://www.suse.com/security/cve/CVE-2021-41159/" source="CVE"/>
		<reference ref_id="CVE-2022-41160" ref_url="https://www.suse.com/security/cve/CVE-2022-41160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011988.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2021-41159: Fixed improper validation of client input (bsc#1191895).
- CVE-2022-41160: Fixed improper region checks (bsc#1191895).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191895">SUSE bug 1191895</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41159/">CVE-2021-41159</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2022-41160/">CVE-2022-41160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706470" comment="freerdp-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706471" comment="freerdp-devel-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706472" comment="freerdp-proxy-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706473" comment="freerdp-server-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706474" comment="freerdp-wayland-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706475" comment="libfreerdp2-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706476" comment="libuwac0-0-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706477" comment="libwinpr2-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706478" comment="uwac0-0-devel-2.1.2-150200.15.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706479" comment="winpr2-devel-2.1.2-150200.15.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52843" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178903" ref_url="https://bugzilla.suse.com/1178903" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25713" ref_url="https://www.suse.com/security/cve/CVE-2020-25713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011990.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- CVE-2020-25713: Fixed an out of bounds access triggered via a
  malformed input file (bsc#1178903).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2022-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178903">SUSE bug 1178903</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25713/">CVE-2020-25713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009705850" comment="libraptor-devel-2.0.15-150200.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705851" comment="libraptor2-0-2.0.15-150200.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706469" comment="libraptor2-0-32bit-2.0.15-150200.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009705852" comment="raptor-2.0.15-150200.9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52844" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201253" ref_url="https://bugzilla.suse.com/1201253" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012000.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2022-2309: Fixed NULL pointer dereference due to state leak between parser runs (bsc#1201253).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201253">SUSE bug 1201253</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707560" comment="python2-lxml-4.7.1-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707561" comment="python2-lxml-devel-4.7.1-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707544" comment="python3-lxml-4.7.1-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707545" comment="python3-lxml-devel-4.7.1-150200.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52845" version="1" class="patch">
	<metadata>
		<title>Security update for libyang (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186377" ref_url="https://bugzilla.suse.com/1186377" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28905" ref_url="https://www.suse.com/security/cve/CVE-2021-28905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012006.html" source="SUSE-SU"/>
		<description>
This update for libyang fixes the following issues:

- CVE-2021-28905: Fixed a reachable assertion which could be exploited
  by an attacker to cause a denial of service (bsc#1186377).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186377">SUSE bug 1186377</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28905/">CVE-2021-28905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707632" comment="libyang-cpp-devel-1.0.184-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707633" comment="libyang-cpp1-1.0.184-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707634" comment="libyang-devel-1.0.184-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707635" comment="libyang-doc-1.0.184-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707572" comment="libyang-extentions-1.0.184-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707573" comment="libyang1-1.0.184-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707636" comment="python3-yang-1.0.184-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707637" comment="yang-tools-1.0.184-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52846" version="1" class="patch">
	<metadata>
		<title>Security update for keepalived (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193115" ref_url="https://bugzilla.suse.com/1193115" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44225" ref_url="https://www.suse.com/security/cve/CVE-2021-44225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012005.html" source="SUSE-SU"/>
		<description>
This update for keepalived fixes the following issues:

- CVE-2021-44225: Fix a potential privilege escalation due to
  insufficient control in the D-Bus policy (bsc#1193115).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-26"/>
	<updated date="2022-08-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193115">SUSE bug 1193115</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-44225/">CVE-2021-44225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707786" comment="keepalived-2.0.19-150100.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52847" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202657" ref_url="https://bugzilla.suse.com/1202657" source="BUGZILLA"/>
		<reference ref_id="1202733" ref_url="https://bugzilla.suse.com/1202733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012007.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- Updated to version 12.1.0 (build 20219665) (bsc#1202733):
  - CVE-2022-31676: Fixed an issue that could allow unprivileged users
    inside a virtual machine to escalate privileges (bsc#1202657).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-29"/>
	<updated date="2022-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202657">SUSE bug 1202657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202733">SUSE bug 1202733</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707920" comment="libvmtools-devel-12.1.0-150300.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707921" comment="libvmtools0-12.1.0-150300.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707922" comment="open-vm-tools-12.1.0-150300.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707923" comment="open-vm-tools-desktop-12.1.0-150300.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707924" comment="open-vm-tools-sdmp-12.1.0-150300.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52848" version="1" class="patch">
	<metadata>
		<title>Security update for libslirp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1201551" ref_url="https://bugzilla.suse.com/1201551" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012010.html" source="SUSE-SU"/>
		<description>
This update for libslirp fixes the following issues:

- CVE-2021-3593: Fixed invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365).

Non-security fixes:

- Fix the version header (bsc#1201551)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-30"/>
	<updated date="2022-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201551">SUSE bug 1201551</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707676" comment="libslirp-devel-4.3.1-150300.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707677" comment="libslirp0-4.3.1-150300.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52849" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012011.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to 10.22:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2022-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706878" comment="postgresql10-10.22-150100.8.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706879" comment="postgresql10-contrib-10.22-150100.8.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706917" comment="postgresql10-docs-10.22-150100.8.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706881" comment="postgresql10-plperl-10.22-150100.8.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706882" comment="postgresql10-plpython-10.22-150100.8.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706883" comment="postgresql10-pltcl-10.22-150100.8.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706884" comment="postgresql10-server-10.22-150100.8.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707056" comment="postgresql10-test-10.22-150100.8.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52850" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202175" ref_url="https://bugzilla.suse.com/1202175" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012012.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2022-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202175">SUSE bug 1202175</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706230" comment="libminizip1-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706483" comment="libminizip1-32bit-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706231" comment="libz1-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706232" comment="libz1-32bit-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706233" comment="minizip-devel-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706234" comment="zlib-devel-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706240" comment="zlib-devel-32bit-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706235" comment="zlib-devel-static-1.2.11-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706484" comment="zlib-devel-static-32bit-1.2.11-150000.3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52851" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Updated to Java 8.0 Service Refresh 7 Fix Pack 11 (bsc#1202427):
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21549: Fixed an issue that could lead to computing
    negative random exponentials (bsc#1201685).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2022-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707070" comment="java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707366" comment="java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707071" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707367" comment="java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707072" comment="java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707368" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707073" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707369" comment="java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52852" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201688" ref_url="https://bugzilla.suse.com/1201688" source="BUGZILLA"/>
		<reference ref_id="1201693" ref_url="https://bugzilla.suse.com/1201693" source="BUGZILLA"/>
		<reference ref_id="1201702" ref_url="https://bugzilla.suse.com/1201702" source="BUGZILLA"/>
		<reference ref_id="1201704" ref_url="https://bugzilla.suse.com/1201704" source="BUGZILLA"/>
		<reference ref_id="1201706" ref_url="https://bugzilla.suse.com/1201706" source="BUGZILLA"/>
		<reference ref_id="1201707" ref_url="https://bugzilla.suse.com/1201707" source="BUGZILLA"/>
		<reference ref_id="1201708" ref_url="https://bugzilla.suse.com/1201708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920/" source="CVE"/>
		<reference ref_id="CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921/" source="CVE"/>
		<reference ref_id="CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922/" source="CVE"/>
		<reference ref_id="CVE-2022-1923" ref_url="https://www.suse.com/security/cve/CVE-2022-1923/" source="CVE"/>
		<reference ref_id="CVE-2022-1924" ref_url="https://www.suse.com/security/cve/CVE-2022-1924/" source="CVE"/>
		<reference ref_id="CVE-2022-1925" ref_url="https://www.suse.com/security/cve/CVE-2022-1925/" source="CVE"/>
		<reference ref_id="CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2022-1920: Fixed integer overflow in WavPack header handling code (bsc#1201688).
- CVE-2022-1921: Fixed integer overflow resulting in heap corruption in avidemux element (bsc#1201693).
- CVE-2022-1922: Fixed integer overflows in mkv demuxing (bsc#1201702).
- CVE-2022-1923: Fixed integer overflows in mkv demuxing using bzip (bsc#1201704).
- CVE-2022-1924: Fixed integer overflows in mkv demuxing using lzo (bsc#1201706).
- CVE-2022-1925: Fixed integer overflows in mkv demuxing using HEADERSTRIP (bsc#1201707).
- CVE-2022-2122: Fixed integer overflows in qtdemux using zlib (bsc#1201708).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2022-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201688">SUSE bug 1201688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201693">SUSE bug 1201693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201702">SUSE bug 1201702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201704">SUSE bug 1201704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201706">SUSE bug 1201706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201707">SUSE bug 1201707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201708">SUSE bug 1201708</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1923/">CVE-2022-1923</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1924/">CVE-2022-1924</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1925/">CVE-2022-1925</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706236" comment="gstreamer-plugins-good-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706485" comment="gstreamer-plugins-good-32bit-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706486" comment="gstreamer-plugins-good-doc-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706487" comment="gstreamer-plugins-good-extra-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706488" comment="gstreamer-plugins-good-extra-32bit-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706489" comment="gstreamer-plugins-good-gtk-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706490" comment="gstreamer-plugins-good-jack-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706491" comment="gstreamer-plugins-good-jack-32bit-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706237" comment="gstreamer-plugins-good-lang-1.16.3-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706492" comment="gstreamer-plugins-good-qtqml-1.16.3-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52853" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201840" ref_url="https://bugzilla.suse.com/1201840" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012015.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes the following issues:

- CVE-2022-29154: Fixed an arbitrary file write issue that could be
  triggered by a malicious remote server (bsc#1201840).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2022-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706877" comment="rsync-3.1.3-150000.4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52854" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201727" ref_url="https://bugzilla.suse.com/1201727" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21233" ref_url="https://www.suse.com/security/cve/CVE-2022-21233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012017.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220809 release (bsc#1201727):

- CVE-2022-21233: Fixed an issue where stale data may have been leaked from the legacy xAPIC MMIO region, which could be used to compromise an SGX enclave (INTEL-SA-00657).
    See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html

Other fixes:

- Update for functional issues.
    See also: https://www.intel.com/content/www/us/en/processors/xeon/scalable/xeon-scalable-spec-update.html?wapkw=processor+specification+update

- Updated Platforms:

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | SKX-SP         | B1       | 06-55-03/97 | 0100015d | 0100015e | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006d05 | 02006e05 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006d05 | 02006e05 | Xeon D-21xx
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000363 | 0d000375 | Xeon Scalable Gen3
  | GLK            | B0       | 06-7a-01/01 | 0000003a | 0000003c | Pentium Silver N/J5xxx, Celeron N/J4xxx
  | GLK-R          | R0       | 06-7a-08/01 | 0000001e | 00000020 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b0 | 000000b2 | Core Gen10 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000026 | 00000028 | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 0000003e | 00000040 | Core Gen11 Mobile
  | RKL-S          | B0       | 06-a7-01/02 | 00000053 | 00000054 | Core Gen11
  | ADL            | C0       | 06-97-02/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | C0       | 06-97-05/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 0000041c | 00000421 | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 0000041c | 00000421 | Core Gen12
  | ADL            | C0       | 06-bf-02/03 | 0000001f | 00000022 | Core Gen12
  | ADL            | C0       | 06-bf-05/03 | 0000001f | 00000022 | Core Gen12
  ------------------------------------------------------------------
		</description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2022-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201727">SUSE bug 1201727</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21233/">CVE-2022-21233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706876" comment="ucode-intel-20220809-150200.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52855" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012053.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- Update to 13.8:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707065" comment="postgresql13-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707090" comment="postgresql13-contrib-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707091" comment="postgresql13-devel-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707092" comment="postgresql13-docs-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707083" comment="postgresql13-llvmjit-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707093" comment="postgresql13-plperl-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707094" comment="postgresql13-plpython-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707095" comment="postgresql13-pltcl-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707096" comment="postgresql13-server-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707097" comment="postgresql13-server-devel-13.8-150200.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707084" comment="postgresql13-test-13.8-150200.5.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52856" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012055.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- Update to 12.12:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707074" comment="postgresql12-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707075" comment="postgresql12-contrib-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707076" comment="postgresql12-devel-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707077" comment="postgresql12-docs-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707085" comment="postgresql12-llvmjit-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707078" comment="postgresql12-plperl-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707079" comment="postgresql12-plpython-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707080" comment="postgresql12-pltcl-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707081" comment="postgresql12-server-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707082" comment="postgresql12-server-devel-12.12-150200.8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707086" comment="postgresql12-test-12.12-150200.8.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52857" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198166" ref_url="https://bugzilla.suse.com/1198166" source="BUGZILLA"/>
		<reference ref_id="1200437" ref_url="https://bugzilla.suse.com/1200437" source="BUGZILLA"/>
		<reference ref_id="1202368" ref_url="https://bugzilla.suse.com/1202368" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012054.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:

- Upgrade to version 14.5:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).

- Upgrade to version 14.4 (bsc#1200437)
- Release notes: https://www.postgresql.org/docs/release/14.4/
- Release announcement: https://www.postgresql.org/about/news/p-2470/
- Prevent possible corruption of indexes created or rebuilt with the CONCURRENTLY option (bsc#1200437)
- Pin to llvm13 until the next patchlevel update (bsc#1198166)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-01"/>
	<updated date="2022-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198166">SUSE bug 1198166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200437">SUSE bug 1200437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706888" comment="libecpg6-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707054" comment="libecpg6-32bit-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706874" comment="libpq5-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706925" comment="libpq5-32bit-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706875" comment="postgresql14-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706889" comment="postgresql14-contrib-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706890" comment="postgresql14-devel-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706891" comment="postgresql14-docs-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706885" comment="postgresql14-llvmjit-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706892" comment="postgresql14-plperl-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706893" comment="postgresql14-plpython-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706894" comment="postgresql14-pltcl-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706895" comment="postgresql14-server-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706896" comment="postgresql14-server-devel-14.5-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707055" comment="postgresql14-test-14.5-150200.5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52858" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201826" ref_url="https://bugzilla.suse.com/1201826" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46829" ref_url="https://www.suse.com/security/cve/CVE-2021-46829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012066.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2021-46829: Fixed overflow when compositing or clearing frames (bsc#1201826).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2022-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201826">SUSE bug 1201826</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46829/">CVE-2021-46829</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707437" comment="gdk-pixbuf-devel-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707499" comment="gdk-pixbuf-devel-32bit-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707438" comment="gdk-pixbuf-lang-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707439" comment="gdk-pixbuf-query-loaders-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707448" comment="gdk-pixbuf-query-loaders-32bit-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707440" comment="gdk-pixbuf-thumbnailer-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707441" comment="libgdk_pixbuf-2_0-0-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707449" comment="libgdk_pixbuf-2_0-0-32bit-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707442" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707443" comment="typelib-1_0-GdkPixdata-2_0-2.40.0-150200.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52859" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202593" ref_url="https://bugzilla.suse.com/1202593" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012067.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-35252: Fixed a potential injection of control characters
  into cookies, which could be exploited by sister sites to cause a
  denial of service (bsc#1202593).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2022-09-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1202593">SUSE bug 1202593</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708195" comment="curl-7.66.0-150200.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708196" comment="libcurl-devel-7.66.0-150200.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708369" comment="libcurl-devel-32bit-7.66.0-150200.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708197" comment="libcurl4-7.66.0-150200.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708198" comment="libcurl4-32bit-7.66.0-150200.4.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52860" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199908" ref_url="https://bugzilla.suse.com/1199908" source="BUGZILLA"/>
		<reference ref_id="1202470" ref_url="https://bugzilla.suse.com/1202470" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2850" ref_url="https://www.suse.com/security/cve/CVE-2022-2850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012079.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-2850: Fixed an application crash when running a sync_repl client that could be triggered via a malformed cookie (bsc#1202470).

Non-security fixes:

- Update to version 1.4.4.19~git46.c900a28c8:
  * CI - makes replication/acceptance_test.py::test_modify_entry more robust
  * UI - LDAP Editor is not updated when we switch instances
- Improvements to openldap import with password policy present (bsc#1199908)
- Update to version 1.4.4.19~git43.8ba2ea21f:
  * fix covscan
  * BUG - pid file handling
  * Memory leak in slapi_ldap_get_lderrno
  * Need a compatibility option about sub suffix handling
  * Release tarballs don't contain cockpit webapp
  * Replication broken after password change
  * Harden ReplicationManager.wait_for_replication
  * dscontainer: TypeError: unsupported operand type(s) for /: 'str' and 'int'
  * CLI - dsconf backend export breaks with multiple backends
  * CLI - improve task handling
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-05"/>
	<updated date="2022-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199908">SUSE bug 1199908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202470">SUSE bug 1202470</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2850/">CVE-2022-2850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707678" comment="389-ds-1.4.4.19~git46.c900a28c8-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707679" comment="389-ds-devel-1.4.4.19~git46.c900a28c8-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707768" comment="389-ds-snmp-1.4.4.19~git46.c900a28c8-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707680" comment="lib389-1.4.4.19~git46.c900a28c8-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707681" comment="libsvrcore0-1.4.4.19~git46.c900a28c8-150300.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52861" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012081.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.13.0 ESR (bsc#1202645):

- CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling.
- CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions.
- CVE-2022-38478: Fixed various memory safety issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-05"/>
	<updated date="2022-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707960" comment="MozillaFirefox-91.13.0-150200.152.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707961" comment="MozillaFirefox-branding-SLE-91-150200.9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708001" comment="MozillaFirefox-branding-upstream-91.13.0-150200.152.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708002" comment="MozillaFirefox-devel-91.13.0-150200.152.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707963" comment="MozillaFirefox-translations-common-91.13.0-150200.152.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707964" comment="MozillaFirefox-translations-other-91.13.0-150200.152.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52862" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="1198935" ref_url="https://bugzilla.suse.com/1198935" source="BUGZILLA"/>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41041" ref_url="https://www.suse.com/security/cve/CVE-2021-41041/" source="CVE"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

- Updated to OpenJDK 8u345 build 01 with OpenJ9 0.33.0 virtual machine:
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).

- Updated to OpenJDK 8u332 build 09 with OpenJ9 0.32.0 virtual machine:
  - CVE-2021-41041: Failed an issue that could allow unverified methods
    to be invoked using MethodHandles (bsc#1198935).
  - CVE-2022-21426: Fixed a remote partial denial of service issue
    (component: JAXP) (bsc#1198672).
  - CVE-2022-21434: Fixed an issue that could allow a remote attacker
    to update, insert or delete data (component: Libraries) (bsc#1198674).
  - CVE-2022-21443: Fixed a remote partial denial of service issue
    (component: Libraries) (bsc#1198675).
  - CVE-2022-21476: Fixed an issue that could allow unauthorized
    access to confidential data (component: Libraries) (bsc#1198671).
  - CVE-2022-21496: Fixed an issue that could allow a remote attacker
    to update, insert or delete data (component: JNDI) (bsc#1198673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198935">SUSE bug 1198935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41041/">CVE-2021-41041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707370" comment="java-1_8_0-openj9-1.8.0.345-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707371" comment="java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707372" comment="java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707373" comment="java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707374" comment="java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707375" comment="java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707376" comment="java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52863" version="1" class="patch">
	<metadata>
		<title>Security update for python-Flask-Security-Too (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181058" ref_url="https://bugzilla.suse.com/1181058" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21241" ref_url="https://www.suse.com/security/cve/CVE-2021-21241/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012106.html" source="SUSE-SU"/>
		<description>
This update for python-Flask-Security-Too fixes the following issues:

- CVE-2021-21241: Fixed an issue where GET requests lacking CSRF
  protection to certain endpoints could return the user's
  authentication token (bsc#1181058).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181058">SUSE bug 1181058</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21241/">CVE-2021-21241</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707546" comment="python3-Flask-Security-Too-3.4.2-150200.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52864" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188524" ref_url="https://bugzilla.suse.com/1188524" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36980" ref_url="https://www.suse.com/security/cve/CVE-2021-36980/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012104.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2021-36980: Fixed a use-after-free issue during the decoding of
  a RAW_ENCAP action (bsc#1188524).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188524">SUSE bug 1188524</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36980/">CVE-2021-36980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707772" comment="libopenvswitch-2_13-0-2.13.2-150200.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707773" comment="libovn-20_03-0-20.03.1-150200.9.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52865" version="1" class="patch">
	<metadata>
		<title>Security update for python-bottle (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200286" ref_url="https://bugzilla.suse.com/1200286" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31799" ref_url="https://www.suse.com/security/cve/CVE-2022-31799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012109.html" source="SUSE-SU"/>
		<description>
This update for python-bottle fixes the following issues:

- CVE-2022-31799: Fixed an error mishandling issue that could lead to
  remote denial of service (bsc#1200286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200286">SUSE bug 1200286</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31799/">CVE-2022-31799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707363" comment="python-bottle-doc-0.12.13-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707087" comment="python2-bottle-0.12.13-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707069" comment="python3-bottle-0.12.13-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52866" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201192" ref_url="https://bugzilla.suse.com/1201192" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32990" ref_url="https://www.suse.com/security/cve/CVE-2022-32990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012112.html" source="SUSE-SU"/>
		<description>
This update for gimp fixes the following issues:

- CVE-2022-32990: Fixed an unhandled exception which may lead to denial
  of service (bsc#1201192).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201192">SUSE bug 1201192</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32990/">CVE-2022-32990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709620" comment="gimp-2.10.12-150300.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709621" comment="gimp-devel-2.10.12-150300.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709512" comment="gimp-lang-2.10.12-150300.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709622" comment="gimp-plugin-aa-2.10.12-150300.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709623" comment="libgimp-2_0-0-2.10.12-150300.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709624" comment="libgimp-2_0-0-32bit-2.10.12-150300.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709625" comment="libgimpui-2_0-0-2.10.12-150300.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709626" comment="libgimpui-2_0-0-32bit-2.10.12-150300.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52867" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188524" ref_url="https://bugzilla.suse.com/1188524" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36980" ref_url="https://www.suse.com/security/cve/CVE-2021-36980/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012114.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2021-36980: Fixed a use-after-free issue during the decoding of
  a RAW_ENCAP action (bsc#1188524).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188524">SUSE bug 1188524</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36980/">CVE-2021-36980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707682" comment="libopenvswitch-2_14-0-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707683" comment="libovn-20_06-0-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707684" comment="openvswitch-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707685" comment="openvswitch-devel-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707770" comment="openvswitch-doc-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707686" comment="openvswitch-ipsec-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707687" comment="openvswitch-pki-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707688" comment="openvswitch-test-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707689" comment="openvswitch-vtep-2.14.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707690" comment="ovn-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707691" comment="ovn-central-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707692" comment="ovn-devel-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707771" comment="ovn-doc-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707693" comment="ovn-docker-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707694" comment="ovn-host-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707695" comment="ovn-vtep-20.06.2-150300.19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707675" comment="python3-ovs-2.14.2-150300.19.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52868" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202250" ref_url="https://bugzilla.suse.com/1202250" source="BUGZILLA"/>
		<reference ref_id="1202800" ref_url="https://bugzilla.suse.com/1202800" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20224" ref_url="https://www.suse.com/security/cve/CVE-2021-20224/" source="CVE"/>
		<reference ref_id="CVE-2022-2719" ref_url="https://www.suse.com/security/cve/CVE-2022-2719/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012116.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20224: Fixed an integer overflow that could be triggered
  via a crafted file (bsc#1202800).
- CVE-2022-2719: Fixed a reachable assertion that could lead to denial
  of service via a crafted file (bsc#1202250).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2022-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202250">SUSE bug 1202250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202800">SUSE bug 1202800</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20224/">CVE-2021-20224</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2719/">CVE-2022-2719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708089" comment="ImageMagick-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708090" comment="ImageMagick-config-7-SUSE-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708091" comment="ImageMagick-config-7-upstream-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708092" comment="ImageMagick-devel-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708161" comment="ImageMagick-devel-32bit-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708162" comment="ImageMagick-doc-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708163" comment="ImageMagick-extra-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708093" comment="libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708164" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708094" comment="libMagick++-devel-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708165" comment="libMagick++-devel-32bit-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708095" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708166" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708096" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708167" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708097" comment="perl-PerlMagick-7.0.7.34-150200.10.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52869" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193951" ref_url="https://bugzilla.suse.com/1193951" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012157.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-21913: Fixed a memory safetey issue that could lead to use
  after free (bsc#1193951).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707450" comment="libicu60_2-60.2-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707503" comment="libicu60_2-32bit-60.2-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707451" comment="libicu60_2-bedata-60.2-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707452" comment="libicu60_2-ledata-60.2-150000.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52870" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193951" ref_url="https://bugzilla.suse.com/1193951" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012161.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-21913: Fixed a memory safetey issue that could lead to use
  after free (bsc#1193951).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707453" comment="icu-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707444" comment="libicu-devel-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707500" comment="libicu-devel-32bit-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707501" comment="libicu-doc-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707445" comment="libicu-suse65_1-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707502" comment="libicu-suse65_1-32bit-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707446" comment="libicu65_1-bedata-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707447" comment="libicu65_1-ledata-65.1-150200.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52871" version="1" class="patch">
	<metadata>
		<title>Security update for udisks2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1098797" ref_url="https://bugzilla.suse.com/1098797" source="BUGZILLA"/>
		<reference ref_id="1190606" ref_url="https://bugzilla.suse.com/1190606" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3802" ref_url="https://www.suse.com/security/cve/CVE-2021-3802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012165.html" source="SUSE-SU"/>
		<description>
This update for udisks2 fixes the following issues:

- CVE-2021-3802: Fixed insecure defaults in user-accessible mount helpers (bsc#1190606).
- Fixed vulnerability that allowed mounting ext4 devices over existing entries in fstab (bsc#1098797).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098797">SUSE bug 1098797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190606">SUSE bug 1190606</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3802/">CVE-2021-3802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709887" comment="libudisks2-0-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709888" comment="libudisks2-0-devel-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710080" comment="libudisks2-0_bcache-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710081" comment="libudisks2-0_btrfs-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710082" comment="libudisks2-0_lsm-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710083" comment="libudisks2-0_lvm2-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710084" comment="libudisks2-0_zram-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709889" comment="typelib-1_0-UDisks-2_0-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709890" comment="udisks2-2.8.1-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709891" comment="udisks2-lang-2.8.1-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52872" version="1" class="patch">
	<metadata>
		<title>Security update for libyajl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198405" ref_url="https://bugzilla.suse.com/1198405" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012163.html" source="SUSE-SU"/>
		<description>
This update for libyajl fixes the following issues:

- CVE-2022-24795: Fixed heap-based buffer overflow when handling large inputs (bsc#1198405).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-07"/>
	<updated date="2022-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198405">SUSE bug 1198405</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706238" comment="libyajl-devel-2.1.0-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706493" comment="libyajl-devel-32bit-2.1.0-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706494" comment="libyajl-devel-static-2.1.0-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706239" comment="libyajl2-2.1.0-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706495" comment="libyajl2-32bit-2.1.0-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706496" comment="yajl-2.1.0-150000.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52873" version="1" class="patch">
	<metadata>
		<title>Important security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1176460" ref_url="https://bugzilla.suse.com/1176460" source="BUGZILLA"/>
		<reference ref_id="1180816" ref_url="https://bugzilla.suse.com/1180816" source="BUGZILLA"/>
		<reference ref_id="1180942" ref_url="https://bugzilla.suse.com/1180942" source="BUGZILLA"/>
		<reference ref_id="1181119" ref_url="https://bugzilla.suse.com/1181119" source="BUGZILLA"/>
		<reference ref_id="1181935" ref_url="https://bugzilla.suse.com/1181935" source="BUGZILLA"/>
		<reference ref_id="1183684" ref_url="https://bugzilla.suse.com/1183684" source="BUGZILLA"/>
		<reference ref_id="1187725" ref_url="https://bugzilla.suse.com/1187725" source="BUGZILLA"/>
		<reference ref_id="1188061" ref_url="https://bugzilla.suse.com/1188061" source="BUGZILLA"/>
		<reference ref_id="1193585" ref_url="https://bugzilla.suse.com/1193585" source="BUGZILLA"/>
		<reference ref_id="1197963" ref_url="https://bugzilla.suse.com/1197963" source="BUGZILLA"/>
		<reference ref_id="1199528" ref_url="https://bugzilla.suse.com/1199528" source="BUGZILLA"/>
		<reference ref_id="1200142" ref_url="https://bugzilla.suse.com/1200142" source="BUGZILLA"/>
		<reference ref_id="1200591" ref_url="https://bugzilla.suse.com/1200591" source="BUGZILLA"/>
		<reference ref_id="1200968" ref_url="https://bugzilla.suse.com/1200968" source="BUGZILLA"/>
		<reference ref_id="1200970" ref_url="https://bugzilla.suse.com/1200970" source="BUGZILLA"/>
		<reference ref_id="1201003" ref_url="https://bugzilla.suse.com/1201003" source="BUGZILLA"/>
		<reference ref_id="1202614" ref_url="https://bugzilla.suse.com/1202614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3447" ref_url="https://www.suse.com/security/cve/CVE-2021-3447/" source="CVE"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<reference ref_id="CVE-2021-3620" ref_url="https://www.suse.com/security/cve/CVE-2021-3620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012182.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

ansible:

- Update to version 2.9.27 (jsc#SLE-23631, jsc#SLE-24133)
  * CVE-2021-3620 ansible-connection module discloses sensitive info in traceback error message (in 2.9.27) (bsc#1187725)
  * CVE-2021-3583 Template Injection through yaml multi-line strings with ansible facts used in template. (in 2.9.23) (bsc#1188061)
  * ansible module nmcli is broken in ansible 2.9.13 (in 2.9.15) (bsc#1176460)
- Update to 2.9.22:
  * CVE-2021-3447 (bsc#1183684) multiple modules expose secured values 
  * CVE-2021-20228 (bsc#1181935) basic.py no_log with fallback option
  * CVE-2021-20191 (bsc#1181119) multiple collections exposes secured values
  * CVE-2021-20180 (bsc#1180942) bitbucket_pipeline_variable exposes sensitive values
  * CVE-2021-20178 (bsc#1180816) user data leak in snmp_facts module

dracut-saltboot:

- Require e2fsprogs (bsc#1202614)
- Update to version 0.1.1657643023.0d694ce
  * Update dracut-saltboot dependencies (bsc#1200970)
  * Fix network loading when ipappend is used in pxe config
  * Add new information messages

golang-github-QubitProducts-exporter_exporter:

- Remove license file from %doc

mgr-daemon:

- Version 4.3.5-1
  * Update translation strings

mgr-virtualization:

- Version 4.3.6-1
  * Report all VMs in poller, not only running ones (bsc#1199528)

prometheus-blackbox_exporter:

- Exclude s390 arch

python-hwdata:

- Declare the LICENSE file as license and not doc

spacecmd:

- Version 4.3.14-1
  * Fix missing argument on system_listmigrationtargets (bsc#1201003)
  * Show correct help on calling kickstart_importjson with no arguments
  * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)
  * Change proxy container config default filename to end with tar.gz
  * Update translation strings

spacewalk-client-tools:

- Version 4.3.11-1
  * Update translation strings

uyuni-common-libs:

- Version 4.3.5-1
  * Fix reposync issue about 'rpm.hdr' object has no attribute 'get'

uyuni-proxy-systemd-services:

- Version 4.3.6-1
  * Expose port 80 (bsc#1200142)
  * Use volumes rather than bind mounts
  * TFTPD to listen on udp port (bsc#1200968)
  * Add TAG variable in configuration 
  * Fix containers namespaces in configuration

zypp-plugin-spacewalk:

- 1.0.13
  * Log in before listing channels. (bsc#1197963, bsc#1193585)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176460">SUSE bug 1176460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180816">SUSE bug 1180816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180942">SUSE bug 1180942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181119">SUSE bug 1181119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181935">SUSE bug 1181935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183684">SUSE bug 1183684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187725">SUSE bug 1187725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188061">SUSE bug 1188061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193585">SUSE bug 1193585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197963">SUSE bug 1197963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199528">SUSE bug 1199528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200142">SUSE bug 1200142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200591">SUSE bug 1200591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200968">SUSE bug 1200968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200970">SUSE bug 1200970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201003">SUSE bug 1201003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202614">SUSE bug 1202614</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3447/">CVE-2021-3447</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3620/">CVE-2021-3620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009706461" comment="ansible-2.9.27-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706462" comment="ansible-doc-2.9.27-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706463" comment="ansible-test-2.9.27-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707769" comment="dracut-saltboot-0.1.1657643023.0d694ce-150000.1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706465" comment="golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706466" comment="python2-hwdata-2.3.5-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706467" comment="python3-hwdata-2.3.5-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706468" comment="spacecmd-4.3.14-150000.3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52874" version="1" class="patch">
	<metadata>
		<title>Security update for libEMF (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1173070" ref_url="https://bugzilla.suse.com/1173070" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13999" ref_url="https://www.suse.com/security/cve/CVE-2020-13999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012194.html" source="SUSE-SU"/>
		<description>
This update for libEMF fixes the following issues:

- CVE-2020-13999: Fixed an integer overflow that could lead to denial
  of service via a crafted file (bsc#1173070).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-08"/>
	<updated date="2022-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173070">SUSE bug 1173070</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13999/">CVE-2020-13999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708081" comment="libEMF-devel-1.0.7-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708082" comment="libEMF-utils-1.0.7-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708083" comment="libEMF1-1.0.7-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52875" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200270" ref_url="https://bugzilla.suse.com/1200270" source="BUGZILLA"/>
		<reference ref_id="1200697" ref_url="https://bugzilla.suse.com/1200697" source="BUGZILLA"/>
		<reference ref_id="1200698" ref_url="https://bugzilla.suse.com/1200698" source="BUGZILLA"/>
		<reference ref_id="1200700" ref_url="https://bugzilla.suse.com/1200700" source="BUGZILLA"/>
		<reference ref_id="1200701" ref_url="https://bugzilla.suse.com/1200701" source="BUGZILLA"/>
		<reference ref_id="1200732" ref_url="https://bugzilla.suse.com/1200732" source="BUGZILLA"/>
		<reference ref_id="1200884" ref_url="https://bugzilla.suse.com/1200884" source="BUGZILLA"/>
		<reference ref_id="1200902" ref_url="https://bugzilla.suse.com/1200902" source="BUGZILLA"/>
		<reference ref_id="1200903" ref_url="https://bugzilla.suse.com/1200903" source="BUGZILLA"/>
		<reference ref_id="1200904" ref_url="https://bugzilla.suse.com/1200904" source="BUGZILLA"/>
		<reference ref_id="1201132" ref_url="https://bugzilla.suse.com/1201132" source="BUGZILLA"/>
		<reference ref_id="1201133" ref_url="https://bugzilla.suse.com/1201133" source="BUGZILLA"/>
		<reference ref_id="1201134" ref_url="https://bugzilla.suse.com/1201134" source="BUGZILLA"/>
		<reference ref_id="1201135" ref_url="https://bugzilla.suse.com/1201135" source="BUGZILLA"/>
		<reference ref_id="1201136" ref_url="https://bugzilla.suse.com/1201136" source="BUGZILLA"/>
		<reference ref_id="1201150" ref_url="https://bugzilla.suse.com/1201150" source="BUGZILLA"/>
		<reference ref_id="1201151" ref_url="https://bugzilla.suse.com/1201151" source="BUGZILLA"/>
		<reference ref_id="1201152" ref_url="https://bugzilla.suse.com/1201152" source="BUGZILLA"/>
		<reference ref_id="1201153" ref_url="https://bugzilla.suse.com/1201153" source="BUGZILLA"/>
		<reference ref_id="1201154" ref_url="https://bugzilla.suse.com/1201154" source="BUGZILLA"/>
		<reference ref_id="1201155" ref_url="https://bugzilla.suse.com/1201155" source="BUGZILLA"/>
		<reference ref_id="1201249" ref_url="https://bugzilla.suse.com/1201249" source="BUGZILLA"/>
		<reference ref_id="1201356" ref_url="https://bugzilla.suse.com/1201356" source="BUGZILLA"/>
		<reference ref_id="1201359" ref_url="https://bugzilla.suse.com/1201359" source="BUGZILLA"/>
		<reference ref_id="1201363" ref_url="https://bugzilla.suse.com/1201363" source="BUGZILLA"/>
		<reference ref_id="1201620" ref_url="https://bugzilla.suse.com/1201620" source="BUGZILLA"/>
		<reference ref_id="1201863" ref_url="https://bugzilla.suse.com/1201863" source="BUGZILLA"/>
		<reference ref_id="1202046" ref_url="https://bugzilla.suse.com/1202046" source="BUGZILLA"/>
		<reference ref_id="1202049" ref_url="https://bugzilla.suse.com/1202049" source="BUGZILLA"/>
		<reference ref_id="1202050" ref_url="https://bugzilla.suse.com/1202050" source="BUGZILLA"/>
		<reference ref_id="1202051" ref_url="https://bugzilla.suse.com/1202051" source="BUGZILLA"/>
		<reference ref_id="1202414" ref_url="https://bugzilla.suse.com/1202414" source="BUGZILLA"/>
		<reference ref_id="1202420" ref_url="https://bugzilla.suse.com/1202420" source="BUGZILLA"/>
		<reference ref_id="1202421" ref_url="https://bugzilla.suse.com/1202421" source="BUGZILLA"/>
		<reference ref_id="1202511" ref_url="https://bugzilla.suse.com/1202511" source="BUGZILLA"/>
		<reference ref_id="1202512" ref_url="https://bugzilla.suse.com/1202512" source="BUGZILLA"/>
		<reference ref_id="1202515" ref_url="https://bugzilla.suse.com/1202515" source="BUGZILLA"/>
		<reference ref_id="1202552" ref_url="https://bugzilla.suse.com/1202552" source="BUGZILLA"/>
		<reference ref_id="1202599" ref_url="https://bugzilla.suse.com/1202599" source="BUGZILLA"/>
		<reference ref_id="1202687" ref_url="https://bugzilla.suse.com/1202687" source="BUGZILLA"/>
		<reference ref_id="1202689" ref_url="https://bugzilla.suse.com/1202689" source="BUGZILLA"/>
		<reference ref_id="1202862" ref_url="https://bugzilla.suse.com/1202862" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1720" ref_url="https://www.suse.com/security/cve/CVE-2022-1720/" source="CVE"/>
		<reference ref_id="CVE-2022-1968" ref_url="https://www.suse.com/security/cve/CVE-2022-1968/" source="CVE"/>
		<reference ref_id="CVE-2022-2124" ref_url="https://www.suse.com/security/cve/CVE-2022-2124/" source="CVE"/>
		<reference ref_id="CVE-2022-2125" ref_url="https://www.suse.com/security/cve/CVE-2022-2125/" source="CVE"/>
		<reference ref_id="CVE-2022-2126" ref_url="https://www.suse.com/security/cve/CVE-2022-2126/" source="CVE"/>
		<reference ref_id="CVE-2022-2129" ref_url="https://www.suse.com/security/cve/CVE-2022-2129/" source="CVE"/>
		<reference ref_id="CVE-2022-2175" ref_url="https://www.suse.com/security/cve/CVE-2022-2175/" source="CVE"/>
		<reference ref_id="CVE-2022-2182" ref_url="https://www.suse.com/security/cve/CVE-2022-2182/" source="CVE"/>
		<reference ref_id="CVE-2022-2183" ref_url="https://www.suse.com/security/cve/CVE-2022-2183/" source="CVE"/>
		<reference ref_id="CVE-2022-2206" ref_url="https://www.suse.com/security/cve/CVE-2022-2206/" source="CVE"/>
		<reference ref_id="CVE-2022-2207" ref_url="https://www.suse.com/security/cve/CVE-2022-2207/" source="CVE"/>
		<reference ref_id="CVE-2022-2208" ref_url="https://www.suse.com/security/cve/CVE-2022-2208/" source="CVE"/>
		<reference ref_id="CVE-2022-2210" ref_url="https://www.suse.com/security/cve/CVE-2022-2210/" source="CVE"/>
		<reference ref_id="CVE-2022-2231" ref_url="https://www.suse.com/security/cve/CVE-2022-2231/" source="CVE"/>
		<reference ref_id="CVE-2022-2257" ref_url="https://www.suse.com/security/cve/CVE-2022-2257/" source="CVE"/>
		<reference ref_id="CVE-2022-2264" ref_url="https://www.suse.com/security/cve/CVE-2022-2264/" source="CVE"/>
		<reference ref_id="CVE-2022-2284" ref_url="https://www.suse.com/security/cve/CVE-2022-2284/" source="CVE"/>
		<reference ref_id="CVE-2022-2285" ref_url="https://www.suse.com/security/cve/CVE-2022-2285/" source="CVE"/>
		<reference ref_id="CVE-2022-2286" ref_url="https://www.suse.com/security/cve/CVE-2022-2286/" source="CVE"/>
		<reference ref_id="CVE-2022-2287" ref_url="https://www.suse.com/security/cve/CVE-2022-2287/" source="CVE"/>
		<reference ref_id="CVE-2022-2304" ref_url="https://www.suse.com/security/cve/CVE-2022-2304/" source="CVE"/>
		<reference ref_id="CVE-2022-2343" ref_url="https://www.suse.com/security/cve/CVE-2022-2343/" source="CVE"/>
		<reference ref_id="CVE-2022-2344" ref_url="https://www.suse.com/security/cve/CVE-2022-2344/" source="CVE"/>
		<reference ref_id="CVE-2022-2345" ref_url="https://www.suse.com/security/cve/CVE-2022-2345/" source="CVE"/>
		<reference ref_id="CVE-2022-2522" ref_url="https://www.suse.com/security/cve/CVE-2022-2522/" source="CVE"/>
		<reference ref_id="CVE-2022-2571" ref_url="https://www.suse.com/security/cve/CVE-2022-2571/" source="CVE"/>
		<reference ref_id="CVE-2022-2580" ref_url="https://www.suse.com/security/cve/CVE-2022-2580/" source="CVE"/>
		<reference ref_id="CVE-2022-2581" ref_url="https://www.suse.com/security/cve/CVE-2022-2581/" source="CVE"/>
		<reference ref_id="CVE-2022-2598" ref_url="https://www.suse.com/security/cve/CVE-2022-2598/" source="CVE"/>
		<reference ref_id="CVE-2022-2816" ref_url="https://www.suse.com/security/cve/CVE-2022-2816/" source="CVE"/>
		<reference ref_id="CVE-2022-2817" ref_url="https://www.suse.com/security/cve/CVE-2022-2817/" source="CVE"/>
		<reference ref_id="CVE-2022-2819" ref_url="https://www.suse.com/security/cve/CVE-2022-2819/" source="CVE"/>
		<reference ref_id="CVE-2022-2845" ref_url="https://www.suse.com/security/cve/CVE-2022-2845/" source="CVE"/>
		<reference ref_id="CVE-2022-2849" ref_url="https://www.suse.com/security/cve/CVE-2022-2849/" source="CVE"/>
		<reference ref_id="CVE-2022-2862" ref_url="https://www.suse.com/security/cve/CVE-2022-2862/" source="CVE"/>
		<reference ref_id="CVE-2022-2874" ref_url="https://www.suse.com/security/cve/CVE-2022-2874/" source="CVE"/>
		<reference ref_id="CVE-2022-2889" ref_url="https://www.suse.com/security/cve/CVE-2022-2889/" source="CVE"/>
		<reference ref_id="CVE-2022-2923" ref_url="https://www.suse.com/security/cve/CVE-2022-2923/" source="CVE"/>
		<reference ref_id="CVE-2022-2946" ref_url="https://www.suse.com/security/cve/CVE-2022-2946/" source="CVE"/>
		<reference ref_id="CVE-2022-3016" ref_url="https://www.suse.com/security/cve/CVE-2022-3016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0 with patch level 0313:

- CVE-2022-2183: Fixed out-of-bounds read through get_lisp_indent() (bsc#1200902).
- CVE-2022-2182: Fixed heap-based buffer overflow through parse_cmd_address() (bsc#1200903).
- CVE-2022-2175: Fixed buffer over-read through cmdline_insert_reg() (bsc#1200904).
- CVE-2022-2304: Fixed stack buffer overflow in spell_dump_compl() (bsc#1201249).
- CVE-2022-2343: Fixed heap-based buffer overflow in GitHub repository vim prior to 9.0.0044 (bsc#1201356).
- CVE-2022-2344: Fixed another heap-based buffer overflow vim prior to 9.0.0045 (bsc#1201359).
- CVE-2022-2345: Fixed use after free in GitHub repository vim prior to 9.0.0046. (bsc#1201363).
- CVE-2022-2819: Fixed heap-based Buffer Overflow in compile_lock_unlock() (bsc#1202414).
- CVE-2022-2874: Fixed NULL Pointer Dereference in generate_loadvar() (bsc#1202552).
- CVE-2022-1968: Fixed use after free in utf_ptr2char (bsc#1200270).
- CVE-2022-2124: Fixed out of bounds read in current_quote() (bsc#1200697).
- CVE-2022-2125: Fixed out of bounds read in get_lisp_indent() (bsc#1200698).
- CVE-2022-2126: Fixed out of bounds read in suggest_trie_walk() (bsc#1200700).
- CVE-2022-2129: Fixed out of bounds write in vim_regsub_both() (bsc#1200701).
- CVE-2022-1720: Fixed out of bounds read in grab_file_name() (bsc#1200732).
- CVE-2022-2264: Fixed out of bounds read in inc() (bsc#1201132).
- CVE-2022-2284: Fixed out of bounds read in utfc_ptr2len() (bsc#1201133).
- CVE-2022-2285: Fixed negative size passed to memmove() due to integer overflow (bsc#1201134).
- CVE-2022-2286: Fixed out of bounds read in ins_bytes() (bsc#1201135).
- CVE-2022-2287: Fixed out of bounds read in suggest_trie_walk() (bsc#1201136).
- CVE-2022-2231: Fixed null pointer dereference skipwhite() (bsc#1201150).
- CVE-2022-2210: Fixed out of bounds read in ml_append_int() (bsc#1201151).
- CVE-2022-2208: Fixed null pointer dereference in diff_check() (bsc#1201152).
- CVE-2022-2207: Fixed out of bounds read in ins_bs() (bsc#1201153).
- CVE-2022-2257: Fixed out of bounds read in msg_outtrans_special() (bsc#1201154).
- CVE-2022-2206: Fixed out of bounds read in msg_outtrans_attr() (bsc#1201155).
- CVE-2022-2522: Fixed out of bounds read via nested autocommand (bsc#1201863).
- CVE-2022-2571: Fixed heap-based buffer overflow related to ins_comp_get_next_word_or_line() (bsc#1202046).
- CVE-2022-2580: Fixed heap-based buffer overflow related to eval_string() (bsc#1202049).
- CVE-2022-2581: Fixed out-of-bounds read related to cstrchr() (bsc#1202050).
- CVE-2022-2598: Fixed undefined behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() (bsc#1202051).
- CVE-2022-2817: Fixed use after gree in f_assert_fails() (bsc#1202420).
- CVE-2022-2816: Fixed out-of-bounds Read in check_vim9_unlet() (bsc#1202421).
- CVE-2022-2862: Fixed use-after-free in compile_nested_function() (bsc#1202511).
- CVE-2022-2849: Fixed invalid memory access related to mb_ptr2len() (bsc#1202512).
- CVE-2022-2845: Fixed buffer Over-read related to display_dollar() (bsc#1202515).
- CVE-2022-2889: Fixed use-after-free in find_var_also_in_script() in evalvars.c (bsc#1202599).
- CVE-2022-2923: Fixed NULL pointer dereference in GitHub repository vim/vim prior to 9.0.0240 (bsc#1202687).
- CVE-2022-2946: Fixed use after free in function vim_vsnprintf_typval (bsc#1202689).
- CVE-2022-3016: Fixed use after free in vim prior to 9.0.0285 (bsc#1202862).
  
Bugfixes:

- Fixing vim error on startup (bsc#1200884).
- Fixing vim SUSE Linux Enterprise Server 15 SP4 Basesystem plugin-tlib issue (bsc#1201620).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-09"/>
	<updated date="2022-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200270">SUSE bug 1200270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200697">SUSE bug 1200697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200698">SUSE bug 1200698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200700">SUSE bug 1200700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200701">SUSE bug 1200701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200732">SUSE bug 1200732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200884">SUSE bug 1200884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200902">SUSE bug 1200902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200903">SUSE bug 1200903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200904">SUSE bug 1200904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201132">SUSE bug 1201132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201133">SUSE bug 1201133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201134">SUSE bug 1201134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201135">SUSE bug 1201135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201136">SUSE bug 1201136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201150">SUSE bug 1201150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201151">SUSE bug 1201151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201152">SUSE bug 1201152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201153">SUSE bug 1201153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201154">SUSE bug 1201154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201155">SUSE bug 1201155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201249">SUSE bug 1201249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201356">SUSE bug 1201356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201359">SUSE bug 1201359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201363">SUSE bug 1201363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201620">SUSE bug 1201620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201863">SUSE bug 1201863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202046">SUSE bug 1202046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202049">SUSE bug 1202049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202050">SUSE bug 1202050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202051">SUSE bug 1202051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202414">SUSE bug 1202414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202420">SUSE bug 1202420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202421">SUSE bug 1202421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202511">SUSE bug 1202511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202512">SUSE bug 1202512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202515">SUSE bug 1202515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202552">SUSE bug 1202552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202599">SUSE bug 1202599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202687">SUSE bug 1202687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202689">SUSE bug 1202689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202862">SUSE bug 1202862</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1720/">CVE-2022-1720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1968/">CVE-2022-1968</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2124/">CVE-2022-2124</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2125/">CVE-2022-2125</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2126/">CVE-2022-2126</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2129/">CVE-2022-2129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2175/">CVE-2022-2175</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2182/">CVE-2022-2182</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2183/">CVE-2022-2183</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2206/">CVE-2022-2206</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2207/">CVE-2022-2207</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2208/">CVE-2022-2208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2210/">CVE-2022-2210</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2231/">CVE-2022-2231</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2257/">CVE-2022-2257</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2264/">CVE-2022-2264</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2284/">CVE-2022-2284</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2285/">CVE-2022-2285</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2286/">CVE-2022-2286</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2287/">CVE-2022-2287</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2304/">CVE-2022-2304</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2343/">CVE-2022-2343</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2344/">CVE-2022-2344</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2345/">CVE-2022-2345</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2522/">CVE-2022-2522</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2571/">CVE-2022-2571</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2580/">CVE-2022-2580</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2581/">CVE-2022-2581</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2598/">CVE-2022-2598</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2816/">CVE-2022-2816</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2817/">CVE-2022-2817</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2819/">CVE-2022-2819</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2845/">CVE-2022-2845</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2849/">CVE-2022-2849</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2862/">CVE-2022-2862</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2874/">CVE-2022-2874</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2889/">CVE-2022-2889</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2923/">CVE-2022-2923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2946/">CVE-2022-2946</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3016/">CVE-2022-3016</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709692" comment="gvim-9.0.0313-150000.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709661" comment="vim-9.0.0313-150000.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709662" comment="vim-data-9.0.0313-150000.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709663" comment="vim-data-common-9.0.0313-150000.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709664" comment="vim-small-9.0.0313-150000.5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52876" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194633" ref_url="https://bugzilla.suse.com/1194633" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44648" ref_url="https://www.suse.com/security/cve/CVE-2021-44648/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012198.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2021-44648: Fixed overflow vulnerability in lzw code size (bsc#1194633).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-09"/>
	<updated date="2022-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194633">SUSE bug 1194633</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44648/">CVE-2021-44648</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709880" comment="gdk-pixbuf-devel-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710073" comment="gdk-pixbuf-devel-32bit-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709881" comment="gdk-pixbuf-lang-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709882" comment="gdk-pixbuf-query-loaders-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709892" comment="gdk-pixbuf-query-loaders-32bit-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709883" comment="gdk-pixbuf-thumbnailer-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709884" comment="libgdk_pixbuf-2_0-0-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709893" comment="libgdk_pixbuf-2_0-0-32bit-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709885" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709886" comment="typelib-1_0-GdkPixdata-2_0-2.40.0-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52877" version="1" class="patch">
	<metadata>
		<title>Security update for libyang (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186374" ref_url="https://bugzilla.suse.com/1186374" source="BUGZILLA"/>
		<reference ref_id="1186375" ref_url="https://bugzilla.suse.com/1186375" source="BUGZILLA"/>
		<reference ref_id="1186376" ref_url="https://bugzilla.suse.com/1186376" source="BUGZILLA"/>
		<reference ref_id="1186378" ref_url="https://bugzilla.suse.com/1186378" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28902" ref_url="https://www.suse.com/security/cve/CVE-2021-28902/" source="CVE"/>
		<reference ref_id="CVE-2021-28903" ref_url="https://www.suse.com/security/cve/CVE-2021-28903/" source="CVE"/>
		<reference ref_id="CVE-2021-28904" ref_url="https://www.suse.com/security/cve/CVE-2021-28904/" source="CVE"/>
		<reference ref_id="CVE-2021-28906" ref_url="https://www.suse.com/security/cve/CVE-2021-28906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012205.html" source="SUSE-SU"/>
		<description>
This update for libyang fixes the following issues:

- CVE-2021-28906: Fixed missing check in read_yin_leaf that can lead to DoS (bsc#1186378)
- CVE-2021-28904: Fixed missing check in ext_get_plugin that lead to DoS (bsc#1186376).
- CVE-2021-28903: Fixed stack overflow in lyxml_parse_mem (bsc#1186375).
- CVE-2021-28902: Fixed missing check in read_yin_container that can lead to DoS (bsc#1186374).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186374">SUSE bug 1186374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186375">SUSE bug 1186375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186376">SUSE bug 1186376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186378">SUSE bug 1186378</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28902/">CVE-2021-28902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28903/">CVE-2021-28903</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28904/">CVE-2021-28904</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28906/">CVE-2021-28906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710074" comment="libyang-cpp-devel-1.0.184-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710075" comment="libyang-cpp1-1.0.184-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710076" comment="libyang-devel-1.0.184-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710077" comment="libyang-doc-1.0.184-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709895" comment="libyang-extentions-1.0.184-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709896" comment="libyang1-1.0.184-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710078" comment="python3-yang-1.0.184-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710079" comment="yang-tools-1.0.184-150300.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52878" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202022" ref_url="https://bugzilla.suse.com/1202022" source="BUGZILLA"/>
		<reference ref_id="1202023" ref_url="https://bugzilla.suse.com/1202023" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25074" ref_url="https://www.suse.com/security/cve/CVE-2019-25074/" source="CVE"/>
		<reference ref_id="CVE-2022-37032" ref_url="https://www.suse.com/security/cve/CVE-2022-37032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012206.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2022-37032: Fixed out-of-bounds read in the BGP daemon that may lead to information disclosure or denial of service (bsc#1202023).
- CVE-2019-25074: Fixed a memory leak in the IS-IS daemon that may lead to server memory exhaustion (bsc#1202022).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202022">SUSE bug 1202022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202023">SUSE bug 1202023</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25074/">CVE-2019-25074</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37032/">CVE-2022-37032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709897" comment="frr-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709898" comment="frr-devel-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709899" comment="libfrr0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709900" comment="libfrr_pb0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709901" comment="libfrrcares0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709902" comment="libfrrfpm_pb0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709903" comment="libfrrgrpc_pb0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709904" comment="libfrrospfapiclient0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709905" comment="libfrrsnmp0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709906" comment="libfrrzmq0-7.4-150300.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709907" comment="libmlag_pb0-7.4-150300.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52879" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188514" ref_url="https://bugzilla.suse.com/1188514" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36978" ref_url="https://www.suse.com/security/cve/CVE-2021-36978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012207.html" source="SUSE-SU"/>
		<description>
This update for qpdf fixes the following issues:

- CVE-2021-36978: Fixed heap-based buffer overflow in Pl_ASCII85Decoder::write (bsc#1188514).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188514">SUSE bug 1188514</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36978/">CVE-2021-36978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709894" comment="libqpdf26-9.0.2-150200.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52880" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202986" ref_url="https://bugzilla.suse.com/1202986" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012211.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.7 (bsc#1202986)

* Upgrade the vendored UnRAR library to version 6.1.7.
* Fix logical signature 'Intermediates' feature.
* Relax constraints on slightly malformed zip archives that
  contain overlapping file entries.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202986">SUSE bug 1202986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709490" comment="clamav-0.103.7-150000.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709491" comment="clamav-devel-0.103.7-150000.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709492" comment="libclamav9-0.103.7-150000.3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709493" comment="libfreshclam2-0.103.7-150000.3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52881" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs16 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200303" ref_url="https://bugzilla.suse.com/1200303" source="BUGZILLA"/>
		<reference ref_id="1200517" ref_url="https://bugzilla.suse.com/1200517" source="BUGZILLA"/>
		<reference ref_id="1201710" ref_url="https://bugzilla.suse.com/1201710" source="BUGZILLA"/>
		<reference ref_id="1202382" ref_url="https://bugzilla.suse.com/1202382" source="BUGZILLA"/>
		<reference ref_id="1202383" ref_url="https://bugzilla.suse.com/1202383" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29244" ref_url="https://www.suse.com/security/cve/CVE-2022-29244/" source="CVE"/>
		<reference ref_id="CVE-2022-31150" ref_url="https://www.suse.com/security/cve/CVE-2022-31150/" source="CVE"/>
		<reference ref_id="CVE-2022-35948" ref_url="https://www.suse.com/security/cve/CVE-2022-35948/" source="CVE"/>
		<reference ref_id="CVE-2022-35949" ref_url="https://www.suse.com/security/cve/CVE-2022-35949/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025091.html" source="SUSE-SU"/>
		<description>
This update for nodejs16 fixes the following issues:

- CVE-2022-35949: Fixed SSRF when an application takes in user input into the path/pathname option of undici.request (bsc#1202382).
- CVE-2022-35948: Fixed CRLF injection via Content-Type (bsc#1202383).
- CVE-2022-29244: Fixed npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace (bsc#1200517).
- CVE-2022-31150: Fixed CRLF injection in node-undici (bsc#1201710).

Bugfixes:

- Enable crypto-policies for SLE15 SP4+ and TW (bsc#1200303)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200303">SUSE bug 1200303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200517">SUSE bug 1200517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201710">SUSE bug 1201710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202382">SUSE bug 1202382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202383">SUSE bug 1202383</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29244/">CVE-2022-29244</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31150/">CVE-2022-31150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35948/">CVE-2022-35948</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35949/">CVE-2022-35949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709516" comment="nodejs16-16.17.0-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709517" comment="nodejs16-devel-16.17.0-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709518" comment="nodejs16-docs-16.17.0-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709519" comment="npm16-16.17.0-150300.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52882" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198823" ref_url="https://bugzilla.suse.com/1198823" source="BUGZILLA"/>
		<reference ref_id="1198830" ref_url="https://bugzilla.suse.com/1198830" source="BUGZILLA"/>
		<reference ref_id="1198832" ref_url="https://bugzilla.suse.com/1198832" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405/" source="CVE"/>
		<reference ref_id="CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025092.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2022-27404 Fixed a segmentation fault via a crafted typeface (bsc#1198830).
- CVE-2022-27405 Fixed a buffer overflow via a crafted typeface (bsc#1198832).
- CVE-2022-27406 Fixed a segmentation fault via a crafted typeface (bsc#1198823).

Non-security fixes:

- Updated to version 2.10.4
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198823">SUSE bug 1198823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198830">SUSE bug 1198830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198832">SUSE bug 1198832</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708192" comment="freetype2-devel-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708356" comment="freetype2-devel-32bit-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708357" comment="freetype2-profile-tti35-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708358" comment="ft2demos-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708359" comment="ftbench-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708360" comment="ftdiff-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708199" comment="ftdump-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708361" comment="ftgamma-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708362" comment="ftgrid-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708363" comment="ftinspect-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708364" comment="ftlint-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708365" comment="ftmulti-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708366" comment="ftstring-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708367" comment="ftvalid-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708368" comment="ftview-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708193" comment="libfreetype6-2.10.4-150000.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708194" comment="libfreetype6-32bit-2.10.4-150000.4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52883" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-kramdown (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1174297" ref_url="https://bugzilla.suse.com/1174297" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14001" ref_url="https://www.suse.com/security/cve/CVE-2020-14001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012214.html" source="SUSE-SU"/>
		<description>
This update for rubygem-kramdown fixes the following issues:

- CVE-2020-14001: Fixed processing template options inside documents allowing unintended read access or embedded Ruby code execution (bsc#1174297).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-12"/>
	<updated date="2022-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174297">SUSE bug 1174297</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14001/">CVE-2020-14001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710254" comment="ruby2.5-rubygem-kramdown-1.15.0-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710403" comment="ruby2.5-rubygem-kramdown-doc-1.15.0-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710404" comment="ruby2.5-rubygem-kramdown-testsuite-1.15.0-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52884" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1179722" ref_url="https://bugzilla.suse.com/1179722" source="BUGZILLA"/>
		<reference ref_id="1179723" ref_url="https://bugzilla.suse.com/1179723" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1191662" ref_url="https://bugzilla.suse.com/1191662" source="BUGZILLA"/>
		<reference ref_id="1191667" ref_url="https://bugzilla.suse.com/1191667" source="BUGZILLA"/>
		<reference ref_id="1191881" ref_url="https://bugzilla.suse.com/1191881" source="BUGZILLA"/>
		<reference ref_id="1192594" ref_url="https://bugzilla.suse.com/1192594" source="BUGZILLA"/>
		<reference ref_id="1192968" ref_url="https://bugzilla.suse.com/1192968" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194535" ref_url="https://bugzilla.suse.com/1194535" source="BUGZILLA"/>
		<reference ref_id="1197158" ref_url="https://bugzilla.suse.com/1197158" source="BUGZILLA"/>
		<reference ref_id="1197755" ref_url="https://bugzilla.suse.com/1197755" source="BUGZILLA"/>
		<reference ref_id="1197756" ref_url="https://bugzilla.suse.com/1197756" source="BUGZILLA"/>
		<reference ref_id="1197757" ref_url="https://bugzilla.suse.com/1197757" source="BUGZILLA"/>
		<reference ref_id="1197760" ref_url="https://bugzilla.suse.com/1197760" source="BUGZILLA"/>
		<reference ref_id="1197763" ref_url="https://bugzilla.suse.com/1197763" source="BUGZILLA"/>
		<reference ref_id="1197920" ref_url="https://bugzilla.suse.com/1197920" source="BUGZILLA"/>
		<reference ref_id="1198971" ref_url="https://bugzilla.suse.com/1198971" source="BUGZILLA"/>
		<reference ref_id="1199291" ref_url="https://bugzilla.suse.com/1199291" source="BUGZILLA"/>
		<reference ref_id="1200431" ref_url="https://bugzilla.suse.com/1200431" source="BUGZILLA"/>
		<reference ref_id="1200845" ref_url="https://bugzilla.suse.com/1200845" source="BUGZILLA"/>
		<reference ref_id="1200868" ref_url="https://bugzilla.suse.com/1200868" source="BUGZILLA"/>
		<reference ref_id="1200869" ref_url="https://bugzilla.suse.com/1200869" source="BUGZILLA"/>
		<reference ref_id="1200870" ref_url="https://bugzilla.suse.com/1200870" source="BUGZILLA"/>
		<reference ref_id="1200871" ref_url="https://bugzilla.suse.com/1200871" source="BUGZILLA"/>
		<reference ref_id="1200872" ref_url="https://bugzilla.suse.com/1200872" source="BUGZILLA"/>
		<reference ref_id="1200873" ref_url="https://bugzilla.suse.com/1200873" source="BUGZILLA"/>
		<reference ref_id="1201019" ref_url="https://bugzilla.suse.com/1201019" source="BUGZILLA"/>
		<reference ref_id="1201420" ref_url="https://bugzilla.suse.com/1201420" source="BUGZILLA"/>
		<reference ref_id="1201610" ref_url="https://bugzilla.suse.com/1201610" source="BUGZILLA"/>
		<reference ref_id="1201705" ref_url="https://bugzilla.suse.com/1201705" source="BUGZILLA"/>
		<reference ref_id="1201726" ref_url="https://bugzilla.suse.com/1201726" source="BUGZILLA"/>
		<reference ref_id="1201948" ref_url="https://bugzilla.suse.com/1201948" source="BUGZILLA"/>
		<reference ref_id="1202096" ref_url="https://bugzilla.suse.com/1202096" source="BUGZILLA"/>
		<reference ref_id="1202097" ref_url="https://bugzilla.suse.com/1202097" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202347" ref_url="https://bugzilla.suse.com/1202347" source="BUGZILLA"/>
		<reference ref_id="1202393" ref_url="https://bugzilla.suse.com/1202393" source="BUGZILLA"/>
		<reference ref_id="1202396" ref_url="https://bugzilla.suse.com/1202396" source="BUGZILLA"/>
		<reference ref_id="1202447" ref_url="https://bugzilla.suse.com/1202447" source="BUGZILLA"/>
		<reference ref_id="1202564" ref_url="https://bugzilla.suse.com/1202564" source="BUGZILLA"/>
		<reference ref_id="1202577" ref_url="https://bugzilla.suse.com/1202577" source="BUGZILLA"/>
		<reference ref_id="1202636" ref_url="https://bugzilla.suse.com/1202636" source="BUGZILLA"/>
		<reference ref_id="1202672" ref_url="https://bugzilla.suse.com/1202672" source="BUGZILLA"/>
		<reference ref_id="1202701" ref_url="https://bugzilla.suse.com/1202701" source="BUGZILLA"/>
		<reference ref_id="1202708" ref_url="https://bugzilla.suse.com/1202708" source="BUGZILLA"/>
		<reference ref_id="1202709" ref_url="https://bugzilla.suse.com/1202709" source="BUGZILLA"/>
		<reference ref_id="1202710" ref_url="https://bugzilla.suse.com/1202710" source="BUGZILLA"/>
		<reference ref_id="1202711" ref_url="https://bugzilla.suse.com/1202711" source="BUGZILLA"/>
		<reference ref_id="1202712" ref_url="https://bugzilla.suse.com/1202712" source="BUGZILLA"/>
		<reference ref_id="1202713" ref_url="https://bugzilla.suse.com/1202713" source="BUGZILLA"/>
		<reference ref_id="1202714" ref_url="https://bugzilla.suse.com/1202714" source="BUGZILLA"/>
		<reference ref_id="1202715" ref_url="https://bugzilla.suse.com/1202715" source="BUGZILLA"/>
		<reference ref_id="1202716" ref_url="https://bugzilla.suse.com/1202716" source="BUGZILLA"/>
		<reference ref_id="1202717" ref_url="https://bugzilla.suse.com/1202717" source="BUGZILLA"/>
		<reference ref_id="1202718" ref_url="https://bugzilla.suse.com/1202718" source="BUGZILLA"/>
		<reference ref_id="1202720" ref_url="https://bugzilla.suse.com/1202720" source="BUGZILLA"/>
		<reference ref_id="1202722" ref_url="https://bugzilla.suse.com/1202722" source="BUGZILLA"/>
		<reference ref_id="1202745" ref_url="https://bugzilla.suse.com/1202745" source="BUGZILLA"/>
		<reference ref_id="1202756" ref_url="https://bugzilla.suse.com/1202756" source="BUGZILLA"/>
		<reference ref_id="1202810" ref_url="https://bugzilla.suse.com/1202810" source="BUGZILLA"/>
		<reference ref_id="1202811" ref_url="https://bugzilla.suse.com/1202811" source="BUGZILLA"/>
		<reference ref_id="1202860" ref_url="https://bugzilla.suse.com/1202860" source="BUGZILLA"/>
		<reference ref_id="1202895" ref_url="https://bugzilla.suse.com/1202895" source="BUGZILLA"/>
		<reference ref_id="1202898" ref_url="https://bugzilla.suse.com/1202898" source="BUGZILLA"/>
		<reference ref_id="1203063" ref_url="https://bugzilla.suse.com/1203063" source="BUGZILLA"/>
		<reference ref_id="1203098" ref_url="https://bugzilla.suse.com/1203098" source="BUGZILLA"/>
		<reference ref_id="1203107" ref_url="https://bugzilla.suse.com/1203107" source="BUGZILLA"/>
		<reference ref_id="1203116" ref_url="https://bugzilla.suse.com/1203116" source="BUGZILLA"/>
		<reference ref_id="1203117" ref_url="https://bugzilla.suse.com/1203117" source="BUGZILLA"/>
		<reference ref_id="1203135" ref_url="https://bugzilla.suse.com/1203135" source="BUGZILLA"/>
		<reference ref_id="1203136" ref_url="https://bugzilla.suse.com/1203136" source="BUGZILLA"/>
		<reference ref_id="1203137" ref_url="https://bugzilla.suse.com/1203137" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2020-27784" ref_url="https://www.suse.com/security/cve/CVE-2020-27784/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4203" ref_url="https://www.suse.com/security/cve/CVE-2021-4203/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905/" source="CVE"/>
		<reference ref_id="CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).

The following non-security bugs were fixed:

- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).
- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).
- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).
- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).
- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- NFSv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).
- NFSv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: qcom: Fix pipe clock imbalance (git-fixes).
- SUNRPC reverting d03727b248d0 ('NFSv4 fix CLOSE not waiting for direct IO compeletion') (git-fixes).
- SUNRPC: Clean up scheduling of autoclose (git-fixes).
- SUNRPC: Do not dereference xprt-&gt;snd_task if it's a cookie (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).
- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).
- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).
- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).
- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).
- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).
- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).
- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).
- blktrace: fix blk_rq_merge documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: m_can: process interrupt only when not runtime suspended (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).
- ceph: do not truncate file in atomic_open (bsc#1202811).
- cgroup: Trace event cgroup id fields should be u64 (git-fixes).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).
- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -&gt; 'Unsupported' (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- ehea: fix error return code in ehea_restart_qps() (git-fixes).
- enetc: Fix endianness issues for enetc_qos (git-fixes).
- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- fuse: Remove the control interface for virtio-fs (bsc#1203137).
- fuse: ioctl: translate ENOSYS (bsc#1203136).
- fuse: limit nsec (bsc#1203135).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: ssif: initialize ssif_info-&gt;client early (git-fixes).
- ixgbevf: add correct exception tracing for XDP (git-fixes).
- jbd2: fix assertion 'jh-&gt;b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kabi/severities: add stmmac driver local sumbols
- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kernel-obs-build: include qemu_fw_cfg (boo#1201705)
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- mm/rmap: Fix anon_vma-&gt;degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).
- net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' (git-fixes).
- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).
- net: cpsw: Properly initialise struct page_pool_params (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).
- net: dsa: b53: fix an off by one in checking 'vlan-&gt;vid' (git-fixes).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).
- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).
- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
- net: ethernet: ezchip: fix error handling (git-fixes).
- net: ethernet: ezchip: remove redundant check (git-fixes).
- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).
- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).
- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).
- net: fec_ptp: add clock rate zero check (git-fixes).
- net: ftgmac100: Fix crash when removing driver (git-fixes).
- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).
- net: hns: Fix kernel-doc (git-fixes).
- net: lantiq: fix memory corruption in RX ring (git-fixes).
- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).
- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).
- net: netcp: Fix an error message (git-fixes).
- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmicro: handle clk_prepare() failure during init (git-fixes).
- net: stmmac: Modify configuration method of EEE timers (git-fixes).
- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).
- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).
- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- ocfs2: drop acl cache for directories too (bsc#1191667).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).
- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).
- pinctrl/rockchip: fix gpio device creation (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: define get_cycles macro for arch-override (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- profiling: fix shift too large makes kernel panic (git-fixes).
- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: fix 2KB pgtable release race (git-fixes).
- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).
- silence nfscache allocation warnings with kvzalloc (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- tee: optee: Fix incorrect page free bug (git-fixes).
- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).
- usb: dwc3: ep0: Fix delay status handling (git-fixes).
- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).
- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).
- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).
- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).
- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings.
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).
- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179722">SUSE bug 1179722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179723">SUSE bug 1179723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191662">SUSE bug 1191662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191667">SUSE bug 1191667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191881">SUSE bug 1191881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192594">SUSE bug 1192594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192968">SUSE bug 1192968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194535">SUSE bug 1194535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197158">SUSE bug 1197158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197755">SUSE bug 1197755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197756">SUSE bug 1197756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197757">SUSE bug 1197757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197760">SUSE bug 1197760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197763">SUSE bug 1197763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197920">SUSE bug 1197920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198971">SUSE bug 1198971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199291">SUSE bug 1199291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200431">SUSE bug 1200431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200845">SUSE bug 1200845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200868">SUSE bug 1200868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200869">SUSE bug 1200869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200870">SUSE bug 1200870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200871">SUSE bug 1200871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200872">SUSE bug 1200872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200873">SUSE bug 1200873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201019">SUSE bug 1201019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201420">SUSE bug 1201420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201610">SUSE bug 1201610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201705">SUSE bug 1201705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201726">SUSE bug 1201726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202347">SUSE bug 1202347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202393">SUSE bug 1202393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202396">SUSE bug 1202396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202447">SUSE bug 1202447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202564">SUSE bug 1202564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202577">SUSE bug 1202577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202636">SUSE bug 1202636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202672">SUSE bug 1202672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202701">SUSE bug 1202701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202708">SUSE bug 1202708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202709">SUSE bug 1202709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202710">SUSE bug 1202710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202711">SUSE bug 1202711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202712">SUSE bug 1202712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202713">SUSE bug 1202713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202714">SUSE bug 1202714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202715">SUSE bug 1202715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202716">SUSE bug 1202716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202717">SUSE bug 1202717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202718">SUSE bug 1202718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202720">SUSE bug 1202720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202722">SUSE bug 1202722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202745">SUSE bug 1202745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202756">SUSE bug 1202756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202810">SUSE bug 1202810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202811">SUSE bug 1202811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202860">SUSE bug 1202860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202895">SUSE bug 1202895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203063">SUSE bug 1203063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203098">SUSE bug 1203098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203116">SUSE bug 1203116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203117">SUSE bug 1203117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203135">SUSE bug 1203135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203136">SUSE bug 1203136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203137">SUSE bug 1203137</bugzilla>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27784/">CVE-2020-27784</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4203/">CVE-2021-4203</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711159" comment="cluster-md-kmp-64kb-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710801" comment="cluster-md-kmp-default-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711160" comment="cluster-md-kmp-preempt-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711161" comment="dlm-kmp-64kb-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710802" comment="dlm-kmp-default-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711162" comment="dlm-kmp-preempt-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711163" comment="dtb-al-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711164" comment="dtb-allwinner-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711165" comment="dtb-altera-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711166" comment="dtb-amd-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711167" comment="dtb-amlogic-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711168" comment="dtb-apm-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711169" comment="dtb-arm-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711170" comment="dtb-broadcom-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711171" comment="dtb-cavium-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711172" comment="dtb-exynos-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711173" comment="dtb-freescale-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711174" comment="dtb-hisilicon-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711175" comment="dtb-lg-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711176" comment="dtb-marvell-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711177" comment="dtb-mediatek-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711178" comment="dtb-nvidia-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711179" comment="dtb-qcom-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711180" comment="dtb-renesas-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711181" comment="dtb-rockchip-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711182" comment="dtb-socionext-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711183" comment="dtb-sprd-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711184" comment="dtb-xilinx-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711185" comment="dtb-zte-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711186" comment="gfs2-kmp-64kb-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710803" comment="gfs2-kmp-default-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711187" comment="gfs2-kmp-preempt-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710778" comment="kernel-64kb-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710779" comment="kernel-64kb-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711188" comment="kernel-64kb-extra-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711189" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711190" comment="kernel-64kb-optional-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711191" comment="kernel-debug-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711192" comment="kernel-debug-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711193" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710780" comment="kernel-default-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710781" comment="kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711194" comment="kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710782" comment="kernel-default-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711195" comment="kernel-default-extra-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711196" comment="kernel-default-livepatch-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711197" comment="kernel-default-livepatch-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711198" comment="kernel-default-optional-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710783" comment="kernel-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710791" comment="kernel-docs-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711199" comment="kernel-docs-html-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711200" comment="kernel-kvmsmall-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711201" comment="kernel-kvmsmall-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711202" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710784" comment="kernel-macros-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710792" comment="kernel-obs-build-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711203" comment="kernel-obs-qa-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710785" comment="kernel-preempt-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710793" comment="kernel-preempt-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711204" comment="kernel-preempt-extra-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711205" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711206" comment="kernel-preempt-optional-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710794" comment="kernel-source-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711207" comment="kernel-source-vanilla-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710795" comment="kernel-syms-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710786" comment="kernel-zfcpdump-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711208" comment="kselftests-kmp-64kb-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711209" comment="kselftests-kmp-default-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711210" comment="kselftests-kmp-preempt-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711211" comment="ocfs2-kmp-64kb-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710804" comment="ocfs2-kmp-default-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711212" comment="ocfs2-kmp-preempt-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711213" comment="reiserfs-kmp-64kb-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710796" comment="reiserfs-kmp-default-5.3.18-150300.59.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711214" comment="reiserfs-kmp-preempt-5.3.18-150300.59.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52885" version="1" class="patch">
	<metadata>
		<title>Security update for libzapojit (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189844" ref_url="https://bugzilla.suse.com/1189844" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39360" ref_url="https://www.suse.com/security/cve/CVE-2021-39360/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012232.html" source="SUSE-SU"/>
		<description>
This update for libzapojit fixes the following issues:

- CVE-2021-39360: Fixed missing guard against invalid SSL certificates (bsc#1189844). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189844">SUSE bug 1189844</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39360/">CVE-2021-39360</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710400" comment="libzapojit-0_0-0-0.0.3-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710401" comment="libzapojit-devel-0.0.3-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710402" comment="typelib-1_0-Zpj-0_0-0.0.3-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52886" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012233.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2017-6512: Fixed File::Path rmtree/remove_tree race condition (bsc#1047178).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-14"/>
	<updated date="2022-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710215" comment="perl-5.26.1-150300.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710248" comment="perl-32bit-5.26.1-150300.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710216" comment="perl-base-5.26.1-150300.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710217" comment="perl-base-32bit-5.26.1-150300.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710218" comment="perl-core-DB_File-5.26.1-150300.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710397" comment="perl-core-DB_File-32bit-5.26.1-150300.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710240" comment="perl-doc-5.26.1-150300.17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52887" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="1203007" ref_url="https://bugzilla.suse.com/1203007" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226/" source="CVE"/>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-3032" ref_url="https://www.suse.com/security/cve/CVE-2022-3032/" source="CVE"/>
		<reference ref_id="CVE-2022-3033" ref_url="https://www.suse.com/security/cve/CVE-2022-3033/" source="CVE"/>
		<reference ref_id="CVE-2022-3034" ref_url="https://www.suse.com/security/cve/CVE-2022-3034/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Updated to Mozilla Thunderbird 102.2.2:
- CVE-2022-3033: Fixed leaking of sensitive information when composing a response to an HTML email with a META refresh tag (bsc#1203007).
- CVE-2022-3032: Fixed missing blocking of remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute (bsc#1203007).
- CVE-2022-3034: Fixed issue where iframe element in an HTML email could trigger a network request (bsc#1203007).
- CVE-2022-36059: Fixed DoS in Matrix SDK bundled with Thunderbird service attack (bsc#1203007).
 
- CVE-2022-38472: Fixed Address bar spoofing via XSLT error handling (bsc#1202645).
- CVE-2022-38473: Fixed cross-origin XSLT Documents inheriting the parent's permissions (bsc#1202645).
- CVE-2022-38476: Fixed data race and potential use-after-free in PK11_ChangePW (bsc#1202645).
- CVE-2022-38477: Fixed memory safety bugs (bsc#1202645).
- CVE-2022-38478: Fixed memory safety bugs (bsc#1202645).

- CVE-2022-36319: Fixed mouse position spoofing with CSS transforms (bsc#1201758).
- CVE-2022-36318: Fixed directory indexes for bundled resources reflected URL parameters (bsc#1201758).
- CVE-2022-36314: Fixed unexpected network loads when opening local .lnk files (bsc#1201758).
- CVE-2022-2505: Fixed memory safety bugs (bsc#1201758).

- CVE-2022-34479: Fixed vulnerability which could overlay the address bar with web content (bsc#1200793).
- CVE-2022-34470: Fixed use-after-free in nsSHistory (bsc#1200793).
- CVE-2022-34468: Fixed CSP sandbox header without `allow-scripts` bypass via retargeted javascript (bsc#1200793).
- CVE-2022-2226: Fixed emails with a mismatching OpenPGP signature date incorrectly accepted as valid (bsc#1200793).
- CVE-2022-34481: Fixed integer overflow in ReplaceElementsAt (bsc#1200793).
- CVE-2022-31744: Fixed CSP bypass enabling stylesheet injection (bsc#1200793).
- CVE-2022-34472: Fixed unavailable PAC file resulting in OCSP requests being blocked (bsc#1200793).
- CVE-2022-34478: Fixed Microsoft protocols attacks if a user accepts a prompt (bsc#1200793).
- CVE-2022-2200: Fixed vulnerability where undesired attributes could be set as part of prototype pollution (bsc#1200793).
- CVE-2022-34484: Fixed memory safety bugs (bsc#1200793).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3032/">CVE-2022-3032</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3033/">CVE-2022-3033</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3034/">CVE-2022-3034</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710609" comment="MozillaThunderbird-102.2.2-150200.8.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710610" comment="MozillaThunderbird-translations-common-102.2.2-150200.8.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710611" comment="MozillaThunderbird-translations-other-102.2.2-150200.8.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52888" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193081" ref_url="https://bugzilla.suse.com/1193081" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012272.html" source="SUSE-SU"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2021-41819: Fixed cookie prefix spoofing in CGI::Cookie.parse (bsc#1193081).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2022-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193081">SUSE bug 1193081</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710219" comment="libruby2_5-2_5-2.5.9-150000.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710220" comment="ruby2.5-2.5.9-150000.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710221" comment="ruby2.5-devel-2.5.9-150000.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710222" comment="ruby2.5-devel-extra-2.5.9-150000.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710398" comment="ruby2.5-doc-2.5.9-150000.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710399" comment="ruby2.5-doc-ri-2.5.9-150000.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710223" comment="ruby2.5-stdlib-2.5.9-150000.4.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52889" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="1194785" ref_url="https://bugzilla.suse.com/1194785" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUNMTSOEM6LU65NFICFVIHBARFG7LVO7/" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2021-3999: Fixed incorrect errno in getcwd (bsc#1194640)
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)

Features added:

- IBM Power 10 string operation improvements (bsc#1194785, jsc#SLE-18195)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194785">SUSE bug 1194785</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665045" comment="glibc-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665046" comment="glibc-32bit-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665047" comment="glibc-devel-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665057" comment="glibc-devel-32bit-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665058" comment="glibc-devel-static-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665060" comment="glibc-devel-static-32bit-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665048" comment="glibc-extra-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665061" comment="glibc-html-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665049" comment="glibc-i18ndata-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665050" comment="glibc-info-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665051" comment="glibc-lang-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665052" comment="glibc-locale-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665053" comment="glibc-locale-base-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665054" comment="glibc-locale-base-32bit-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665055" comment="glibc-profile-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665062" comment="glibc-profile-32bit-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665059" comment="glibc-utils-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665063" comment="glibc-utils-32bit-2.31-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665056" comment="nscd-2.31-150300.9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52890" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201680" ref_url="https://bugzilla.suse.com/1201680" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012284.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

- CVE-2021-46828: Fixed denial of service vulnerability with lots of connections (bsc#1201680).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-19"/>
	<updated date="2022-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201680">SUSE bug 1201680</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710520" comment="libtirpc-devel-1.2.6-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710521" comment="libtirpc-netconfig-1.2.6-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710522" comment="libtirpc3-1.2.6-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710523" comment="libtirpc3-32bit-1.2.6-150300.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52891" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189802" ref_url="https://bugzilla.suse.com/1189802" source="BUGZILLA"/>
		<reference ref_id="1195773" ref_url="https://bugzilla.suse.com/1195773" source="BUGZILLA"/>
		<reference ref_id="1201783" ref_url="https://bugzilla.suse.com/1201783" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36690" ref_url="https://www.suse.com/security/cve/CVE-2021-36690/" source="CVE"/>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012285.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed:

- CVE-2022-35737: Fixed an array-bounds overflow if billions of bytes are used in a string argument to a C API (bnc#1201783).
- CVE-2021-36690: Fixed an issue with the SQLite Expert extension when a column has no collating sequence (bsc#1189802).
  
- Package the Tcl bindings here again so that we only ship one copy of SQLite (bsc#1195773).

sqlite was updated to 3.39.3:

* Use a statement journal on DML statement affecting two or more
  database rows if the statement makes use of a SQL functions
  that might abort.
* Use a mutex to protect the PRAGMA temp_store_directory and
  PRAGMA data_store_directory statements, even though they are
  decremented and documented as not being threadsafe.

Update to 3.39.2:

* Fix a performance regression in the query planner associated
  with rearranging the order of FROM clause terms in the
  presences of a LEFT JOIN.
* Apply fixes for CVE-2022-35737, Chromium bugs 1343348 and
  1345947, forum post 3607259d3c, and other minor problems
  discovered by internal testing. [boo#1201783]

Update to 3.39.1:

* Fix an incorrect result from a query that uses a view that
  contains a compound SELECT in which only one arm contains a
  RIGHT JOIN and where the view is not the first FROM clause term
  of the query that contains the view
* Fix a long-standing problem with ALTER TABLE RENAME that can
  only arise if the sqlite3_limit(SQLITE_LIMIT_SQL_LENGTH) is set
  to a very small value.
* Fix a long-standing problem in FTS3 that can only arise when
  compiled with the SQLITE_ENABLE_FTS3_PARENTHESIS compile-time
  option.
* Fix the initial-prefix optimization for the REGEXP extension so
  that it works correctly even if the prefix contains characters
  that require a 3-byte UTF8 encoding.
* Enhance the sqlite_stmt virtual table so that it buffers all of
  its output. 

Update to 3.39.0:

* Add (long overdue) support for RIGHT and FULL OUTER JOIN
* Add new binary comparison operators IS NOT DISTINCT FROM and 
  IS DISTINCT FROM that are equivalent to IS and IS NOT, 
  respective, for compatibility with PostgreSQL and SQL standards
* Add a new return code (value '3') from the sqlite3_vtab_distinct()
  interface that indicates a query that has both DISTINCT and 
  ORDER BY clauses
* Added the sqlite3_db_name() interface
* The unix os interface resolves all symbolic links in database
  filenames to create a canonical name for the database before
  the file is opened
* Defer materializing views until the materialization is actually
  needed, thus avoiding unnecessary work if the materialization
  turns out to never be used
* The HAVING clause of a SELECT statement is now allowed on any
  aggregate query, even queries that do not have a GROUP BY
  clause
* Many microoptimizations collectively reduce CPU cycles by about
  2.3%. 

Update to 3.38.5:

* Fix a blunder in the CLI of the 3.38.4 release

Update to 3.38.4:

* fix a byte-code problem in the Bloom filter pull-down
  optimization added by release 3.38.0 in which an error in the
  byte code causes the byte code engine to enter an infinite loop
  when the pull-down optimization encounters a NULL key   

Update to 3.38.3:

* Fix a case of the query planner be overly aggressive with
  optimizing automatic-index and Bloom-filter construction,
  using inappropriate ON clause terms to restrict the size of the
  automatic-index or Bloom filter, and resulting in missing rows
  in the output.
* Other minor patches. See the timeline for details. 

Update to 3.38.2:

* Fix a problem with the Bloom filter optimization that might
  cause an incorrect answer when doing a LEFT JOIN with a WHERE
  clause constraint that says that one of the columns on the
  right table of the LEFT JOIN is NULL.
* Other minor patches.

- Package the Tcl bindings here again so that we only ship one copy
of SQLite (bsc#1195773).

Update to 3.38.1:

* Fix problems with the new Bloom filter optimization that might
  cause some obscure queries to get an incorrect answer.
* Fix the localtime modifier of the date and time functions so
  that it preserves fractional seconds.
* Fix the sqlite_offset SQL function so that it works correctly
  even in corner cases such as when the argument is a virtual
  column or the column of a view.
* Fix row value IN operator constraints on virtual tables so that
  they work correctly even if the virtual table implementation
  relies on bytecode to filter rows that do not satisfy the
  constraint.
* Other minor fixes to assert() statements, test cases, and
  documentation. See the source code timeline for details.

Update to 3.38.0

* Add the -&gt; and -&gt;&gt; operators for easier processing of JSON
* The JSON functions are now built-ins
* Enhancements to date and time functions
* Rename the printf() SQL function to format() for better
  compatibility, with alias for backwards compatibility.
* Add the sqlite3_error_offset() interface for helping localize
  an SQL error to a specific character in the input SQL text 
* Enhance the interface to virtual tables 
* CLI columnar output modes are enhanced to correctly handle tabs
  and newlines embedded in text, and add options like '--wrap N',
  '--wordwrap on', and '--quote' to the columnar output modes.
* Query planner enhancements using a Bloom filter to speed up 
  large analytic queries, and a balanced merge tree to evaluate
  UNION or UNION ALL compound SELECT statements that have an
  ORDER BY clause.
* The ALTER TABLE statement is changed to silently ignores
  entries in the sqlite_schema table that do not parse when
  PRAGMA writable_schema=ON

Update to 3.37.2:

* Fix a bug introduced in version 3.35.0 (2021-03-12) that can
  cause database corruption if a SAVEPOINT is rolled back while
  in PRAGMA temp_store=MEMORY mode, and other changes are made,
  and then the outer transaction commits
* Fix a long-standing problem with ON DELETE CASCADE and ON 
  UPDATE CASCADE in which a cache of the bytecode used to
  implement the cascading change was not being reset following a
  local DDL change

Update to 3.37.1:

* Fix a bug introduced by the UPSERT enhancements of version
  3.35.0 that can cause incorrect byte-code to be generated for
  some obscure but valid SQL, possibly resulting in a NULL-
  pointer dereference.
* Fix an OOB read that can occur in FTS5 when reading corrupt
  database files.
* Improved robustness of the --safe option in the CLI.
* Other minor fixes to assert() statements and test cases. 

Updated to 3.37.0:

* STRICT tables provide a prescriptive style of data type
  management, for developers who prefer that kind of thing.
* When adding columns that contain a CHECK constraint or a
  generated column containing a NOT NULL constraint, the
  ALTER TABLE ADD COLUMN now checks new constraints against
  preexisting rows in the database and will only proceed if no
  constraints are violated.
* Added the PRAGMA table_list statement.
* Add the .connection command, allowing the CLI to keep multiple
  database connections open at the same time.
* Add the --safe command-line option that disables dot-commands
  and SQL statements that might cause side-effects that extend
  beyond the single database file named on the command-line.
* CLI: Performance improvements when reading SQL statements that
  span many lines.
* Added the sqlite3_autovacuum_pages() interface.
* The sqlite3_deserialize() does not and has never worked
  for the TEMP database. That limitation is now noted in the
  documentation.
* The query planner now omits ORDER BY clauses on subqueries and
  views if removing those clauses does not change the semantics
  of the query.
* The generate_series table-valued function extension is modified
  so that the first parameter ('START') is now required. This is
  done as a way to demonstrate how to write table-valued
  functions with required parameters. The legacy behavior is
  available using the -DZERO_ARGUMENT_GENERATE_SERIES
  compile-time option.
* Added new sqlite3_changes64() and sqlite3_total_changes64()
  interfaces.
* Added the SQLITE_OPEN_EXRESCODE flag option to sqlite3_open_v2().
* Use less memory to hold the database schema.
* bsc#1189802, CVE-2021-36690: Fix an issue with the SQLite Expert
  extension when a column has no collating sequence.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-02"/>
	<updated date="2022-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189802">SUSE bug 1189802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195773">SUSE bug 1195773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201783">SUSE bug 1201783</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36690/">CVE-2021-36690</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710767" comment="libsqlite3-0-3.39.3-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710768" comment="libsqlite3-0-32bit-3.39.3-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710769" comment="sqlite3-3.39.3-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710770" comment="sqlite3-devel-3.39.3-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711145" comment="sqlite3-doc-3.39.3-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714912" comment="sqlite3-tcl-3.39.3-150000.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52892" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194165" ref_url="https://bugzilla.suse.com/1194165" source="BUGZILLA"/>
		<reference ref_id="1203388" ref_url="https://bugzilla.suse.com/1203388" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4186" ref_url="https://www.suse.com/security/cve/CVE-2021-4186/" source="CVE"/>
		<reference ref_id="CVE-2022-3190" ref_url="https://www.suse.com/security/cve/CVE-2022-3190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012290.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Updated to Wireshark 3.6.8:
- CVE-2022-3190: Fixed F5 Ethernet Trailer dissector infinite loop (bsc#1203388).
- CVE-2021-4186: Fixed Gryphon dissector crash (bsc#1194165).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-19"/>
	<updated date="2022-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194165">SUSE bug 1194165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203388">SUSE bug 1203388</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4186/">CVE-2021-4186</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3190/">CVE-2022-3190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711312" comment="libwireshark15-3.6.8-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711313" comment="libwiretap12-3.6.8-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711314" comment="libwsutil13-3.6.8-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711315" comment="wireshark-3.6.8-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711316" comment="wireshark-devel-3.6.8-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711317" comment="wireshark-ui-qt-3.6.8-150000.3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52893" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199392" ref_url="https://bugzilla.suse.com/1199392" source="BUGZILLA"/>
		<reference ref_id="1199460" ref_url="https://bugzilla.suse.com/1199460" source="BUGZILLA"/>
		<reference ref_id="1199603" ref_url="https://bugzilla.suse.com/1199603" source="BUGZILLA"/>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="1202516" ref_url="https://bugzilla.suse.com/1202516" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1798" ref_url="https://www.suse.com/security/cve/CVE-2022-1798/" source="CVE"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012297.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container fixes the following issues:

Security issues fixed:

- CVE-2022-1798: Fix arbitrary file read on the host from KubeVirt VMs (bsc#1202516)

Security issues fixed in vendored dependencies:

- CVE-2022-1996: Fixed go-restful CORS bypass (bsc#1200528)
- CVE-2022-29162: Fixed runc incorrect handling of inheritable capabilities in default configuration (bsc#1199460)

Other fixes:

- Pack nft rules and nsswitch.conf for virt-handler
- Only create 1MiB-aligned disk images (bsc#1199603)
- Avoid to return nil failure message
- Use semantic equality comparison
- Allow to configure utility containers for update test
- Install nftables to manage network rules
- Install tar to allow kubectl cp ...
- Symlink nsswitch.conf and nft rules to proper locations
- Enable USB redirection support for QEMU
- Install vim-small instread of vim
- Drop libvirt-daemon-driver-storage-core
- Install ethtool and gawk (bsc#1199392)
- Use non-versioned appliance to avoid redundant rpm query
- Explicitly state the dependency on kubevirt main package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-20"/>
	<updated date="2022-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199392">SUSE bug 1199392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199460">SUSE bug 1199460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199603">SUSE bug 1199603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202516">SUSE bug 1202516</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1798/">CVE-2022-1798</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710417" comment="kubevirt-container-disk-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710233" comment="kubevirt-manifests-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710418" comment="kubevirt-tests-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710419" comment="kubevirt-virt-api-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710420" comment="kubevirt-virt-controller-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710421" comment="kubevirt-virt-handler-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710422" comment="kubevirt-virt-launcher-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710423" comment="kubevirt-virt-operator-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710234" comment="kubevirt-virtctl-0.49.0-150300.8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710424" comment="obs-service-kubevirt_containers_meta-0.49.0-150300.8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52894" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1203185" ref_url="https://bugzilla.suse.com/1203185" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012319.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

Update to go version 1.18.6 (bsc#1193742):     
     
- CVE-2022-27664: Fixed DoS in net/http caused by mishandled server errors after sending GOAWAY (bsc#1203185).
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-21"/>
	<updated date="2022-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203185">SUSE bug 1203185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710241" comment="go1.18-1.18.6-150000.1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710242" comment="go1.18-doc-1.18.6-150000.1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710243" comment="go1.18-race-1.18.6-150000.1.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52895" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1203185" ref_url="https://bugzilla.suse.com/1203185" source="BUGZILLA"/>
		<reference ref_id="1203186" ref_url="https://bugzilla.suse.com/1203186" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-32190" ref_url="https://www.suse.com/security/cve/CVE-2022-32190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012321.html" source="SUSE-SU"/>
		<description>
This update for go1.19 fixes the following issues:

Update to go version 1.19.1 (bsc#1200441):

- CVE-2022-27664: Fixed DoS in net/http caused by mishandled server errors after sending GOAWAY (bsc#1203185).
- CVE-2022-32190: Fixed missing stripping of relative path components in net/url JoinPath (bsc#1203186).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-21"/>
	<updated date="2022-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203185">SUSE bug 1203185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203186">SUSE bug 1203186</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32190/">CVE-2022-32190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710244" comment="go1.19-1.19.1-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710245" comment="go1.19-doc-1.19.1-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710246" comment="go1.19-race-1.19.1-150000.1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52896" version="1" class="patch">
	<metadata>
		<title>Security update for oniguruma (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1142847" ref_url="https://bugzilla.suse.com/1142847" source="BUGZILLA"/>
		<reference ref_id="1150130" ref_url="https://bugzilla.suse.com/1150130" source="BUGZILLA"/>
		<reference ref_id="1157805" ref_url="https://bugzilla.suse.com/1157805" source="BUGZILLA"/>
		<reference ref_id="1164550" ref_url="https://bugzilla.suse.com/1164550" source="BUGZILLA"/>
		<reference ref_id="1164569" ref_url="https://bugzilla.suse.com/1164569" source="BUGZILLA"/>
		<reference ref_id="1177179" ref_url="https://bugzilla.suse.com/1177179" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13224" ref_url="https://www.suse.com/security/cve/CVE-2019-13224/" source="CVE"/>
		<reference ref_id="CVE-2019-16163" ref_url="https://www.suse.com/security/cve/CVE-2019-16163/" source="CVE"/>
		<reference ref_id="CVE-2019-19203" ref_url="https://www.suse.com/security/cve/CVE-2019-19203/" source="CVE"/>
		<reference ref_id="CVE-2019-19204" ref_url="https://www.suse.com/security/cve/CVE-2019-19204/" source="CVE"/>
		<reference ref_id="CVE-2019-19246" ref_url="https://www.suse.com/security/cve/CVE-2019-19246/" source="CVE"/>
		<reference ref_id="CVE-2020-26159" ref_url="https://www.suse.com/security/cve/CVE-2020-26159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012320.html" source="SUSE-SU"/>
		<description>
This update for oniguruma fixes the following issues:

- CVE-2019-19246: Fixed an out of bounds access during regular
  expression matching (bsc#1157805).
- CVE-2019-19204: Fixed an out of bounds access when compiling a
  crafted regular expression (bsc#1164569).
- CVE-2019-19203: Fixed an out of bounds access when performing a
  string search (bsc#1164550).
- CVE-2019-16163: Fixed an uncontrolled recursion issue when compiling
  a crafted regular expression, which could lead to denial of service (bsc#1150130).
- CVE-2020-26159: Fixed an off-by-one buffer overflow (bsc#1177179).
- CVE-2019-13224: Fixed a potential use-after-free when handling
  multiple different encodings (bsc#1142847).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-21"/>
	<updated date="2022-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142847">SUSE bug 1142847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150130">SUSE bug 1150130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157805">SUSE bug 1157805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164550">SUSE bug 1164550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164569">SUSE bug 1164569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177179">SUSE bug 1177179</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13224/">CVE-2019-13224</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16163/">CVE-2019-16163</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19203/">CVE-2019-19203</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19204/">CVE-2019-19204</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19246/">CVE-2019-19246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26159/">CVE-2020-26159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009708026" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708027" comment="oniguruma-devel-6.7.0-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52897" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194576" ref_url="https://bugzilla.suse.com/1194576" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIM2A32O55DKEA5CCA7L5EE2KL4DYQJF/" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576)
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666501" comment="xen-4.14.3_06-150300.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666502" comment="xen-devel-4.14.3_06-150300.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666503" comment="xen-doc-html-4.14.3_06-150300.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666504" comment="xen-libs-4.14.3_06-150300.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666505" comment="xen-libs-32bit-4.14.3_06-150300.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666506" comment="xen-tools-4.14.3_06-150300.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666507" comment="xen-tools-domU-4.14.3_06-150300.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665448" comment="xen-tools-xendomains-wait-disk-4.14.3_06-150300.3.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52898" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012327.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

Update to version 1.43.2

- Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.43.2

Security issues fixed:

- CVE-2022-1996: Fixed CORS bypass in go-restful vendored dependency (bsc#1200528)

Other fixes:
- Include additional tools used by cdi-importer:
  cdi-containerimage-server
  cdi-source-update-poller
- Pack only cdi-{cr,operator}.yaml into the manifests RPM
- Install tar package (used for cloning filesystem PVCs)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-22"/>
	<updated date="2022-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711148" comment="containerized-data-importer-api-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711149" comment="containerized-data-importer-cloner-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711150" comment="containerized-data-importer-controller-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711151" comment="containerized-data-importer-importer-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710787" comment="containerized-data-importer-manifests-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711152" comment="containerized-data-importer-operator-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711153" comment="containerized-data-importer-uploadproxy-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711154" comment="containerized-data-importer-uploadserver-1.43.2-150300.8.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711155" comment="obs-service-cdi_containers_meta-1.43.2-150300.8.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52899" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191015" ref_url="https://bugzilla.suse.com/1191015" source="BUGZILLA"/>
		<reference ref_id="1191121" ref_url="https://bugzilla.suse.com/1191121" source="BUGZILLA"/>
		<reference ref_id="1191334" ref_url="https://bugzilla.suse.com/1191334" source="BUGZILLA"/>
		<reference ref_id="1191434" ref_url="https://bugzilla.suse.com/1191434" source="BUGZILLA"/>
		<reference ref_id="1193273" ref_url="https://bugzilla.suse.com/1193273" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089/" source="CVE"/>
		<reference ref_id="CVE-2021-41091" ref_url="https://www.suse.com/security/cve/CVE-2021-41091/" source="CVE"/>
		<reference ref_id="CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092/" source="CVE"/>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
		<description>
This update for containerd, docker fixes the following issues:

- CVE-2021-41089: Fixed 'cp' can chmod host files (bsc#1191015).
- CVE-2021-41091: Fixed flaw that could lead to data directory traversal in moby (bsc#1191434).
- CVE-2021-41092: Fixed exposed user credentials with a misconfigured configuration file (bsc#1191334).
- CVE-2021-41103: Fixed file access to local users in containerd (bsc#1191121).
- CVE-2021-41190: Fixed OCI manifest and index parsing confusion (bsc#1193273).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-04"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191015">SUSE bug 1191015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191121">SUSE bug 1191121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191334">SUSE bug 1191334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191434">SUSE bug 1191434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193273">SUSE bug 1193273</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41091/">CVE-2021-41091</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664292" comment="containerd-1.4.12-60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664376" comment="containerd-ctr-1.4.12-60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664293" comment="docker-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664294" comment="docker-bash-completion-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664295" comment="docker-fish-completion-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664377" comment="docker-kubic-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664378" comment="docker-kubic-bash-completion-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664379" comment="docker-kubic-fish-completion-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664380" comment="docker-kubic-kubeadm-criconfig-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664381" comment="docker-kubic-zsh-completion-20.10.12_ce-159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664382" comment="docker-zsh-completion-20.10.12_ce-159.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52900" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1172037" ref_url="https://bugzilla.suse.com/1172037" source="BUGZILLA"/>
		<reference ref_id="1173351" ref_url="https://bugzilla.suse.com/1173351" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8161" ref_url="https://www.suse.com/security/cve/CVE-2020-8161/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012347.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

- CVE-2020-8184: Fixed vulnerability where percent-encoded cookies can be used to overwrite existing prefixed cookie names (bsc#1173351). 
- CVE-2020-8161: Fixed directory traversal in Rack:Directory (bsc#1172037).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-23"/>
	<updated date="2022-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172037">SUSE bug 1172037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8161/">CVE-2020-8161</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713886" comment="ruby2.5-rubygem-rack-2.0.8-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713931" comment="ruby2.5-rubygem-rack-doc-2.0.8-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713932" comment="ruby2.5-rubygem-rack-testsuite-2.0.8-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52901" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202169" ref_url="https://bugzilla.suse.com/1202169" source="BUGZILLA"/>
		<reference ref_id="1202807" ref_url="https://bugzilla.suse.com/1202807" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32893" ref_url="https://www.suse.com/security/cve/CVE-2022-32893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012352.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2022-32893: Fixed several crashes and rendering issues (bsc#1202807).

- Fixed WebKitGTK not allow to be used from non-main threads (bsc#1202169).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-23"/>
	<updated date="2022-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202169">SUSE bug 1202169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202807">SUSE bug 1202807</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32893/">CVE-2022-32893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710224" comment="libjavascriptcoregtk-4_0-18-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710405" comment="libjavascriptcoregtk-4_0-18-32bit-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710225" comment="libwebkit2gtk-4_0-37-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710406" comment="libwebkit2gtk-4_0-37-32bit-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710226" comment="libwebkit2gtk3-lang-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710235" comment="typelib-1_0-JavaScriptCore-4_0-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710236" comment="typelib-1_0-WebKit2-4_0-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710237" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710407" comment="webkit-jsc-4-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710227" comment="webkit2gtk-4_0-injected-bundles-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710238" comment="webkit2gtk3-devel-2.36.7-150200.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710408" comment="webkit2gtk3-minibrowser-2.36.7-150200.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52902" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202903" ref_url="https://bugzilla.suse.com/1202903" source="BUGZILLA"/>
		<reference ref_id="1202956" ref_url="https://bugzilla.suse.com/1202956" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132/" source="CVE"/>
		<reference ref_id="CVE-2022-28199" ref_url="https://www.suse.com/security/cve/CVE-2022-28199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012370.html" source="SUSE-SU"/>
		<description>
This update for dpdk fixes the following issues:

- CVE-2022-2132: Fixed DoS when a vhost header crosses more than two descriptors and exhausts all mbufs (bsc#1202903).
- CVE-2022-28199: Fixed buffer overflow in the vhost code (bsc#1202956).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202903">SUSE bug 1202903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202956">SUSE bug 1202956</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28199/">CVE-2022-28199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713878" comment="dpdk-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713879" comment="dpdk-devel-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713921" comment="dpdk-doc-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713922" comment="dpdk-examples-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713880" comment="dpdk-kmp-default-19.11.4_k5.3.18_150300.59.93-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713923" comment="dpdk-kmp-preempt-19.11.4_k5.3.18_150300.59.93-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713881" comment="dpdk-thunderx-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713882" comment="dpdk-thunderx-devel-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713924" comment="dpdk-thunderx-doc-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713925" comment="dpdk-thunderx-examples-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713883" comment="dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.93-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713926" comment="dpdk-thunderx-kmp-preempt-19.11.4_k5.3.18_150300.59.93-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713927" comment="dpdk-thunderx-tools-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713884" comment="dpdk-tools-19.11.4-150300.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713885" comment="libdpdk-20_0-19.11.4-150300.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52903" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200105" ref_url="https://bugzilla.suse.com/1200105" source="BUGZILLA"/>
		<reference ref_id="1201161" ref_url="https://bugzilla.suse.com/1201161" source="BUGZILLA"/>
		<reference ref_id="1201162" ref_url="https://bugzilla.suse.com/1201162" source="BUGZILLA"/>
		<reference ref_id="1201163" ref_url="https://bugzilla.suse.com/1201163" source="BUGZILLA"/>
		<reference ref_id="1201164" ref_url="https://bugzilla.suse.com/1201164" source="BUGZILLA"/>
		<reference ref_id="1201165" ref_url="https://bugzilla.suse.com/1201165" source="BUGZILLA"/>
		<reference ref_id="1201166" ref_url="https://bugzilla.suse.com/1201166" source="BUGZILLA"/>
		<reference ref_id="1201167" ref_url="https://bugzilla.suse.com/1201167" source="BUGZILLA"/>
		<reference ref_id="1201168" ref_url="https://bugzilla.suse.com/1201168" source="BUGZILLA"/>
		<reference ref_id="1201169" ref_url="https://bugzilla.suse.com/1201169" source="BUGZILLA"/>
		<reference ref_id="1201170" ref_url="https://bugzilla.suse.com/1201170" source="BUGZILLA"/>
		<reference ref_id="1202863" ref_url="https://bugzilla.suse.com/1202863" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32081" ref_url="https://www.suse.com/security/cve/CVE-2022-32081/" source="CVE"/>
		<reference ref_id="CVE-2022-32082" ref_url="https://www.suse.com/security/cve/CVE-2022-32082/" source="CVE"/>
		<reference ref_id="CVE-2022-32083" ref_url="https://www.suse.com/security/cve/CVE-2022-32083/" source="CVE"/>
		<reference ref_id="CVE-2022-32084" ref_url="https://www.suse.com/security/cve/CVE-2022-32084/" source="CVE"/>
		<reference ref_id="CVE-2022-32085" ref_url="https://www.suse.com/security/cve/CVE-2022-32085/" source="CVE"/>
		<reference ref_id="CVE-2022-32086" ref_url="https://www.suse.com/security/cve/CVE-2022-32086/" source="CVE"/>
		<reference ref_id="CVE-2022-32087" ref_url="https://www.suse.com/security/cve/CVE-2022-32087/" source="CVE"/>
		<reference ref_id="CVE-2022-32088" ref_url="https://www.suse.com/security/cve/CVE-2022-32088/" source="CVE"/>
		<reference ref_id="CVE-2022-32089" ref_url="https://www.suse.com/security/cve/CVE-2022-32089/" source="CVE"/>
		<reference ref_id="CVE-2022-32091" ref_url="https://www.suse.com/security/cve/CVE-2022-32091/" source="CVE"/>
		<reference ref_id="CVE-2022-38791" ref_url="https://www.suse.com/security/cve/CVE-2022-38791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to 10.5.17:

- CVE-2022-32082: Fixed assertion failure at table-&gt;get_ref_count() == 0 in dict0dict.cc (bsc#1201162).
- CVE-2022-32089: Fixed segmentation fault via the component st_select_lex_unit::exclude_level (bsc#1201169).
- CVE-2022-32081: Fixed use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc (bsc#1201161).
- CVE-2022-32091: Fixed use-after-poison in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc (bsc#1201170).
- CVE-2022-32084: Fixed segmentation fault via the component sub_select (bsc#1201164).
- CVE-2022-38791: Fixed deadlock in compress_write in extra/mariabackup/ds_compress.cc (bsc#1202863).

- CVE-2022-32088: Fixed segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (bsc#1201168).
- CVE-2022-32087: Fixed segmentation fault via the component Item_args::walk_args (bsc#1201167).
- CVE-2022-32086: Fixed segmentation fault via the component Item_field::fix_outer_field (bsc#1201166).
- CVE-2022-32085: Fixed segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor (bsc#1201165).
- CVE-2022-32083: Fixed segmentation fault via the component Item_subselect::init_expr_cache_tracker (bsc#1201163).

Bugfixes:

- Fixed mysql-systemd-helper being unaware of custom group (bsc#1200105).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200105">SUSE bug 1200105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201161">SUSE bug 1201161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201162">SUSE bug 1201162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201163">SUSE bug 1201163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201164">SUSE bug 1201164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201165">SUSE bug 1201165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201166">SUSE bug 1201166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201167">SUSE bug 1201167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201168">SUSE bug 1201168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201169">SUSE bug 1201169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201170">SUSE bug 1201170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202863">SUSE bug 1202863</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32081/">CVE-2022-32081</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32082/">CVE-2022-32082</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32083/">CVE-2022-32083</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32084/">CVE-2022-32084</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32085/">CVE-2022-32085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32086/">CVE-2022-32086</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32087/">CVE-2022-32087</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32088/">CVE-2022-32088</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32089/">CVE-2022-32089</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32091/">CVE-2022-32091</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38791/">CVE-2022-38791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710656" comment="libmariadbd-devel-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710657" comment="libmariadbd19-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710658" comment="mariadb-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710750" comment="mariadb-bench-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710659" comment="mariadb-client-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710660" comment="mariadb-errormessages-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710751" comment="mariadb-rpm-macros-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710752" comment="mariadb-test-10.5.17-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710661" comment="mariadb-tools-10.5.17-150300.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52904" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192425" ref_url="https://bugzilla.suse.com/1192425" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23177" ref_url="https://www.suse.com/security/cve/CVE-2021-23177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012384.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2021-23177: Fixed symlink ACL extraction that modifies ACLs of the target system (bsc#1192425).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192425">SUSE bug 1192425</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-23177/">CVE-2021-23177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710788" comment="bsdtar-3.4.2-150200.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710776" comment="libarchive-devel-3.4.2-150200.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710777" comment="libarchive13-3.4.2-150200.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711156" comment="libarchive13-32bit-3.4.2-150200.4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52905" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203018" ref_url="https://bugzilla.suse.com/1203018" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012380.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2022-31252: Fixed chkstat group controlled paths (bsc#1203018).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203018">SUSE bug 1203018</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714070" comment="permissions-20181225-150200.23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714071" comment="permissions-zypp-plugin-20181225-150200.23.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52906" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200793" ref_url="https://bugzilla.suse.com/1200793" source="BUGZILLA"/>
		<reference ref_id="1201758" ref_url="https://bugzilla.suse.com/1201758" source="BUGZILLA"/>
		<reference ref_id="1202645" ref_url="https://bugzilla.suse.com/1202645" source="BUGZILLA"/>
		<reference ref_id="1203477" ref_url="https://bugzilla.suse.com/1203477" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34469" ref_url="https://www.suse.com/security/cve/CVE-2022-34469/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34471" ref_url="https://www.suse.com/security/cve/CVE-2022-34471/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34473" ref_url="https://www.suse.com/security/cve/CVE-2022-34473/" source="CVE"/>
		<reference ref_id="CVE-2022-34474" ref_url="https://www.suse.com/security/cve/CVE-2022-34474/" source="CVE"/>
		<reference ref_id="CVE-2022-34475" ref_url="https://www.suse.com/security/cve/CVE-2022-34475/" source="CVE"/>
		<reference ref_id="CVE-2022-34476" ref_url="https://www.suse.com/security/cve/CVE-2022-34476/" source="CVE"/>
		<reference ref_id="CVE-2022-34477" ref_url="https://www.suse.com/security/cve/CVE-2022-34477/" source="CVE"/>
		<reference ref_id="CVE-2022-34478" ref_url="https://www.suse.com/security/cve/CVE-2022-34478/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34480" ref_url="https://www.suse.com/security/cve/CVE-2022-34480/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34482" ref_url="https://www.suse.com/security/cve/CVE-2022-34482/" source="CVE"/>
		<reference ref_id="CVE-2022-34483" ref_url="https://www.suse.com/security/cve/CVE-2022-34483/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<reference ref_id="CVE-2022-34485" ref_url="https://www.suse.com/security/cve/CVE-2022-34485/" source="CVE"/>
		<reference ref_id="CVE-2022-36314" ref_url="https://www.suse.com/security/cve/CVE-2022-36314/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 102.3.0esr ESR (bsc#1200793, bsc#1201758, bsc#1202645, bsc#1203477):

- CVE-2022-40959: Fixed bypassing FeaturePolicy restrictions on transient pages.
- CVE-2022-40960: Fixed data-race when parsing non-UTF-8 URLs in threads.   
- CVE-2022-40958: Fixed bypassing secure context restriction for cookies with __Host and __Secure prefix.                                                           
- CVE-2022-40956: Fixed content-security-policy base-uri bypass.                                                                           
- CVE-2022-40957: Fixed incoherent instruction cache when building WASM on ARM64.
- CVE-2022-40962: Fixed memory safety bugs.
- CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling.
- CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions.
- CVE-2022-38478: Fixed various memory safety issues.
- CVE-2022-38476: Fixed data race and potential use-after-free in PK11_ChangePW.
- CVE-2022-38477: Fixed memory safety bugs.
- CVE-2022-36319: Fixed mouse position spoofing with CSS transforms.
- CVE-2022-36318: Fixed directory indexes for bundled resources reflected URL parameters.
- CVE-2022-36314: Fixed unexpected network loads when opening local .lnk files.
- CVE-2022-2505: Fixed memory safety bugs.
- CVE-2022-34479: Fixed vulnerabilty where a popup window could be resized in a way to overlay the address bar with web content.
- CVE-2022-34470: Fixed use-after-free in nsSHistory.
- CVE-2022-34468: Fixed bypass of CSP sandbox header without `allow-scripts` via retargeted javascript: URI.
- CVE-2022-34482: Fixed drag and drop of malicious image that could have led to malicious executable and potential code execution.
- CVE-2022-34483: Fixed drag and drop of malicious image that could have led to malicious executable and potential code execution.
- CVE-2022-34476: Fixed vulnerability where ASN.1 parser could have been tricked into accepting malformed ASN.1.
- CVE-2022-34481: Fixed potential integer overflow in ReplaceElementsAt
- CVE-2022-34474: Fixed vulnerability where sandboxed iframes could redirect to external schemes.
- CVE-2022-34469: Fixed TLS certificate errors on HSTS-protected domains which could be bypassed by the user on Firefox for Android.
- CVE-2022-34471: Fixed vulnerability where a compromised server could trick a browser into an addon downgrade.
- CVE-2022-34472: Fixed vulnerability where an unavailable PAC file resulted in OCSP requests being blocked.
- CVE-2022-34478: Fixed vulnerability where Microsoft protocols can be attacked if a user accepts a prompt.
- CVE-2022-2200: Fixed vulnerability where undesired attributes could be set as part of prototype pollution.
- CVE-2022-34480: Fixed free of uninitialized pointer in lg_init.
- CVE-2022-34477: Fixed vulnerability in MediaError message property leaking information on cross-origin same-site pages.
- CVE-2022-34475: Fixed vulnerability where the HTML Sanitizer could have been bypassed via same-origin script via use tags.
- CVE-2022-34473: Fixed vulnerability where the HTML Sanitizer could have been bypassed via use tags.
- CVE-2022-34484: Fixed memory safety bugs.
- CVE-2022-34485: Fixed memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34469/">CVE-2022-34469</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34471/">CVE-2022-34471</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34473/">CVE-2022-34473</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34474/">CVE-2022-34474</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34475/">CVE-2022-34475</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34476/">CVE-2022-34476</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-34477/">CVE-2022-34477</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34478/">CVE-2022-34478</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34480/">CVE-2022-34480</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34482/">CVE-2022-34482</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34483/">CVE-2022-34483</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34485/">CVE-2022-34485</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36314/">CVE-2022-36314</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714175" comment="MozillaFirefox-102.3.0-150200.152.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714176" comment="MozillaFirefox-branding-SLE-102-150200.9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714314" comment="MozillaFirefox-branding-upstream-102.3.0-150200.152.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714315" comment="MozillaFirefox-devel-102.3.0-150200.152.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714178" comment="MozillaFirefox-translations-common-102.3.0-150200.152.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714179" comment="MozillaFirefox-translations-other-102.3.0-150200.152.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52907" version="1" class="patch">
	<metadata>
		<title>Security update for snakeyaml (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202932" ref_url="https://bugzilla.suse.com/1202932" source="BUGZILLA"/>
		<reference ref_id="1203149" ref_url="https://bugzilla.suse.com/1203149" source="BUGZILLA"/>
		<reference ref_id="1203153" ref_url="https://bugzilla.suse.com/1203153" source="BUGZILLA"/>
		<reference ref_id="1203154" ref_url="https://bugzilla.suse.com/1203154" source="BUGZILLA"/>
		<reference ref_id="1203158" ref_url="https://bugzilla.suse.com/1203158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936/" source="CVE"/>
		<reference ref_id="CVE-2022-25857" ref_url="https://www.suse.com/security/cve/CVE-2022-25857/" source="CVE"/>
		<reference ref_id="CVE-2022-38749" ref_url="https://www.suse.com/security/cve/CVE-2022-38749/" source="CVE"/>
		<reference ref_id="CVE-2022-38750" ref_url="https://www.suse.com/security/cve/CVE-2022-38750/" source="CVE"/>
		<reference ref_id="CVE-2022-38751" ref_url="https://www.suse.com/security/cve/CVE-2022-38751/" source="CVE"/>
		<reference ref_id="CVE-2022-38752" ref_url="https://www.suse.com/security/cve/CVE-2022-38752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012382.html" source="SUSE-SU"/>
		<description>
This update for snakeyaml fixes the following issues:

- CVE-2022-38750: Fixed uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (bsc#1203158).
- CVE-2022-38749: Fixed StackOverflowError for many open unmatched brackets (bsc#1203149).
- CVE-2022-38752: Fixed uncaught exception in java.base/java.util.ArrayList.hashCode (bsc#1203154).
- CVE-2022-38751: Fixed unrestricted data matched with Regular Expressions (bsc#1203153).
- CVE-2022-25857: Fixed denial of service vulnerability due missing to nested depth limitation for collections (bsc#1202932).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202932">SUSE bug 1202932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203149">SUSE bug 1203149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203153">SUSE bug 1203153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203154">SUSE bug 1203154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203158">SUSE bug 1203158</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25857/">CVE-2022-25857</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38749/">CVE-2022-38749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38750/">CVE-2022-38750</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38751/">CVE-2022-38751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38752/">CVE-2022-38752</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710247" comment="snakeyaml-1.31-150200.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710409" comment="snakeyaml-javadoc-1.31-150200.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52908" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196177" ref_url="https://bugzilla.suse.com/1196177" source="BUGZILLA"/>
		<reference ref_id="1196180" ref_url="https://bugzilla.suse.com/1196180" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0529" ref_url="https://www.suse.com/security/cve/CVE-2022-0529/" source="CVE"/>
		<reference ref_id="CVE-2022-0530" ref_url="https://www.suse.com/security/cve/CVE-2022-0530/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012379.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2022-0530: Fixed SIGSEGV during the conversion of an utf-8 string to a local string (bsc#1196177).
- CVE-2022-0529: Fixed heap out-of-bound writes and reads during conversion of wide string to local string (bsc#1196180)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196177">SUSE bug 1196177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196180">SUSE bug 1196180</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0529/">CVE-2022-0529</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0530/">CVE-2022-0530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714387" comment="unzip-6.00-150000.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714749" comment="unzip-doc-6.00-150000.4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52909" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182731" ref_url="https://bugzilla.suse.com/1182731" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3410" ref_url="https://www.suse.com/security/cve/CVE-2021-3410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012381.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-3410: Fixed overflow when multiplying large ints (bsc#1182731).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182731">SUSE bug 1182731</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3410/">CVE-2021-3410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714103" comment="caca-utils-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714073" comment="libcaca-devel-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714104" comment="libcaca-ruby-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714074" comment="libcaca0-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714105" comment="libcaca0-32bit-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714075" comment="libcaca0-plugins-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714106" comment="libcaca0-plugins-32bit-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714107" comment="python3-caca-0.99.beta19.git20171003-150200.11.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52910" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1180153" ref_url="https://bugzilla.suse.com/1180153" source="BUGZILLA"/>
		<reference ref_id="1188944" ref_url="https://bugzilla.suse.com/1188944" source="BUGZILLA"/>
		<reference ref_id="1191881" ref_url="https://bugzilla.suse.com/1191881" source="BUGZILLA"/>
		<reference ref_id="1194535" ref_url="https://bugzilla.suse.com/1194535" source="BUGZILLA"/>
		<reference ref_id="1196616" ref_url="https://bugzilla.suse.com/1196616" source="BUGZILLA"/>
		<reference ref_id="1197158" ref_url="https://bugzilla.suse.com/1197158" source="BUGZILLA"/>
		<reference ref_id="1199482" ref_url="https://bugzilla.suse.com/1199482" source="BUGZILLA"/>
		<reference ref_id="1199665" ref_url="https://bugzilla.suse.com/1199665" source="BUGZILLA"/>
		<reference ref_id="1201019" ref_url="https://bugzilla.suse.com/1201019" source="BUGZILLA"/>
		<reference ref_id="1201420" ref_url="https://bugzilla.suse.com/1201420" source="BUGZILLA"/>
		<reference ref_id="1201705" ref_url="https://bugzilla.suse.com/1201705" source="BUGZILLA"/>
		<reference ref_id="1201726" ref_url="https://bugzilla.suse.com/1201726" source="BUGZILLA"/>
		<reference ref_id="1201948" ref_url="https://bugzilla.suse.com/1201948" source="BUGZILLA"/>
		<reference ref_id="1202096" ref_url="https://bugzilla.suse.com/1202096" source="BUGZILLA"/>
		<reference ref_id="1202097" ref_url="https://bugzilla.suse.com/1202097" source="BUGZILLA"/>
		<reference ref_id="1202154" ref_url="https://bugzilla.suse.com/1202154" source="BUGZILLA"/>
		<reference ref_id="1202335" ref_url="https://bugzilla.suse.com/1202335" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202347" ref_url="https://bugzilla.suse.com/1202347" source="BUGZILLA"/>
		<reference ref_id="1202393" ref_url="https://bugzilla.suse.com/1202393" source="BUGZILLA"/>
		<reference ref_id="1202396" ref_url="https://bugzilla.suse.com/1202396" source="BUGZILLA"/>
		<reference ref_id="1202672" ref_url="https://bugzilla.suse.com/1202672" source="BUGZILLA"/>
		<reference ref_id="1202897" ref_url="https://bugzilla.suse.com/1202897" source="BUGZILLA"/>
		<reference ref_id="1202898" ref_url="https://bugzilla.suse.com/1202898" source="BUGZILLA"/>
		<reference ref_id="1203098" ref_url="https://bugzilla.suse.com/1203098" source="BUGZILLA"/>
		<reference ref_id="1203107" ref_url="https://bugzilla.suse.com/1203107" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2021-4203" ref_url="https://www.suse.com/security/cve/CVE-2021-4203/" source="CVE"/>
		<reference ref_id="CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-21385" ref_url="https://www.suse.com/security/cve/CVE-2022-21385/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581/" source="CVE"/>
		<reference ref_id="CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2022-1012: Fixed a memory leak problem that was found in the TCP source port generation algorithm in net/ipv4/tcp.c (bnc#1199482).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs() that allowed unprivileged local users to crash the machine (bnc#1202897).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-29581: Fixed improper update of reference count vulnerability in net/sched that allowed a local attacker to cause privilege escalation to root (bnc#1199665).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).

The following non-security bugs were fixed:

- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- cifs: fix error paths in cifs_tree_connect() (bsc#1177440).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1188944).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: skip trailing separators of prefix paths (bsc#1188944).
- kernel-obs-build: include qemu_fw_cfg (boo#1201705)
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git-fixes, bsc#1203098).
- mm/rmap: Fix anon_vma-&gt;degree ambiguity leading to double-reuse (git-fixes, bsc#1203098). 
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- objtool: Add --backtrace support (bsc#1202396).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Allow no-op CFI ops in alternatives (bsc#1202396).
- objtool: Convert insn type to enum (bsc#1202396).
- objtool: Do not use ignore flag for fake jumps (bsc#1202396).
- objtool: Fix !CFI insn_state propagation (bsc#1202396).
- objtool: Fix ORC vs alternatives (bsc#1202396).
- objtool: Fix sibling call detection (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Remove check preventing branches within alternative (bsc#1202396).
- objtool: Rename elf_open() to prevent conflict with libelf from elftoolchain (bsc#1202396).
- objtool: Rename struct cfi_state (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Rewrite alt-&gt;skip_orig (bsc#1202396).
- objtool: Set insn-&gt;func for alternatives (bsc#1202396).
- objtool: Support conditional retpolines (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- objtool: Track original function across branches (bsc#1202396).
- objtool: Uniquely identify alternative instruction groups (bsc#1202396).
- objtool: Use Elf_Scn typedef instead of assuming struct name (bsc#1202396).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153 bsc#1202335).
- tcp: change source port randomizarion at connect() time (bsc#1180153 bsc#1202335).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-26"/>
	<updated date="2022-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180153">SUSE bug 1180153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188944">SUSE bug 1188944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191881">SUSE bug 1191881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194535">SUSE bug 1194535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196616">SUSE bug 1196616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197158">SUSE bug 1197158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199482">SUSE bug 1199482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199665">SUSE bug 1199665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201019">SUSE bug 1201019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201420">SUSE bug 1201420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201705">SUSE bug 1201705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201726">SUSE bug 1201726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202154">SUSE bug 1202154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202335">SUSE bug 1202335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202347">SUSE bug 1202347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202393">SUSE bug 1202393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202396">SUSE bug 1202396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202672">SUSE bug 1202672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202897">SUSE bug 1202897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203098">SUSE bug 1203098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4203/">CVE-2021-4203</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21385/">CVE-2022-21385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009711138" comment="kernel-debug-base-4.12.14-150100.197.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710986" comment="kernel-default-man-4.12.14-150100.197.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711139" comment="kernel-kvmsmall-base-4.12.14-150100.197.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711140" comment="kernel-vanilla-4.12.14-150100.197.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711141" comment="kernel-vanilla-base-4.12.14-150100.197.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711142" comment="kernel-vanilla-devel-4.12.14-150100.197.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711143" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711144" comment="kernel-zfcpdump-man-4.12.14-150100.197.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52911" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202903" ref_url="https://bugzilla.suse.com/1202903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012404.html" source="SUSE-SU"/>
		<description>
This update for dpdk fixes the following issues:

- CVE-2022-2132: Fixed DoS when a vhost header crosses more than two descriptors and exhausts all mbufs (bsc#1202903).    
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2022-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202903">SUSE bug 1202903</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710749" comment="libdpdk-18_11-18.11.9-150100.4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52912" version="1" class="patch">
	<metadata>
		<title>Security update for rust1.62 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203431" ref_url="https://bugzilla.suse.com/1203431" source="BUGZILLA"/>
		<reference ref_id="1203433" ref_url="https://bugzilla.suse.com/1203433" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36113" ref_url="https://www.suse.com/security/cve/CVE-2022-36113/" source="CVE"/>
		<reference ref_id="CVE-2022-36114" ref_url="https://www.suse.com/security/cve/CVE-2022-36114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012440.html" source="SUSE-SU"/>
		<description>
This update for rust1.62 fixes the following issues:

- CVE-2022-36113: Fixed symlink hijack vulnerability (bsc#1203433).
- CVE-2022-36114: Fixed zip bomb vulnerability (bsc#1203431).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-28"/>
	<updated date="2022-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203431">SUSE bug 1203431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203433">SUSE bug 1203433</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-36113/">CVE-2022-36113</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36114/">CVE-2022-36114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714180" comment="cargo1.62-1.62.1-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714181" comment="rust1.62-1.62.1-150300.7.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52913" version="1" class="patch">
	<metadata>
		<title>Security update for libostree (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201770" ref_url="https://bugzilla.suse.com/1201770" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9862" ref_url="https://www.suse.com/security/cve/CVE-2014-9862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012445.html" source="SUSE-SU"/>
		<description>
This update for libostree fixes the following issues:

- CVE-2014-9862: Fixed arbitrary write on heap vulnerability (bsc#1201770).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-28"/>
	<updated date="2022-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201770">SUSE bug 1201770</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9862/">CVE-2014-9862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709689" comment="libostree-2020.8-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709660" comment="libostree-1-1-2020.8-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709690" comment="libostree-devel-2020.8-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709813" comment="libostree-grub2-2020.8-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709691" comment="typelib-1_0-OSTree-1_0-2020.8-150200.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52914" version="1" class="patch">
	<metadata>
		<title>Security update for vsftpd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1021387" ref_url="https://bugzilla.suse.com/1021387" source="BUGZILLA"/>
		<reference ref_id="1052900" ref_url="https://bugzilla.suse.com/1052900" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1187678" ref_url="https://bugzilla.suse.com/1187678" source="BUGZILLA"/>
		<reference ref_id="1187686" ref_url="https://bugzilla.suse.com/1187686" source="BUGZILLA"/>
		<reference ref_id="786024" ref_url="https://bugzilla.suse.com/786024" source="BUGZILLA"/>
		<reference ref_id="971784" ref_url="https://bugzilla.suse.com/971784" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3618" ref_url="https://www.suse.com/security/cve/CVE-2021-3618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012443.html" source="SUSE-SU"/>
		<description>
This update for vsftpd fixes the following issues:

- CVE-2021-3618: Enforced security checks against ALPACA attack (PM-3322, jsc#SLE-23896, bsc#1187686, bsc#1187678).
- Added hardening to systemd services (bsc#1181400).

Bugfixes:
- Fixed a seccomp failure in FIPS mode when SSL was enabled (bsc#1052900).
- Allowed wait4() to be called so that the broker can wait for its child processes (bsc#1021387).
- Fixed hang when using seccomp and syslog (bsc#971784).
- Allowed sendto() syscall when /dev/log support is enabled (bsc#786024).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-28"/>
	<updated date="2022-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021387">SUSE bug 1021387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052900">SUSE bug 1052900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187678">SUSE bug 1187678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187686">SUSE bug 1187686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786024">SUSE bug 786024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971784">SUSE bug 971784</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3618/">CVE-2021-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711318" comment="vsftpd-3.0.5-150200.12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52915" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_18_08 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199278" ref_url="https://bugzilla.suse.com/1199278" source="BUGZILLA"/>
		<reference ref_id="1199279" ref_url="https://bugzilla.suse.com/1199279" source="BUGZILLA"/>
		<reference ref_id="1201674" ref_url="https://bugzilla.suse.com/1201674" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<reference ref_id="CVE-2022-31251" ref_url="https://www.suse.com/security/cve/CVE-2022-31251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012451.html" source="SUSE-SU"/>
		<description>
This update for slurm_18_08 fixes the following issues:

- CVE-2022-31251: Fixed a potential security vulnerability in the test package (bsc#1201674).
- CVE-2022-29500: Fixed an architectural flaw can be exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).
- CVE-2022-29501: Fixed a vulnerability where an unprivileged user can send data to arbitrary unix socket as root (bsc#1199279).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199278">SUSE bug 1199278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199279">SUSE bug 1199279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201674">SUSE bug 1201674</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31251/">CVE-2022-31251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716088" comment="libpmi0_18_08-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716089" comment="perl-slurm_18_08-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716090" comment="slurm_18_08-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716091" comment="slurm_18_08-auth-none-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716092" comment="slurm_18_08-config-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716093" comment="slurm_18_08-config-man-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716094" comment="slurm_18_08-cray-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716095" comment="slurm_18_08-devel-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716096" comment="slurm_18_08-doc-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716097" comment="slurm_18_08-hdf5-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716098" comment="slurm_18_08-lua-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716099" comment="slurm_18_08-munge-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716100" comment="slurm_18_08-node-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716101" comment="slurm_18_08-openlava-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716102" comment="slurm_18_08-pam_slurm-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716103" comment="slurm_18_08-plugins-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716104" comment="slurm_18_08-seff-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716105" comment="slurm_18_08-sjstat-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716106" comment="slurm_18_08-slurmdbd-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716107" comment="slurm_18_08-sql-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716108" comment="slurm_18_08-sview-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716109" comment="slurm_18_08-torque-18.08.9-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716110" comment="slurm_18_08-webdoc-18.08.9-150000.1.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52916" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199278" ref_url="https://bugzilla.suse.com/1199278" source="BUGZILLA"/>
		<reference ref_id="1199279" ref_url="https://bugzilla.suse.com/1199279" source="BUGZILLA"/>
		<reference ref_id="1201674" ref_url="https://bugzilla.suse.com/1201674" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<reference ref_id="CVE-2022-31251" ref_url="https://www.suse.com/security/cve/CVE-2022-31251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012448.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2022-31251: Fixed a potential security vulnerability in the test package (bsc#1201674).
- CVE-2022-29500: Fixed an architectural flaw can be exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).
- CVE-2022-29501: Fixed a vulnerability where an unprivileged user can send data to arbitrary unix socket as root (bsc#1199279).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2022-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199278">SUSE bug 1199278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199279">SUSE bug 1199279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201674">SUSE bug 1201674</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31251/">CVE-2022-31251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716111" comment="libslurm33-18.08.9-150100.3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52917" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="1203125" ref_url="https://bugzilla.suse.com/1203125" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCKKVK6RUGD7FMGWHAMOVXOTAX4JRA2I/" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

python39 was updated to version 3.9.14:

- CVE-2020-10735: Fixed DoS due to int() type in PyLong_FromString() not limiting amount of digits when converting text to int (bsc#1203125). 
- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-01"/>
	<updated date="2022-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203125">SUSE bug 1203125</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714388" comment="libpython3_9-1_0-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714750" comment="libpython3_9-1_0-32bit-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714389" comment="python39-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714751" comment="python39-32bit-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714390" comment="python39-base-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714752" comment="python39-base-32bit-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714391" comment="python39-curses-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714392" comment="python39-dbm-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714393" comment="python39-devel-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714753" comment="python39-doc-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714754" comment="python39-doc-devhelp-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714394" comment="python39-idle-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714755" comment="python39-testsuite-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714395" comment="python39-tk-3.9.14-150300.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714396" comment="python39-tools-3.9.14-150300.4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52918" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199278" ref_url="https://bugzilla.suse.com/1199278" source="BUGZILLA"/>
		<reference ref_id="1199279" ref_url="https://bugzilla.suse.com/1199279" source="BUGZILLA"/>
		<reference ref_id="1201674" ref_url="https://bugzilla.suse.com/1201674" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<reference ref_id="CVE-2022-31251" ref_url="https://www.suse.com/security/cve/CVE-2022-31251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012477.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2022-31251: Fixed a potential security vulnerability in the test package (bsc#1201674).
- CVE-2022-29500: Fixed an architectural flaw can be exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).
- CVE-2022-29501: Fixed a vulnerability where an unprivileged user can send data to arbitrary unix socket as root (bsc#1199279).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-03"/>
	<updated date="2022-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199278">SUSE bug 1199278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199279">SUSE bug 1199279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201674">SUSE bug 1201674</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31251/">CVE-2022-31251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716087" comment="libslurm35-20.02.7-150200.3.14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52919" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_20_02 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186646" ref_url="https://bugzilla.suse.com/1186646" source="BUGZILLA"/>
		<reference ref_id="1199278" ref_url="https://bugzilla.suse.com/1199278" source="BUGZILLA"/>
		<reference ref_id="1199279" ref_url="https://bugzilla.suse.com/1199279" source="BUGZILLA"/>
		<reference ref_id="1201674" ref_url="https://bugzilla.suse.com/1201674" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<reference ref_id="CVE-2022-31251" ref_url="https://www.suse.com/security/cve/CVE-2022-31251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012479.html" source="SUSE-SU"/>
		<description>
This update for slurm_20_02 fixes the following issues:


- CVE-2022-31251: Fixed security vulnerability in the test package (bsc#1201674).
- CVE-2022-29500: Fixed architectural flaw that can be exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).
- CVE-2022-29501: Fixed vulnerability where an unprivileged user can send data to arbitrary unix socket as root (bsc#1199279).

Bugfixes:
- Fixed qstat error message (torque wrapper) (bsc#1186646).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-03"/>
	<updated date="2022-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186646">SUSE bug 1186646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199278">SUSE bug 1199278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199279">SUSE bug 1199279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201674">SUSE bug 1201674</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31251/">CVE-2022-31251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716112" comment="libnss_slurm2_20_02-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716113" comment="libpmi0_20_02-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716114" comment="perl-slurm_20_02-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716115" comment="slurm_20_02-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716116" comment="slurm_20_02-auth-none-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716117" comment="slurm_20_02-config-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716118" comment="slurm_20_02-config-man-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716119" comment="slurm_20_02-cray-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716120" comment="slurm_20_02-devel-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716121" comment="slurm_20_02-doc-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716122" comment="slurm_20_02-hdf5-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716123" comment="slurm_20_02-lua-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716124" comment="slurm_20_02-munge-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716125" comment="slurm_20_02-node-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716126" comment="slurm_20_02-openlava-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716127" comment="slurm_20_02-pam_slurm-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716128" comment="slurm_20_02-plugins-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716129" comment="slurm_20_02-rest-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716130" comment="slurm_20_02-seff-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716131" comment="slurm_20_02-sjstat-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716132" comment="slurm_20_02-slurmdbd-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716133" comment="slurm_20_02-sql-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716134" comment="slurm_20_02-sview-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716135" comment="slurm_20_02-torque-20.02.7-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716136" comment="slurm_20_02-webdoc-20.02.7-150100.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52920" version="1" class="patch">
	<metadata>
		<title>Security update for libgit2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="1201431" ref_url="https://bugzilla.suse.com/1201431" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012486.html" source="SUSE-SU"/>
		<description>
This update for libgit2 fixes the following issues:

- CVE-2022-24765: Fixed potential command injection via git worktree (bsc#1198234).
- CVE-2022-29187: Fixed incomplete fix for CVE-2022-24765 (bsc#1201431).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710789" comment="libgit2-28-0.28.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711158" comment="libgit2-28-32bit-0.28.4-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710790" comment="libgit2-devel-0.28.4-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52921" version="1" class="patch">
	<metadata>
		<title>Security update for libgit2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158981" ref_url="https://bugzilla.suse.com/1158981" source="BUGZILLA"/>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="1201431" ref_url="https://bugzilla.suse.com/1201431" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012490.html" source="SUSE-SU"/>
		<description>
This update for libgit2 fixes the following issues:

- Fixed DoS by oob write in constructed commit object with a very large number of parents (bsc#1158981).
- CVE-2019-1352: Fixed git on Windows being unaware of NTFS Alternate Data Streams (bnc#1158790). 
- CVE-2022-24765: Fixed potential command injection via git worktree (bsc#1198234).
- CVE-2022-29187: Fixed incomplete fix for CVE-2022-24765 (bsc#1201431).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158981">SUSE bug 1158981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710961" comment="libgit2-26-0.26.8-150000.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009711157" comment="libgit2-26-32bit-0.26.8-150000.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52922" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012483.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:
                                                                                                                                                                                               
- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).                                                                    
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714325" comment="libpython2_7-1_0-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714742" comment="libpython2_7-1_0-32bit-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714326" comment="python-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714743" comment="python-32bit-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714327" comment="python-base-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714744" comment="python-base-32bit-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714329" comment="python-curses-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714745" comment="python-demo-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714330" comment="python-devel-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714746" comment="python-doc-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714747" comment="python-doc-pdf-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714331" comment="python-gdbm-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714748" comment="python-idle-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714328" comment="python-tk-2.7.18-150000.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714332" comment="python-xml-2.7.18-150000.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52923" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202915" ref_url="https://bugzilla.suse.com/1202915" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35538" ref_url="https://www.suse.com/security/cve/CVE-2020-35538/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012494.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-35538: Fixed null pointer dereference in jcopy_sample_rows() function (bsc#1202915).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-04"/>
	<updated date="2022-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202915">SUSE bug 1202915</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35538/">CVE-2020-35538</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710252" comment="libjpeg-turbo-1.5.3-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710228" comment="libjpeg62-62.2.0-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710412" comment="libjpeg62-32bit-62.2.0-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710229" comment="libjpeg62-devel-62.2.0-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710413" comment="libjpeg62-devel-32bit-62.2.0-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710414" comment="libjpeg62-turbo-1.5.3-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710230" comment="libjpeg8-8.1.2-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710239" comment="libjpeg8-32bit-8.1.2-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710231" comment="libjpeg8-devel-8.1.2-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710415" comment="libjpeg8-devel-32bit-8.1.2-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710232" comment="libturbojpeg0-8.1.2-150000.32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710416" comment="libturbojpeg0-32bit-8.1.2-150000.32.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52924" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199278" ref_url="https://bugzilla.suse.com/1199278" source="BUGZILLA"/>
		<reference ref_id="1199279" ref_url="https://bugzilla.suse.com/1199279" source="BUGZILLA"/>
		<reference ref_id="1201674" ref_url="https://bugzilla.suse.com/1201674" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="CVE-2022-29501" ref_url="https://www.suse.com/security/cve/CVE-2022-29501/" source="CVE"/>
		<reference ref_id="CVE-2022-31251" ref_url="https://www.suse.com/security/cve/CVE-2022-31251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012506.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2022-31251: Fixed a potential security vulnerability in the test package (bsc#1201674).
- CVE-2022-29500: Fixed architectural flaw that could have been exploited to allow an unprivileged user to execute arbitrary processes as root (bsc#1199278).
- CVE-2022-29501: Fixed a problem that an unprivileged user could have sent data to arbitrary unix socket as root (bsc#1199279).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199278">SUSE bug 1199278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199279">SUSE bug 1199279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201674">SUSE bug 1201674</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29501/">CVE-2022-29501</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31251/">CVE-2022-31251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716315" comment="libslurm32-17.11.13-150000.6.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52925" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203530" ref_url="https://bugzilla.suse.com/1203530" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886/" source="CVE"/>
		<reference ref_id="CVE-2022-32912" ref_url="https://www.suse.com/security/cve/CVE-2022-32912/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012501.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.36.8 (bsc#1203530):
  - CVE-2022-32886: Fixed a buffer overflow issue that could potentially lead to code execution.
  - CVE-2022-32912: Fixed an out-of-bounds read that could potentially lead to code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203530">SUSE bug 1203530</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32912/">CVE-2022-32912</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715360" comment="libjavascriptcoregtk-4_0-18-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715791" comment="libjavascriptcoregtk-4_0-18-32bit-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715361" comment="libwebkit2gtk-4_0-37-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715792" comment="libwebkit2gtk-4_0-37-32bit-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715362" comment="libwebkit2gtk3-lang-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715364" comment="typelib-1_0-JavaScriptCore-4_0-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715365" comment="typelib-1_0-WebKit2-4_0-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715366" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715793" comment="webkit-jsc-4-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715363" comment="webkit2gtk-4_0-injected-bundles-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715367" comment="webkit2gtk3-devel-2.36.8-150200.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715794" comment="webkit2gtk3-minibrowser-2.36.8-150200.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52926" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202624" ref_url="https://bugzilla.suse.com/1202624" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012510.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-06"/>
	<updated date="2022-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716354" comment="libpython3_6m1_0-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716492" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716355" comment="python3-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716356" comment="python3-base-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716357" comment="python3-curses-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716358" comment="python3-dbm-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716359" comment="python3-devel-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716493" comment="python3-doc-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716494" comment="python3-doc-devhelp-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716360" comment="python3-idle-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716495" comment="python3-testsuite-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716361" comment="python3-tk-3.6.15-150300.10.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716362" comment="python3-tools-3.6.15-150300.10.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52927" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203212" ref_url="https://bugzilla.suse.com/1203212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3574" ref_url="https://www.suse.com/security/cve/CVE-2021-3574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012520.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-3574: Fixed memory leaks with convert command (bsc#1203212).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-07"/>
	<updated date="2022-10-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1203212">SUSE bug 1203212</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3574/">CVE-2021-3574</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710524" comment="ImageMagick-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710525" comment="ImageMagick-config-7-SUSE-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710526" comment="ImageMagick-config-7-upstream-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710527" comment="ImageMagick-devel-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710602" comment="ImageMagick-devel-32bit-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710603" comment="ImageMagick-doc-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710604" comment="ImageMagick-extra-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710528" comment="libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710605" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710529" comment="libMagick++-devel-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710606" comment="libMagick++-devel-32bit-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710530" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710607" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710531" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710608" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710532" comment="perl-PerlMagick-7.0.7.34-150200.10.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52928" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-puma (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197818" ref_url="https://bugzilla.suse.com/1197818" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24790" ref_url="https://www.suse.com/security/cve/CVE-2022-24790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012533.html" source="SUSE-SU"/>
		<description>
This update for rubygem-puma fixes the following issues:

  Updated to version 4.3.12:
  - CVE-2022-24790: Fixed HTTP request smuggling if proxy is not RFC7230 compliant (bsc#1197818).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-13"/>
	<updated date="2022-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197818">SUSE bug 1197818</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24790/">CVE-2022-24790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715925" comment="ruby2.5-rubygem-puma-4.3.12-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716137" comment="ruby2.5-rubygem-puma-doc-4.3.12-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52929" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1175144" ref_url="https://bugzilla.suse.com/1175144" source="BUGZILLA"/>
		<reference ref_id="1182282" ref_url="https://bugzilla.suse.com/1182282" source="BUGZILLA"/>
		<reference ref_id="1192115" ref_url="https://bugzilla.suse.com/1192115" source="BUGZILLA"/>
		<reference ref_id="1198035" ref_url="https://bugzilla.suse.com/1198035" source="BUGZILLA"/>
		<reference ref_id="1198037" ref_url="https://bugzilla.suse.com/1198037" source="BUGZILLA"/>
		<reference ref_id="1198038" ref_url="https://bugzilla.suse.com/1198038" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3409" ref_url="https://www.suse.com/security/cve/CVE-2021-3409/" source="CVE"/>
		<reference ref_id="CVE-2021-4206" ref_url="https://www.suse.com/security/cve/CVE-2021-4206/" source="CVE"/>
		<reference ref_id="CVE-2021-4207" ref_url="https://www.suse.com/security/cve/CVE-2021-4207/" source="CVE"/>
		<reference ref_id="CVE-2022-0216" ref_url="https://www.suse.com/security/cve/CVE-2022-0216/" source="CVE"/>
		<reference ref_id="CVE-2022-35414" ref_url="https://www.suse.com/security/cve/CVE-2022-35414/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012542.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-3409: Fixed an incomplete fix for CVE-2020-17380 and CVE-2020-25085 in sdhi controller. (bsc#1182282)
- CVE-2021-4206: Fixed an integer overflow in cursor_alloc which can lead to heap buffer overflow. (bsc#1198035)
- CVE-2021-4207: Fixed a double fetch in qxl_cursor ehich can lead to heap buffer overflow. (bsc#1198037)
- CVE-2022-0216: Fixed a use after free issue found in hw/scsi/lsi53c895a.c. (bsc#1198038)
- CVE-2022-35414: Fixed an uninitialized read during address translation that leads to a crash. (bsc#1201367)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175144">SUSE bug 1175144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192115">SUSE bug 1192115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198035">SUSE bug 1198035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198037">SUSE bug 1198037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198038">SUSE bug 1198038</bugzilla>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3409/">CVE-2021-3409</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4206/">CVE-2021-4206</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4207/">CVE-2021-4207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0216/">CVE-2022-0216</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35414/">CVE-2022-35414</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717301" comment="qemu-s390-4.2.1-150200.69.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52930" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203677" ref_url="https://bugzilla.suse.com/1203677" source="BUGZILLA"/>
		<reference ref_id="1203680" ref_url="https://bugzilla.suse.com/1203680" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41317" ref_url="https://www.suse.com/security/cve/CVE-2022-41317/" source="CVE"/>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012545.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

  - CVE-2022-41317: Fixed exposure of sensitive information in cache manager (bsc#1203677).
  - CVE-2022-41318: Fixed buffer overread in SSPI and SMB Authentication (bsc#1203680).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203677">SUSE bug 1203677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203680">SUSE bug 1203680</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41317/">CVE-2022-41317</cve>
	<cve impact="important" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715808" comment="squid-4.17-150000.5.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52931" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203438" ref_url="https://bugzilla.suse.com/1203438" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012544.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203438">SUSE bug 1203438</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715803" comment="expat-2.2.5-150000.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715804" comment="libexpat-devel-2.2.5-150000.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715921" comment="libexpat-devel-32bit-2.2.5-150000.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715805" comment="libexpat1-2.2.5-150000.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715806" comment="libexpat1-32bit-2.2.5-150000.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52932" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1076579" ref_url="https://bugzilla.suse.com/1076579" source="BUGZILLA"/>
		<reference ref_id="1086798" ref_url="https://bugzilla.suse.com/1086798" source="BUGZILLA"/>
		<reference ref_id="1086810" ref_url="https://bugzilla.suse.com/1086810" source="BUGZILLA"/>
		<reference ref_id="1092096" ref_url="https://bugzilla.suse.com/1092096" source="BUGZILLA"/>
		<reference ref_id="1114690" ref_url="https://bugzilla.suse.com/1114690" source="BUGZILLA"/>
		<reference ref_id="1185447" ref_url="https://bugzilla.suse.com/1185447" source="BUGZILLA"/>
		<reference ref_id="1186192" ref_url="https://bugzilla.suse.com/1186192" source="BUGZILLA"/>
		<reference ref_id="1188733" ref_url="https://bugzilla.suse.com/1188733" source="BUGZILLA"/>
		<reference ref_id="1188756" ref_url="https://bugzilla.suse.com/1188756" source="BUGZILLA"/>
		<reference ref_id="1189330" ref_url="https://bugzilla.suse.com/1189330" source="BUGZILLA"/>
		<reference ref_id="1189331" ref_url="https://bugzilla.suse.com/1189331" source="BUGZILLA"/>
		<reference ref_id="1189332" ref_url="https://bugzilla.suse.com/1189332" source="BUGZILLA"/>
		<reference ref_id="1189333" ref_url="https://bugzilla.suse.com/1189333" source="BUGZILLA"/>
		<reference ref_id="1189636" ref_url="https://bugzilla.suse.com/1189636" source="BUGZILLA"/>
		<reference ref_id="1189780" ref_url="https://bugzilla.suse.com/1189780" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10772" ref_url="https://www.suse.com/security/cve/CVE-2018-10772/" source="CVE"/>
		<reference ref_id="CVE-2018-18915" ref_url="https://www.suse.com/security/cve/CVE-2018-18915/" source="CVE"/>
		<reference ref_id="CVE-2018-5772" ref_url="https://www.suse.com/security/cve/CVE-2018-5772/" source="CVE"/>
		<reference ref_id="CVE-2018-8976" ref_url="https://www.suse.com/security/cve/CVE-2018-8976/" source="CVE"/>
		<reference ref_id="CVE-2018-8977" ref_url="https://www.suse.com/security/cve/CVE-2018-8977/" source="CVE"/>
		<reference ref_id="CVE-2020-18898" ref_url="https://www.suse.com/security/cve/CVE-2020-18898/" source="CVE"/>
		<reference ref_id="CVE-2020-18899" ref_url="https://www.suse.com/security/cve/CVE-2020-18899/" source="CVE"/>
		<reference ref_id="CVE-2021-29470" ref_url="https://www.suse.com/security/cve/CVE-2021-29470/" source="CVE"/>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<reference ref_id="CVE-2021-31292" ref_url="https://www.suse.com/security/cve/CVE-2021-31292/" source="CVE"/>
		<reference ref_id="CVE-2021-32617" ref_url="https://www.suse.com/security/cve/CVE-2021-32617/" source="CVE"/>
		<reference ref_id="CVE-2021-37618" ref_url="https://www.suse.com/security/cve/CVE-2021-37618/" source="CVE"/>
		<reference ref_id="CVE-2021-37619" ref_url="https://www.suse.com/security/cve/CVE-2021-37619/" source="CVE"/>
		<reference ref_id="CVE-2021-37620" ref_url="https://www.suse.com/security/cve/CVE-2021-37620/" source="CVE"/>
		<reference ref_id="CVE-2021-37621" ref_url="https://www.suse.com/security/cve/CVE-2021-37621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025597.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2021-37621: Fixed denial of service due to infinite loop in Image:printIFDStructure (bsc#1189333).
- CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read() (bsc#1189332).
- CVE-2021-37619: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1189331).
- CVE-2021-37618: Fixed out-of-bounds read in Exiv2:Jp2Image:printStructure (bsc#1189330).
- CVE-2021-32617: Fixed denial of service inside inefficient algorithm (quadratic complexity) (bsc#1186192).
- CVE-2021-31292: Fixed integer overflow in CrwMap:encode0x1810 (bsc#1188756).
- CVE-2021-31291: Fixed heap-based buffer overflow vulnerability in jp2image.cpp may lead to a denial of service (bsc#1188733).
- CVE-2021-29470: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1185447).
- CVE-2020-18899: Fixed uncontrolled memory allocation (bsc#1189636).
- CVE-2020-18898: Fixed remote denial of service in printIFDStructure function (bsc#1189780).
- CVE-2018-8977: Fixed remote denial of service in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp (bsc#1086798).
- CVE-2018-8976: Fixed remote denial of service in image.cpp Exiv2::Internal::stringFormat via out-of-bounds read (bsc#1086810).
- CVE-2018-5772: Fixed segmentation fault caused by uncontrolled recursion inthe Exiv2::Image::printIFDStructure (bsc#1076579).
- CVE-2018-18915: Fixed an infinite loop in the Exiv2:Image:printIFDStructure function (bsc#1114690).
- CVE-2018-10772: Fixed segmentation fault when the function Exiv2::tEXtToDataBuf() is finished (bsc#1092096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-17"/>
	<updated date="2022-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076579">SUSE bug 1076579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086798">SUSE bug 1086798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086810">SUSE bug 1086810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092096">SUSE bug 1092096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114690">SUSE bug 1114690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185447">SUSE bug 1185447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186192">SUSE bug 1186192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188733">SUSE bug 1188733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188756">SUSE bug 1188756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189330">SUSE bug 1189330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189331">SUSE bug 1189331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189332">SUSE bug 1189332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189333">SUSE bug 1189333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189636">SUSE bug 1189636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189780">SUSE bug 1189780</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10772/">CVE-2018-10772</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18915/">CVE-2018-18915</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5772/">CVE-2018-5772</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8976/">CVE-2018-8976</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8977/">CVE-2018-8977</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18898/">CVE-2020-18898</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18899/">CVE-2020-18899</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29470/">CVE-2021-29470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31292/">CVE-2021-31292</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32617/">CVE-2021-32617</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37618/">CVE-2021-37618</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37619/">CVE-2021-37619</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37620/">CVE-2021-37620</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37621/">CVE-2021-37621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716317" comment="exiv2-0.26-150000.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716318" comment="exiv2-lang-0.26-150000.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716207" comment="libexiv2-26-0.26-150000.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716319" comment="libexiv2-26-32bit-0.26-150000.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716208" comment="libexiv2-devel-0.26-150000.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716320" comment="libexiv2-doc-0.26-150000.6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52933" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1177471" ref_url="https://bugzilla.suse.com/1177471" source="BUGZILLA"/>
		<reference ref_id="1179722" ref_url="https://bugzilla.suse.com/1179722" source="BUGZILLA"/>
		<reference ref_id="1179723" ref_url="https://bugzilla.suse.com/1179723" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1185032" ref_url="https://bugzilla.suse.com/1185032" source="BUGZILLA"/>
		<reference ref_id="1191662" ref_url="https://bugzilla.suse.com/1191662" source="BUGZILLA"/>
		<reference ref_id="1191667" ref_url="https://bugzilla.suse.com/1191667" source="BUGZILLA"/>
		<reference ref_id="1191881" ref_url="https://bugzilla.suse.com/1191881" source="BUGZILLA"/>
		<reference ref_id="1192594" ref_url="https://bugzilla.suse.com/1192594" source="BUGZILLA"/>
		<reference ref_id="1194023" ref_url="https://bugzilla.suse.com/1194023" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194535" ref_url="https://bugzilla.suse.com/1194535" source="BUGZILLA"/>
		<reference ref_id="1196444" ref_url="https://bugzilla.suse.com/1196444" source="BUGZILLA"/>
		<reference ref_id="1196616" ref_url="https://bugzilla.suse.com/1196616" source="BUGZILLA"/>
		<reference ref_id="1196867" ref_url="https://bugzilla.suse.com/1196867" source="BUGZILLA"/>
		<reference ref_id="1197158" ref_url="https://bugzilla.suse.com/1197158" source="BUGZILLA"/>
		<reference ref_id="1197659" ref_url="https://bugzilla.suse.com/1197659" source="BUGZILLA"/>
		<reference ref_id="1197755" ref_url="https://bugzilla.suse.com/1197755" source="BUGZILLA"/>
		<reference ref_id="1197756" ref_url="https://bugzilla.suse.com/1197756" source="BUGZILLA"/>
		<reference ref_id="1197757" ref_url="https://bugzilla.suse.com/1197757" source="BUGZILLA"/>
		<reference ref_id="1197760" ref_url="https://bugzilla.suse.com/1197760" source="BUGZILLA"/>
		<reference ref_id="1197763" ref_url="https://bugzilla.suse.com/1197763" source="BUGZILLA"/>
		<reference ref_id="1197920" ref_url="https://bugzilla.suse.com/1197920" source="BUGZILLA"/>
		<reference ref_id="1198971" ref_url="https://bugzilla.suse.com/1198971" source="BUGZILLA"/>
		<reference ref_id="1199255" ref_url="https://bugzilla.suse.com/1199255" source="BUGZILLA"/>
		<reference ref_id="1199291" ref_url="https://bugzilla.suse.com/1199291" source="BUGZILLA"/>
		<reference ref_id="1200084" ref_url="https://bugzilla.suse.com/1200084" source="BUGZILLA"/>
		<reference ref_id="1200313" ref_url="https://bugzilla.suse.com/1200313" source="BUGZILLA"/>
		<reference ref_id="1200431" ref_url="https://bugzilla.suse.com/1200431" source="BUGZILLA"/>
		<reference ref_id="1200622" ref_url="https://bugzilla.suse.com/1200622" source="BUGZILLA"/>
		<reference ref_id="1200845" ref_url="https://bugzilla.suse.com/1200845" source="BUGZILLA"/>
		<reference ref_id="1200868" ref_url="https://bugzilla.suse.com/1200868" source="BUGZILLA"/>
		<reference ref_id="1200869" ref_url="https://bugzilla.suse.com/1200869" source="BUGZILLA"/>
		<reference ref_id="1200870" ref_url="https://bugzilla.suse.com/1200870" source="BUGZILLA"/>
		<reference ref_id="1200871" ref_url="https://bugzilla.suse.com/1200871" source="BUGZILLA"/>
		<reference ref_id="1200872" ref_url="https://bugzilla.suse.com/1200872" source="BUGZILLA"/>
		<reference ref_id="1200873" ref_url="https://bugzilla.suse.com/1200873" source="BUGZILLA"/>
		<reference ref_id="1201019" ref_url="https://bugzilla.suse.com/1201019" source="BUGZILLA"/>
		<reference ref_id="1201309" ref_url="https://bugzilla.suse.com/1201309" source="BUGZILLA"/>
		<reference ref_id="1201310" ref_url="https://bugzilla.suse.com/1201310" source="BUGZILLA"/>
		<reference ref_id="1201420" ref_url="https://bugzilla.suse.com/1201420" source="BUGZILLA"/>
		<reference ref_id="1201442" ref_url="https://bugzilla.suse.com/1201442" source="BUGZILLA"/>
		<reference ref_id="1201489" ref_url="https://bugzilla.suse.com/1201489" source="BUGZILLA"/>
		<reference ref_id="1201610" ref_url="https://bugzilla.suse.com/1201610" source="BUGZILLA"/>
		<reference ref_id="1201645" ref_url="https://bugzilla.suse.com/1201645" source="BUGZILLA"/>
		<reference ref_id="1201705" ref_url="https://bugzilla.suse.com/1201705" source="BUGZILLA"/>
		<reference ref_id="1201726" ref_url="https://bugzilla.suse.com/1201726" source="BUGZILLA"/>
		<reference ref_id="1201865" ref_url="https://bugzilla.suse.com/1201865" source="BUGZILLA"/>
		<reference ref_id="1201948" ref_url="https://bugzilla.suse.com/1201948" source="BUGZILLA"/>
		<reference ref_id="1201990" ref_url="https://bugzilla.suse.com/1201990" source="BUGZILLA"/>
		<reference ref_id="1202095" ref_url="https://bugzilla.suse.com/1202095" source="BUGZILLA"/>
		<reference ref_id="1202096" ref_url="https://bugzilla.suse.com/1202096" source="BUGZILLA"/>
		<reference ref_id="1202097" ref_url="https://bugzilla.suse.com/1202097" source="BUGZILLA"/>
		<reference ref_id="1202154" ref_url="https://bugzilla.suse.com/1202154" source="BUGZILLA"/>
		<reference ref_id="1202341" ref_url="https://bugzilla.suse.com/1202341" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202347" ref_url="https://bugzilla.suse.com/1202347" source="BUGZILLA"/>
		<reference ref_id="1202385" ref_url="https://bugzilla.suse.com/1202385" source="BUGZILLA"/>
		<reference ref_id="1202393" ref_url="https://bugzilla.suse.com/1202393" source="BUGZILLA"/>
		<reference ref_id="1202396" ref_url="https://bugzilla.suse.com/1202396" source="BUGZILLA"/>
		<reference ref_id="1202447" ref_url="https://bugzilla.suse.com/1202447" source="BUGZILLA"/>
		<reference ref_id="1202577" ref_url="https://bugzilla.suse.com/1202577" source="BUGZILLA"/>
		<reference ref_id="1202636" ref_url="https://bugzilla.suse.com/1202636" source="BUGZILLA"/>
		<reference ref_id="1202672" ref_url="https://bugzilla.suse.com/1202672" source="BUGZILLA"/>
		<reference ref_id="1202677" ref_url="https://bugzilla.suse.com/1202677" source="BUGZILLA"/>
		<reference ref_id="1202701" ref_url="https://bugzilla.suse.com/1202701" source="BUGZILLA"/>
		<reference ref_id="1202708" ref_url="https://bugzilla.suse.com/1202708" source="BUGZILLA"/>
		<reference ref_id="1202709" ref_url="https://bugzilla.suse.com/1202709" source="BUGZILLA"/>
		<reference ref_id="1202710" ref_url="https://bugzilla.suse.com/1202710" source="BUGZILLA"/>
		<reference ref_id="1202711" ref_url="https://bugzilla.suse.com/1202711" source="BUGZILLA"/>
		<reference ref_id="1202712" ref_url="https://bugzilla.suse.com/1202712" source="BUGZILLA"/>
		<reference ref_id="1202713" ref_url="https://bugzilla.suse.com/1202713" source="BUGZILLA"/>
		<reference ref_id="1202714" ref_url="https://bugzilla.suse.com/1202714" source="BUGZILLA"/>
		<reference ref_id="1202715" ref_url="https://bugzilla.suse.com/1202715" source="BUGZILLA"/>
		<reference ref_id="1202716" ref_url="https://bugzilla.suse.com/1202716" source="BUGZILLA"/>
		<reference ref_id="1202717" ref_url="https://bugzilla.suse.com/1202717" source="BUGZILLA"/>
		<reference ref_id="1202718" ref_url="https://bugzilla.suse.com/1202718" source="BUGZILLA"/>
		<reference ref_id="1202720" ref_url="https://bugzilla.suse.com/1202720" source="BUGZILLA"/>
		<reference ref_id="1202722" ref_url="https://bugzilla.suse.com/1202722" source="BUGZILLA"/>
		<reference ref_id="1202745" ref_url="https://bugzilla.suse.com/1202745" source="BUGZILLA"/>
		<reference ref_id="1202756" ref_url="https://bugzilla.suse.com/1202756" source="BUGZILLA"/>
		<reference ref_id="1202810" ref_url="https://bugzilla.suse.com/1202810" source="BUGZILLA"/>
		<reference ref_id="1202811" ref_url="https://bugzilla.suse.com/1202811" source="BUGZILLA"/>
		<reference ref_id="1202860" ref_url="https://bugzilla.suse.com/1202860" source="BUGZILLA"/>
		<reference ref_id="1202895" ref_url="https://bugzilla.suse.com/1202895" source="BUGZILLA"/>
		<reference ref_id="1202898" ref_url="https://bugzilla.suse.com/1202898" source="BUGZILLA"/>
		<reference ref_id="1202960" ref_url="https://bugzilla.suse.com/1202960" source="BUGZILLA"/>
		<reference ref_id="1202984" ref_url="https://bugzilla.suse.com/1202984" source="BUGZILLA"/>
		<reference ref_id="1203063" ref_url="https://bugzilla.suse.com/1203063" source="BUGZILLA"/>
		<reference ref_id="1203098" ref_url="https://bugzilla.suse.com/1203098" source="BUGZILLA"/>
		<reference ref_id="1203107" ref_url="https://bugzilla.suse.com/1203107" source="BUGZILLA"/>
		<reference ref_id="1203116" ref_url="https://bugzilla.suse.com/1203116" source="BUGZILLA"/>
		<reference ref_id="1203117" ref_url="https://bugzilla.suse.com/1203117" source="BUGZILLA"/>
		<reference ref_id="1203135" ref_url="https://bugzilla.suse.com/1203135" source="BUGZILLA"/>
		<reference ref_id="1203136" ref_url="https://bugzilla.suse.com/1203136" source="BUGZILLA"/>
		<reference ref_id="1203137" ref_url="https://bugzilla.suse.com/1203137" source="BUGZILLA"/>
		<reference ref_id="1203159" ref_url="https://bugzilla.suse.com/1203159" source="BUGZILLA"/>
		<reference ref_id="1203313" ref_url="https://bugzilla.suse.com/1203313" source="BUGZILLA"/>
		<reference ref_id="1203389" ref_url="https://bugzilla.suse.com/1203389" source="BUGZILLA"/>
		<reference ref_id="1203410" ref_url="https://bugzilla.suse.com/1203410" source="BUGZILLA"/>
		<reference ref_id="1203424" ref_url="https://bugzilla.suse.com/1203424" source="BUGZILLA"/>
		<reference ref_id="1203552" ref_url="https://bugzilla.suse.com/1203552" source="BUGZILLA"/>
		<reference ref_id="1203622" ref_url="https://bugzilla.suse.com/1203622" source="BUGZILLA"/>
		<reference ref_id="1203737" ref_url="https://bugzilla.suse.com/1203737" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1203909" ref_url="https://bugzilla.suse.com/1203909" source="BUGZILLA"/>
		<reference ref_id="1203933" ref_url="https://bugzilla.suse.com/1203933" source="BUGZILLA"/>
		<reference ref_id="1203935" ref_url="https://bugzilla.suse.com/1203935" source="BUGZILLA"/>
		<reference ref_id="1203939" ref_url="https://bugzilla.suse.com/1203939" source="BUGZILLA"/>
		<reference ref_id="1203987" ref_url="https://bugzilla.suse.com/1203987" source="BUGZILLA"/>
		<reference ref_id="1203992" ref_url="https://bugzilla.suse.com/1203992" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119/" source="CVE"/>
		<reference ref_id="CVE-2020-27784" ref_url="https://www.suse.com/security/cve/CVE-2020-27784/" source="CVE"/>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4203" ref_url="https://www.suse.com/security/cve/CVE-2021-4203/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905/" source="CVE"/>
		<reference ref_id="CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-41222" ref_url="https://www.suse.com/security/cve/CVE-2022-41222/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="CVE-2022-41849" ref_url="https://www.suse.com/security/cve/CVE-2022-41849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).
- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).
- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).
- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).
- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).
- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)

The following non-security bugs were fixed:

- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).
- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- ALSA: usb-audio: fix spelling mistakes (git-fixes).
- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).
- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).
- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).
- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)
- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)
- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)
- arm64: mm: fix p?d_leaf() (git-fixes)
- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)
- arm64: mm: Validate hotplug range before creating linear mapping (git-fixes)
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)
- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)
- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).
- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).
- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).
- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).
- blktrace: fix blk_rq_merge documentation (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: m_can: process interrupt only when not runtime suspended (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).
- ceph: do not truncate file in atomic_open (bsc#1202811).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- cgroup: Trace event cgroup id fields should be u64 (git-fixes).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).
- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -&gt; 'Unsupported' (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- ehea: fix error return code in ehea_restart_qps() (git-fixes).
- enetc: Fix endianness issues for enetc_qos (git-fixes).
- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- fuse: ioctl: translate ENOSYS (bsc#1203136).
- fuse: limit nsec (bsc#1203135).
- fuse: Remove the control interface for virtio-fs (bsc#1203137).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).
- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: ssif: initialize ssif_info-&gt;client early (git-fixes).
- ixgbevf: add correct exception tracing for XDP (git-fixes).
- jbd2: fix assertion 'jh-&gt;b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- jfs: fix GPF in diFree (bsc#1203389).
- JFS: fix memleak in jfs_mount (git-fixes).
- JFS: more checks for invalid superblock (git-fixes).
- jfs: prevent NULL deref in diFree (bsc#1203389).
- kABI: cgroup: Restore KABI of css_set (bsc#1201610).
- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).
- kabi/severities: add stmmac driver local sumbols
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).
- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).
- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md-raid10: fix KASAN warning (git-fixes).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: rc: increase rc-mm tolerance and add debug message (git-fixes).
- media: rtl28xxu: add missing sleep before probing slave demod (git-fixes).
- media: rtl28xxu: Add support for PROlectrix DV107669 DVB-T dongle (git-fixes).
- media: rtl28xxu: set keymap for Astrometa DVB-T2 (git-fixes).
- media: smipcie: fix interrupt handling and IR timeout (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: usb: dvb-usb-v2: rtl28xxu: convert to use i2c_new_client_device() (git-fixes).
- media: v4l2-mem2mem: always consider OUTPUT queue during poll (git-fixes).
- media: v4l2-mem2mem: reorder checks in v4l2_m2m_poll() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: fix page reference leak in soft_offline_page() (git fixes (mm/memory-failure)).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).
- mm: rmap: Fix anon_vma-&gt;degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).
- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: cpsw: Properly initialise struct page_pool_params (git-fixes).
- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).
- net: dsa: b53: fix an off by one in checking 'vlan-&gt;vid' (git-fixes).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).
- net: ethernet: ezchip: fix error handling (git-fixes).
- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
- net: ethernet: ezchip: remove redundant check (git-fixes).
- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).
- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).
- net: fec_ptp: add clock rate zero check (git-fixes).
- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).
- net: ftgmac100: Fix crash when removing driver (git-fixes).
- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).
- net: hns: Fix kernel-doc (git-fixes).
- net: lantiq: fix memory corruption in RX ring (git-fixes).
- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).
- net: netcp: Fix an error message (git-fixes).
- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmicro: handle clk_prepare() failure during init (git-fixes).
- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).
- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).
- net: stmmac: Modify configuration method of EEE timers (git-fixes).
- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).
- net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' (git-fixes).
- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFS: Fix races in the legacy idmapper upcall (git-fixes).
- NFS: Fix second deadlock in nfs4_evict_inode() (git-fixes).
- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).
- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- NFS: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix offset type in I/O trace points (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: fix use-after-free due to delegation race (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvmet: Expose max queues to configfs (bsc#1201865).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- ocfs2: drop acl cache for directories too (bsc#1191667).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- of/device: Fix up of_dma_configure_id() stub (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: qcom: Fix pipe clock imbalance (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- pinctrl/rockchip: fix gpio device creation (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- PM: runtime: Remove link state checks in rpm_get/put_supplier() (git-fixes).
- powerpc: define get_cycles macro for arch-override (bsc#1065729).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).
- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- profiling: fix shift too large makes kernel panic (git-fixes).
- profiling: fix shift-out-of-bounds bugs (git fixes).
- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).
- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).
- random: remove useless header comment (git fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: core: Clean up on enable failure (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: fix 2KB pgtable release race (git-fixes).
- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).
- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).
- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).
- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).
- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).
- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).
- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).
- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).
- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)
- sched/fair: Revise comment about lb decision matrix (git fixes (sched/fair)).
- sched/membarrier: fix missing local execution of ipi_sync_rq_state() (git fixes (sched/membarrier)).
- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: smartpqi: Update LUN reset handler (bsc#1200622).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- squashfs: fix divide error in calculate_skip() (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- SUNRPC reverting d03727b248d0 ('NFSv4 fix CLOSE not waiting for direct IO compeletion') (git-fixes).
- SUNRPC: Clean up scheduling of autoclose (git-fixes).
- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).
- SUNRPC: Do not dereference xprt-&gt;snd_task if it's a cookie (git-fixes).
- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).
- SUNRPC: fix expiry of auth creds (git-fixes).
- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).
- SUNRPC: RPC level errors should set task-&gt;tk_rpc_status (git-fixes).
- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).
- tee: optee: Fix incorrect page free bug (git-fixes).
- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation (git fixes (kernel/time)).
- tools/thermal: Fix possible path truncations (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- USB: core: Fix RST error in hub.c (git-fixes).
- USB: core: Prevent nested device-reset calls (git-fixes).
- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- USB: dwc3: add cancelled reasons for dwc3 requests (git-fixes).
- USB: dwc3: disable USB core PHY management (git-fixes).
- USB: dwc3: ep0: Fix delay status handling (git-fixes).
- USB: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).
- USB: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- USB: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).
- USB: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).
- USB: dwc3: gadget: Remove unnecessary checks (git-fixes).
- USB: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- USB: dwc3: gadget: Store resource index of start cmd (git-fixes).
- USB: dwc3: qcom: fix missing optional irq warnings.
- USB: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).
- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- USB: gadget: u_audio: fix race condition on endpoint stop (git-fixes).
- USB: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- USB: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- USB: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- USB: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- USB: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- USB: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- USB: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).
- USB: renesas: Fix refcount leak bug (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: ch341: name prescaler, divisor registers (git-fixes).
- USB: serial: cp210x: add Decagon UCA device id (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- USB: serial: option: add Quectel EM060K modem (git-fixes).
- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- USB: serial: option: add support for OPPO R11 diag port (git-fixes).
- USB: storage: Add ASUS &amp;lt;0x0b05:0x1932&gt; to IGNORE_UAS (git-fixes).
- USB: storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- USB: struct usb_device: hide new member (git-fixes).
- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- USB: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- USB: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).
- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).
- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).
- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).
- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).
- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xprtrdma: Fix cwnd update ordering (git-fixes).
- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177471">SUSE bug 1177471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179722">SUSE bug 1179722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179723">SUSE bug 1179723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185032">SUSE bug 1185032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191662">SUSE bug 1191662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191667">SUSE bug 1191667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191881">SUSE bug 1191881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192594">SUSE bug 1192594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194023">SUSE bug 1194023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194535">SUSE bug 1194535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196444">SUSE bug 1196444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196616">SUSE bug 1196616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196867">SUSE bug 1196867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197158">SUSE bug 1197158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197659">SUSE bug 1197659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197755">SUSE bug 1197755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197756">SUSE bug 1197756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197757">SUSE bug 1197757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197760">SUSE bug 1197760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197763">SUSE bug 1197763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197920">SUSE bug 1197920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198971">SUSE bug 1198971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199291">SUSE bug 1199291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200313">SUSE bug 1200313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200431">SUSE bug 1200431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200622">SUSE bug 1200622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200845">SUSE bug 1200845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200868">SUSE bug 1200868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200869">SUSE bug 1200869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200870">SUSE bug 1200870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200871">SUSE bug 1200871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200872">SUSE bug 1200872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200873">SUSE bug 1200873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201019">SUSE bug 1201019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201309">SUSE bug 1201309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201310">SUSE bug 1201310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201420">SUSE bug 1201420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201442">SUSE bug 1201442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201489">SUSE bug 1201489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201610">SUSE bug 1201610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201645">SUSE bug 1201645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201705">SUSE bug 1201705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201726">SUSE bug 1201726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201865">SUSE bug 1201865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201990">SUSE bug 1201990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202095">SUSE bug 1202095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202154">SUSE bug 1202154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202341">SUSE bug 1202341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202347">SUSE bug 1202347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202385">SUSE bug 1202385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202393">SUSE bug 1202393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202396">SUSE bug 1202396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202447">SUSE bug 1202447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202577">SUSE bug 1202577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202636">SUSE bug 1202636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202672">SUSE bug 1202672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202677">SUSE bug 1202677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202701">SUSE bug 1202701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202708">SUSE bug 1202708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202709">SUSE bug 1202709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202710">SUSE bug 1202710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202711">SUSE bug 1202711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202712">SUSE bug 1202712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202713">SUSE bug 1202713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202714">SUSE bug 1202714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202715">SUSE bug 1202715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202716">SUSE bug 1202716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202717">SUSE bug 1202717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202718">SUSE bug 1202718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202720">SUSE bug 1202720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202722">SUSE bug 1202722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202745">SUSE bug 1202745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202756">SUSE bug 1202756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202810">SUSE bug 1202810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202811">SUSE bug 1202811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202860">SUSE bug 1202860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202895">SUSE bug 1202895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202960">SUSE bug 1202960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202984">SUSE bug 1202984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203063">SUSE bug 1203063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203098">SUSE bug 1203098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203116">SUSE bug 1203116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203117">SUSE bug 1203117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203135">SUSE bug 1203135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203136">SUSE bug 1203136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203137">SUSE bug 1203137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203159">SUSE bug 1203159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203313">SUSE bug 1203313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203389">SUSE bug 1203389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203410">SUSE bug 1203410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203424">SUSE bug 1203424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203552">SUSE bug 1203552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203622">SUSE bug 1203622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203737">SUSE bug 1203737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203909">SUSE bug 1203909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203933">SUSE bug 1203933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203935">SUSE bug 1203935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203939">SUSE bug 1203939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203987">SUSE bug 1203987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203992">SUSE bug 1203992</bugzilla>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27784/">CVE-2020-27784</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4203/">CVE-2021-4203</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41222/">CVE-2022-41222</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41849/">CVE-2022-41849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717663" comment="cluster-md-kmp-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717664" comment="dlm-kmp-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717665" comment="gfs2-kmp-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717649" comment="kernel-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717650" comment="kernel-azure-devel-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717666" comment="kernel-azure-extra-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717667" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717668" comment="kernel-azure-optional-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717651" comment="kernel-devel-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717652" comment="kernel-source-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717653" comment="kernel-syms-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717669" comment="kselftests-kmp-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717670" comment="ocfs2-kmp-azure-5.3.18-150300.38.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717671" comment="reiserfs-kmp-azure-5.3.18-150300.38.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52934" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202170" ref_url="https://bugzilla.suse.com/1202170" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012559.html" source="SUSE-SU"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2022-31197: Fixed SQL injection vulnerability (bsc#1202170).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202170">SUSE bug 1202170</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716220" comment="postgresql-jdbc-42.2.25-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716321" comment="postgresql-jdbc-javadoc-42.2.25-150300.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52935" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1203832" ref_url="https://bugzilla.suse.com/1203832" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012558.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

  Updated to version 14.20.1:

  - CVE-2022-32213: Fixed bypass via obs-fold mechanic (bsc#1201325).
  - CVE-2022-35256: Fixed incorrect Parsing of Header Fields (bsc#1203832).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203832">SUSE bug 1203832</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716221" comment="nodejs14-14.20.1-150200.15.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716222" comment="nodejs14-devel-14.20.1-150200.15.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716223" comment="nodejs14-docs-14.20.1-150200.15.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716224" comment="npm14-14.20.1-150200.15.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52936" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1201327" ref_url="https://bugzilla.suse.com/1201327" source="BUGZILLA"/>
		<reference ref_id="1203831" ref_url="https://bugzilla.suse.com/1203831" source="BUGZILLA"/>
		<reference ref_id="1203832" ref_url="https://bugzilla.suse.com/1203832" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012560.html" source="SUSE-SU"/>
		<description>
This update for nodejs16 fixes the following issues:

Updated to version 16.17.1:

- CVE-2022-32213: Fixed bypass via obs-fold mechanic (bsc#1201325).
- CVE-2022-32215: Fixed incorrect Parsing of Multi-line Transfer-Encoding (bsc#1201327).
- CVE-2022-35256: Fixed incorrect Parsing of Header Fields (bsc#1203832).
- CVE-2022-35255: FIxed weak randomness in WebCrypto keygen (bsc#1203831).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201327">SUSE bug 1201327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203831">SUSE bug 1203831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203832">SUSE bug 1203832</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716225" comment="nodejs16-16.17.1-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716226" comment="nodejs16-devel-16.17.1-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716227" comment="nodejs16-docs-16.17.1-150300.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716228" comment="npm16-16.17.1-150300.7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52937" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1203832" ref_url="https://bugzilla.suse.com/1203832" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012563.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

  - CVE-2022-35256: Fixed incorrect parsing of header fields (bsc#1203832).
  - CVE-2022-32213: Fixed bypass via obs-fold mechanic (bsc#1201325).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203832">SUSE bug 1203832</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716229" comment="nodejs12-12.22.12-150200.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716230" comment="nodejs12-devel-12.22.12-150200.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716231" comment="nodejs12-docs-12.22.12-150200.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716232" comment="npm12-12.22.12-150200.4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52938" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-5_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199060" ref_url="https://bugzilla.suse.com/1199060" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27777" ref_url="https://www.suse.com/security/cve/CVE-2022-27777/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012561.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activesupport-5_1 fixes the following issues:

- CVE-2022-27777: Fixed cross-site scripting vulnerability in Action View tag helper (bsc#1199060).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199060">SUSE bug 1199060</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-27777/">CVE-2022-27777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716155" comment="ruby2.5-rubygem-activesupport-5_1-5.1.4-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716187" comment="ruby2.5-rubygem-activesupport-doc-5_1-5.1.4-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52939" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1187428" ref_url="https://bugzilla.suse.com/1187428" source="BUGZILLA"/>
		<reference ref_id="1187723" ref_url="https://bugzilla.suse.com/1187723" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1191881" ref_url="https://bugzilla.suse.com/1191881" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193802" ref_url="https://bugzilla.suse.com/1193802" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194291" ref_url="https://bugzilla.suse.com/1194291" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195062" ref_url="https://bugzilla.suse.com/1195062" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195073" ref_url="https://bugzilla.suse.com/1195073" source="BUGZILLA"/>
		<reference ref_id="1195183" ref_url="https://bugzilla.suse.com/1195183" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195267" ref_url="https://bugzilla.suse.com/1195267" source="BUGZILLA"/>
		<reference ref_id="1195293" ref_url="https://bugzilla.suse.com/1195293" source="BUGZILLA"/>
		<reference ref_id="1195371" ref_url="https://bugzilla.suse.com/1195371" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28097" ref_url="https://www.suse.com/security/cve/CVE-2020-28097/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-39685" ref_url="https://www.suse.com/security/cve/CVE-2021-39685/" source="CVE"/>
		<reference ref_id="CVE-2021-4159" ref_url="https://www.suse.com/security/cve/CVE-2021-4159/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0286" ref_url="https://www.suse.com/security/cve/CVE-2022-0286/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).


The following security references were added to already fixed issues:

- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).


The following non-security bugs were fixed:

- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y &amp; CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init -&gt;running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused -&gt;wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187428">SUSE bug 1187428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187723">SUSE bug 1187723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191881">SUSE bug 1191881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193802">SUSE bug 1193802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194291">SUSE bug 1194291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195062">SUSE bug 1195062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195073">SUSE bug 1195073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195183">SUSE bug 1195183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195267">SUSE bug 1195267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195293">SUSE bug 1195293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195371">SUSE bug 1195371</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28097/">CVE-2020-28097</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39685/">CVE-2021-39685</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4159/">CVE-2021-4159</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0286/">CVE-2022-0286</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667757" comment="cluster-md-kmp-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667758" comment="dlm-kmp-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667759" comment="gfs2-kmp-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667465" comment="kernel-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667466" comment="kernel-azure-devel-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667760" comment="kernel-azure-extra-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667761" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667762" comment="kernel-azure-optional-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667467" comment="kernel-devel-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667468" comment="kernel-source-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667469" comment="kernel-syms-azure-5.3.18-150300.38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667763" comment="kselftests-kmp-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667764" comment="ocfs2-kmp-azure-5.3.18-150300.38.40.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667765" comment="reiserfs-kmp-azure-5.3.18-150300.38.40.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52940" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201868" ref_url="https://bugzilla.suse.com/1201868" source="BUGZILLA"/>
		<reference ref_id="1201872" ref_url="https://bugzilla.suse.com/1201872" source="BUGZILLA"/>
		<reference ref_id="1203209" ref_url="https://bugzilla.suse.com/1203209" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26305" ref_url="https://www.suse.com/security/cve/CVE-2022-26305/" source="CVE"/>
		<reference ref_id="CVE-2022-26307" ref_url="https://www.suse.com/security/cve/CVE-2022-26307/" source="CVE"/>
		<reference ref_id="CVE-2022-3140" ref_url="https://www.suse.com/security/cve/CVE-2022-3140/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012568.html" source="SUSE-SU"/>
		<description>
This update for libreoffice fixes the following issues:

  Updated to version 7.3.6.2 (jsc#SLE-23447):

  - CVE-2022-3140: Fixed macro URL arbitrary script execution (bsc#1203209).
  - CVE-2022-26305: Fixed execution of untrusted Macros due to improper certificate validation (bsc#1201868).
  - CVE-2022-26307: Fixed weak Master Keys in password storage (bsc#1201872).

  		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2022-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201868">SUSE bug 1201868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201872">SUSE bug 1201872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203209">SUSE bug 1203209</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26305/">CVE-2022-26305</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26307/">CVE-2022-26307</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3140/">CVE-2022-3140</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718224" comment="libreoffice-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718225" comment="libreoffice-base-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718226" comment="libreoffice-base-drivers-postgresql-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718227" comment="libreoffice-branding-upstream-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718228" comment="libreoffice-calc-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718229" comment="libreoffice-calc-extensions-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718230" comment="libreoffice-draw-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718231" comment="libreoffice-filters-optional-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718232" comment="libreoffice-gdb-pretty-printers-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718233" comment="libreoffice-glade-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718234" comment="libreoffice-gnome-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718235" comment="libreoffice-gtk3-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718236" comment="libreoffice-icon-themes-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718237" comment="libreoffice-impress-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718238" comment="libreoffice-l10n-af-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718239" comment="libreoffice-l10n-am-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718240" comment="libreoffice-l10n-ar-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718241" comment="libreoffice-l10n-as-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718242" comment="libreoffice-l10n-ast-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718243" comment="libreoffice-l10n-be-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718244" comment="libreoffice-l10n-bg-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718245" comment="libreoffice-l10n-bn-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718246" comment="libreoffice-l10n-bn_IN-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718247" comment="libreoffice-l10n-bo-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718248" comment="libreoffice-l10n-br-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718249" comment="libreoffice-l10n-brx-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718250" comment="libreoffice-l10n-bs-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718251" comment="libreoffice-l10n-ca-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718252" comment="libreoffice-l10n-ca_valencia-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718253" comment="libreoffice-l10n-ckb-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718254" comment="libreoffice-l10n-cs-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718255" comment="libreoffice-l10n-cy-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718256" comment="libreoffice-l10n-da-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718257" comment="libreoffice-l10n-de-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718258" comment="libreoffice-l10n-dgo-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718259" comment="libreoffice-l10n-dsb-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718260" comment="libreoffice-l10n-dz-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718261" comment="libreoffice-l10n-el-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718262" comment="libreoffice-l10n-en-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718263" comment="libreoffice-l10n-en_GB-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718264" comment="libreoffice-l10n-en_ZA-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718265" comment="libreoffice-l10n-eo-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718266" comment="libreoffice-l10n-es-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718267" comment="libreoffice-l10n-et-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718268" comment="libreoffice-l10n-eu-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718269" comment="libreoffice-l10n-fa-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718270" comment="libreoffice-l10n-fi-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718271" comment="libreoffice-l10n-fr-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718272" comment="libreoffice-l10n-fur-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718273" comment="libreoffice-l10n-fy-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718274" comment="libreoffice-l10n-ga-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718275" comment="libreoffice-l10n-gd-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718276" comment="libreoffice-l10n-gl-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718277" comment="libreoffice-l10n-gu-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718278" comment="libreoffice-l10n-gug-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718279" comment="libreoffice-l10n-he-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718280" comment="libreoffice-l10n-hi-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718281" comment="libreoffice-l10n-hr-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718282" comment="libreoffice-l10n-hsb-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718283" comment="libreoffice-l10n-hu-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718284" comment="libreoffice-l10n-id-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718285" comment="libreoffice-l10n-is-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718286" comment="libreoffice-l10n-it-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718287" comment="libreoffice-l10n-ja-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718288" comment="libreoffice-l10n-ka-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718289" comment="libreoffice-l10n-kab-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718290" comment="libreoffice-l10n-kk-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718291" comment="libreoffice-l10n-km-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718292" comment="libreoffice-l10n-kmr_Latn-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718293" comment="libreoffice-l10n-kn-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718294" comment="libreoffice-l10n-ko-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718295" comment="libreoffice-l10n-kok-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718296" comment="libreoffice-l10n-ks-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718297" comment="libreoffice-l10n-lb-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718298" comment="libreoffice-l10n-lo-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718299" comment="libreoffice-l10n-lt-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718300" comment="libreoffice-l10n-lv-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718301" comment="libreoffice-l10n-mai-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718302" comment="libreoffice-l10n-mk-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718303" comment="libreoffice-l10n-ml-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718304" comment="libreoffice-l10n-mn-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718305" comment="libreoffice-l10n-mni-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718306" comment="libreoffice-l10n-mr-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718307" comment="libreoffice-l10n-my-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718308" comment="libreoffice-l10n-nb-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718309" comment="libreoffice-l10n-ne-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718310" comment="libreoffice-l10n-nl-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718311" comment="libreoffice-l10n-nn-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718312" comment="libreoffice-l10n-nr-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718313" comment="libreoffice-l10n-nso-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718314" comment="libreoffice-l10n-oc-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718315" comment="libreoffice-l10n-om-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718316" comment="libreoffice-l10n-or-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718317" comment="libreoffice-l10n-pa-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718318" comment="libreoffice-l10n-pl-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718319" comment="libreoffice-l10n-pt_BR-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718320" comment="libreoffice-l10n-pt_PT-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718321" comment="libreoffice-l10n-ro-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718322" comment="libreoffice-l10n-ru-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718323" comment="libreoffice-l10n-rw-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718324" comment="libreoffice-l10n-sa_IN-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718325" comment="libreoffice-l10n-sat-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718326" comment="libreoffice-l10n-sd-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718327" comment="libreoffice-l10n-si-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718328" comment="libreoffice-l10n-sid-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718329" comment="libreoffice-l10n-sk-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718330" comment="libreoffice-l10n-sl-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718331" comment="libreoffice-l10n-sq-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718332" comment="libreoffice-l10n-sr-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718333" comment="libreoffice-l10n-ss-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718334" comment="libreoffice-l10n-st-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718335" comment="libreoffice-l10n-sv-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718336" comment="libreoffice-l10n-sw_TZ-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718337" comment="libreoffice-l10n-szl-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718338" comment="libreoffice-l10n-ta-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718339" comment="libreoffice-l10n-te-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718340" comment="libreoffice-l10n-tg-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718341" comment="libreoffice-l10n-th-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718342" comment="libreoffice-l10n-tn-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718343" comment="libreoffice-l10n-tr-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718344" comment="libreoffice-l10n-ts-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718345" comment="libreoffice-l10n-tt-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718346" comment="libreoffice-l10n-ug-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718347" comment="libreoffice-l10n-uk-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718348" comment="libreoffice-l10n-uz-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718349" comment="libreoffice-l10n-ve-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718350" comment="libreoffice-l10n-vec-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718351" comment="libreoffice-l10n-vi-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718352" comment="libreoffice-l10n-xh-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718353" comment="libreoffice-l10n-zh_CN-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718354" comment="libreoffice-l10n-zh_TW-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718355" comment="libreoffice-l10n-zu-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718356" comment="libreoffice-librelogo-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718357" comment="libreoffice-mailmerge-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718358" comment="libreoffice-math-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718359" comment="libreoffice-officebean-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718360" comment="libreoffice-pyuno-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718361" comment="libreoffice-qt5-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718362" comment="libreoffice-sdk-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718363" comment="libreoffice-sdk-doc-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718364" comment="libreoffice-writer-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718365" comment="libreoffice-writer-extensions-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718366" comment="libreofficekit-7.3.6.2-150300.14.22.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718367" comment="libreofficekit-devel-7.3.6.2-150300.14.22.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52941" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1124431" ref_url="https://bugzilla.suse.com/1124431" source="BUGZILLA"/>
		<reference ref_id="1167162" ref_url="https://bugzilla.suse.com/1167162" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186207" ref_url="https://bugzilla.suse.com/1186207" source="BUGZILLA"/>
		<reference ref_id="1186222" ref_url="https://bugzilla.suse.com/1186222" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190428" ref_url="https://bugzilla.suse.com/1190428" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1192032" ref_url="https://bugzilla.suse.com/1192032" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193575" ref_url="https://bugzilla.suse.com/1193575" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="1195166" ref_url="https://bugzilla.suse.com/1195166" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-15126" ref_url="https://www.suse.com/security/cve/CVE-2019-15126/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847)
- CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bsc#1192845)
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
- CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).
- CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
- CVE-2021-4135: Fixed zero-initialize memory inside netdevsim for new map's value in function nsim_bpf_map_alloc (bsc#1193927).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
- CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861). 
- CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
- CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet ixgbe driver due to improper input validation. (bsc#1192877)
- CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
- CVE-2021-28714: Fixed issue with xen/netback to handle rx queue stall detection (XSA-392) (bsc#1193442).
- CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1193731).
- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599).
- CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips, used in RPi family of devices aka 'Kr00k'. (bsc#1167162)
- CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).

The following non-security bugs were fixed:

- Bluetooth: fix the erroneous flush_work() order (git-fixes).
- Build: Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241 bsc#1195166).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- elfcore: fix building with clang (bsc#1169514).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241 bsc#1195166).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358).
- kernel-binary.spec.in: add zstd to BuildRequires if used
- kernel-binary.spec.in: make sure zstd is supported by kmod if used
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: Fix kernel-default-base scriptlets after packaging merge.
- kernel-binary.spec: Require dwarves for kernel-binary-devel when BTF is enabled (jsc#SLE-17288).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well.
- kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841). 
- kernel-source.spec: install-kernel-tools also required on 15.4
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). The semantic changed in an incompatible way so invoking the macro now causes a build failure.
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- memstick: rtsx_usb_ms: fix UAF (bsc#1194516).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: Using proper atomic helper (bsc#1186222).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: mana: Allow setting the number of queues while the NIC is down (bsc#1193506).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (bsc#1193506).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193506).
- net: mana: Improve the HWC error handling (bsc#1193506).
- net: mana: Support hibernation and kexec (bsc#1193506).
- net: mana: Use kcalloc() instead of kzalloc() (bsc#1193506).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- post.sh: detect /usr mountpoint too
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306). 
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305).
- rpm/kernel-source.rpmlintrc: ignore new include/config files. 
- rpm/kernel-source.spec.in: do some more for vanilla_only.
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. 
- rpm: Define $certs as rpm macro (bsc#1189841). 
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841). 
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- tty: hvc: replace BUG_ON() with negative return value.
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (bsc#1169514).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124431">SUSE bug 1124431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167162">SUSE bug 1167162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186222">SUSE bug 1186222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190428">SUSE bug 1190428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195166">SUSE bug 1195166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020</cve>
	<cve impact="important" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15126/">CVE-2019-15126</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667096" comment="kernel-debug-base-4.12.14-197.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667070" comment="kernel-default-man-4.12.14-197.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667097" comment="kernel-kvmsmall-base-4.12.14-197.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667098" comment="kernel-vanilla-4.12.14-197.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667099" comment="kernel-vanilla-base-4.12.14-197.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667100" comment="kernel-vanilla-devel-4.12.14-197.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667101" comment="kernel-vanilla-livepatch-devel-4.12.14-197.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667102" comment="kernel-zfcpdump-man-4.12.14-197.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52942" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192115" ref_url="https://bugzilla.suse.com/1192115" source="BUGZILLA"/>
		<reference ref_id="1198038" ref_url="https://bugzilla.suse.com/1198038" source="BUGZILLA"/>
		<reference ref_id="1201367" ref_url="https://bugzilla.suse.com/1201367" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0216" ref_url="https://www.suse.com/security/cve/CVE-2022-0216/" source="CVE"/>
		<reference ref_id="CVE-2022-35414" ref_url="https://www.suse.com/security/cve/CVE-2022-35414/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012576.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2022-0216: Fixed a use after free issue found in hw/scsi/lsi53c895a.c. (bsc#1198038)
- CVE-2022-35414: Fixed an uninitialized read during address translation that leads to a crash. (bsc#1201367) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192115">SUSE bug 1192115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198038">SUSE bug 1198038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201367">SUSE bug 1201367</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0216/">CVE-2022-0216</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35414/">CVE-2022-35414</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717044" comment="qemu-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717045" comment="qemu-SLOF-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717273" comment="qemu-arm-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717274" comment="qemu-audio-alsa-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717275" comment="qemu-audio-pa-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717276" comment="qemu-audio-spice-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717050" comment="qemu-block-curl-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717277" comment="qemu-block-dmg-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717278" comment="qemu-block-gluster-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717051" comment="qemu-block-iscsi-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717279" comment="qemu-block-nfs-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717052" comment="qemu-block-rbd-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717053" comment="qemu-block-ssh-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717054" comment="qemu-chardev-baum-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717280" comment="qemu-chardev-spice-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717281" comment="qemu-extra-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717056" comment="qemu-guest-agent-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717282" comment="qemu-hw-display-qxl-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717283" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717284" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717285" comment="qemu-hw-display-virtio-vga-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717286" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717287" comment="qemu-hw-usb-redirect-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717288" comment="qemu-hw-usb-smartcard-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717063" comment="qemu-ipxe-1.0.0+-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717289" comment="qemu-ivshmem-tools-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717064" comment="qemu-ksm-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717065" comment="qemu-kvm-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717066" comment="qemu-lang-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717290" comment="qemu-linux-user-5.2.0-150300.118.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717291" comment="qemu-microvm-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717292" comment="qemu-ppc-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717293" comment="qemu-s390x-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717069" comment="qemu-seabios-1.14.0_0_g155821a-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717070" comment="qemu-sgabios-8-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717071" comment="qemu-skiboot-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717294" comment="qemu-testsuite-5.2.0-150300.118.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717037" comment="qemu-tools-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717072" comment="qemu-ui-curses-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717295" comment="qemu-ui-gtk-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717296" comment="qemu-ui-opengl-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717297" comment="qemu-ui-spice-app-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717298" comment="qemu-ui-spice-core-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717077" comment="qemu-vgabios-1.14.0_0_g155821a-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717299" comment="qemu-vhost-user-gpu-5.2.0-150300.118.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717300" comment="qemu-x86-5.2.0-150300.118.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52943" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1167608" ref_url="https://bugzilla.suse.com/1167608" source="BUGZILLA"/>
		<reference ref_id="1185104" ref_url="https://bugzilla.suse.com/1185104" source="BUGZILLA"/>
		<reference ref_id="1197081" ref_url="https://bugzilla.suse.com/1197081" source="BUGZILLA"/>
		<reference ref_id="1200762" ref_url="https://bugzilla.suse.com/1200762" source="BUGZILLA"/>
		<reference ref_id="1201394" ref_url="https://bugzilla.suse.com/1201394" source="BUGZILLA"/>
		<reference ref_id="1201631" ref_url="https://bugzilla.suse.com/1201631" source="BUGZILLA"/>
		<reference ref_id="1203806" ref_url="https://bugzilla.suse.com/1203806" source="BUGZILLA"/>
		<reference ref_id="1203807" ref_url="https://bugzilla.suse.com/1203807" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28689" ref_url="https://www.suse.com/security/cve/CVE-2021-28689/" source="CVE"/>
		<reference ref_id="CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365/" source="CVE"/>
		<reference ref_id="CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740/" source="CVE"/>
		<reference ref_id="CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741/" source="CVE"/>
		<reference ref_id="CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742/" source="CVE"/>
		<reference ref_id="CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745/" source="CVE"/>
		<reference ref_id="CVE-2022-33746" ref_url="https://www.suse.com/security/cve/CVE-2022-33746/" source="CVE"/>
		<reference ref_id="CVE-2022-33748" ref_url="https://www.suse.com/security/cve/CVE-2022-33748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012580.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:
                                                                                                                                                                          
  - CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806).                                                                                     
  - CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).
  - CVE-2022-26365: Fixed issue where Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (bsc#1200762).
  - CVE-2022-33740: Fixed issue where Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (bsc#1200762).
  - CVE-2022-33741: Fixed issue where data residing in the same 4K page as data shared with a backend was being accessible by such backend (bsc#1200762).
  - CVE-2022-33742: Fixed issue where data residing in the same 4K page as data shared with a backend was being accessible by such backend (bsc#1200762).
  - CVE-2022-33745: Fixed an insufficient TLB flush for x86 PV guests in shadow mode (bsc#1201394).
  - CVE-2021-28689: Fixed speculative vulnerabilities with bare (non-shim) 32-bit PV guests (bsc#1185104).

  Bugfixes:                                                                                                                                                               
                                                                                                                                                                          
  - Fixed logic error in built-in default of max_event_channels (bsc#1167608, bsc#1201631). 
  - Fixed issue where dom0 fails to boot with constrained vcpus and nodes (bsc#1197081).
  - Included upstream bugfixes (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167608">SUSE bug 1167608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185104">SUSE bug 1185104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197081">SUSE bug 1197081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200762">SUSE bug 1200762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201394">SUSE bug 1201394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201631">SUSE bug 1201631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203806">SUSE bug 1203806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203807">SUSE bug 1203807</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28689/">CVE-2021-28689</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33746/">CVE-2022-33746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33748/">CVE-2022-33748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719046" comment="xen-4.14.5_06-150300.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719047" comment="xen-devel-4.14.5_06-150300.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719048" comment="xen-doc-html-4.14.5_06-150300.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719049" comment="xen-libs-4.14.5_06-150300.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719050" comment="xen-libs-32bit-4.14.5_06-150300.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719051" comment="xen-tools-4.14.5_06-150300.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719052" comment="xen-tools-domU-4.14.5_06-150300.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718871" comment="xen-tools-xendomains-wait-disk-4.14.5_06-150300.3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52944" version="1" class="patch">
	<metadata>
		<title>Security update for helm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="1203054" ref_url="https://bugzilla.suse.com/1203054" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-36055" ref_url="https://www.suse.com/security/cve/CVE-2022-36055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025643.html" source="SUSE-SU"/>
		<description>
This update for helm fixes the following issues:

helm was updated to version 3.9.4:

* CVE-2022-36055: Fixed denial of service through string value parsing (bsc#1203054).
* Updating the certificates used for testing
* Updating index handling

helm was updated to version 3.9.3:

- CVE-2022-1996: Updated kube-openapi to fix an issue that could result in a CORS protection bypass (bsc#1200528).
* Fix missing array length check on release

helm was updated to version 3.9.2:

* Update of the circleci image

helm was updated  to version 3.9.1:

* Update to support Kubernetes 1.24.2
* Improve logging and safety of statefulSetReady
* Make token caching an opt-in feature
* Bump github.com/lib/pq from 1.10.5 to 1.10.6
* Bump github.com/Masterminds/squirrel from 1.5.2 to 1.5.3

helm was updated to version 3.9.0:

* Added a --quiet flag to helm lint
* Added a --post-renderer-args flag to support arguments being passed to the post renderer
* Added more checks during the signing process
* Updated to add Kubernetes 1.24 support

helm was updated to version 3.8.2:

* Bump oras.land/oras-go from 1.1.0 to 1.1.1
* Fixing downloader plugin error handling
* Simplify testdata charts
* Simplify testdata charts
* Add tests for multi-level dependencies.
* Fix value precedence
* Bumping Kubernetes package versions
* Updating vcs to latest version
* Dont modify provided transport
* Pass http getter as pointer in tests
* Add docs block
* Add transport option and tests
* Reuse http transport
* Updating Kubernetes libs to 0.23.4 (latest)
* fix: remove deadcode
* fix: helm package tests
* fix: helm package with dependency update for charts with OCI dependencies
* Fix typo Unset the env var before func return in Unit Test
* add legal name check
* maint: fix syntax error in deploy.sh
* linting issue fixed
* only apply overwrite if version is canary
* overwrite flag added to az storage blob upload-batch
* Avoid querying for OCI tags can explicit version provided in chart dependencies
* Management of bearer tokens for tag listing
* Updating Kubernetes packages to 1.23.3
* refactor: use `os.ReadDir` for lightweight directory reading
* Add IngressClass to manifests to be (un)installed
* feat(comp): Shell completion for OCI
* Fix install memory/goroutine leak
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203054">SUSE bug 1203054</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36055/">CVE-2022-36055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717039" comment="helm-3.9.4-150000.1.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717040" comment="helm-bash-completion-3.9.4-150000.1.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717042" comment="helm-fish-completion-3.9.4-150000.1.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717041" comment="helm-zsh-completion-3.9.4-150000.1.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52945" version="1" class="patch">
	<metadata>
		<title>Security update for clone-master-clean-up (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181050" ref_url="https://bugzilla.suse.com/1181050" source="BUGZILLA"/>
		<reference ref_id="1203651" ref_url="https://bugzilla.suse.com/1203651" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32000" ref_url="https://www.suse.com/security/cve/CVE-2021-32000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012584.html" source="SUSE-SU"/>
		<description>
This update for clone-master-clean-up fixes the following issues:

- CVE-2021-32000: Fixed some potentially dangerous file system operations (bsc#1181050).

Bugfixes:
- Fixed clone-master-clean-up failing to remove btrfs snapshots (bsc#1203651).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181050">SUSE bug 1181050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203651">SUSE bug 1203651</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32000/">CVE-2021-32000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715595" comment="clone-master-clean-up-1.8-150100.3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52946" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1204023" ref_url="https://bugzilla.suse.com/1204023" source="BUGZILLA"/>
		<reference ref_id="1204024" ref_url="https://bugzilla.suse.com/1204024" source="BUGZILLA"/>
		<reference ref_id="1204025" ref_url="https://bugzilla.suse.com/1204025" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012583.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

  Updated to version 1.18.7 (bsc#1193742):

  - CVE-2022-41715: Fixed memory exhaustion in regexp/syntax (bsc#1204023).
  - CVE-2022-2879: Fixed unbounded memory consumption when reading headers in archive/tar (bsc#1204024).
  - CVE-2022-2880: Fixed ReverseProxy forwarding unparseable query parameters (bsc#1204025).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204024">SUSE bug 1204024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204025">SUSE bug 1204025</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716744" comment="go1.18-1.18.7-150000.1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716745" comment="go1.18-doc-1.18.7-150000.1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716746" comment="go1.18-race-1.18.7-150000.1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52947" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1204023" ref_url="https://bugzilla.suse.com/1204023" source="BUGZILLA"/>
		<reference ref_id="1204024" ref_url="https://bugzilla.suse.com/1204024" source="BUGZILLA"/>
		<reference ref_id="1204025" ref_url="https://bugzilla.suse.com/1204025" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012582.html" source="SUSE-SU"/>
		<description>
This update for go1.19 fixes the following issues:

Updated to version 1.19.2 (bsc#1200441):

  - CVE-2022-41715: Fixed memory exhaustion in regexp/syntax (bsc#1204023).
  - CVE-2022-2879: Fixed unbounded memory consumption when reading headers in archive/tar (bsc#1204024).
  - CVE-2022-2880: Fixed ReverseProxy forwarding unparseable query parameters (bsc#1204025).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2022-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204024">SUSE bug 1204024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204025">SUSE bug 1204025</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716747" comment="go1.19-1.19.2-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716748" comment="go1.19-doc-1.19.2-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716749" comment="go1.19-race-1.19.2-150000.1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52948" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202642" ref_url="https://bugzilla.suse.com/1202642" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2963" ref_url="https://www.suse.com/security/cve/CVE-2022-2963/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012589.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2022-2963: Fixed memory leaks in function cmdopts_parse (bsc#1202642).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2022-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202642">SUSE bug 1202642</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2963/">CVE-2022-2963</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714101" comment="jasper-2.0.14-150000.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714076" comment="libjasper-devel-2.0.14-150000.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714072" comment="libjasper4-2.0.14-150000.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714102" comment="libjasper4-32bit-2.0.14-150000.3.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52949" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201247" ref_url="https://bugzilla.suse.com/1201247" source="BUGZILLA"/>
		<reference ref_id="1203614" ref_url="https://bugzilla.suse.com/1203614" source="BUGZILLA"/>
		<reference ref_id="1203619" ref_url="https://bugzilla.suse.com/1203619" source="BUGZILLA"/>
		<reference ref_id="1203620" ref_url="https://bugzilla.suse.com/1203620" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations (bsc#1203614).
- CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm (bsc#1203619).
- CVE-2022-38178: Fixed memory leaks that could be externally triggered in the DNSSEC verification code for the EdDSA algorithm (bsc#1203620).

Bugfixes:
- Changed ownership of /var/lib/named/master from named:named to root:root (bsc#1201247)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2022-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201247">SUSE bug 1201247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203614">SUSE bug 1203614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203619">SUSE bug 1203619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203620">SUSE bug 1203620</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715592" comment="bind-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715593" comment="bind-chrootenv-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715349" comment="bind-devel-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715594" comment="bind-doc-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715350" comment="bind-utils-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715351" comment="libbind9-1600-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715352" comment="libdns1605-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715353" comment="libirs-devel-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715354" comment="libirs1601-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715355" comment="libisc1606-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715356" comment="libisccc1600-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715357" comment="libisccfg1600-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715358" comment="libns1604-9.16.6-150300.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715359" comment="python3-bind-9.16.6-150300.22.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52950" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204357" ref_url="https://bugzilla.suse.com/1204357" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012597.html" source="SUSE-SU"/>
		<description>
This update for libksba fixes the following issues:

  - CVE-2022-3515: Fixed a possible overflow in the TLV parser (bsc#1204357).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2022-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204357">SUSE bug 1204357</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718374" comment="libksba-devel-1.3.5-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718375" comment="libksba8-1.3.5-150000.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52951" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201723" ref_url="https://bugzilla.suse.com/1201723" source="BUGZILLA"/>
		<reference ref_id="1201971" ref_url="https://bugzilla.suse.com/1201971" source="BUGZILLA"/>
		<reference ref_id="1202026" ref_url="https://bugzilla.suse.com/1202026" source="BUGZILLA"/>
		<reference ref_id="1202466" ref_url="https://bugzilla.suse.com/1202466" source="BUGZILLA"/>
		<reference ref_id="1202467" ref_url="https://bugzilla.suse.com/1202467" source="BUGZILLA"/>
		<reference ref_id="1202468" ref_url="https://bugzilla.suse.com/1202468" source="BUGZILLA"/>
		<reference ref_id="1202968" ref_url="https://bugzilla.suse.com/1202968" source="BUGZILLA"/>
		<reference ref_id="1202971" ref_url="https://bugzilla.suse.com/1202971" source="BUGZILLA"/>
		<reference ref_id="1202973" ref_url="https://bugzilla.suse.com/1202973" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<reference ref_id="CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867/" source="CVE"/>
		<reference ref_id="CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868/" source="CVE"/>
		<reference ref_id="CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869/" source="CVE"/>
		<reference ref_id="CVE-2022-34266" ref_url="https://www.suse.com/security/cve/CVE-2022-34266/" source="CVE"/>
		<reference ref_id="CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-2519: Fixed a double free in rotateImage() (bsc#1202968).
- CVE-2022-2520: Fixed a assertion failure in rotateImage() (bsc#1202973).
- CVE-2022-2521: Fixed invalid free in TIFFClose() (bsc#1202971).
- CVE-2022-2867: Fixed out of bounds read and write in tiffcrop.c (bsc#1202466).
- CVE-2022-2868: Fixed out of bounds read in reverseSamples16bits() (bsc#1202467).
- CVE-2022-2869: Fixed out of bounds read and write in extractContigSamples8bits() (bsc#1202468).
- CVE-2022-34526: Fixed stack overflow in the _TIFFVGetField function of Tiffsplit (bsc#1202026).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2022-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201723">SUSE bug 1201723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201971">SUSE bug 1201971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202026">SUSE bug 1202026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202466">SUSE bug 1202466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202467">SUSE bug 1202467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202468">SUSE bug 1202468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202968">SUSE bug 1202968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202971">SUSE bug 1202971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202973">SUSE bug 1202973</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34266/">CVE-2022-34266</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718767" comment="libtiff-devel-4.0.9-150000.45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719768" comment="libtiff-devel-32bit-4.0.9-150000.45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718768" comment="libtiff5-4.0.9-150000.45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718725" comment="libtiff5-32bit-4.0.9-150000.45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718727" comment="tiff-4.0.9-150000.45.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52952" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199564" ref_url="https://bugzilla.suse.com/1199564" source="BUGZILLA"/>
		<reference ref_id="1200288" ref_url="https://bugzilla.suse.com/1200288" source="BUGZILLA"/>
		<reference ref_id="1201309" ref_url="https://bugzilla.suse.com/1201309" source="BUGZILLA"/>
		<reference ref_id="1202677" ref_url="https://bugzilla.suse.com/1202677" source="BUGZILLA"/>
		<reference ref_id="1202960" ref_url="https://bugzilla.suse.com/1202960" source="BUGZILLA"/>
		<reference ref_id="1203552" ref_url="https://bugzilla.suse.com/1203552" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1203987" ref_url="https://bugzilla.suse.com/1203987" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20008" ref_url="https://www.suse.com/security/cve/CVE-2022-20008/" source="CVE"/>
		<reference ref_id="CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503/" source="CVE"/>
		<reference ref_id="CVE-2022-32296" ref_url="https://www.suse.com/security/cve/CVE-2022-32296/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-20008: Fixed local information disclosure due to possibility to read kernel heap memory via mmc_blk_read_single of block.c (bnc#1199564).
- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).
- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bnc#1200288).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-41848: Fixed a race condition in drivers/char/pcmcia/synclink_cs.c mgslpc_ioctl and mgslpc_detach (bnc#1203987).

The following non-security bugs were fixed:

- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add the Linux MANA PF driver (bnc#1201309, jsc#PED-529).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-22"/>
	<updated date="2022-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199564">SUSE bug 1199564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200288">SUSE bug 1200288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201309">SUSE bug 1201309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202677">SUSE bug 1202677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202960">SUSE bug 1202960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203552">SUSE bug 1203552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203987">SUSE bug 1203987</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-20008/">CVE-2022-20008</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32296/">CVE-2022-32296</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717302" comment="kernel-debug-base-4.12.14-150100.197.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716991" comment="kernel-default-man-4.12.14-150100.197.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717303" comment="kernel-kvmsmall-base-4.12.14-150100.197.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717304" comment="kernel-vanilla-4.12.14-150100.197.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717305" comment="kernel-vanilla-base-4.12.14-150100.197.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717306" comment="kernel-vanilla-devel-4.12.14-150100.197.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717307" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717308" comment="kernel-zfcpdump-man-4.12.14-150100.197.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52953" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1187428" ref_url="https://bugzilla.suse.com/1187428" source="BUGZILLA"/>
		<reference ref_id="1187723" ref_url="https://bugzilla.suse.com/1187723" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1191881" ref_url="https://bugzilla.suse.com/1191881" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193802" ref_url="https://bugzilla.suse.com/1193802" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194291" ref_url="https://bugzilla.suse.com/1194291" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195062" ref_url="https://bugzilla.suse.com/1195062" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195073" ref_url="https://bugzilla.suse.com/1195073" source="BUGZILLA"/>
		<reference ref_id="1195183" ref_url="https://bugzilla.suse.com/1195183" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195267" ref_url="https://bugzilla.suse.com/1195267" source="BUGZILLA"/>
		<reference ref_id="1195293" ref_url="https://bugzilla.suse.com/1195293" source="BUGZILLA"/>
		<reference ref_id="1195371" ref_url="https://bugzilla.suse.com/1195371" source="BUGZILLA"/>
		<reference ref_id="1195476" ref_url="https://bugzilla.suse.com/1195476" source="BUGZILLA"/>
		<reference ref_id="1195477" ref_url="https://bugzilla.suse.com/1195477" source="BUGZILLA"/>
		<reference ref_id="1195478" ref_url="https://bugzilla.suse.com/1195478" source="BUGZILLA"/>
		<reference ref_id="1195479" ref_url="https://bugzilla.suse.com/1195479" source="BUGZILLA"/>
		<reference ref_id="1195480" ref_url="https://bugzilla.suse.com/1195480" source="BUGZILLA"/>
		<reference ref_id="1195481" ref_url="https://bugzilla.suse.com/1195481" source="BUGZILLA"/>
		<reference ref_id="1195482" ref_url="https://bugzilla.suse.com/1195482" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28097" ref_url="https://www.suse.com/security/cve/CVE-2020-28097/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-39685" ref_url="https://www.suse.com/security/cve/CVE-2021-39685/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0286" ref_url="https://www.suse.com/security/cve/CVE-2022-0286/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).


The following non-security bugs were fixed:

- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Bluetooth: refactor malicious adv data check (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- IB/cm: Avoid a loop when device has 255 ports (git-fixes)
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/isert: Fix a use after free in isert_connect_request (git-fixes)
- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)
- IB/mlx5: Add missing error code (git-fixes)
- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)
- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)
- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- Input: wm97xx: Simplify resource management (git-fixes).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/core: Do not access cm_id after its destruction (git-fixes)
- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)
- RDMA/core: Fix corrupted SL on passive side (git-fixes)
- RDMA/core: Unify RoCE check and re-factor code (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)
- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)
- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)
- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)
- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)
- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)
- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)
- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)
- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)
- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)
- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)
- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: serial: mos7840: fix probe error handling (git-fixes).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).
- blk-mq: introduce blk_mq_set_request_complete (git-fixes).
- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y &amp; CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).
- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- i40iw: Add support to make destroy QP synchronous (git-fixes)
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init -&gt;running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused -&gt;wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).
- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).
- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).
- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).
- nvme-tcp: fix data digest pointer calculation (git-fixes).
- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).
- nvme-tcp: fix memory leak when freeing a queue (git-fixes).
- nvme-tcp: fix possible use-after-completion (git-fixes).
- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).
- nvme: introduce a nvme_host_path_error helper (git-fixes).
- nvme: refactor ns-&gt;ctrl by request (git-fixes).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).
- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).
- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: Add support for Brainboxes UC cards (git-fixes).
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).
- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).
- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-11"/>
	<updated date="2022-02-11"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187428">SUSE bug 1187428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187723">SUSE bug 1187723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191881">SUSE bug 1191881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193802">SUSE bug 1193802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194291">SUSE bug 1194291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195062">SUSE bug 1195062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195073">SUSE bug 1195073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195183">SUSE bug 1195183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195267">SUSE bug 1195267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195293">SUSE bug 1195293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195371">SUSE bug 1195371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195476">SUSE bug 1195476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195477">SUSE bug 1195477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195478">SUSE bug 1195478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195479">SUSE bug 1195479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195480">SUSE bug 1195480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195481">SUSE bug 1195481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195482">SUSE bug 1195482</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28097/">CVE-2020-28097</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39685/">CVE-2021-39685</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0286/">CVE-2022-0286</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667685" comment="cluster-md-kmp-64kb-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667480" comment="cluster-md-kmp-default-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667686" comment="cluster-md-kmp-preempt-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667687" comment="dlm-kmp-64kb-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667481" comment="dlm-kmp-default-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667688" comment="dlm-kmp-preempt-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667689" comment="dtb-al-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667690" comment="dtb-allwinner-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667691" comment="dtb-altera-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667692" comment="dtb-amd-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667693" comment="dtb-amlogic-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667694" comment="dtb-apm-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667695" comment="dtb-arm-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667696" comment="dtb-broadcom-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667697" comment="dtb-cavium-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667698" comment="dtb-exynos-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667699" comment="dtb-freescale-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667700" comment="dtb-hisilicon-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667701" comment="dtb-lg-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667702" comment="dtb-marvell-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667703" comment="dtb-mediatek-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667704" comment="dtb-nvidia-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667705" comment="dtb-qcom-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667706" comment="dtb-renesas-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667707" comment="dtb-rockchip-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667708" comment="dtb-socionext-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667709" comment="dtb-sprd-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667710" comment="dtb-xilinx-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667711" comment="dtb-zte-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667712" comment="gfs2-kmp-64kb-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667482" comment="gfs2-kmp-default-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667713" comment="gfs2-kmp-preempt-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667415" comment="kernel-64kb-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667416" comment="kernel-64kb-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667714" comment="kernel-64kb-extra-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667715" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667716" comment="kernel-64kb-optional-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667717" comment="kernel-debug-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667718" comment="kernel-debug-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667719" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667417" comment="kernel-default-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667418" comment="kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667720" comment="kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667419" comment="kernel-default-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667721" comment="kernel-default-extra-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667722" comment="kernel-default-livepatch-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667723" comment="kernel-default-livepatch-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667724" comment="kernel-default-optional-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667420" comment="kernel-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667448" comment="kernel-docs-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667725" comment="kernel-docs-html-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667726" comment="kernel-kvmsmall-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667727" comment="kernel-kvmsmall-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667728" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667421" comment="kernel-macros-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667449" comment="kernel-obs-build-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667729" comment="kernel-obs-qa-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667422" comment="kernel-preempt-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667450" comment="kernel-preempt-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667730" comment="kernel-preempt-extra-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667731" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667732" comment="kernel-preempt-optional-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667451" comment="kernel-source-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667733" comment="kernel-source-vanilla-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667452" comment="kernel-syms-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667423" comment="kernel-zfcpdump-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667734" comment="kselftests-kmp-64kb-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667735" comment="kselftests-kmp-default-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667736" comment="kselftests-kmp-preempt-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667737" comment="ocfs2-kmp-64kb-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667483" comment="ocfs2-kmp-default-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667738" comment="ocfs2-kmp-preempt-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667739" comment="reiserfs-kmp-64kb-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667454" comment="reiserfs-kmp-default-5.3.18-150300.59.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667740" comment="reiserfs-kmp-preempt-5.3.18-150300.59.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52954" version="1" class="patch">
	<metadata>
		<title>Security update for multipath-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1189551" ref_url="https://bugzilla.suse.com/1189551" source="BUGZILLA"/>
		<reference ref_id="1191900" ref_url="https://bugzilla.suse.com/1191900" source="BUGZILLA"/>
		<reference ref_id="1195506" ref_url="https://bugzilla.suse.com/1195506" source="BUGZILLA"/>
		<reference ref_id="1197570" ref_url="https://bugzilla.suse.com/1197570" source="BUGZILLA"/>
		<reference ref_id="1202616" ref_url="https://bugzilla.suse.com/1202616" source="BUGZILLA"/>
		<reference ref_id="1202739" ref_url="https://bugzilla.suse.com/1202739" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973/" source="CVE"/>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012648.html" source="SUSE-SU"/>
		<description>
This update for multipath-tools fixes the following issues:

- CVE-2022-41973: Fixed a symlink attack in multipathd. (bsc#1202739)
- CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)
    
- multipathd: add 'force_reconfigure' option (bsc#1189551)
    The command 'multipathd -kreconfigure' changes behavior: instead
    of reloading every map, it checks map configuration and reloads
    only modified maps. This speeds up the reconfigure operation 
    substantially. The old behavior can be reinstated by setting
    'force_reconfigure yes' in multipath.conf (not recommended).
    Note: 'force_reconfigure yes' is not supported in SLE15-SP4 and
    beyond, which provide the command 'multipathd -k'reconfigure all''

- multipathd: avoid stalled clients during reconfigure (bsc#1189551)
- multipathd: handle client disconnect correctly (bsc#1189551)
- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
- multipathd: don't switch to DAEMON_IDLE during startup (bsc#1197570)
- multipathd: disallow changing to/from fpin marginal paths on reconfig
- multipathd handle fpin events (bsc#1195506,jsc#PED-1448)
- multipath: fix exit status of multipath -T (bsc#1191900)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189551">SUSE bug 1189551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191900">SUSE bug 1191900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195506">SUSE bug 1195506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197570">SUSE bug 1197570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202616">SUSE bug 1202616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202739">SUSE bug 1202739</bugzilla>
	<cve impact="important" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720104" comment="kpartx-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720105" comment="libdmmp-devel-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720106" comment="libdmmp0_2_0-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720107" comment="libmpath0-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720108" comment="multipath-tools-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720109" comment="multipath-tools-devel-0.8.5+126+suse.8ce8da5-150300.2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52955" version="1" class="patch">
	<metadata>
		<title>Security update for multipath-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202616" ref_url="https://bugzilla.suse.com/1202616" source="BUGZILLA"/>
		<reference ref_id="1202739" ref_url="https://bugzilla.suse.com/1202739" source="BUGZILLA"/>
		<reference ref_id="1204325" ref_url="https://bugzilla.suse.com/1204325" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012641.html" source="SUSE-SU"/>
		<description>
This update for multipath-tools fixes the following issues:

- CVE-2022-41974: Fixed an authorization bypass issue in multipathd. (bsc#1202739)
- Avoid linking to libreadline to avoid licensing issue (bsc#1202616)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2022-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202616">SUSE bug 1202616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202739">SUSE bug 1202739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204325">SUSE bug 1204325</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720053" comment="libdmmp0_1_0-0.7.3+173+suse.7dd1b01-150000.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720056" comment="multipath-tools-rbd-0.7.3+173+suse.7dd1b01-150000.3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52956" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204421" ref_url="https://bugzilla.suse.com/1204421" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Updated to version 102.4.0 ESR (bsc#1204421)
- CVE-2022-42927: Fixed same-origin policy violation that could have leaked cross-origin URLs.
- CVE-2022-42928: Fixed memory Corruption in JS Engine.
- CVE-2022-42929: Fixed denial of Service via window.print.
- CVE-2022-42932: Fixed memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718863" comment="MozillaFirefox-102.4.0-150200.152.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720861" comment="MozillaFirefox-branding-upstream-102.4.0-150200.152.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720862" comment="MozillaFirefox-devel-102.4.0-150200.152.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718865" comment="MozillaFirefox-translations-common-102.4.0-150200.152.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718866" comment="MozillaFirefox-translations-other-102.4.0-150200.152.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52957" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203614" ref_url="https://bugzilla.suse.com/1203614" source="BUGZILLA"/>
		<reference ref_id="1203619" ref_url="https://bugzilla.suse.com/1203619" source="BUGZILLA"/>
		<reference ref_id="1203620" ref_url="https://bugzilla.suse.com/1203620" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

  - CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations (bsc#1203614).
  - CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm (bsc#1203619).
  - CVE-2022-38178: Fixed memory leaks that could be externally triggered in the DNSSEC verification code for the EdDSA algorithm (bsc#1203620).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203614">SUSE bug 1203614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203619">SUSE bug 1203619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203620">SUSE bug 1203620</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714757" comment="bind-devel-32bit-9.16.6-150000.12.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714758" comment="libbind9-1600-32bit-9.16.6-150000.12.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714759" comment="libdns1605-32bit-9.16.6-150000.12.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714760" comment="libirs1601-32bit-9.16.6-150000.12.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714761" comment="libisc1606-32bit-9.16.6-150000.12.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714762" comment="libisccc1600-32bit-9.16.6-150000.12.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714763" comment="libisccfg1600-32bit-9.16.6-150000.12.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714764" comment="libns1604-32bit-9.16.6-150000.12.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52958" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1111151" ref_url="https://bugzilla.suse.com/1111151" source="BUGZILLA"/>
		<reference ref_id="1200603" ref_url="https://bugzilla.suse.com/1200603" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012669.html" source="SUSE-SU"/>
		<description>
This update for python-paramiko fixes the following issues:

Updated to version 2.4.3:

- CVE-2018-1000805: Fixed authentication bypass (bsc#1111151).

Bugfixes:

- Fixed Ed25519 key handling for certain key comment lengths (bsc#1200603).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200603">SUSE bug 1200603</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716329" comment="python-paramiko-doc-2.4.3-150100.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716215" comment="python2-paramiko-2.4.3-150100.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716204" comment="python3-paramiko-2.4.3-150100.6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52959" version="1" class="patch">
	<metadata>
		<title>Security update for python-waitress (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197255" ref_url="https://bugzilla.suse.com/1197255" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24761" ref_url="https://www.suse.com/security/cve/CVE-2022-24761/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012668.html" source="SUSE-SU"/>
		<description>
This update for python-waitress fixes the following issues:

- CVE-2022-24761: Fixed a bug to avoid inconsistent interpretation of HTTP requests leading to request smuggling. (bsc#1197255)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2022-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197255">SUSE bug 1197255</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-24761/">CVE-2022-24761</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716751" comment="python2-waitress-1.4.3-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716743" comment="python3-waitress-1.4.3-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52960" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-node_exporter (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196338" ref_url="https://bugzilla.suse.com/1196338" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012700.html" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-node_exporter fixes the following issues:

  (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239, jsc#SUMA-114,
  CVE-2022-21698)		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716943" comment="golang-github-prometheus-node_exporter-1.3.0-150100.3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52961" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194166" ref_url="https://bugzilla.suse.com/1194166" source="BUGZILLA"/>
		<reference ref_id="1194167" ref_url="https://bugzilla.suse.com/1194167" source="BUGZILLA"/>
		<reference ref_id="1194168" ref_url="https://bugzilla.suse.com/1194168" source="BUGZILLA"/>
		<reference ref_id="1194169" ref_url="https://bugzilla.suse.com/1194169" source="BUGZILLA"/>
		<reference ref_id="1194170" ref_url="https://bugzilla.suse.com/1194170" source="BUGZILLA"/>
		<reference ref_id="1194171" ref_url="https://bugzilla.suse.com/1194171" source="BUGZILLA"/>
		<reference ref_id="1194780" ref_url="https://bugzilla.suse.com/1194780" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAOH336QWFQFZUXO5FOHF4P6VJNY7R4L/" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.1: 

- CVE-2021-4185: RTMPT dissector infinite loop (bsc#1194166)
- CVE-2021-4184: BitTorrent DHT dissector infinite loop (bsc#1194167)
- CVE-2021-4183: pcapng file parser crash (bsc#1194168)
- CVE-2021-4182: RFC 7468 file parser infinite loop (bsc#1194169)
- CVE-2021-4181: Sysdig Event dissector crash (bsc#1194170)
- CVE-2021-4190: Kafka dissector infinite loop (bsc#1194171)
- Support for Shared Memory Communications (SMC) (jsc#SLE-18727)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194166">SUSE bug 1194166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194167">SUSE bug 1194167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194168">SUSE bug 1194168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194169">SUSE bug 1194169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194170">SUSE bug 1194170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194171">SUSE bug 1194171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194780">SUSE bug 1194780</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663863" comment="libvirt-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663864" comment="libvirt-admin-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663865" comment="libvirt-bash-completion-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663866" comment="libvirt-client-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663867" comment="libvirt-daemon-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663868" comment="libvirt-daemon-config-network-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663869" comment="libvirt-daemon-config-nwfilter-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663870" comment="libvirt-daemon-driver-interface-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663871" comment="libvirt-daemon-driver-libxl-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663872" comment="libvirt-daemon-driver-lxc-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663873" comment="libvirt-daemon-driver-network-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663874" comment="libvirt-daemon-driver-nodedev-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663875" comment="libvirt-daemon-driver-nwfilter-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663876" comment="libvirt-daemon-driver-qemu-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663877" comment="libvirt-daemon-driver-secret-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663878" comment="libvirt-daemon-driver-storage-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663879" comment="libvirt-daemon-driver-storage-core-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663880" comment="libvirt-daemon-driver-storage-disk-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664024" comment="libvirt-daemon-driver-storage-gluster-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663881" comment="libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663882" comment="libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663883" comment="libvirt-daemon-driver-storage-logical-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663884" comment="libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663885" comment="libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663886" comment="libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663887" comment="libvirt-daemon-hooks-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663888" comment="libvirt-daemon-lxc-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663889" comment="libvirt-daemon-qemu-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663890" comment="libvirt-daemon-xen-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663891" comment="libvirt-devel-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664025" comment="libvirt-devel-32bit-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663892" comment="libvirt-doc-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663838" comment="libvirt-libs-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663893" comment="libvirt-lock-sanlock-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663894" comment="libvirt-nss-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663839" comment="libwireshark15-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663840" comment="libwiretap12-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663841" comment="libwsutil13-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663842" comment="wireshark-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663857" comment="wireshark-devel-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664026" comment="wireshark-plugin-libvirt-7.1.0-150300.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663858" comment="wireshark-ui-qt-3.6.1-3.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52962" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198903" ref_url="https://bugzilla.suse.com/1198903" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012706.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

dracut-saltboot:

- Update to version 0.1.1661440542.6cbe0da
  * Use standard susemanager.conf
  * Move image services to dracut-saltboot package
  * Use salt bundle

golang-github-lusitaniae-apache_exporter:

- Update to upstream release 0.11.0 (jsc#SLE-24791)
  * Add TLS support
  * Switch to logger, please check --log.level and --log.format
    flags
- Update to version 0.10.1
  * Bugfix: Reset ProxyBalancer metrics on each scrape to
    remove stale data
- Update to version 0.10.0
  * Add Apache Proxy and other metrics
- Update to version 0.8.0
  * Change commandline flags
  * Add metrics: Apache version, request duration total
- Adapted to build on Enterprise Linux 8
- Require building with Go 1.15
- Add %license macro for LICENSE file 

grafana:

- Update to version 8.3.10
  + Security:
    * CVE-2022-31097: Cross Site Scripting vulnerability in the Unified Alerting (bsc#1201535)
    * CVE-2022-31107: Fixes OAuth account takeover vulnerability (bsc#1201539)
- Update to version 8.3.9
  + Bug fixes:
    * Geomap: Display legend
    * Prometheus: Fix timestamp truncation
- Update to version 8.3.7
  + Bug fix:
    * Provisioning: Ensure that the default value for orgID is set
      when provisioning datasources to be deleted.
- Update to version 8.3.6
  + Features and enhancements:
    * Cloud Monitoring: Reduce request size when listing labels.
    * Explore: Show scalar data result in a table instead of graph.
    * Snapshots: Updates the default external snapshot server URL.
    * Table: Makes footer not overlap table content.
    * Tempo: Add request histogram to service graph datalink.
    * Tempo: Add time range to tempo search query behind a feature flag.
    * Tempo: Auto-clear results when changing query type.
    * Tempo: Display start time in search results as relative time.
    * CloudMonitoring: Fix resource labels in query editor.
    * Cursor sync: Apply the settings without saving the dashboard.
    * LibraryPanels: Fix for Error while cleaning library panels.
    * Logs Panel: Fix timestamp parsing for string dates without timezone.
    * Prometheus: Fix some of the alerting queries that use reduce/math operation.
    * TablePanel: Fix ad-hoc variables not working on default datasources.
    * Text Panel: Fix alignment of elements.
    * Variables: Fix for constant variables in self referencing links.
- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565)

mgr-daemon:

- Version 4.3.6-1
  * Update translation strings

spacecmd:

- Version 4.3.15-1
  * Process date values in spacecmd api calls (bsc#1198903)

spacewalk-client-tools:

- Version 4.3.12-1
  * Update translation strings

uyuni-common-libs:

- Version 4.3.6-1
  * Do not allow creating path if nonexistent user or group in fileutils.

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198903">SUSE bug 1198903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717270" comment="dracut-saltboot-0.1.1661440542.6cbe0da-150000.1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717271" comment="golang-github-lusitaniae-apache_exporter-0.11.0-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717272" comment="spacecmd-4.3.15-150000.3.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52963" version="1" class="patch">
	<metadata>
		<title>Security update for grafana (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195726" ref_url="https://bugzilla.suse.com/1195726" source="BUGZILLA"/>
		<reference ref_id="1195727" ref_url="https://bugzilla.suse.com/1195727" source="BUGZILLA"/>
		<reference ref_id="1195728" ref_url="https://bugzilla.suse.com/1195728" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012701.html" source="SUSE-SU"/>
		<description>
This update for grafana fixes the following issues:

  Updated to version 8.3.10 (jsc#SLE-24565, jsc#SLE-23422, jsc#SLE-23439):

  - CVE-2022-31097: Fixed XSS vulnerability in the Unified Alerting (bsc#1201535).
  - CVE-2022-31107: Fixed OAuth account takeover vulnerability (bsc#1201539).
  - CVE-2022-21702: Fixed XSS through attacker-controlled data source (bsc#1195726).
  - CVE-2022-21703: Fixed Cross Site Request Forgery (bsc#1195727).
  - CVE-2022-21713: Fixed Teams API IDOR (bsc#1195728).

  		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716499" comment="grafana-8.3.10-150200.3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52964" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1167864" ref_url="https://bugzilla.suse.com/1167864" source="BUGZILLA"/>
		<reference ref_id="1181961" ref_url="https://bugzilla.suse.com/1181961" source="BUGZILLA"/>
		<reference ref_id="1202812" ref_url="https://bugzilla.suse.com/1202812" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012703.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2021-20206: Fixed an issue in libcni that could allow an attacker to execute arbitrary binaries on the host (bsc#1181961).
- CVE-2020-10696: Fixed an issue that could lead to files being overwritten during the image building process (bsc#1167864).
- CVE-2022-2990: Fixed possible information disclosure and modification / bsc#1202812

Buildah was updated to version 1.27.1:

* run: add container gid to additional groups

- Add fix for CVE-2022-2990 / bsc#1202812


Update to version 1.27.0:

* Don't try to call runLabelStdioPipes if spec.Linux is not set
* build: support filtering cache by duration using --cache-ttl
* build: support building from commit when using git repo as build context
* build: clean up git repos correctly when using subdirs
* integration tests: quote '?' in shell scripts
* test: manifest inspect should have OCIv1 annotation
* vendor: bump to c/common@87fab4b7019a
* Failure to determine a file or directory should print an error
* refactor: remove unused CommitOptions from generateBuildOutput
* stage_executor: generate output for cases with no commit
* stage_executor, commit: output only if last stage in build
* Use errors.Is() instead of os.Is{Not,}Exist
* Minor test tweak for podman-remote compatibility
* Cirrus: Use the latest imgts container
* imagebuildah: complain about the right Dockerfile
* tests: don't try to wrap `nil` errors
* cmd/buildah.commitCmd: don't shadow 'err'
* cmd/buildah.pullCmd: complain about DecryptConfig/EncryptConfig
* Fix a copy/paste error message
* Fix a typo in an error message
* build,cache: support pulling/pushing cache layers to/from remote sources
* Update vendor of containers/(common, storage, image)
* Rename chroot/run.go to chroot/run_linux.go
* Don't bother telling codespell to skip files that don't exist
* Set user namespace defaults correctly for the library
* imagebuildah: optimize cache hits for COPY and ADD instructions
* Cirrus: Update VM images w/ updated bats
* docs, run: show SELinux label flag for cache and bind mounts
* imagebuildah, build: remove undefined concurrent writes
* bump github.com/opencontainers/runtime-tools
* Add FreeBSD support for 'buildah info'
* Vendor in latest containers/(storage, common, image)
* Add freebsd cross build targets
* Make the jail package build on 32bit platforms
* Cirrus: Ensure the build-push VM image is labeled
* GHA: Fix dynamic script filename
* Vendor in containers/(common, storage, image)
* Run codespell
* Remove import of github.com/pkg/errors
* Avoid using cgo in pkg/jail
* Rename footypes to fooTypes for naming consistency
* Move cleanupTempVolumes and cleanupRunMounts to run_common.go
* Make the various run mounts work for FreeBSD
* Move get{Bind,Tmpfs,Secret,SSH}Mount to run_common.go
* Move runSetupRunMounts to run_common.go
* Move cleanableDestinationListFromMounts to run_common.go
* Make setupMounts and runSetupBuiltinVolumes work on FreeBSD
* Move setupMounts and runSetupBuiltinVolumes to run_common.go
* Tidy up - runMakeStdioPipe can't be shared with linux
* Move runAcceptTerminal to run_common.go
* Move stdio copying utilities to run_common.go
* Move runUsingRuntime and runCollectOutput to run_common.go
* Move fileCloser, waitForSync and contains to run_common.go
* Move checkAndOverrideIsolationOptions to run_common.go
* Move DefaultNamespaceOptions to run_common.go
* Move getNetworkInterface to run_common.go
* Move configureEnvironment to run_common.go
* Don't crash in configureUIDGID if Process.Capabilities is nil
* Move configureUIDGID to run_common.go
* Move runLookupPath to run_common.go
* Move setupTerminal to run_common.go
* Move etc file generation utilities to run_common.go
* Add run support for FreeBSD
* Add a simple FreeBSD jail library
* Add FreeBSD support to pkg/chrootuser
* Sync call signature for RunUsingChroot with chroot/run.go
* test: verify feature to resolve basename with args
* vendor: bump openshift/imagebuilder to master@4151e43
* GHA: Remove required reserved-name use
* buildah: set XDG_RUNTIME_DIR before setting default runroot
* imagebuildah: honor build output even if build container is not commited
* chroot: honor DefaultErrnoRet
* [CI:DOCS] improve pull-policy documentation
* tests: retrofit test since --file does not supports dir
* Switch to golang native error wrapping
* BuildDockerfiles: error out if path to containerfile is a directory
* define.downloadToDirectory: fail early if bad HTTP response
* GHA: Allow re-use of Cirrus-Cron fail-mail workflow
* add: fail on bad http response instead of writing to container
* [CI:DOCS] Update buildahimage comment
* lint: inspectable is never nil
* vendor: c/common to common@7e1563b
* build: support OCI hooks for ephemeral build containers
* [CI:BUILD] Install latest buildah instead of compiling
* Add subid support with BuildRequires and BUILDTAG [NO NEW TESTS NEEDED]
* Make sure cpp is installed in buildah images
* demo: use unshare for rootless invocations
* buildah.spec.rpkg: initial addition
* build: fix test for subid 4
* build, userns: add support for --userns=auto
* Fix building upstream buildah image
* Remove redundant buildahimages-are-sane validation
* Docs: Update multi-arch buildah images readme
* Cirrus: Migrate multiarch build off github actions
* retrofit-tests: we skip unused stages so use stages
* stage_executor: dont rely on stage while looking for additional-context
* buildkit, multistage: skip computing unwanted stages
* More test cleanup
* copier: work around freebsd bug for 'mkdir /'
* Replace $BUILDAH_BINARY with buildah() function
* Fix up buildah images
* Make util and copier build on FreeBSD
* Vendor in latest github.com/sirupsen/logrus
* Makefile: allow building without .git
* run_unix: don't return an error from getNetworkInterface
* run_unix: return a valid DefaultNamespaceOptions
* Update vendor of containers/storage
* chroot: use ActKillThread instead of ActKill
* use resolvconf package from c/common/libnetwork
* update c/common to latest main
* copier: add `NoOverwriteNonDirDir` option
* Sort buildoptions and move cli/build functions to internal
* Fix TODO: de-spaghettify run mounts
* Move options parsing out of build.go and into pkg/cli
* [CI:DOCS] Tutorial 04 - Include Debian/Ubuntu deps
* build, multiarch: support splitting build logs for --platform
* [CI:BUILD] WIP Cleanup Image Dockerfiles
* cli remove stutter
* docker-parity: ignore sanity check if baseImage history is null
* build, commit: allow disabling image history with --omit-history
* Fix use generic/ambiguous DEBUG name
* Cirrus: use Ubuntu 22.04 LTS
* Fix codespell errors
* Remove util.StringInSlice because it is defined in containers/common
* buildah: add support for renaming a device in rootless setups
* squash: never use build cache when computing last step of last stage
* Update vendor of containers/(common, storage, image)
* buildkit: supports additionalBuildContext in builds via --build-context
* buildah source pull/push: show progress bar
* run: allow resuing secret twice in different RUN steps
* test helpers: default to being rootless-aware
* Add --cpp-flag flag to buildah build
* build: accept branch and subdirectory when context is git repo
* Vendor in latest containers/common
* vendor: update c/storage and c/image
* Fix gentoo install docs
* copier: move NSS load to new process
* Add test for prevention of reusing encrypted layers
* Make `buildah build --label foo` create an empty 'foo' label again


Update to version 1.26.4:

* build, multiarch: support splitting build logs for --platform
* copier: add `NoOverwriteNonDirDir` option
* docker-parity: ignore sanity check if baseImage history is null
* build, commit: allow disabling image history with --omit-history
* buildkit: supports additionalBuildContext in builds via --build-context
* Add --cpp-flag flag to buildah build

Update to version 1.26.3:

* define.downloadToDirectory: fail early if bad HTTP response
* add: fail on bad http response instead of writing to container
* squash: never use build cache when computing last step of last stage
* run: allow resuing secret twice in different RUN steps
* integration tests: update expected error messages
* integration tests: quote '?' in shell scripts
* Use errors.Is() to check for storage errors
* lint: inspectable is never nil
* chroot: use ActKillThread instead of ActKill
* chroot: honor DefaultErrnoRet
* Set user namespace defaults correctly for the library
* contrib/rpm/buildah.spec: fix `rpm` parser warnings

Drop requires on apparmor pattern, should be moved elsewhere
for systems which want AppArmor instead of SELinux.

- Update BuildRequires to libassuan-devel &gt;= 2.5.2, pkgconfig file
  is required to build.

Update to version 1.26.2:

* buildah: add support for renaming a device in rootless setups

Update to version 1.26.1:

* Make `buildah build --label foo` create an empty 'foo' label again
* imagebuildah,build: move deepcopy of args before we spawn goroutine
* Vendor in containers/storage v1.40.2
* buildah.BuilderOptions.DefaultEnv is ignored, so mark it as deprecated
* help output: get more consistent about option usage text
* Handle OS version and features flags
* buildah build: --annotation and --label should remove values
* buildah build: add a --env
* buildah: deep copy options.Args before performing concurrent build/stage
* test: inline platform and builtinargs behaviour
* vendor: bump imagebuilder to master/009dbc6
* build: automatically set correct TARGETPLATFORM where expected
* Vendor in containers/(common, storage, image)
* imagebuildah, executor: process arg variables while populating baseMap
* buildkit: add support for custom build output with --output
* Cirrus: Update CI VMs to F36
* fix staticcheck linter warning for deprecated function
* Fix docs build on FreeBSD
* copier.unwrapError(): update for Go 1.16
* copier.PutOptions: add StripSetuidBit/StripSetgidBit/StripStickyBit
* copier.Put(): write to read-only directories
* Ed's periodic test cleanup
* using consistent lowercase 'invalid' word in returned err msg
* use etchosts package from c/common
* run: set actual hostname in /etc/hostname to match docker parity
* Update vendor of containers/(common,storage,image)
* manifest-create: allow creating manifest list from local image
* Update vendor of storage,common,image
* Initialize network backend before first pull
* oci spec: change special mount points for namespaces
* tests/helpers.bash: assert handle corner cases correctly
* buildah: actually use containers.conf settings
* integration tests: learn to start a dummy registry
* Fix error check to work on Podman
* buildah build should accept at most one arg
* tests: reduce concurrency for flaky bud-multiple-platform-no-run
* vendor in latest containers/common,image,storage
* manifest-add: allow override arch,variant while adding image
* Remove a stray `\` from .containerenv
* Vendor in latest opencontainers/selinux v1.10.1
* build, commit: allow removing default identity labels
* Create shorter names for containers based on image IDs
* test: skip rootless on cgroupv2 in root env
* fix hang when oci runtime fails
* Set permissions for GitHub actions
* copier test: use correct UID/GID in test archives
* run: set parent-death signals and forward SIGHUP/SIGINT/SIGTERM

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167864">SUSE bug 1167864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181961">SUSE bug 1181961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202812">SUSE bug 1202812</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717542" comment="buildah-1.27.1-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717534" comment="libgpg-error-devel-1.42-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717624" comment="libgpg-error-devel-32bit-1.42-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717535" comment="libgpg-error0-1.42-150300.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717536" comment="libgpg-error0-32bit-1.42-150300.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52965" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204383" ref_url="https://bugzilla.suse.com/1204383" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012704.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

  - CVE-2022-32221: Fixed POST following PUT confusion (bsc#1204383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204383">SUSE bug 1204383</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721540" comment="curl-7.66.0-150200.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721541" comment="libcurl-devel-7.66.0-150200.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721800" comment="libcurl-devel-32bit-7.66.0-150200.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721542" comment="libcurl4-7.66.0-150200.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721543" comment="libcurl4-32bit-7.66.0-150200.4.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52966" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1177471" ref_url="https://bugzilla.suse.com/1177471" source="BUGZILLA"/>
		<reference ref_id="1185032" ref_url="https://bugzilla.suse.com/1185032" source="BUGZILLA"/>
		<reference ref_id="1194023" ref_url="https://bugzilla.suse.com/1194023" source="BUGZILLA"/>
		<reference ref_id="1196444" ref_url="https://bugzilla.suse.com/1196444" source="BUGZILLA"/>
		<reference ref_id="1197659" ref_url="https://bugzilla.suse.com/1197659" source="BUGZILLA"/>
		<reference ref_id="1199564" ref_url="https://bugzilla.suse.com/1199564" source="BUGZILLA"/>
		<reference ref_id="1200313" ref_url="https://bugzilla.suse.com/1200313" source="BUGZILLA"/>
		<reference ref_id="1200622" ref_url="https://bugzilla.suse.com/1200622" source="BUGZILLA"/>
		<reference ref_id="1201309" ref_url="https://bugzilla.suse.com/1201309" source="BUGZILLA"/>
		<reference ref_id="1201310" ref_url="https://bugzilla.suse.com/1201310" source="BUGZILLA"/>
		<reference ref_id="1201489" ref_url="https://bugzilla.suse.com/1201489" source="BUGZILLA"/>
		<reference ref_id="1201645" ref_url="https://bugzilla.suse.com/1201645" source="BUGZILLA"/>
		<reference ref_id="1201865" ref_url="https://bugzilla.suse.com/1201865" source="BUGZILLA"/>
		<reference ref_id="1201990" ref_url="https://bugzilla.suse.com/1201990" source="BUGZILLA"/>
		<reference ref_id="1202095" ref_url="https://bugzilla.suse.com/1202095" source="BUGZILLA"/>
		<reference ref_id="1202341" ref_url="https://bugzilla.suse.com/1202341" source="BUGZILLA"/>
		<reference ref_id="1202385" ref_url="https://bugzilla.suse.com/1202385" source="BUGZILLA"/>
		<reference ref_id="1202677" ref_url="https://bugzilla.suse.com/1202677" source="BUGZILLA"/>
		<reference ref_id="1202960" ref_url="https://bugzilla.suse.com/1202960" source="BUGZILLA"/>
		<reference ref_id="1202984" ref_url="https://bugzilla.suse.com/1202984" source="BUGZILLA"/>
		<reference ref_id="1203159" ref_url="https://bugzilla.suse.com/1203159" source="BUGZILLA"/>
		<reference ref_id="1203290" ref_url="https://bugzilla.suse.com/1203290" source="BUGZILLA"/>
		<reference ref_id="1203313" ref_url="https://bugzilla.suse.com/1203313" source="BUGZILLA"/>
		<reference ref_id="1203389" ref_url="https://bugzilla.suse.com/1203389" source="BUGZILLA"/>
		<reference ref_id="1203410" ref_url="https://bugzilla.suse.com/1203410" source="BUGZILLA"/>
		<reference ref_id="1203424" ref_url="https://bugzilla.suse.com/1203424" source="BUGZILLA"/>
		<reference ref_id="1203514" ref_url="https://bugzilla.suse.com/1203514" source="BUGZILLA"/>
		<reference ref_id="1203552" ref_url="https://bugzilla.suse.com/1203552" source="BUGZILLA"/>
		<reference ref_id="1203622" ref_url="https://bugzilla.suse.com/1203622" source="BUGZILLA"/>
		<reference ref_id="1203737" ref_url="https://bugzilla.suse.com/1203737" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1203770" ref_url="https://bugzilla.suse.com/1203770" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1203909" ref_url="https://bugzilla.suse.com/1203909" source="BUGZILLA"/>
		<reference ref_id="1203935" ref_url="https://bugzilla.suse.com/1203935" source="BUGZILLA"/>
		<reference ref_id="1203939" ref_url="https://bugzilla.suse.com/1203939" source="BUGZILLA"/>
		<reference ref_id="1203987" ref_url="https://bugzilla.suse.com/1203987" source="BUGZILLA"/>
		<reference ref_id="1203992" ref_url="https://bugzilla.suse.com/1203992" source="BUGZILLA"/>
		<reference ref_id="1204051" ref_url="https://bugzilla.suse.com/1204051" source="BUGZILLA"/>
		<reference ref_id="1204059" ref_url="https://bugzilla.suse.com/1204059" source="BUGZILLA"/>
		<reference ref_id="1204060" ref_url="https://bugzilla.suse.com/1204060" source="BUGZILLA"/>
		<reference ref_id="1204125" ref_url="https://bugzilla.suse.com/1204125" source="BUGZILLA"/>
		<reference ref_id="1204289" ref_url="https://bugzilla.suse.com/1204289" source="BUGZILLA"/>
		<reference ref_id="1204290" ref_url="https://bugzilla.suse.com/1204290" source="BUGZILLA"/>
		<reference ref_id="1204291" ref_url="https://bugzilla.suse.com/1204291" source="BUGZILLA"/>
		<reference ref_id="1204292" ref_url="https://bugzilla.suse.com/1204292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119/" source="CVE"/>
		<reference ref_id="CVE-2022-20008" ref_url="https://www.suse.com/security/cve/CVE-2022-20008/" source="CVE"/>
		<reference ref_id="CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-3169" ref_url="https://www.suse.com/security/cve/CVE-2022-3169/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-41222" ref_url="https://www.suse.com/security/cve/CVE-2022-41222/" source="CVE"/>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="CVE-2022-41849" ref_url="https://www.suse.com/security/cve/CVE-2022-41849/" source="CVE"/>
		<reference ref_id="CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory. (bnc#1203514)
- CVE-2022-3169: Fixed a denial of service flaw which occurs when consecutive requests to NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET are sent. (bnc#1203290)
- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)
- CVE-2022-42719: Fixed MBSSID parsing use-after-free. (bsc#1204051)
- CVE-2022-42721: Avoid nontransmitted BSS list corruption. (bsc#1204060)
- CVE-2022-42720: Fixed BSS refcounting bugs. (bsc#1204059)
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).
- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).
- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).
- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).
- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).
- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).
- CVE-2022-20008: Fixed a bug which allowed to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. (bnc#1199564)
- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)

The following non-security bugs were fixed:

- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- ALSA: usb-audio: fix spelling mistakes (git-fixes).
- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).
- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)
- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)
- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)
- arm64: mm: fix p?d_leaf() (git-fixes)
- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)
- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)
- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)
- arm64/mm: Validate hotplug range before creating linear mapping (git-fixes)
- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).
- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- JFS: fix GPF in diFree (bsc#1203389).
- JFS: fix memleak in jfs_mount (git-fixes).
- JFS: more checks for invalid superblock (git-fixes).
- JFS: prevent NULL deref in diFree (bsc#1203389).
- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).
- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kexec: KEYS: s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- md-raid10: fix KASAN warning (git-fixes).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).
- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- NFS: Fix races in the legacy idmapper upcall (git-fixes).
- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- NFSD: Fix offset type in I/O trace points (git-fixes).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvmet: Expose max queues to configfs (bsc#1201865).
- of: device: Fix up of_dma_configure_id() stub (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).
- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).
- regulator: core: Clean up on enable failure (git-fixes).
- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).
- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).
- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).
- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).
- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).
- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).
- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).
- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: smartpqi: Update LUN reset handler (bsc#1200622).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- squashfs: fix divide error in calculate_skip() (git-fixes).
- struct ehci_hcd: hide new member (git-fixes).
- struct otg_fsm: hide new boolean member in gap (git-fixes).
- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).
- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).
- SUNRPC: fix expiry of auth creds (git-fixes).
- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).
- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).
- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).
- SUNRPC: RPC level errors should set task-&gt;tk_rpc_status (git-fixes).
- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- USB: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- USB: core: Fix RST error in hub.c (git-fixes).
- USB: core: Prevent nested device-reset calls (git-fixes).
- USB: dwc3: disable USB core PHY management (git-fixes).
- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).
- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: ch341: name prescaler, divisor registers (git-fixes).
- USB: serial: cp210x: add Decagon UCA device id (git-fixes).
- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- USB: serial: option: add Quectel EM060K modem (git-fixes).
- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- USB: serial: option: add support for OPPO R11 diag port (git-fixes).
- USB: storage: Add ASUS &amp;lt;0x0b05:0x1932&gt; to IGNORE_UAS (git-fixes).
- USB: struct usb_device: hide new member (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xprtrdma: Fix cwnd update ordering (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177471">SUSE bug 1177471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185032">SUSE bug 1185032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194023">SUSE bug 1194023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196444">SUSE bug 1196444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197659">SUSE bug 1197659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199564">SUSE bug 1199564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200313">SUSE bug 1200313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200622">SUSE bug 1200622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201309">SUSE bug 1201309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201310">SUSE bug 1201310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201489">SUSE bug 1201489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201645">SUSE bug 1201645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201865">SUSE bug 1201865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201990">SUSE bug 1201990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202095">SUSE bug 1202095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202341">SUSE bug 1202341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202385">SUSE bug 1202385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202677">SUSE bug 1202677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202960">SUSE bug 1202960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202984">SUSE bug 1202984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203159">SUSE bug 1203159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203290">SUSE bug 1203290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203313">SUSE bug 1203313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203389">SUSE bug 1203389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203410">SUSE bug 1203410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203424">SUSE bug 1203424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203514">SUSE bug 1203514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203552">SUSE bug 1203552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203622">SUSE bug 1203622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203737">SUSE bug 1203737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203770">SUSE bug 1203770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203909">SUSE bug 1203909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203935">SUSE bug 1203935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203939">SUSE bug 1203939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203987">SUSE bug 1203987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203992">SUSE bug 1203992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204051">SUSE bug 1204051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204059">SUSE bug 1204059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204060">SUSE bug 1204060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204125">SUSE bug 1204125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204289">SUSE bug 1204289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204290">SUSE bug 1204290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204291">SUSE bug 1204291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204292">SUSE bug 1204292</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-20008/">CVE-2022-20008</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3169/">CVE-2022-3169</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41222/">CVE-2022-41222</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41849/">CVE-2022-41849</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721801" comment="cluster-md-kmp-64kb-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721588" comment="cluster-md-kmp-default-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721802" comment="cluster-md-kmp-preempt-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721803" comment="dlm-kmp-64kb-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721589" comment="dlm-kmp-default-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721804" comment="dlm-kmp-preempt-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721505" comment="dtb-al-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721805" comment="dtb-allwinner-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721806" comment="dtb-altera-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721807" comment="dtb-amd-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721808" comment="dtb-amlogic-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721809" comment="dtb-apm-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721810" comment="dtb-arm-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721811" comment="dtb-broadcom-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721812" comment="dtb-cavium-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721813" comment="dtb-exynos-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721814" comment="dtb-freescale-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721815" comment="dtb-hisilicon-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721816" comment="dtb-lg-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721817" comment="dtb-marvell-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721818" comment="dtb-mediatek-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721819" comment="dtb-nvidia-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721820" comment="dtb-qcom-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721821" comment="dtb-renesas-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721822" comment="dtb-rockchip-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721823" comment="dtb-socionext-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721824" comment="dtb-sprd-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721825" comment="dtb-xilinx-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721506" comment="dtb-zte-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721826" comment="gfs2-kmp-64kb-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721590" comment="gfs2-kmp-default-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721827" comment="gfs2-kmp-preempt-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721544" comment="kernel-64kb-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721545" comment="kernel-64kb-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721828" comment="kernel-64kb-extra-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721829" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721830" comment="kernel-64kb-optional-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721831" comment="kernel-debug-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721832" comment="kernel-debug-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721833" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721546" comment="kernel-default-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721547" comment="kernel-default-base-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721834" comment="kernel-default-base-rebuild-5.3.18-150300.59.98.1.150300.18.56.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721548" comment="kernel-default-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721835" comment="kernel-default-extra-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721836" comment="kernel-default-livepatch-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721837" comment="kernel-default-livepatch-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721838" comment="kernel-default-optional-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721549" comment="kernel-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721567" comment="kernel-docs-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721839" comment="kernel-docs-html-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721840" comment="kernel-kvmsmall-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721841" comment="kernel-kvmsmall-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721842" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721550" comment="kernel-macros-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721568" comment="kernel-obs-build-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721843" comment="kernel-obs-qa-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721551" comment="kernel-preempt-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721569" comment="kernel-preempt-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721844" comment="kernel-preempt-extra-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721845" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721846" comment="kernel-preempt-optional-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721570" comment="kernel-source-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721847" comment="kernel-source-vanilla-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721571" comment="kernel-syms-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721552" comment="kernel-zfcpdump-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721848" comment="kselftests-kmp-64kb-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721849" comment="kselftests-kmp-default-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721850" comment="kselftests-kmp-preempt-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721851" comment="ocfs2-kmp-64kb-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721591" comment="ocfs2-kmp-default-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721852" comment="ocfs2-kmp-preempt-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721853" comment="reiserfs-kmp-64kb-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721572" comment="reiserfs-kmp-default-5.3.18-150300.59.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721854" comment="reiserfs-kmp-preempt-5.3.18-150300.59.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52967" version="1" class="patch">
	<metadata>
		<title>Security update for container-suseconnect (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204397" ref_url="https://bugzilla.suse.com/1204397" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012716.html" source="SUSE-SU"/>
		<description>

This update of container-suseconnect is a rebuilt of the previous sources against the current security updated go compiler.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204397">SUSE bug 1204397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719072" comment="container-suseconnect-2.3.0-150000.4.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52968" version="1" class="patch">
	<metadata>
		<title>Security update for libmad (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1036968" ref_url="https://bugzilla.suse.com/1036968" source="BUGZILLA"/>
		<reference ref_id="1036969" ref_url="https://bugzilla.suse.com/1036969" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8372" ref_url="https://www.suse.com/security/cve/CVE-2017-8372/" source="CVE"/>
		<reference ref_id="CVE-2017-8373" ref_url="https://www.suse.com/security/cve/CVE-2017-8373/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012717.html" source="SUSE-SU"/>
		<description>
This update for libmad fixes the following issues:

  - CVE-2017-8373: Fixed heap-based buffer overflow in mad_layer_III (bsc#1036968).
  - CVE-2017-8372: Fixed assertion failure in layer3.c (bsc#1036969).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036968">SUSE bug 1036968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036969">SUSE bug 1036969</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8372/">CVE-2017-8372</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8373/">CVE-2017-8373</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719714" comment="libmad-devel-0.15.1b-150000.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009719715" comment="libmad0-0.15.1b-150000.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721509" comment="libmad0-32bit-0.15.1b-150000.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52969" version="1" class="patch">
	<metadata>
		<title>Security update for telnet (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203759" ref_url="https://bugzilla.suse.com/1203759" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39028" ref_url="https://www.suse.com/security/cve/CVE-2022-39028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012714.html" source="SUSE-SU"/>
		<description>
This update for telnet fixes the following issues:

  - CVE-2022-39028: Fixed NULL pointer dereference in telnetd (bsc#1203759).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203759">SUSE bug 1203759</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39028/">CVE-2022-39028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720651" comment="telnet-1.2-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720652" comment="telnet-server-1.2-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52970" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204690" ref_url="https://bugzilla.suse.com/1204690" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012715.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- CVE-2021-46848: Fixed off-by-one array size check that affects asn1_encode_simple_der (bsc#1204690)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-26"/>
	<updated date="2022-10-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1204690">SUSE bug 1204690</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721368" comment="libtasn1-4.13-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721369" comment="libtasn1-6-4.13-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721362" comment="libtasn1-6-32bit-4.13-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721370" comment="libtasn1-devel-4.13-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721510" comment="libtasn1-devel-32bit-4.13-150000.4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52971" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1183858" ref_url="https://bugzilla.suse.com/1183858" source="BUGZILLA"/>
		<reference ref_id="1185588" ref_url="https://bugzilla.suse.com/1185588" source="BUGZILLA"/>
		<reference ref_id="1185706" ref_url="https://bugzilla.suse.com/1185706" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29921" ref_url="https://www.suse.com/security/cve/CVE-2021-29921/" source="CVE"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2021-29921: Fixed improper input validation of octal string IP addresses (bsc#1185706).
- Use versioned python-Sphinx to avoid dependency on other version of Python (bsc#1183858).
- Stop providing 'python' symbol (bsc#1185588), which means python2 currently.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-07"/>
	<updated date="2022-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183858">SUSE bug 1183858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185588">SUSE bug 1185588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185706">SUSE bug 1185706</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-29921/">CVE-2021-29921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631564" comment="libpython3_9-1_0-3.9.6-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662637" comment="libpython3_9-1_0-32bit-3.9.6-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631565" comment="python39-3.9.6-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631612" comment="python39-32bit-3.9.6-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631566" comment="python39-base-3.9.6-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662638" comment="python39-base-32bit-3.9.6-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631567" comment="python39-curses-3.9.6-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631568" comment="python39-dbm-3.9.6-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631569" comment="python39-devel-3.9.6-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662639" comment="python39-doc-3.9.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662640" comment="python39-doc-devhelp-3.9.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631570" comment="python39-idle-3.9.6-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662641" comment="python39-testsuite-3.9.6-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631571" comment="python39-tk-3.9.6-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631572" comment="python39-tools-3.9.6-4.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52972" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203477" ref_url="https://bugzilla.suse.com/1203477" source="BUGZILLA"/>
		<reference ref_id="1204411" ref_url="https://bugzilla.suse.com/1204411" source="BUGZILLA"/>
		<reference ref_id="1204421" ref_url="https://bugzilla.suse.com/1204421" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3155" ref_url="https://www.suse.com/security/cve/CVE-2022-3155/" source="CVE"/>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236/" source="CVE"/>
		<reference ref_id="CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249/" source="CVE"/>
		<reference ref_id="CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250/" source="CVE"/>
		<reference ref_id="CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 102.4.0 (bsc#1204421)
  * changed: Thunderbird will automatically detect and repair OpenPGP key storage corruption caused by using the profile import tool in Thunderbird 102   
  * fixed: POP message download into a large folder (~13000 messages) caused Thunderbird to temporarily freeze
  * fixed: Forwarding messages with special characters in Subject failed on Windows
  * fixed: Links for FileLink attachments were not added when attachment filename contained Unicode characters
  * fixed: Address Book display pane continued to show contacts after deletion
  * fixed: Printing address book did not include all contact details
  * fixed: CardDAV contacts without a Name property did not save to Google Contacts
  * fixed: 'Publish Calendar' did not work
  * fixed: Calendar database storage improvements
  * fixed: Incorrectly handled error responses from CalDAV servers sometimes caused events to disappear from calendar
  * fixed: Various visual and UX improvements
- Mozilla Thunderbird 102.3.3
  * new: Option added to show containing address book for a
    contact when using `All Address Books` in vertical mode
    (bmo#1778871)
  * changed: Thunderbird will try to use POP NTLM authentication
    even if not advertised by server (bmo#1793349)
  * changed: Task List and Today Pane sidebars will no longer
    load when not visible (bmo#1788549)
  * fixed: Sending a message while a recipient pill was being
    modified did not save changes (bmo#1779785)
  * fixed: Nickname column was not available in horizontal view
    of Address Book (bmo#1778000)
  * fixed: Multiline organization values were displayed across
    two columns in horizontal view of Address Book (bmo#1777780)
  * fixed: Contact vCard fields with multiple values such as
    Categories were truncated when saved (bmo#1792399)
  * fixed: ICS calendar files with a `FREEBUSY` property could
    not be imported (bmo#1783441)
  * fixed: Thunderbird would hang if calendar event exceeded the
    year 2035 (bmo#1789999)
- Mozilla Thunderbird 102.3.2
  * changed: Thunderbird will try to use POP CRAM-MD5
    authentication even if not advertised by server (bmo#1789975)
  * fixed: Checking messages on POP3 accounts caused POP folder
    to lock if mail server was slow or non-responsive
    (bmo#1792451)
  * fixed: Newsgroups named with consecutive dots would not
    appear when refreshing list of newsgroups (bmo#1787789)
  * fixed: Sending news articles containing lines starting with
    dot were sometimes clipped (bmo#1787955)
  * fixed: CardDAV server sync silently failed if sync token
    expired (bmo#1791183)
  * fixed: Contacts from LDAP on macOS address books were not
    displayed (bmo#1791347)
  * fixed: Chat account input now accepts URIs for supported chat
    protocols (bmo#1776706)
  * fixed: Chat ScreenName field was not migrated to new address
    book (bmo#1789990)
  * fixed: Creating a New Event from the Today Pane used the
    currently selected day from the main calendar instead of from
    the Today Pane (bmo#1791203)
  * fixed: `New Event` button in Today Pane was incorrectly
    disabled sometimes (bmo#1792058)
  * fixed: Event reminder windows did not close after being
    dismissed or snoozed (bmo#1791228)
  * fixed: Improved performance of recurring event date
    calculation (bmo#1787677)
  * fixed: Quarterly calendar events on the last day of the month
    repeated one month early (bmo#1789362)
  * fixed: Thunderbird would hang if calendar event exceeded the
    year 2035 (bmo#1789999)
  * fixed: Whitespace in calendar events was incorrectly handled
    when upgrading from Thunderbird 91 to 102 (bmo#1790339)
  * fixed: Various visual and UX improvements (bmo#1755623,bmo#17
    83903,bmo#1785851,bmo#1786434,bmo#1787286,bmo#1788151,bmo#178
    9728,bmo#1790499)
- Mozilla Thunderbird 102.3.1
  * changed: Compose window encryption options now only appear
    for encryption technologies that have already been configured
    (bmo#1788988)
  * changed: Number of contacts in currently selected address
    book now displayed at bottom of Address Book list column
    (bmo#1745571)
  * fixed: Password prompt did not include server hostname for
    POP servers (bmo#1786920)
  * fixed: `Edit Contact` was missing from Contacts sidebar
    context menus (bmo#1771795)
  * fixed: Address Book contact lists cut off display of some
    characters, the result being unreadable (bmo#1780909)
  * fixed: Menu items for dark-themed alarm dialog were invisible
    on Windows 7 (bmo#1791738)
  * fixed: Various security fixes
  MFSA 2022-43 (bsc#1204411)
  * CVE-2022-39249 (bmo#1791765)
    Matrix SDK bundled with Thunderbird vulnerable to an
    impersonation attack by malicious server administrators
  * CVE-2022-39250 (bmo#1791765)
    Matrix SDK bundled with Thunderbird vulnerable to a device
    verification attack
  * CVE-2022-39251 (bmo#1791765)
    Matrix SDK bundled with Thunderbird vulnerable to an
    impersonation attack
  * CVE-2022-39236 (bmo#1791765)
    Matrix SDK bundled with Thunderbird vulnerable to a data
    corruption issue
- Mozilla Thunderbird 102.3
  * changed: Thunderbird will no longer attempt to import account
    passwords when importing from another Thunderbird profile in
    order to prevent profile corruption and permanent data loss.
    (bmo#1790605)
  * changed: Devtools performance profile will use Thunderbird
    presets instead of Web Developer presets (bmo#1785954)
  * fixed: Thunderbird startup performance improvements
    (bmo#1785967)
  * fixed: Saving email source and images failed
    (bmo#1777323,bmo#1778804)
  * fixed: Error message was shown repeatedly when temporary disk
    space was full (bmo#1788580)
  * fixed: Attaching OpenPGP keys without a set size to non-
    encrypted messages briefly displayed a size of zero bytes
    (bmo#1788952)
  * fixed: Global Search entry box initially contained
    'undefined' (bmo#1780963)
  * fixed: Delete from POP Server mail filter rule intermittently
    failed to trigger (bmo#1789418)
  * fixed: Connections to POP3 servers without UIDL support
    failed (bmo#1789314)
  * fixed: Pop accounts with 'Fetch headers only' set downloaded
    complete messages if server did not advertise TOP capability
    (bmo#1789356)
  * fixed: 'File -&gt; New -&gt; Address Book Contact' from Compose
    window did not work (bmo#1782418)
  * fixed: Attach 'My vCard' option in compose window was not
    available (bmo#1787614)
  * fixed: Improved performance of matching a contact to an email
    address (bmo#1782725)
  * fixed: Address book only recognized a contact's first two
    email addresses (bmo#1777156)
  * fixed: Address book search and autocomplete failed if a
    contact vCard could not be parsed (bmo#1789793)
  * fixed: Downloading NNTP messages for offline use failed
    (bmo#1785773)
  * fixed: NNTP client became stuck when connecting to Public-
    Inbox servers (bmo#1786203)
  * fixed: Various visual and UX improvements
    (bmo#1782235,bmo#1787448,bmo#1788725,bmo#1790324)
  * fixed: Various security fixes
  * unresolved: No dedicated 'Department' field in address book
    (bmo#1777780)
  MFSA 2022-42 (bsc#1203477)
  * CVE-2022-3266 (bmo#1767360)
    Out of bounds read when decoding H264
  * CVE-2022-40959 (bmo#1782211)
    Bypassing FeaturePolicy restrictions on transient pages
  * CVE-2022-40960 (bmo#1787633)
    Data-race when parsing non-UTF-8 URLs in threads
  * CVE-2022-40958 (bmo#1779993)
    Bypassing Secure Context restriction for cookies with __Host
    and __Secure prefix
  * CVE-2022-40956 (bmo#1770094)
    Content-Security-Policy base-uri bypass
  * CVE-2022-40957 (bmo#1777604)
    Incoherent instruction cache when building WASM on ARM64
  * CVE-2022-3155 (bmo#1789061)
    Attachment files saved to disk on macOS could be executed
    without warning
  * CVE-2022-40962 (bmo#1776655, bmo#1777574, bmo#1784835,
    bmo#1785109, bmo#1786502, bmo#1789440)
    Memory safety bugs fixed in Thunderbird 102.3
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3155/">CVE-2022-3155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721700" comment="MozillaThunderbird-102.4.0-150200.8.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721701" comment="MozillaThunderbird-translations-common-102.4.0-150200.8.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721702" comment="MozillaThunderbird-translations-other-102.4.0-150200.8.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52973" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1149789" ref_url="https://bugzilla.suse.com/1149789" source="BUGZILLA"/>
		<reference ref_id="1179594" ref_url="https://bugzilla.suse.com/1179594" source="BUGZILLA"/>
		<reference ref_id="1179821" ref_url="https://bugzilla.suse.com/1179821" source="BUGZILLA"/>
		<reference ref_id="1180042" ref_url="https://bugzilla.suse.com/1180042" source="BUGZILLA"/>
		<reference ref_id="1180043" ref_url="https://bugzilla.suse.com/1180043" source="BUGZILLA"/>
		<reference ref_id="1180044" ref_url="https://bugzilla.suse.com/1180044" source="BUGZILLA"/>
		<reference ref_id="1180046" ref_url="https://bugzilla.suse.com/1180046" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010/" source="CVE"/>
		<reference ref_id="CVE-2020-27814" ref_url="https://www.suse.com/security/cve/CVE-2020-27814/" source="CVE"/>
		<reference ref_id="CVE-2020-27824" ref_url="https://www.suse.com/security/cve/CVE-2020-27824/" source="CVE"/>
		<reference ref_id="CVE-2020-27841" ref_url="https://www.suse.com/security/cve/CVE-2020-27841/" source="CVE"/>
		<reference ref_id="CVE-2020-27842" ref_url="https://www.suse.com/security/cve/CVE-2020-27842/" source="CVE"/>
		<reference ref_id="CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843/" source="CVE"/>
		<reference ref_id="CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012731.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

  - CVE-2018-20846: Fixed OOB read in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
  - CVE-2018-21010: Fixed heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789).
  - CVE-2020-27814: Fixed heap buffer overflow in lib/openjp2/mqc.c (bsc#1179594),
  - CVE-2020-27824: Fixed OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821).
  - CVE-2020-27841: Fixed buffer over-read in lib/openjp2/pi.c (bsc#1180042).
  - CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043).
  - CVE-2020-27843: Fixed OOB read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044).
  - CVE-2020-27845: Fixed heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149789">SUSE bug 1149789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179594">SUSE bug 1179594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179821">SUSE bug 1179821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180042">SUSE bug 1180042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180043">SUSE bug 1180043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180044">SUSE bug 1180044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180046">SUSE bug 1180046</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27814/">CVE-2020-27814</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27824/">CVE-2020-27824</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27841/">CVE-2020-27841</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27842/">CVE-2020-27842</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721365" comment="libopenjp2-7-2.3.0-150000.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721340" comment="libopenjp2-7-32bit-2.3.0-150000.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721366" comment="openjpeg2-2.3.0-150000.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721367" comment="openjpeg2-devel-2.3.0-150000.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52974" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1087072" ref_url="https://bugzilla.suse.com/1087072" source="BUGZILLA"/>
		<reference ref_id="1204111" ref_url="https://bugzilla.suse.com/1204111" source="BUGZILLA"/>
		<reference ref_id="1204112" ref_url="https://bugzilla.suse.com/1204112" source="BUGZILLA"/>
		<reference ref_id="1204113" ref_url="https://bugzilla.suse.com/1204113" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012727.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

  - CVE-2022-42010: Fixed potential crash that could be triggered by an invalid signature (bsc#1204111).
  - CVE-2022-42011: Fixed an out of bounds read caused by a fixed length array (bsc#1204112).
  - CVE-2022-42012: Fixed a use-after-free that could be trigged by a message in non-native endianness with out-of-band Unix file descriptor (bsc#1204113).

  Bugfixes:

  - Disable asserts (bsc#1087072).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2022-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087072">SUSE bug 1087072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204111">SUSE bug 1204111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204112">SUSE bug 1204112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204113">SUSE bug 1204113</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717537" comment="dbus-1-1.12.2-150100.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717538" comment="dbus-1-devel-1.12.2-150100.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717626" comment="dbus-1-devel-32bit-1.12.2-150100.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717627" comment="dbus-1-devel-doc-1.12.2-150100.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717539" comment="dbus-1-x11-1.12.2-150100.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717540" comment="libdbus-1-3-1.12.2-150100.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717541" comment="libdbus-1-3-32bit-1.12.2-150100.8.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52975" version="1" class="patch">
	<metadata>
		<title>Security update for libconfuse0 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203326" ref_url="https://bugzilla.suse.com/1203326" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40320" ref_url="https://www.suse.com/security/cve/CVE-2022-40320/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012757.html" source="SUSE-SU"/>
		<description>
This update for libconfuse0 fixes the following issues:

- CVE-2022-40320: Fixed a heap-based buffer over-read in cfg_tilde_expand in confuse.c (bsc#1203326).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-28"/>
	<updated date="2022-10-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203326">SUSE bug 1203326</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40320/">CVE-2022-40320</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710612" comment="libconfuse-devel-2.8-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710613" comment="libconfuse0-2.8-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710543" comment="libconfuse0-lang-2.8-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52976" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202809" ref_url="https://bugzilla.suse.com/1202809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012774.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2022-2989: Fixed possible information disclosure and modification (bsc#1202809).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-10-31"/>
	<updated date="2022-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202809">SUSE bug 1202809</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714498" comment="podman-3.4.7-150300.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714499" comment="podman-cni-config-3.4.7-150300.9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52977" version="1" class="patch">
	<metadata>
		<title>Security update for hsqldb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204521" ref_url="https://bugzilla.suse.com/1204521" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41853" ref_url="https://www.suse.com/security/cve/CVE-2022-41853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012782.html" source="SUSE-SU"/>
		<description>
This update for hsqldb fixes the following issues:

  - CVE-2022-41853: Fixed insufficient input sanitization (bsc#1204521).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204521">SUSE bug 1204521</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41853/">CVE-2022-41853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721793" comment="hsqldb-2.3.3-150000.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721794" comment="hsqldb-demo-2.3.3-150000.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721795" comment="hsqldb-javadoc-2.3.3-150000.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721796" comment="hsqldb-manual-2.3.3-150000.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52978" version="1" class="patch">
	<metadata>
		<title>Security update for hdf5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1093663" ref_url="https://bugzilla.suse.com/1093663" source="BUGZILLA"/>
		<reference ref_id="1101475" ref_url="https://bugzilla.suse.com/1101475" source="BUGZILLA"/>
		<reference ref_id="1101906" ref_url="https://bugzilla.suse.com/1101906" source="BUGZILLA"/>
		<reference ref_id="1107069" ref_url="https://bugzilla.suse.com/1107069" source="BUGZILLA"/>
		<reference ref_id="1111598" ref_url="https://bugzilla.suse.com/1111598" source="BUGZILLA"/>
		<reference ref_id="1125882" ref_url="https://bugzilla.suse.com/1125882" source="BUGZILLA"/>
		<reference ref_id="1167400" ref_url="https://bugzilla.suse.com/1167400" source="BUGZILLA"/>
		<reference ref_id="1194366" ref_url="https://bugzilla.suse.com/1194366" source="BUGZILLA"/>
		<reference ref_id="1194375" ref_url="https://bugzilla.suse.com/1194375" source="BUGZILLA"/>
		<reference ref_id="1195212" ref_url="https://bugzilla.suse.com/1195212" source="BUGZILLA"/>
		<reference ref_id="1195215" ref_url="https://bugzilla.suse.com/1195215" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11205" ref_url="https://www.suse.com/security/cve/CVE-2018-11205/" source="CVE"/>
		<reference ref_id="CVE-2018-13867" ref_url="https://www.suse.com/security/cve/CVE-2018-13867/" source="CVE"/>
		<reference ref_id="CVE-2018-14031" ref_url="https://www.suse.com/security/cve/CVE-2018-14031/" source="CVE"/>
		<reference ref_id="CVE-2018-16438" ref_url="https://www.suse.com/security/cve/CVE-2018-16438/" source="CVE"/>
		<reference ref_id="CVE-2018-17439" ref_url="https://www.suse.com/security/cve/CVE-2018-17439/" source="CVE"/>
		<reference ref_id="CVE-2019-8396" ref_url="https://www.suse.com/security/cve/CVE-2019-8396/" source="CVE"/>
		<reference ref_id="CVE-2020-10812" ref_url="https://www.suse.com/security/cve/CVE-2020-10812/" source="CVE"/>
		<reference ref_id="CVE-2021-45830" ref_url="https://www.suse.com/security/cve/CVE-2021-45830/" source="CVE"/>
		<reference ref_id="CVE-2021-45833" ref_url="https://www.suse.com/security/cve/CVE-2021-45833/" source="CVE"/>
		<reference ref_id="CVE-2021-46242" ref_url="https://www.suse.com/security/cve/CVE-2021-46242/" source="CVE"/>
		<reference ref_id="CVE-2021-46244" ref_url="https://www.suse.com/security/cve/CVE-2021-46244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012793.html" source="SUSE-SU"/>
		<description>
This update for hdf5 fixes the following issues:

  - CVE-2021-46244: Fixed division by zero leading to DoS (bsc#1195215).
  - CVE-2018-13867: Fixed out of bounds read in the function H5F__accum_read in H5Faccum.c (bsc#1101906).
  - CVE-2018-16438: Fixed out of bounds read in H5L_extern_query at H5Lexternal.c (bsc#1107069).
  - CVE-2020-10812: Fixed NULL pointer dereference (bsc#1167400).
  - CVE-2021-45830: Fixed heap buffer overflow vulnerability in H5F_addr_decode_len in /hdf5/src/H5Fint.c (bsc#1194375).
  - CVE-2019-8396:  Fixed buffer overflow in function H5O__layout_encode in H5Olayout.c (bsc#1125882).
  - CVE-2018-11205: Fixed out of bounds read was discovered in H5VM_memcpyvv in H5VM.c (bsc#1093663).
  - CVE-2021-46242: Fixed heap-use-after free via the component H5AC_unpin_entry (bsc#1195212).
  - CVE-2021-45833: Fixed stack buffer overflow vulnerability (bsc#1194366).
  - CVE-2018-14031: Fixed heap-based buffer over-read in the function H5T_copy in H5T.c (bsc#1101475).
  - CVE-2018-17439: Fixed out of bounds read in the function H5F__accum_read in H5Faccum.c (bsc#1111598).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1093663">SUSE bug 1093663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101475">SUSE bug 1101475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101906">SUSE bug 1101906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107069">SUSE bug 1107069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111598">SUSE bug 1111598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125882">SUSE bug 1125882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167400">SUSE bug 1167400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194366">SUSE bug 1194366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194375">SUSE bug 1194375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195212">SUSE bug 1195212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195215">SUSE bug 1195215</bugzilla>
	<cve impact="low" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11205/">CVE-2018-11205</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13867/">CVE-2018-13867</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14031/">CVE-2018-14031</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16438/">CVE-2018-16438</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17439/">CVE-2018-17439</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8396/">CVE-2019-8396</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10812/">CVE-2020-10812</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-45830/">CVE-2021-45830</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-45833/">CVE-2021-45833</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46242/">CVE-2021-46242</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46244/">CVE-2021-46244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720110" comment="hdf5-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720111" comment="hdf5-gnu-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720112" comment="hdf5-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720113" comment="hdf5-gnu-mpich-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720114" comment="hdf5-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720115" comment="hdf5-gnu-mvapich2-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720116" comment="hdf5-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720117" comment="hdf5-gnu-openmpi3-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720118" comment="hdf5-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720119" comment="hdf5-gnu-openmpi4-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720120" comment="hdf5-hpc-examples-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721709" comment="hdf5_1_10_8-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721710" comment="hdf5_1_10_8-gnu-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721711" comment="hdf5_1_10_8-gnu-hpc-devel-static-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721712" comment="hdf5_1_10_8-gnu-hpc-module-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721713" comment="hdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721714" comment="hdf5_1_10_8-gnu-mpich-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721715" comment="hdf5_1_10_8-gnu-mpich-hpc-devel-static-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721716" comment="hdf5_1_10_8-gnu-mpich-hpc-module-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721717" comment="hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721718" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721719" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel-static-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721720" comment="hdf5_1_10_8-gnu-mvapich2-hpc-module-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721721" comment="hdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721722" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721723" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel-static-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721724" comment="hdf5_1_10_8-gnu-openmpi3-hpc-module-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721725" comment="hdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721726" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721727" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel-static-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721728" comment="hdf5_1_10_8-gnu-openmpi4-hpc-module-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721729" comment="hdf5_1_10_8-hpc-examples-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721730" comment="libhdf5-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721731" comment="libhdf5-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721732" comment="libhdf5-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721733" comment="libhdf5-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721734" comment="libhdf5-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721735" comment="libhdf5_1_10_8-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721736" comment="libhdf5_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721737" comment="libhdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721738" comment="libhdf5_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721739" comment="libhdf5_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721740" comment="libhdf5_cpp-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721741" comment="libhdf5_cpp-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721742" comment="libhdf5_cpp-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721743" comment="libhdf5_cpp-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721744" comment="libhdf5_cpp-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721745" comment="libhdf5_cpp_1_10_8-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721746" comment="libhdf5_cpp_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721747" comment="libhdf5_cpp_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721748" comment="libhdf5_cpp_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721749" comment="libhdf5_cpp_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721750" comment="libhdf5_fortran-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721751" comment="libhdf5_fortran-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721752" comment="libhdf5_fortran-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721753" comment="libhdf5_fortran-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721754" comment="libhdf5_fortran-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721755" comment="libhdf5_fortran_1_10_8-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721756" comment="libhdf5_fortran_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721757" comment="libhdf5_fortran_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721758" comment="libhdf5_fortran_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721759" comment="libhdf5_fortran_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721760" comment="libhdf5_hl-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721761" comment="libhdf5_hl-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721762" comment="libhdf5_hl-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721763" comment="libhdf5_hl-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721764" comment="libhdf5_hl-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721765" comment="libhdf5_hl_1_10_8-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721766" comment="libhdf5_hl_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721767" comment="libhdf5_hl_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721768" comment="libhdf5_hl_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721769" comment="libhdf5_hl_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721770" comment="libhdf5_hl_cpp-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721771" comment="libhdf5_hl_cpp-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721772" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721773" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721774" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721775" comment="libhdf5_hl_cpp_1_10_8-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721776" comment="libhdf5_hl_cpp_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721777" comment="libhdf5_hl_cpp_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721778" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721779" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721780" comment="libhdf5_hl_fortran-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721781" comment="libhdf5_hl_fortran-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721782" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721783" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721784" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721785" comment="libhdf5hl_fortran_1_10_8-gnu-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721786" comment="libhdf5hl_fortran_1_10_8-gnu-mpich-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721787" comment="libhdf5hl_fortran_1_10_8-gnu-mvapich2-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721788" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi3-hpc-1.10.8-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721789" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi4-hpc-1.10.8-150300.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52979" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1099719" ref_url="https://bugzilla.suse.com/1099719" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12983" ref_url="https://www.suse.com/security/cve/CVE-2018-12983/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012785.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

- CVE-2018-12983: Fixed a stack overrun (bsc#1099719).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099719">SUSE bug 1099719</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12983/">CVE-2018-12983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009713928" comment="libpodofo-devel-0.9.6-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713929" comment="libpodofo0_9_6-0.9.6-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009713930" comment="podofo-0.9.6-150300.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52980" version="1" class="patch">
	<metadata>
		<title>Security update for python-Flask-Security (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202105" ref_url="https://bugzilla.suse.com/1202105" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23385" ref_url="https://www.suse.com/security/cve/CVE-2021-23385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012786.html" source="SUSE-SU"/>
		<description>
This update for python-Flask-Security fixes the following issues:

- CVE-2021-23385: Fixed open redirect (bsc#1202105).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202105">SUSE bug 1202105</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23385/">CVE-2021-23385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009715922" comment="python2-Flask-Security-3.0.0-150100.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715923" comment="python3-Flask-Security-3.0.0-150100.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52981" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1203832" ref_url="https://bugzilla.suse.com/1203832" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JUWQCTN3BP2AGML5ZX2MGFCXJ47QKKT/" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

  - CVE-2022-35256: Fixed incorrect parsing of header fields (bsc#1203832).
  - CVE-2022-32213: Fixed bypass via obs-fold mechanic (bsc#1201325).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203832">SUSE bug 1203832</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716325" comment="nodejs10-10.24.1-150000.1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716326" comment="nodejs10-devel-10.24.1-150000.1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716327" comment="nodejs10-docs-10.24.1-150000.1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716328" comment="npm10-10.24.1-150000.1.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52982" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012792.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

  - CVE-2021-28957: Fixed XSS due to missing input sanitization for HTML5 attributes (bsc#1184177).
  - CVE-2020-27783: Fixed XSS due to the use of improper parser (bsc#1179534).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717314" comment="python2-lxml-doc-4.0.0-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717315" comment="python3-lxml-doc-4.0.0-150000.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52983" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-desktop (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1133043" ref_url="https://bugzilla.suse.com/1133043" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11460" ref_url="https://www.suse.com/security/cve/CVE-2019-11460/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012788.html" source="SUSE-SU"/>
		<description>
This update for gnome-desktop fixes the following issues:

  - CVE-2019-11460: Fixed sandbox issue that allowed bypassing from a compromised thumbnailer (bsc#1133043).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2022-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133043">SUSE bug 1133043</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11460/">CVE-2019-11460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721955" comment="libgnome-desktop-3-12-3.26.2-150000.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721956" comment="libgnome-desktop-3-12-32bit-3.26.2-150000.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52984" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204412" ref_url="https://bugzilla.suse.com/1204412" source="BUGZILLA"/>
		<reference ref_id="1204416" ref_url="https://bugzilla.suse.com/1204416" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012799.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

  - CVE-2022-3550: Fixed out of bounds read/write in _GetCountedString() (bsc#1204412).
  - CVE-2022-3551: Fixed various leaks of the return value of GetComponentSpec() (bsc#1204416).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-02"/>
	<updated date="2022-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204412">SUSE bug 1204412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204416">SUSE bug 1204416</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721532" comment="xorg-x11-server-1.20.3-150200.22.5.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721533" comment="xorg-x11-server-extra-1.20.3-150200.22.5.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721555" comment="xorg-x11-server-sdk-1.20.3-150200.22.5.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721704" comment="xorg-x11-server-source-1.20.3-150200.22.5.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721705" comment="xorg-x11-server-wayland-1.20.3-150200.22.5.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52985" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204734" ref_url="https://bugzilla.suse.com/1204734" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40284" ref_url="https://www.suse.com/security/cve/CVE-2022-40284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012808.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

  - CVE-2022-40284: Fixed incorrect validation of some of the NTFS metadata that could cause buffer overflow (bsc#1204734).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-03"/>
	<updated date="2022-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204734">SUSE bug 1204734</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40284/">CVE-2022-40284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722778" comment="libntfs-3g-devel-2022.5.17-150000.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722779" comment="libntfs-3g87-2022.5.17-150000.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722780" comment="ntfs-3g-2022.5.17-150000.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722781" comment="ntfsprogs-2022.5.17-150000.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722782" comment="ntfsprogs-extra-2022.5.17-150000.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52986" version="1" class="patch">
	<metadata>
		<title>Security update for python-Flask-Security-Too (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202105" ref_url="https://bugzilla.suse.com/1202105" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23385" ref_url="https://www.suse.com/security/cve/CVE-2021-23385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012809.html" source="SUSE-SU"/>
		<description>
This update for python-Flask-Security-Too fixes the following issues:

- CVE-2021-23385: Fixed open redirect (bsc#1202105).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-03"/>
	<updated date="2022-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202105">SUSE bug 1202105</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23385/">CVE-2021-23385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009715807" comment="python3-Flask-Security-Too-3.4.2-150200.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52987" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-loofah (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1154751" ref_url="https://bugzilla.suse.com/1154751" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15587" ref_url="https://www.suse.com/security/cve/CVE-2019-15587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012810.html" source="SUSE-SU"/>
		<description>
This update for rubygem-loofah fixes the following issues:

  - CVE-2019-15587: Fixed issue in sanitization of crafted SVG elements (bsc#1154751).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-04"/>
	<updated date="2022-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154751">SUSE bug 1154751</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15587/">CVE-2019-15587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721356" comment="ruby2.5-rubygem-loofah-2.2.2-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721798" comment="ruby2.5-rubygem-loofah-doc-2.2.2-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721799" comment="ruby2.5-rubygem-loofah-testsuite-2.2.2-150000.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52988" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201978" ref_url="https://bugzilla.suse.com/1201978" source="BUGZILLA"/>
		<reference ref_id="1204366" ref_url="https://bugzilla.suse.com/1204366" source="BUGZILLA"/>
		<reference ref_id="1204367" ref_url="https://bugzilla.suse.com/1204367" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3709" ref_url="https://www.suse.com/security/cve/CVE-2016-3709/" source="CVE"/>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012813.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

  - CVE-2016-3709: Fixed possible XSS vulnerability (bsc#1201978).
  - CVE-2022-40303: Fixed integer overflows with XML_PARSE_HUGE (bsc#1204366).
  - CVE-2022-40304: Fixed dict corruption caused by entity reference cycles (bsc#1204367).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-04"/>
	<updated date="2022-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201978">SUSE bug 1201978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204366">SUSE bug 1204366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204367">SUSE bug 1204367</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3709/">CVE-2016-3709</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718928" comment="libxml2-2-2.9.7-150000.3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718903" comment="libxml2-2-32bit-2.9.7-150000.3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718929" comment="libxml2-devel-2.9.7-150000.3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721676" comment="libxml2-devel-32bit-2.9.7-150000.3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721677" comment="libxml2-doc-2.9.7-150000.3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718930" comment="libxml2-tools-2.9.7-150000.3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718867" comment="python2-libxml2-python-2.9.7-150000.3.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718931" comment="python3-libxml2-python-2.9.7-150000.3.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52989" version="1" class="patch">
	<metadata>
		<title>Security update for xmlbeans (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180915" ref_url="https://bugzilla.suse.com/1180915" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23926" ref_url="https://www.suse.com/security/cve/CVE-2021-23926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012812.html" source="SUSE-SU"/>
		<description>
This update for xmlbeans fixes the following issues:

  - CVE-2021-23926: Fixed XML parsers not protecting from malicious XML input (bsc#1180915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-04"/>
	<updated date="2022-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180915">SUSE bug 1180915</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23926/">CVE-2021-23926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721364" comment="xmlbeans-2.6.0-150000.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721797" comment="xmlbeans-scripts-2.6.0-150000.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52990" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1142679" ref_url="https://bugzilla.suse.com/1142679" source="BUGZILLA"/>
		<reference ref_id="1185913" ref_url="https://bugzilla.suse.com/1185913" source="BUGZILLA"/>
		<reference ref_id="1189338" ref_url="https://bugzilla.suse.com/1189338" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13111" ref_url="https://www.suse.com/security/cve/CVE-2019-13111/" source="CVE"/>
		<reference ref_id="CVE-2021-29463" ref_url="https://www.suse.com/security/cve/CVE-2021-29463/" source="CVE"/>
		<reference ref_id="CVE-2021-34334" ref_url="https://www.suse.com/security/cve/CVE-2021-34334/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012824.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

  - CVE-2019-13111: Fixed nteger overflow in WebPImage:decodeChunks (bsc#1142679).
  - CVE-2021-29463: Fixed out-of-bounds read (bsc#1185913).
  - CVE-2021-34334: Fixed a DoS due to integer overflow in loop counter bug (bsc#1189338).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-07"/>
	<updated date="2022-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142679">SUSE bug 1142679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185913">SUSE bug 1185913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189338">SUSE bug 1189338</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13111/">CVE-2019-13111</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29463/">CVE-2021-29463</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34334/">CVE-2021-34334</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722308" comment="exiv2-0.26-150000.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722309" comment="exiv2-lang-0.26-150000.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722266" comment="libexiv2-26-0.26-150000.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722310" comment="libexiv2-26-32bit-0.26-150000.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722267" comment="libexiv2-devel-0.26-150000.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722311" comment="libexiv2-doc-0.26-150000.6.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52991" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1032323" ref_url="https://bugzilla.suse.com/1032323" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1198702" ref_url="https://bugzilla.suse.com/1198702" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1200788" ref_url="https://bugzilla.suse.com/1200788" source="BUGZILLA"/>
		<reference ref_id="1201725" ref_url="https://bugzilla.suse.com/1201725" source="BUGZILLA"/>
		<reference ref_id="1202638" ref_url="https://bugzilla.suse.com/1202638" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1202700" ref_url="https://bugzilla.suse.com/1202700" source="BUGZILLA"/>
		<reference ref_id="1203066" ref_url="https://bugzilla.suse.com/1203066" source="BUGZILLA"/>
		<reference ref_id="1203098" ref_url="https://bugzilla.suse.com/1203098" source="BUGZILLA"/>
		<reference ref_id="1203290" ref_url="https://bugzilla.suse.com/1203290" source="BUGZILLA"/>
		<reference ref_id="1203387" ref_url="https://bugzilla.suse.com/1203387" source="BUGZILLA"/>
		<reference ref_id="1203391" ref_url="https://bugzilla.suse.com/1203391" source="BUGZILLA"/>
		<reference ref_id="1203496" ref_url="https://bugzilla.suse.com/1203496" source="BUGZILLA"/>
		<reference ref_id="1203514" ref_url="https://bugzilla.suse.com/1203514" source="BUGZILLA"/>
		<reference ref_id="1203770" ref_url="https://bugzilla.suse.com/1203770" source="BUGZILLA"/>
		<reference ref_id="1203802" ref_url="https://bugzilla.suse.com/1203802" source="BUGZILLA"/>
		<reference ref_id="1204051" ref_url="https://bugzilla.suse.com/1204051" source="BUGZILLA"/>
		<reference ref_id="1204053" ref_url="https://bugzilla.suse.com/1204053" source="BUGZILLA"/>
		<reference ref_id="1204059" ref_url="https://bugzilla.suse.com/1204059" source="BUGZILLA"/>
		<reference ref_id="1204060" ref_url="https://bugzilla.suse.com/1204060" source="BUGZILLA"/>
		<reference ref_id="1204125" ref_url="https://bugzilla.suse.com/1204125" source="BUGZILLA"/>
		<reference ref_id="1204166" ref_url="https://bugzilla.suse.com/1204166" source="BUGZILLA"/>
		<reference ref_id="1204168" ref_url="https://bugzilla.suse.com/1204168" source="BUGZILLA"/>
		<reference ref_id="1204354" ref_url="https://bugzilla.suse.com/1204354" source="BUGZILLA"/>
		<reference ref_id="1204355" ref_url="https://bugzilla.suse.com/1204355" source="BUGZILLA"/>
		<reference ref_id="1204382" ref_url="https://bugzilla.suse.com/1204382" source="BUGZILLA"/>
		<reference ref_id="1204402" ref_url="https://bugzilla.suse.com/1204402" source="BUGZILLA"/>
		<reference ref_id="1204415" ref_url="https://bugzilla.suse.com/1204415" source="BUGZILLA"/>
		<reference ref_id="1204417" ref_url="https://bugzilla.suse.com/1204417" source="BUGZILLA"/>
		<reference ref_id="1204431" ref_url="https://bugzilla.suse.com/1204431" source="BUGZILLA"/>
		<reference ref_id="1204439" ref_url="https://bugzilla.suse.com/1204439" source="BUGZILLA"/>
		<reference ref_id="1204470" ref_url="https://bugzilla.suse.com/1204470" source="BUGZILLA"/>
		<reference ref_id="1204479" ref_url="https://bugzilla.suse.com/1204479" source="BUGZILLA"/>
		<reference ref_id="1204574" ref_url="https://bugzilla.suse.com/1204574" source="BUGZILLA"/>
		<reference ref_id="1204575" ref_url="https://bugzilla.suse.com/1204575" source="BUGZILLA"/>
		<reference ref_id="1204619" ref_url="https://bugzilla.suse.com/1204619" source="BUGZILLA"/>
		<reference ref_id="1204635" ref_url="https://bugzilla.suse.com/1204635" source="BUGZILLA"/>
		<reference ref_id="1204637" ref_url="https://bugzilla.suse.com/1204637" source="BUGZILLA"/>
		<reference ref_id="1204646" ref_url="https://bugzilla.suse.com/1204646" source="BUGZILLA"/>
		<reference ref_id="1204647" ref_url="https://bugzilla.suse.com/1204647" source="BUGZILLA"/>
		<reference ref_id="1204653" ref_url="https://bugzilla.suse.com/1204653" source="BUGZILLA"/>
		<reference ref_id="1204728" ref_url="https://bugzilla.suse.com/1204728" source="BUGZILLA"/>
		<reference ref_id="1204753" ref_url="https://bugzilla.suse.com/1204753" source="BUGZILLA"/>
		<reference ref_id="1204754" ref_url="https://bugzilla.suse.com/1204754" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037/" source="CVE"/>
		<reference ref_id="CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978/" source="CVE"/>
		<reference ref_id="CVE-2022-3169" ref_url="https://www.suse.com/security/cve/CVE-2022-3169/" source="CVE"/>
		<reference ref_id="CVE-2022-3176" ref_url="https://www.suse.com/security/cve/CVE-2022-3176/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3521" ref_url="https://www.suse.com/security/cve/CVE-2022-3521/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3535" ref_url="https://www.suse.com/security/cve/CVE-2022-3535/" source="CVE"/>
		<reference ref_id="CVE-2022-3542" ref_url="https://www.suse.com/security/cve/CVE-2022-3542/" source="CVE"/>
		<reference ref_id="CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3577" ref_url="https://www.suse.com/security/cve/CVE-2022-3577/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3623" ref_url="https://www.suse.com/security/cve/CVE-2022-3623/" source="CVE"/>
		<reference ref_id="CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625/" source="CVE"/>
		<reference ref_id="CVE-2022-3629" ref_url="https://www.suse.com/security/cve/CVE-2022-3629/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).
- CVE-2022-2153: Fixed vulnerability in KVM that could allow an unprivileged local attacker on the host to cause DoS (bnc#1200788).
- CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in ax88179_178a devices (bnc#1202686 bsc#1196018).
- CVE-2022-2978: Fixed use-after-free in the NILFS file system that could lead to local privilege escalation or DoS (bnc#1202700).
- CVE-2022-3169: Fixed a denial of service flaw which occurs when consecutive requests to NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET are sent (bnc#1203290).
- CVE-2022-3176: Fixed use-after-free in io_uring when using POLLFREE (bnc#1203391).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).
- CVE-2022-3521: Fixed race condition in kcm_tx_work() in net/kcm/kcmsock.c (bnc#1204355).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bnc#1204354).
- CVE-2022-3535: Fixed memory leak in mvpp2_dbgfs_port_init() in drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bnc#1204417).
- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402).
- CVE-2022-3545: Fixed use-after-free in area_cache_get() in drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).
- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bnc#1204431).
- CVE-2022-3577: Fixed out-of-bounds memory write flaw in bigben device driver that could lead to local privilege escalation or DoS (bnc#1204470).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bnc#1204439).
- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bnc#1204479).
- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bnc#1204574).
- CVE-2022-3623: Fixed race condition in follow_page_pte() (mm/gup.c) (bsc#1204575).
- CVE-2022-3625: Fixed use-after-free in devlink_param_set()/devlink_param_get() in net/core/devlink.c (bnc#1204637).
- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bnc#1204635).
- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bnc#1204619).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bnc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bnc#1204647).
- CVE-2022-39189: Fixed a flaw in the x86 KVM subsystem that could allow unprivileged guest users to compromise the guest kernel via TLB flush operations on preempted vCPU (bnc#1203066).
- CVE-2022-40768: Fixed information disclosure in stex_queuecommand_lck (bnc#1203514).
- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).
- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bnc#1204168).
- CVE-2022-42719: Fixed MBSSID parsing use-after-free. (bsc#1204051)
- CVE-2022-42720: Fixed BSS refcounting bugs. (bsc#1204059)
- CVE-2022-42721: Avoid nontransmitted BSS list corruption. (bsc#1204060)
- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bnc#1204653).

The following non-security bugs were fixed:

- acpi: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).
- acpi: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).
- acpi: extlog: Handle multiple records (git-fixes).
- acpi: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bnc#1203802).
- acpi: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).
- alsa: Use del_timer_sync( before freeing timer (git-fixes).
- alsa: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).
- alsa: aoa: Fix I2S device accounting (git-fixes).
- alsa: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).
- alsa: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).
- alsa: au88x0: use explicitly signed char (git-fixes).
- alsa: dmaengine: increment buffer pointer atomically (git-fixes).
- alsa: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).
- alsa: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).
- alsa: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).
- alsa: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).
- alsa: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).
- alsa: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).
- alsa: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).
- alsa: hda/sigmatel: Keep power up while beep is enabled (git-fixes).
- alsa: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).
- alsa: hda: Fix position reporting on Poulsbo (git-fixes).
- alsa: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).
- alsa: oss: Fix potential deadlock at unregistration (git-fixes).
- alsa: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).
- alsa: rme9652: use explicitly signed char (git-fixes).
- alsa: usb-audio: Fix NULL dererence at error path (git-fixes).
- alsa: usb-audio: Fix potential memory leaks (git-fixes).
- arm64: assembler: add cond_yield macro (git-fixes)
- asoc: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).
- asoc: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).
- asoc: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).
- asoc: nau8824: Fix semaphore unbalance at error paths (git-fixes).
- asoc: rsnd: Add check for rsnd_mod_power_on (git-fixes).
- asoc: tas2770: Reinit regcache on reset (git-fixes).
- asoc: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).
- asoc: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).
- asoc: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).
- asoc: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).
- asoc: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).
- ata: fix ata_id_has_devslp() (git-fixes).
- ata: fix ata_id_has_dipm() (git-fixes).
- ata: fix ata_id_has_ncq_autosense() (git-fixes).
- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).
- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).
- bluetooth: L2CAP: Fix user-after-free (git-fixes).
- bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).
- bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).
- bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).
- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).
- can: gs_usb: gs_can_open(): fix race dev-&gt;can.state condition (git-fixes).
- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).
- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).
- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).
- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).
- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).
- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).
- clk: bcm2835: Make peripheral PLLC critical (git-fixes).
- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).
- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).
- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).
- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).
- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).
- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).
- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).
- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).
- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).
- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).
- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).
- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).
- crypto: akcipher - default implementation for setting a private key (git-fixes).
- crypto: arm64/sha - fix function types (git-fixes)
- crypto: arm64/sha1-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha2-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha3-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha512-ce - simplify NEON yield (git-fixes)
- crypto: cavium - prevent integer overflow loading firmware (git-fixes).
- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).
- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).
- device property: Fix documentation for *_match_string() APIs (git-fixes).
- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).
- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).
- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).
- docs: update mediator information in CoC docs (git-fixes).
- drivers: serial: jsm: fix some leaks in probe (git-fixes).
- drm/amd/display: Limit user regamma to a valid value (git-fixes).
- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).
- drm/amdgpu: fix initial connector audio value (git-fixes).
- drm/amdgpu: use dirty framebuffer helper (git-fixes).
- drm/bridge: Avoid uninitialized variable warning (git-fixes).
- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).
- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).
- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).
- drm/mipi-dsi: Detach devices when removing the host (git-fixes).
- drm/msm/dpu: Fix comment typo (git-fixes).
- drm/msm/dpu: index dpu_kms-&gt;hw_vbif using vbif_idx (git-fixes).
- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).
- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).
- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).
- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).
- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).
- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).
- drm/omap: dss: Fix refcount leak bugs (git-fixes).
- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).
- drm/scheduler: quieten kernel-doc warnings (git-fixes).
- drm/udl: Restore display mode on resume (git-fixes).
- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).
- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).
- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).
- drm: fix drm_mipi_dbi build errors (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).
- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).
- dyndbg: fix module.dyndbg handling (git-fixes).
- dyndbg: let query-modname override actual module name (git-fixes).
- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).
- efi: libstub: drop pointless get_memory_map() call (git-fixes).
- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1204053 bsc#1201725).
- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).
- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).
- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).
- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).
- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).
- gpio: rockchip: request GPIO mux to pinctrl when setting direction (git-fixes).
- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).
- hid: hidraw: fix memory leak in hidraw_release() (git-fixes).
- hid: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).
- hid: multitouch: Add memory barriers (git-fixes).
- hid: roccat: Fix use-after-free in roccat_read() (git-fixes).
- hsi: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).
- hsi: omap_ssi_port: Fix dma_map_sg error check (git-fixes).
- hwmon/coretemp: Handle large core ID value (git-fixes).
- ib/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes)
- ib/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes)
- ib/core: Only update PKEY and GID caches on respective events (git-fixes)
- ib/hfi1: Adjust pkey entry in index 0 (git-fixes)
- ib/hfi1: Fix abba locking issue with sc_disable() (git-fixes)
- ib/hfi1: Fix possible null-pointer dereference in _extend_sdma_tx_descs() (git-fixes)
- ib/mlx4: Add support for REJ due to timeout (git-fixes)
- ib/mlx4: Use port iterator and validation APIs (git-fixes)
- ib/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields (git-fixes)
- ib/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)
- ib/srpt: Remove redundant assignment to ret (git-fixes)
- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).
- iio: adc: ad7923: fix channel readings for some variants (git-fixes).
- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).
- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).
- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).
- iio: adc: mcp3911: use correct id bits (git-fixes).
- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).
- iio: inkern: only release the device node when done with it (git-fixes).
- iio: light: tsl2583: Fix module unloading (git-fixes).
- iio: pressure: dps310: Refactor startup procedure (git-fixes).
- iio: pressure: dps310: Reset chip after timeout (git-fixes).
- input: i8042 - fix refount leak on sparc (git-fixes).
- input: xpad - add supported devices as contributed on github (git-fixes).
- input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).
- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).
- kABI: arm64/crypto/sha512 Preserve function signature (git-fixes).
- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).
- kbuild: remove the target in signal traps when interrupted (git-fixes).
- kbuild: sink stdout from cmd for silent build (git-fixes).
- kbuild: skip per-CPU BTF generation for pahole v1.18-v1.21 (jsc#SLE-24559).
- kthread: Extract KTHREAD_IS_PER_CPU (bsc#1204753).
- kvm: nVMX: Unconditionally purge queued/injected events on nested 'exit' (git-fixes).
- kvm: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).
- kvm: s390: VSIE: fix MVPG handling for prefixing and MSO (git-fixes).
- kvm: s390: clear kicked_mask before sleeping again (git-fixes).
- kvm: s390: preserve deliverable_mask in __airqs_kick_single_vcpu (git-fixes).
- kvm: s390: pv: do not present the ecall interrupt twice (git-fixes).
- kvm: s390: split kvm_s390_real_to_abs (git-fixes).
- kvm: s390x: fix SCK locking (git-fixes)
- kvm: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).
- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).
- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).
- locking/csd_lock: Change csdlock_debug from early_param to __setup (git-fixes).
- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).
- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).
- mac802154: Fix LQI recording (git-fixes).
- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).
- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).
- media: cedrus: Set the platform driver data earlier (git-fixes).
- media: coda: Add more H264 levels for CODA960 (git-fixes).
- media: coda: Fix reported H264 profile (git-fixes).
- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).
- media: dvb_vb2: fix possible out of bound access (git-fixes).
- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).
- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced' (git-fixes).
- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).
- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).
- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).
- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).
- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).
- mfd: sm501: Add check for platform_driver_register() (git-fixes).
- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).
- mm, memcg: avoid stale protection values when cgroup is above protection (bsc#1204754).
- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).
- mm: memcontrol: fix occasional OOMs due to proportional memory.low reclaim (bsc#1204754).
- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).
- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).
- mmc: core: Replace with already defined values for readability (git-fixes).
- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).
- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).
- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).
- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).
- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).
- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).
- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).
- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).
- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).
- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).
- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).
- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).
- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).
- openvswitch: switch from WARN to pr_warn (git-fixes).
- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).
- padata: make padata_free_shell() to respect pd's -&gt;refcnt (bsc#1202638).
- parisc/sticon: fix reverse colors (bsc#1152489) Backporting notes: 	* context changes
- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)
- pci: Dynamically map ECAM regions (bsc#1204382).
- pci: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).
- pci: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).
- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).
- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).
- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).
- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).
- pinctrl: rockchip: add pinmux_ops.gpio_set_direction callback (git-fixes).
- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).
- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).
- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).
- pm: domains: Fix handling of unavailable/disabled idle states (git-fixes).
- pm: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).
- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).
- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).
- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).
- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).
- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
- powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h (bsc#1065729).
- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).
- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#PED-1931).
- quota: widen timestamps for the fs_disk_quota structure (bsc#1203387).
- rdma/bnxt_re: Add missing spin lock initialization (git-fixes)
- rdma/bnxt_re: Fix query SRQ failure (git-fixes)
- rdma/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)
- rdma/cma: Ensure rdma_addr_cancel() happens before issuing more requests (git-fixes)
- rdma/cma: Fix arguments order in net device validation (git-fixes)
- rdma/core: Sanitize WQ state received from the userspace (git-fixes)
- rdma/cxgb4: Remove MW support (git-fixes)
- rdma/efa: Free IRQ vectors on error flow (git-fixes)
- rdma/efa: Remove double QP type assignment (git-fixes)
- rdma/efa: Use ib_umem_num_dma_pages() (git-fixes)
- rdma/hfi1: Fix potential integer multiplication overflow errors (git-fixes)
- rdma/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)
- rdma/i40iw: Use ib_umem_num_dma_pages() (git-fixes)
- rdma/iwcm: Release resources if iw_cm module initialization fails (git-fixes)
- rdma/mlx4: Return missed an error if device does not support steering (git-fixes)
- rdma/mlx5: Add missing check for return value in get namespace flow (git-fixes)
- rdma/mlx5: Block FDB rules when not in switchdev mode (git-fixes)
- rdma/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes)
- rdma/mlx5: Make mkeys always owned by the kernel's PD when not enabled (git-fixes)
- rdma/mlx5: Set user priority for DCT (git-fixes)
- rdma/mlx5: Use set_mkc_access_pd_addr_fields() in reg_create() (git-fixes)
- rdma/mthca: Work around -Wenum-conversion warning (git-fixes)
- rdma/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes)
- rdma/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)
- rdma/qedr: Fix reporting QP timeout attribute (git-fixes)
- rdma/qib: Remove superfluous fallthrough statements (git-fixes)
- rdma/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)
- rdma/rxe: Do not overwrite errno from ib_umem_get() (git-fixes)
- rdma/rxe: Fix 'kernel NULL pointer dereference' error (git-fixes)
- rdma/rxe: Fix error unwind in rxe_create_qp() (git-fixes)
- rdma/rxe: Fix extra copies in build_rdma_network_hdr (git-fixes)
- rdma/rxe: Fix extra copy in prepare_ack_packet (git-fixes)
- rdma/rxe: Fix failure during driver load (git-fixes)
- rdma/rxe: Fix over copying in get_srq_wqe (git-fixes)
- rdma/rxe: Fix redundant call to ip_send_check (git-fixes)
- rdma/rxe: Fix redundant skb_put_zero (git-fixes)
- rdma/rxe: Fix rnr retry behavior (git-fixes)
- rdma/rxe: Fix the error caused by qp-&gt;sk (git-fixes)
- rdma/rxe: Fix wrong port_cap_flags (git-fixes)
- rdma/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)
- rdma/rxe: Remove unused pkt-&gt;offset (git-fixes)
- rdma/rxe: Return CQE error if invalid lkey was supplied (git-fixes)
- rdma/sa_query: Use strscpy_pad instead of memcpy to copy a string (git-fixes)
- rdma/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)
- rdma/siw: Fix a condition race issue in MPA request processing (git-fixes)
- rdma/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)
- rdma/siw: Pass a pointer to virt_to_page() (git-fixes)
- rdma/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)
- rdma: Verify port when creating flow rule (git-fixes)
- rdma: remove useless condition in siw_create_cq() (git-fixes)
- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).
- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).
- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).
- revert 'drivers/video/backlight/platform_lcd.c: add support for (bsc#1152489)
- revert 'drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time' (git-fixes).
- revert 'usb: add quirks for Lenovo OneLink+ Dock' (git-fixes).
- revert 'usb: storage: Add quirk for Samsung Fit flash' (git-fixes).
- revert 'usb: storage: Add quirk for Samsung Fit flash' (git-fixes).
- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).
- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).
- sbitmap: fix possible io hung due to lost wakeup (git-fixes).
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).
- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).
- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).
- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#PED-1931).
- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).
- serial: Create uart_xmit_advance() (git-fixes).
- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- soc: qcom: smem_state: Add refcounting for the 'state-&gt;of_node' (git-fixes).
- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).
- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).
- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).
- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).
- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).
- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).
- spi: s3c64xx: Fix large transfers with DMA (git-fixes).
- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).
- staging: vt6655: fix potential memory leak (git-fixes).
- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).
- struct pci_config_window kABI workaround (bsc#1204382).
- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).
- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).
- tty/serial: atmel: RS485 &amp; ISO7816: wait for TXRDY before sending data (git-fixes).
- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).
- tty: xilinx_uartps: Fix the ignore_status (git-fixes).
- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
- uas: ignore UAS for Thinkplus chips (git-fixes).
- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: bdc: change state when port disconnected (git-fixes).
- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).
- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).
- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).
- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).
- usb: mon: make mmapped memory read only (git-fixes).
- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).
- usb: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).
- usb: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
- usb: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
- usb: typec: ucsi: Remove incorrect warning (git-fixes).
- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).
- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).
- usb: xhci-mtk: add some schedule error number (git-fixes).
- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).
- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).
- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule (git-fixes).
- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).
- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).
- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).
- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).
- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).
- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).
- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).
- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).
- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).
- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).
- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).
- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).
- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).
- wifi: rt2x00: set SoC wmac clock register (git-fixes).
- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).
- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).
- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).
- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).
- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).
- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).
- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).
- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).
- xfs: add missing assert in xfs_fsmap_owner_from_rmap (git-fixes).
- xfs: enable big timestamps (bsc#1203387).
- xfs: enable new inode btree counters feature (bsc#1203387).
- xfs: explicitly define inode timestamp range (bsc#1203387).
- xfs: fix memory corruption during remote attr value buffer invalidation (git-fixes).
- xfs: fix s_maxbytes computation on 32-bit kernels (git-fixes).
- xfs: hoist out xfs_resizefs_init_new_ags() (git-fixes).
- xfs: move incore structures out of xfs_da_format.h (git-fixes).
- xfs: quota: move to time64_t interfaces (bsc#1203387).
- xfs: redefine xfs_ictimestamp_t (bsc#1203387). Refresh patches.suse/xfs-repair-malformed-inode-items-during-log-recovery.patch.
- xfs: redefine xfs_timestamp_t (bsc#1203387).
- xfs: refactor remote attr value buffer invalidation (git-fixes).
- xfs: remove obsolete AGF counter debugging (git-fixes).
- xfs: rename `new' to `delta' in xfs_growfs_data_private() (git-fixes).
- xfs: reserve data and rt quota at the same time (bsc#1203496).
- xfs: slightly tweak an assert in xfs_fs_map_blocks (git-fixes).
- xfs: store inode btree block counts in AGI header (bsc#1203387).
- xfs: streamline xfs_attr3_leaf_inactive (git-fixes).
- xfs: use a struct timespec64 for the in-core crtime (bsc#1203387).
- xfs: use the finobt block counts to speed up mount times (bsc#1203387).
- xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387).
- xfs: widen ondisk quota expiration timestamps to handle y2038+ (bsc#1203387).
- xhci: Do not show warning for reinit on known broken suspend (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032323">SUSE bug 1032323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200788">SUSE bug 1200788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201725">SUSE bug 1201725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202638">SUSE bug 1202638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202700">SUSE bug 1202700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203066">SUSE bug 1203066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203098">SUSE bug 1203098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203290">SUSE bug 1203290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203387">SUSE bug 1203387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203391">SUSE bug 1203391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203496">SUSE bug 1203496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203514">SUSE bug 1203514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203770">SUSE bug 1203770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203802">SUSE bug 1203802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204051">SUSE bug 1204051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204053">SUSE bug 1204053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204059">SUSE bug 1204059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204060">SUSE bug 1204060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204125">SUSE bug 1204125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204168">SUSE bug 1204168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204355">SUSE bug 1204355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204382">SUSE bug 1204382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204402">SUSE bug 1204402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204415">SUSE bug 1204415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204417">SUSE bug 1204417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204439">SUSE bug 1204439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204470">SUSE bug 1204470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204479">SUSE bug 1204479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204574">SUSE bug 1204574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204575">SUSE bug 1204575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204635">SUSE bug 1204635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204637">SUSE bug 1204637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204646">SUSE bug 1204646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204647">SUSE bug 1204647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204728">SUSE bug 1204728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204753">SUSE bug 1204753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204754">SUSE bug 1204754</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3169/">CVE-2022-3169</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3176/">CVE-2022-3176</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3521/">CVE-2022-3521</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3535/">CVE-2022-3535</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3542/">CVE-2022-3542</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3577/">CVE-2022-3577</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3623/">CVE-2022-3623</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3629/">CVE-2022-3629</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724512" comment="cluster-md-kmp-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724513" comment="dlm-kmp-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724514" comment="gfs2-kmp-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724426" comment="kernel-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724427" comment="kernel-azure-devel-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724515" comment="kernel-azure-extra-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724516" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724517" comment="kernel-azure-optional-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724428" comment="kernel-devel-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724429" comment="kernel-source-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724430" comment="kernel-syms-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724518" comment="kselftests-kmp-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724519" comment="ocfs2-kmp-azure-5.3.18-150300.38.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724520" comment="reiserfs-kmp-azure-5.3.18-150300.38.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52992" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202937" ref_url="https://bugzilla.suse.com/1202937" source="BUGZILLA"/>
		<reference ref_id="1204696" ref_url="https://bugzilla.suse.com/1204696" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31256" ref_url="https://www.suse.com/security/cve/CVE-2022-31256/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012839.html" source="SUSE-SU"/>
		<description>
This update for sendmail fixes the following issues:

  - CVE-2022-31256: Fixed mail to root privilege escalation via sm-client.pre script (bsc#1204696, bsc#1202937).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202937">SUSE bug 1202937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204696">SUSE bug 1204696</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31256/">CVE-2022-31256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721946" comment="libmilter-doc-8.15.2-150000.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721887" comment="libmilter1_0-8.15.2-150000.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721894" comment="rmail-8.15.2-150000.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721947" comment="sendmail-8.15.2-150000.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721948" comment="sendmail-devel-8.15.2-150000.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721949" comment="sendmail-starttls-8.15.2-150000.8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52993" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185448" ref_url="https://bugzilla.suse.com/1185448" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3522" ref_url="https://www.suse.com/security/cve/CVE-2021-3522/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012843.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2021-3522: Fixed ID3v2 tag frame size check and potential invalid reads (bsc#1185448).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185448">SUSE bug 1185448</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3522/">CVE-2021-3522</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710495" comment="gstreamer-plugins-base-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710590" comment="gstreamer-plugins-base-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710496" comment="gstreamer-plugins-base-devel-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710591" comment="gstreamer-plugins-base-devel-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710592" comment="gstreamer-plugins-base-doc-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710497" comment="gstreamer-plugins-base-lang-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710498" comment="libgstallocators-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710593" comment="libgstallocators-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710499" comment="libgstapp-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710594" comment="libgstapp-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710500" comment="libgstaudio-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710535" comment="libgstaudio-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710501" comment="libgstfft-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710595" comment="libgstfft-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710502" comment="libgstgl-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710596" comment="libgstgl-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710503" comment="libgstpbutils-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710597" comment="libgstpbutils-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710504" comment="libgstriff-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710598" comment="libgstriff-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710505" comment="libgstrtp-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710599" comment="libgstrtp-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710506" comment="libgstrtsp-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710600" comment="libgstrtsp-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710507" comment="libgstsdp-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710601" comment="libgstsdp-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710508" comment="libgsttag-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710536" comment="libgsttag-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710509" comment="libgstvideo-1_0-0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710537" comment="libgstvideo-1_0-0-32bit-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710510" comment="typelib-1_0-GstAllocators-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710511" comment="typelib-1_0-GstApp-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710512" comment="typelib-1_0-GstAudio-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710513" comment="typelib-1_0-GstGL-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710514" comment="typelib-1_0-GstPbutils-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710515" comment="typelib-1_0-GstRtp-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710516" comment="typelib-1_0-GstRtsp-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710517" comment="typelib-1_0-GstSdp-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710518" comment="typelib-1_0-GstTag-1_0-1.16.3-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710519" comment="typelib-1_0-GstVideo-1_0-1.16.3-150200.4.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52994" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204708" ref_url="https://bugzilla.suse.com/1204708" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012847.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

  - CVE-2022-43680: Fixed use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (bsc#1204708).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204708">SUSE bug 1204708</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721888" comment="expat-2.2.5-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721889" comment="libexpat-devel-2.2.5-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721950" comment="libexpat-devel-32bit-2.2.5-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721890" comment="libexpat1-2.2.5-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721891" comment="libexpat1-32bit-2.2.5-150000.3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52995" version="1" class="patch">
	<metadata>
		<title>Security update for vsftpd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196918" ref_url="https://bugzilla.suse.com/1196918" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012846.html" source="SUSE-SU"/>
		<description>
This update for vsftpd fixes the following issues:

  Bugfixes:

  - Removed unsupported systemd hardening options (bsc#1196918).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196918">SUSE bug 1196918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717507" comment="vsftpd-3.0.5-150200.12.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52996" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="SUSE-SU-2022:3919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012852.html" source="SUSE-SU"/>
		<description>

This update rebuilds the kubevirt stack to include recent security updates in its basecontainers.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722314" comment="kubevirt-container-disk-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722264" comment="kubevirt-manifests-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722315" comment="kubevirt-tests-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722316" comment="kubevirt-virt-api-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722317" comment="kubevirt-virt-controller-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722318" comment="kubevirt-virt-handler-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722319" comment="kubevirt-virt-launcher-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722320" comment="kubevirt-virt-operator-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722265" comment="kubevirt-virtctl-0.49.0-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722321" comment="obs-service-kubevirt_containers_meta-0.49.0-150300.8.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52997" version="1" class="patch">
	<metadata>
		<title>Security update for containerized data importer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="SUSE-SU-2022:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012851.html" source="SUSE-SU"/>
		<description>

This update of containerized data importer images rebases the containers
against the current base images to resolve security issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-08"/>
	<updated date="2022-11-08"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722490" comment="containerized-data-importer-api-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722491" comment="containerized-data-importer-cloner-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722492" comment="containerized-data-importer-controller-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722493" comment="containerized-data-importer-importer-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722466" comment="containerized-data-importer-manifests-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722494" comment="containerized-data-importer-operator-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722495" comment="containerized-data-importer-uploadproxy-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722496" comment="containerized-data-importer-uploadserver-1.43.2-150300.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722497" comment="obs-service-cdi_containers_meta-1.43.2-150300.8.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52998" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194530" ref_url="https://bugzilla.suse.com/1194530" source="BUGZILLA"/>
		<reference ref_id="1203681" ref_url="https://bugzilla.suse.com/1203681" source="BUGZILLA"/>
		<reference ref_id="1204256" ref_url="https://bugzilla.suse.com/1204256" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22569" ref_url="https://www.suse.com/security/cve/CVE-2021-22569/" source="CVE"/>
		<reference ref_id="CVE-2022-1941" ref_url="https://www.suse.com/security/cve/CVE-2022-1941/" source="CVE"/>
		<reference ref_id="CVE-2022-3171" ref_url="https://www.suse.com/security/cve/CVE-2022-3171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012857.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2021-22569: Fixed Denial of Service in protobuf-java in the parsing procedure for binary data (bsc#1194530).
- CVE-2022-1941: Fix a potential DoS issue in protobuf-cpp and protobuf-python (bsc#1203681)
- CVE-2022-3171: Fix a potential DoS issue when parsing with binary data in protobuf-java (bsc#1204256)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-09"/>
	<updated date="2022-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194530">SUSE bug 1194530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203681">SUSE bug 1203681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204256">SUSE bug 1204256</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22569/">CVE-2021-22569</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1941/">CVE-2022-1941</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3171/">CVE-2022-3171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721519" comment="libprotobuf-lite20-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721678" comment="libprotobuf-lite20-32bit-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721520" comment="libprotobuf20-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721679" comment="libprotobuf20-32bit-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721553" comment="libprotoc20-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721680" comment="libprotoc20-32bit-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721554" comment="protobuf-devel-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721681" comment="protobuf-java-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721682" comment="protobuf-source-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721576" comment="python2-protobuf-3.9.2-150200.4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721577" comment="python3-protobuf-3.9.2-150200.4.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52999" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204455" ref_url="https://bugzilla.suse.com/1204455" source="BUGZILLA"/>
		<reference ref_id="1204456" ref_url="https://bugzilla.suse.com/1204456" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012868.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

  - CVE-2022-39260: Fixed overflow in split_cmdline() (bsc#1204456).
  - CVE-2022-39253: Fixed dereference issue with symbolic links via the `--local` clone mechanism (bsc#1204455).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204455">SUSE bug 1204455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204456">SUSE bug 1204456</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721557" comment="git-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721558" comment="git-arch-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721538" comment="git-core-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721790" comment="git-credential-gnome-keyring-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721791" comment="git-credential-libsecret-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721559" comment="git-cvs-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721560" comment="git-daemon-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721561" comment="git-doc-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721562" comment="git-email-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721563" comment="git-gui-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721792" comment="git-p4-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721564" comment="git-svn-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721565" comment="git-web-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721566" comment="gitk-2.35.3-150300.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721539" comment="perl-Git-2.35.3-150300.10.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53000" version="1" class="patch">
	<metadata>
		<title>Security update for python-rsa (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178676" ref_url="https://bugzilla.suse.com/1178676" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25658" ref_url="https://www.suse.com/security/cve/CVE-2020-25658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012870.html" source="SUSE-SU"/>
		<description>
This update for python-rsa fixes the following issues:

  - CVE-2020-25658: Fixed bleichenbacher timing oracle attack against RSA decryption (bsc#1178676).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178676">SUSE bug 1178676</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25658/">CVE-2020-25658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719096" comment="python2-rsa-3.4.2-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721522" comment="python3-rsa-3.4.2-150000.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53001" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192426" ref_url="https://bugzilla.suse.com/1192426" source="BUGZILLA"/>
		<reference ref_id="1192427" ref_url="https://bugzilla.suse.com/1192427" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31566" ref_url="https://www.suse.com/security/cve/CVE-2021-31566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026106.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

  - CVE-2021-31566: Fixed incorrect usage of file flags (bsc#1192426).
  - Fixed issues where postprocessing alters symlink targets instead of actual file (bsc#1192427).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-10"/>
	<updated date="2022-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192426">SUSE bug 1192426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192427">SUSE bug 1192427</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-31566/">CVE-2021-31566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721556" comment="bsdtar-3.4.2-150200.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721536" comment="libarchive-devel-3.4.2-150200.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721537" comment="libarchive13-3.4.2-150200.4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721708" comment="libarchive13-32bit-3.4.2-150200.4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53002" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1193923" ref_url="https://bugzilla.suse.com/1193923" source="BUGZILLA"/>
		<reference ref_id="1203806" ref_url="https://bugzilla.suse.com/1203806" source="BUGZILLA"/>
		<reference ref_id="1203807" ref_url="https://bugzilla.suse.com/1203807" source="BUGZILLA"/>
		<reference ref_id="1204482" ref_url="https://bugzilla.suse.com/1204482" source="BUGZILLA"/>
		<reference ref_id="1204485" ref_url="https://bugzilla.suse.com/1204485" source="BUGZILLA"/>
		<reference ref_id="1204487" ref_url="https://bugzilla.suse.com/1204487" source="BUGZILLA"/>
		<reference ref_id="1204488" ref_url="https://bugzilla.suse.com/1204488" source="BUGZILLA"/>
		<reference ref_id="1204489" ref_url="https://bugzilla.suse.com/1204489" source="BUGZILLA"/>
		<reference ref_id="1204490" ref_url="https://bugzilla.suse.com/1204490" source="BUGZILLA"/>
		<reference ref_id="1204494" ref_url="https://bugzilla.suse.com/1204494" source="BUGZILLA"/>
		<reference ref_id="1204496" ref_url="https://bugzilla.suse.com/1204496" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33746" ref_url="https://www.suse.com/security/cve/CVE-2022-33746/" source="CVE"/>
		<reference ref_id="CVE-2022-33747" ref_url="https://www.suse.com/security/cve/CVE-2022-33747/" source="CVE"/>
		<reference ref_id="CVE-2022-33748" ref_url="https://www.suse.com/security/cve/CVE-2022-33748/" source="CVE"/>
		<reference ref_id="CVE-2022-42309" ref_url="https://www.suse.com/security/cve/CVE-2022-42309/" source="CVE"/>
		<reference ref_id="CVE-2022-42310" ref_url="https://www.suse.com/security/cve/CVE-2022-42310/" source="CVE"/>
		<reference ref_id="CVE-2022-42311" ref_url="https://www.suse.com/security/cve/CVE-2022-42311/" source="CVE"/>
		<reference ref_id="CVE-2022-42312" ref_url="https://www.suse.com/security/cve/CVE-2022-42312/" source="CVE"/>
		<reference ref_id="CVE-2022-42313" ref_url="https://www.suse.com/security/cve/CVE-2022-42313/" source="CVE"/>
		<reference ref_id="CVE-2022-42314" ref_url="https://www.suse.com/security/cve/CVE-2022-42314/" source="CVE"/>
		<reference ref_id="CVE-2022-42315" ref_url="https://www.suse.com/security/cve/CVE-2022-42315/" source="CVE"/>
		<reference ref_id="CVE-2022-42316" ref_url="https://www.suse.com/security/cve/CVE-2022-42316/" source="CVE"/>
		<reference ref_id="CVE-2022-42317" ref_url="https://www.suse.com/security/cve/CVE-2022-42317/" source="CVE"/>
		<reference ref_id="CVE-2022-42318" ref_url="https://www.suse.com/security/cve/CVE-2022-42318/" source="CVE"/>
		<reference ref_id="CVE-2022-42319" ref_url="https://www.suse.com/security/cve/CVE-2022-42319/" source="CVE"/>
		<reference ref_id="CVE-2022-42320" ref_url="https://www.suse.com/security/cve/CVE-2022-42320/" source="CVE"/>
		<reference ref_id="CVE-2022-42321" ref_url="https://www.suse.com/security/cve/CVE-2022-42321/" source="CVE"/>
		<reference ref_id="CVE-2022-42322" ref_url="https://www.suse.com/security/cve/CVE-2022-42322/" source="CVE"/>
		<reference ref_id="CVE-2022-42323" ref_url="https://www.suse.com/security/cve/CVE-2022-42323/" source="CVE"/>
		<reference ref_id="CVE-2022-42325" ref_url="https://www.suse.com/security/cve/CVE-2022-42325/" source="CVE"/>
		<reference ref_id="CVE-2022-42326" ref_url="https://www.suse.com/security/cve/CVE-2022-42326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012906.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806)
- CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807)
- CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)
- CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)
- CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)
- CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488)
- CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)
- CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)
- CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)
- CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitrary number of nodes via transactions (bsc#1204496)
- xen: Frontends vulnerable to backends (bsc#1193923)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193923">SUSE bug 1193923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203806">SUSE bug 1203806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203807">SUSE bug 1203807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204482">SUSE bug 1204482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204485">SUSE bug 1204485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204487">SUSE bug 1204487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204488">SUSE bug 1204488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204489">SUSE bug 1204489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204490">SUSE bug 1204490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204494">SUSE bug 1204494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204496">SUSE bug 1204496</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33746/">CVE-2022-33746</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-33747/">CVE-2022-33747</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33748/">CVE-2022-33748</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42309/">CVE-2022-42309</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42310/">CVE-2022-42310</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42311/">CVE-2022-42311</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42312/">CVE-2022-42312</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42313/">CVE-2022-42313</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42314/">CVE-2022-42314</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42315/">CVE-2022-42315</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42316/">CVE-2022-42316</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42317/">CVE-2022-42317</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42318/">CVE-2022-42318</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42319/">CVE-2022-42319</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42320/">CVE-2022-42320</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42321/">CVE-2022-42321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42322/">CVE-2022-42322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42323/">CVE-2022-42323</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42325/">CVE-2022-42325</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42326/">CVE-2022-42326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725117" comment="xen-4.14.5_08-150300.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725118" comment="xen-devel-4.14.5_08-150300.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725119" comment="xen-doc-html-4.14.5_08-150300.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725120" comment="xen-libs-4.14.5_08-150300.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725121" comment="xen-libs-32bit-4.14.5_08-150300.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725122" comment="xen-tools-4.14.5_08-150300.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725123" comment="xen-tools-domU-4.14.5_08-150300.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724898" comment="xen-tools-xendomains-wait-disk-4.14.5_08-150300.3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53003" version="1" class="patch">
	<metadata>
		<title>Security update for rustup (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194119" ref_url="https://bugzilla.suse.com/1194119" source="BUGZILLA"/>
		<reference ref_id="1196972" ref_url="https://bugzilla.suse.com/1196972" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012900.html" source="SUSE-SU"/>
		<description>
This update for rustup fixes the following issues:

Updated to version 1.25.1~0:
  - CVE-2022-24713: Fixed Regex denial of service (bsc#1196972).
  - CVE-2021-45710: Fixed tokio data race with memory corruption (bsc#1194119).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194119">SUSE bug 1194119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196972">SUSE bug 1196972</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716214" comment="rustup-1.25.1~0-150300.7.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53004" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195387" ref_url="https://bugzilla.suse.com/1195387" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24130" ref_url="https://www.suse.com/security/cve/CVE-2022-24130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012901.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

  - CVE-2022-24130: Fixed buffer overflow in set_sixel when Sixel support is enabled (bsc#1195387).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195387">SUSE bug 1195387</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24130/">CVE-2022-24130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721534" comment="xterm-330-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721535" comment="xterm-bin-330-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53005" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200102" ref_url="https://bugzilla.suse.com/1200102" source="BUGZILLA"/>
		<reference ref_id="1202803" ref_url="https://bugzilla.suse.com/1202803" source="BUGZILLA"/>
		<reference ref_id="1202976" ref_url="https://bugzilla.suse.com/1202976" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1615" ref_url="https://www.suse.com/security/cve/CVE-2022-1615/" source="CVE"/>
		<reference ref_id="CVE-2022-32743" ref_url="https://www.suse.com/security/cve/CVE-2022-32743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012905.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2022-1615: Fixed error handling in random number generation (bso#15103)(bsc#1202976).
- CVE-2022-32743: Implement validated dnsHostName write rights (bso#14833)(bsc#1202803).

Bugfixes:

- Fixed use after free when iterating smbd_server_connection-&gt;connections after tree disconnect failure (bso#15128)(bsc#1200102).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-11"/>
	<updated date="2022-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200102">SUSE bug 1200102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202803">SUSE bug 1202803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202976">SUSE bug 1202976</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1615/">CVE-2022-1615</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32743/">CVE-2022-32743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709694" comment="ctdb-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709814" comment="ctdb-pcp-pmda-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709665" comment="libsamba-policy-devel-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709666" comment="libsamba-policy-python3-devel-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709667" comment="libsamba-policy0-python3-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709815" comment="libsamba-policy0-python3-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709816" comment="libsamba-policy0-python3-64bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709668" comment="samba-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709693" comment="samba-ad-dc-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709669" comment="samba-ad-dc-libs-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709670" comment="samba-ad-dc-libs-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709671" comment="samba-ceph-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709672" comment="samba-client-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709673" comment="samba-client-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709817" comment="samba-client-64bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709674" comment="samba-client-libs-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709675" comment="samba-client-libs-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709676" comment="samba-devel-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709677" comment="samba-devel-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709818" comment="samba-doc-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709678" comment="samba-dsdb-modules-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709679" comment="samba-gpupdate-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709680" comment="samba-ldb-ldap-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709681" comment="samba-libs-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709682" comment="samba-libs-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709819" comment="samba-libs-64bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709683" comment="samba-libs-python3-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709820" comment="samba-libs-python3-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709821" comment="samba-libs-python3-64bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709684" comment="samba-python3-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709822" comment="samba-test-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709685" comment="samba-tool-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709686" comment="samba-winbind-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709687" comment="samba-winbind-libs-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709688" comment="samba-winbind-libs-32bit-4.15.8+git.527.8d0c05d313e-150300.3.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53006" version="1" class="patch">
	<metadata>
		<title>Security update for python-Mako (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203246" ref_url="https://bugzilla.suse.com/1203246" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012921.html" source="SUSE-SU"/>
		<description>
This update for python-Mako fixes the following issues:

  - CVE-2022-40023: Fixed regular expression Denial of Service when using the Lexer class to parse (bsc#1203246).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203246">SUSE bug 1203246</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717043" comment="python2-Mako-1.0.7-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717038" comment="python3-Mako-1.0.7-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53007" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188859" ref_url="https://bugzilla.suse.com/1188859" source="BUGZILLA"/>
		<reference ref_id="1192394" ref_url="https://bugzilla.suse.com/1192394" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3658" ref_url="https://www.suse.com/security/cve/CVE-2021-3658/" source="CVE"/>
		<reference ref_id="CVE-2021-43400" ref_url="https://www.suse.com/security/cve/CVE-2021-43400/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012918.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

  - CVE-2021-43400: Fixed use-after-free in gatt-database.c (bsc#1192394).
  - CVE-2021-3658: Fixed adapter incorrectly restoring discoverable state after powered down (bsc#1188859).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188859">SUSE bug 1188859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192394">SUSE bug 1192394</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3658/">CVE-2021-3658</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43400/">CVE-2021-43400</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721523" comment="bluez-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721685" comment="bluez-auto-enable-devices-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721686" comment="bluez-cups-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721524" comment="bluez-deprecated-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718726" comment="bluez-devel-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721687" comment="bluez-devel-32bit-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721688" comment="bluez-test-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721525" comment="libbluetooth3-5.55-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721689" comment="libbluetooth3-32bit-5.55-150300.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53008" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204257" ref_url="https://bugzilla.suse.com/1204257" source="BUGZILLA"/>
		<reference ref_id="1204258" ref_url="https://bugzilla.suse.com/1204258" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39282" ref_url="https://www.suse.com/security/cve/CVE-2022-39282/" source="CVE"/>
		<reference ref_id="CVE-2022-39283" ref_url="https://www.suse.com/security/cve/CVE-2022-39283/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012919.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2022-39282: Fix to init data read by `/parallel` command line switch. (bsc#1204258)
- CVE-2022-39283: Fix to prevent video channel from reading uninitialized data. (bsc#1204257)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204257">SUSE bug 1204257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204258">SUSE bug 1204258</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39282/">CVE-2022-39282</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39283/">CVE-2022-39283</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721690" comment="freerdp-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721691" comment="freerdp-devel-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721692" comment="freerdp-proxy-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721693" comment="freerdp-server-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721694" comment="freerdp-wayland-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721695" comment="libfreerdp2-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721696" comment="libuwac0-0-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721697" comment="libwinpr2-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721698" comment="uwac0-0-devel-2.1.2-150200.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721699" comment="winpr2-devel-2.1.2-150200.15.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53009" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204422" ref_url="https://bugzilla.suse.com/1204422" source="BUGZILLA"/>
		<reference ref_id="1204425" ref_url="https://bugzilla.suse.com/1204425" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3554" ref_url="https://www.suse.com/security/cve/CVE-2022-3554/" source="CVE"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012923.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

  - CVE-2022-3554: Fixed memory leak in XRegisterIMInstantiateCallback() (bsc#1204422).
  - CVE-2022-3555: Fixed memory leak in _XFreeX11XCBStructure() (bsc#1204425).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204422">SUSE bug 1204422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3554/">CVE-2022-3554</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721526" comment="libX11-6-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721527" comment="libX11-6-32bit-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721528" comment="libX11-data-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721529" comment="libX11-devel-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721703" comment="libX11-devel-32bit-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721530" comment="libX11-xcb1-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721531" comment="libX11-xcb1-32bit-1.6.5-150000.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53010" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203106" ref_url="https://bugzilla.suse.com/1203106" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29260" ref_url="https://www.suse.com/security/cve/CVE-2020-29260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012926.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-29260: Fixed memory leakage via rfbClientCleanup() (bsc#1203106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203106">SUSE bug 1203106</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29260/">CVE-2020-29260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710410" comment="LibVNCServer-devel-0.9.10-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710411" comment="libvncclient0-0.9.10-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710251" comment="libvncserver0-0.9.10-150000.4.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53011" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203988" ref_url="https://bugzilla.suse.com/1203988" source="BUGZILLA"/>
		<reference ref_id="1203989" ref_url="https://bugzilla.suse.com/1203989" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928/" source="CVE"/>
		<reference ref_id="CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012925.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

  - CVE-2022-2928: Fixed an option refcount overflow (bsc#1203988).
  - CVE-2022-2929: Fixed a DHCP memory leak (bsc#1203989).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203988">SUSE bug 1203988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203989">SUSE bug 1203989</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725348" comment="dhcp-4.3.6.P1-150000.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725349" comment="dhcp-client-4.3.6.P1-150000.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725350" comment="dhcp-devel-4.3.6.P1-150000.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725351" comment="dhcp-doc-4.3.6.P1-150000.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725352" comment="dhcp-relay-4.3.6.P1-150000.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725353" comment="dhcp-server-4.3.6.P1-150000.6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53012" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204369" ref_url="https://bugzilla.suse.com/1204369" source="BUGZILLA"/>
		<reference ref_id="1204370" ref_url="https://bugzilla.suse.com/1204370" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42003" ref_url="https://www.suse.com/security/cve/CVE-2022-42003/" source="CVE"/>
		<reference ref_id="CVE-2022-42004" ref_url="https://www.suse.com/security/cve/CVE-2022-42004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012934.html" source="SUSE-SU"/>
		<description>
This update for jackson-databind fixes the following issues:

  Update to version 2.13.4.2:

  - CVE-2022-42003: Fixed missing check in primitive value deserializers to avoid deep wrapper array nesting wrt 'UNWRAP_SINGLE_VALUE_ARRAYS' (bsc#1204370).
  - CVE-2022-42004: Fixed missing check in 'BeanDeserializer._deserializeFromArray()' to prevent use of deeply nested arrays (bsc#1204369).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-15"/>
	<updated date="2022-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204369">SUSE bug 1204369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204370">SUSE bug 1204370</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42003/">CVE-2022-42003</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42004/">CVE-2022-42004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718372" comment="jackson-databind-2.13.4.2-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718373" comment="jackson-databind-javadoc-2.13.4.2-150200.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53013" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190587" ref_url="https://bugzilla.suse.com/1190587" source="BUGZILLA"/>
		<reference ref_id="1190839" ref_url="https://bugzilla.suse.com/1190839" source="BUGZILLA"/>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PH3Q2TLVW235XFTNU2563GON62BFYPLP/" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container fixes the following issues:

- CVE-2021-43565: Fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. (bsc#1193930)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-10"/>
	<updated date="2022-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190587">SUSE bug 1190587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190839">SUSE bug 1190839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661893" comment="kubevirt-container-disk-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661857" comment="kubevirt-manifests-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661894" comment="kubevirt-tests-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661895" comment="kubevirt-virt-api-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661896" comment="kubevirt-virt-controller-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661897" comment="kubevirt-virt-handler-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661898" comment="kubevirt-virt-launcher-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661899" comment="kubevirt-virt-operator-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661858" comment="kubevirt-virtctl-0.45.0-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661900" comment="obs-service-kubevirt_containers_meta-0.45.0-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53014" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203459" ref_url="https://bugzilla.suse.com/1203459" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36033" ref_url="https://www.suse.com/security/cve/CVE-2022-36033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012941.html" source="SUSE-SU"/>
		<description>
This update for jsoup fixes the following issues:

  Updated to version 1.15.3:

  - CVE-2022-36033: Fixed incorrect sanitization of user input in SafeList.preserveRelativeLinks (bsc#1203459).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2022-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203459">SUSE bug 1203459</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36033/">CVE-2022-36033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009718376" comment="jsoup-1.15.3-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009718659" comment="jsoup-javadoc-1.15.3-150200.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53015" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-nokogiri (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198408" ref_url="https://bugzilla.suse.com/1198408" source="BUGZILLA"/>
		<reference ref_id="1199782" ref_url="https://bugzilla.suse.com/1199782" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24836" ref_url="https://www.suse.com/security/cve/CVE-2022-24836/" source="CVE"/>
		<reference ref_id="CVE-2022-29181" ref_url="https://www.suse.com/security/cve/CVE-2022-29181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012945.html" source="SUSE-SU"/>
		<description>
This update for rubygem-nokogiri fixes the following issues:

- CVE-2022-24836: Fixes possibility to DoS because of inefficient RE in HTML encoding. (bsc#1198408)
- CVE-2022-29181: Fixes Improper Handling of Unexpected Data Typesi. (bsc#1199782)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2022-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198408">SUSE bug 1198408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199782">SUSE bug 1199782</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24836/">CVE-2022-24836</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29181/">CVE-2022-29181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722263" comment="ruby2.5-rubygem-nokogiri-1.8.5-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722312" comment="ruby2.5-rubygem-nokogiri-doc-1.8.5-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722313" comment="ruby2.5-rubygem-nokogiri-testsuite-1.8.5-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53016" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-cryptography-vectors (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1176785" ref_url="https://bugzilla.suse.com/1176785" source="BUGZILLA"/>
		<reference ref_id="1177083" ref_url="https://bugzilla.suse.com/1177083" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012962.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography, python-cryptography-vectors fixes the following issues:

- Update in SLE-15 (bsc#1177083, jsc#PM-2730, jsc#SLE-18312)
- Refresh patches for new version
- Update in SLE-15 (bsc#1176785, jsc#ECO-3105, jsc#PM-2352)
- update to 2.9.2
  * 2.9.2 - 2020-04-22
    - Updated the macOS wheel to fix an issue where it would not run on macOS versions older than 10.15.
  * 2.9.1 - 2020-04-21
    - Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1g.
  * 2.9 - 2020-04-02
    - BACKWARDS INCOMPATIBLE: Support for Python 3.4 has been removed due to
      low usage and maintenance burden.
    - BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.0.1 has been removed.
      Users on older version of OpenSSL will need to upgrade.
    - BACKWARDS INCOMPATIBLE: Support for LibreSSL 2.6.x has been removed.
    - Removed support for calling public_bytes() with no arguments, as per 
      our deprecation policy. You must now pass encoding and format.
    - BACKWARDS INCOMPATIBLE: Reversed the order in which rfc4514_string()
      returns the RDNs as required by RFC 4514.
    - Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1f.
    - Added support for parsing single_extensions in an OCSP response.
    - NameAttribute values can now be empty strings.

- Add openSSL_111d.patch to make this version of the package
  compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API
- Update in SLE-15 (bsc#1177083, jsc#PM-2730, jsc#SLE-18312)
- Include in SLE-15 (bsc#1176785, jsc#ECO-3105, jsc#PM-2352)
- update to 2.9.2:
  * updated vectors for the cryptography 2.9.2 testing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176785">SUSE bug 1176785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177083">SUSE bug 1177083</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009719776" comment="python2-cryptography-2.9.2-150200.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721683" comment="python2-cryptography-vectors-2.9.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721521" comment="python3-cryptography-2.9.2-150200.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721684" comment="python3-cryptography-vectors-2.9.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53017" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1032323" ref_url="https://bugzilla.suse.com/1032323" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1198702" ref_url="https://bugzilla.suse.com/1198702" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1200788" ref_url="https://bugzilla.suse.com/1200788" source="BUGZILLA"/>
		<reference ref_id="1201725" ref_url="https://bugzilla.suse.com/1201725" source="BUGZILLA"/>
		<reference ref_id="1202638" ref_url="https://bugzilla.suse.com/1202638" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1202700" ref_url="https://bugzilla.suse.com/1202700" source="BUGZILLA"/>
		<reference ref_id="1203066" ref_url="https://bugzilla.suse.com/1203066" source="BUGZILLA"/>
		<reference ref_id="1203098" ref_url="https://bugzilla.suse.com/1203098" source="BUGZILLA"/>
		<reference ref_id="1203387" ref_url="https://bugzilla.suse.com/1203387" source="BUGZILLA"/>
		<reference ref_id="1203391" ref_url="https://bugzilla.suse.com/1203391" source="BUGZILLA"/>
		<reference ref_id="1203496" ref_url="https://bugzilla.suse.com/1203496" source="BUGZILLA"/>
		<reference ref_id="1203802" ref_url="https://bugzilla.suse.com/1203802" source="BUGZILLA"/>
		<reference ref_id="1204053" ref_url="https://bugzilla.suse.com/1204053" source="BUGZILLA"/>
		<reference ref_id="1204166" ref_url="https://bugzilla.suse.com/1204166" source="BUGZILLA"/>
		<reference ref_id="1204168" ref_url="https://bugzilla.suse.com/1204168" source="BUGZILLA"/>
		<reference ref_id="1204354" ref_url="https://bugzilla.suse.com/1204354" source="BUGZILLA"/>
		<reference ref_id="1204355" ref_url="https://bugzilla.suse.com/1204355" source="BUGZILLA"/>
		<reference ref_id="1204382" ref_url="https://bugzilla.suse.com/1204382" source="BUGZILLA"/>
		<reference ref_id="1204402" ref_url="https://bugzilla.suse.com/1204402" source="BUGZILLA"/>
		<reference ref_id="1204415" ref_url="https://bugzilla.suse.com/1204415" source="BUGZILLA"/>
		<reference ref_id="1204417" ref_url="https://bugzilla.suse.com/1204417" source="BUGZILLA"/>
		<reference ref_id="1204431" ref_url="https://bugzilla.suse.com/1204431" source="BUGZILLA"/>
		<reference ref_id="1204439" ref_url="https://bugzilla.suse.com/1204439" source="BUGZILLA"/>
		<reference ref_id="1204470" ref_url="https://bugzilla.suse.com/1204470" source="BUGZILLA"/>
		<reference ref_id="1204479" ref_url="https://bugzilla.suse.com/1204479" source="BUGZILLA"/>
		<reference ref_id="1204574" ref_url="https://bugzilla.suse.com/1204574" source="BUGZILLA"/>
		<reference ref_id="1204575" ref_url="https://bugzilla.suse.com/1204575" source="BUGZILLA"/>
		<reference ref_id="1204619" ref_url="https://bugzilla.suse.com/1204619" source="BUGZILLA"/>
		<reference ref_id="1204635" ref_url="https://bugzilla.suse.com/1204635" source="BUGZILLA"/>
		<reference ref_id="1204637" ref_url="https://bugzilla.suse.com/1204637" source="BUGZILLA"/>
		<reference ref_id="1204646" ref_url="https://bugzilla.suse.com/1204646" source="BUGZILLA"/>
		<reference ref_id="1204647" ref_url="https://bugzilla.suse.com/1204647" source="BUGZILLA"/>
		<reference ref_id="1204653" ref_url="https://bugzilla.suse.com/1204653" source="BUGZILLA"/>
		<reference ref_id="1204728" ref_url="https://bugzilla.suse.com/1204728" source="BUGZILLA"/>
		<reference ref_id="1204753" ref_url="https://bugzilla.suse.com/1204753" source="BUGZILLA"/>
		<reference ref_id="1204754" ref_url="https://bugzilla.suse.com/1204754" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037/" source="CVE"/>
		<reference ref_id="CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978/" source="CVE"/>
		<reference ref_id="CVE-2022-3176" ref_url="https://www.suse.com/security/cve/CVE-2022-3176/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3521" ref_url="https://www.suse.com/security/cve/CVE-2022-3521/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3535" ref_url="https://www.suse.com/security/cve/CVE-2022-3535/" source="CVE"/>
		<reference ref_id="CVE-2022-3542" ref_url="https://www.suse.com/security/cve/CVE-2022-3542/" source="CVE"/>
		<reference ref_id="CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3577" ref_url="https://www.suse.com/security/cve/CVE-2022-3577/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625/" source="CVE"/>
		<reference ref_id="CVE-2022-3629" ref_url="https://www.suse.com/security/cve/CVE-2022-3629/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).
- CVE-2022-2153: Fixed vulnerability in KVM that could allow an unprivileged local attacker on the host to cause DoS (bnc#1200788).
- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bnc#1202686).
- CVE-2022-2978: Fixed use-after-free in the NILFS file system that could lead to local privilege escalation or DoS (bnc#1202700).
- CVE-2022-3176: Fixed use-after-free in io_uring when using POLLFREE (bnc#1203391).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).
- CVE-2022-3521: Fixed race condition in kcm_tx_work() in net/kcm/kcmsock.c (bnc#1204355).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bnc#1204354).
- CVE-2022-3535: Fixed memory leak in mvpp2_dbgfs_port_init() in drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bnc#1204417).
- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402).
- CVE-2022-3545: Fixed use-after-free in area_cache_get() in drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).
- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bnc#1204431).
- CVE-2022-3577: Fixed out-of-bounds memory write flaw in bigben device driver that could lead to local privilege escalation or DoS (bnc#1204470).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bnc#1204439).
- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bnc#1204479).
- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bnc#1204574).
- CVE-2022-3625: Fixed use-after-free in devlink_param_set()/devlink_param_get() in net/core/devlink.c (bnc#1204637).
- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bnc#1204635).
- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bnc#1204619).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bnc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bnc#1204647).
- CVE-2022-39189: Fixed a flaw in the x86 KVM subsystem that could allow unprivileged guest users to compromise the guest kernel via TLB flush operations on preempted vCPU (bnc#1203066).
- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bnc#1204168).
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bnc#1204653).

The following non-security bugs were fixed:

- ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).
- ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).
- ACPI: extlog: Handle multiple records (git-fixes).
- ACPI: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bnc#1203802).
- ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).
- ALSA: Use del_timer_sync() before freeing timer (git-fixes).
- ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).
- ALSA: aoa: Fix I2S device accounting (git-fixes).
- ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).
- ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).
- ALSA: au88x0: use explicitly signed char (git-fixes).
- ALSA: dmaengine: increment buffer pointer atomically (git-fixes).
- ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).
- ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).
- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).
- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).
- ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).
- ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).
- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).
- ALSA: hda/sigmatel: Keep power up while beep is enabled (git-fixes).
- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).
- ALSA: hda: Fix position reporting on Poulsbo (git-fixes).
- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).
- ALSA: oss: Fix potential deadlock at unregistration (git-fixes).
- ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).
- ALSA: rme9652: use explicitly signed char (git-fixes).
- ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).
- ALSA: usb-audio: Fix potential memory leaks (git-fixes).
- ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).
- ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).
- ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).
- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).
- ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).
- ASoC: tas2770: Reinit regcache on reset (git-fixes).
- ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).
- ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).
- ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).
- ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).
- ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).
- Bluetooth: L2CAP: Fix user-after-free (git-fixes).
- Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).
- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).
- HID: hidraw: fix memory leak in hidraw_release() (git-fixes).
- HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).
- HID: multitouch: Add memory barriers (git-fixes).
- HID: roccat: Fix use-after-free in roccat_read() (git-fixes).
- HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).
- HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).
- IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes)
- IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes)
- IB/core: Only update PKEY and GID caches on respective events (git-fixes)
- IB/hfi1: Adjust pkey entry in index 0 (git-fixes)
- IB/hfi1: Fix abba locking issue with sc_disable() (git-fixes)
- IB/hfi1: Fix possible null-pointer dereference in _extend_sdma_tx_descs() (git-fixes)
- IB/mlx4: Add support for REJ due to timeout (git-fixes)
- IB/mlx4: Use port iterator and validation APIs (git-fixes)
- IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields (git-fixes)
- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)
- IB/srpt: Remove redundant assignment to ret (git-fixes)
- Input: i8042 - fix refount leak on sparc (git-fixes).
- Input: xpad - add supported devices as contributed on github (git-fixes).
- Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).
- KVM: nVMX: Unconditionally purge queued/injected events on nested 'exit' (git-fixes).
- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).
- KVM: s390: VSIE: fix MVPG handling for prefixing and MSO (git-fixes).
- KVM: s390: clear kicked_mask before sleeping again (git-fixes).
- KVM: s390: preserve deliverable_mask in __airqs_kick_single_vcpu (git-fixes).
- KVM: s390: pv: do not present the ecall interrupt twice (git-fixes).
- KVM: s390: split kvm_s390_real_to_abs (git-fixes).
- KVM: s390x: fix SCK locking (git-fixes).
- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).
- PCI: Dynamically map ECAM regions (bsc#1204382).
- PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).
- PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).
- PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).
- PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).
- RDMA/bnxt_re: Add missing spin lock initialization (git-fixes)
- RDMA/bnxt_re: Fix query SRQ failure (git-fixes)
- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)
- RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests (git-fixes)
- RDMA/cma: Fix arguments order in net device validation (git-fixes)
- RDMA/core: Sanitize WQ state received from the userspace (git-fixes)
- RDMA/cxgb4: Remove MW support (git-fixes)
- RDMA/efa: Free IRQ vectors on error flow (git-fixes)
- RDMA/efa: Remove double QP type assignment (git-fixes)
- RDMA/efa: Use ib_umem_num_dma_pages() (git-fixes)
- RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)
- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)
- RDMA/i40iw: Use ib_umem_num_dma_pages() (git-fixes)
- RDMA/iwcm: Release resources if iw_cm module initialization fails (git-fixes)
- RDMA/mlx4: Return missed an error if device does not support steering (git-fixes)
- RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes)
- RDMA/mlx5: Block FDB rules when not in switchdev mode (git-fixes)
- RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes)
- RDMA/mlx5: Make mkeys always owned by the kernel's PD when not enabled (git-fixes)
- RDMA/mlx5: Set user priority for DCT (git-fixes)
- RDMA/mlx5: Use set_mkc_access_pd_addr_fields() in reg_create() (git-fixes)
- RDMA/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes)
- RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)
- RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)
- RDMA/qib: Remove superfluous fallthrough statements (git-fixes)
- RDMA/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)
- RDMA/rxe: Do not overwrite errno from ib_umem_get() (git-fixes)
- RDMA/rxe: Fix 'kernel NULL pointer dereference' error (git-fixes)
- RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)
- RDMA/rxe: Fix extra copies in build_rdma_network_hdr (git-fixes)
- RDMA/rxe: Fix extra copy in prepare_ack_packet (git-fixes)
- RDMA/rxe: Fix failure during driver load (git-fixes)
- RDMA/rxe: Fix over copying in get_srq_wqe (git-fixes)
- RDMA/rxe: Fix redundant call to ip_send_check (git-fixes)
- RDMA/rxe: Fix redundant skb_put_zero (git-fixes)
- RDMA/rxe: Fix rnr retry behavior (git-fixes)
- RDMA/rxe: Fix the error caused by qp-&gt;sk (git-fixes)
- RDMA/rxe: Fix wrong port_cap_flags (git-fixes)
- RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)
- RDMA/rxe: Remove unused pkt-&gt;offset (git-fixes)
- RDMA/rxe: Return CQE error if invalid lkey was supplied (git-fixes)
- RDMA/sa_query: Use strscpy_pad instead of memcpy to copy a string (git-fixes)
- RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)
- RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes)
- RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)
- RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)
- RDMA/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)
- RDMA: Verify port when creating flow rule (git-fixes)
- RDMA: remove useless condition in siw_create_cq() (git-fixes)
- RDMa/mthca: Work around -Wenum-conversion warning (git-fixes)
- Revert 'drivers/video/backlight/platform_lcd.c: add support for (bsc#1152489)
- Revert 'drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time' (git-fixes).
- Revert 'usb: add quirks for Lenovo OneLink+ Dock' (git-fixes).
- Revert 'usb: storage: Add quirk for Samsung Fit flash' (git-fixes).
- Revert 'usb: storage: Add quirk for Samsung Fit flash' (git-fixes).
- USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).
- USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).
- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- USB: serial: option: add Quectel RM520N (git-fixes).
- USB: serial: option: add Quectel RM520N (git-fixes).
- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
- arm64: assembler: add cond_yield macro (git-fixes)
- ata: fix ata_id_has_devslp() (git-fixes).
- ata: fix ata_id_has_dipm() (git-fixes).
- ata: fix ata_id_has_ncq_autosense() (git-fixes).
- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).
- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).
- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).
- can: gs_usb: gs_can_open(): fix race dev-&gt;can.state condition (git-fixes).
- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).
- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).
- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).
- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).
- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).
- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).
- clk: bcm2835: Make peripheral PLLC critical (git-fixes).
- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).
- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).
- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).
- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).
- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).
- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).
- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).
- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).
- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).
- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).
- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).
- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).
- crypto: akcipher - default implementation for setting a private key (git-fixes).
- crypto: arm64/sha - fix function types (git-fixes)
- crypto: arm64/sha1-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha2-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha3-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha512-ce - simplify NEON yield (git-fixes)
- crypto: cavium - prevent integer overflow loading firmware (git-fixes).
- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).
- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).
- device property: Fix documentation for *_match_string() APIs (git-fixes).
- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).
- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).
- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).
- docs: update mediator information in CoC docs (git-fixes).
- drivers: serial: jsm: fix some leaks in probe (git-fixes).
- drm/amd/display: Limit user regamma to a valid value (git-fixes).
- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).
- drm/amdgpu: fix initial connector audio value (git-fixes).
- drm/amdgpu: use dirty framebuffer helper (git-fixes).
- drm/bridge: Avoid uninitialized variable warning (git-fixes).
- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).
- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).
- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).
- drm/mipi-dsi: Detach devices when removing the host (git-fixes).
- drm/msm/dpu: Fix comment typo (git-fixes).
- drm/msm/dpu: index dpu_kms-&gt;hw_vbif using vbif_idx (git-fixes).
- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).
- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).
- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).
- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).
- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).
- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).
- drm/omap: dss: Fix refcount leak bugs (git-fixes).
- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).
- drm/scheduler: quieten kernel-doc warnings (git-fixes).
- drm/udl: Restore display mode on resume (git-fixes).
- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).
- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).
- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).
- drm: fix drm_mipi_dbi build errors (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).
- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).
- dyndbg: fix module.dyndbg handling (git-fixes).
- dyndbg: let query-modname override actual module name (git-fixes).
- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).
- efi: libstub: drop pointless get_memory_map() call (git-fixes).
- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1204053 bsc#1201725).
- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).
- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).
- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).
- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).
- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).
- gpio: rockchip: request GPIO mux to pinctrl when setting direction (git-fixes).
- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).
- hwmon/coretemp: Handle large core ID value (git-fixes).
- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).
- iio: adc: ad7923: fix channel readings for some variants (git-fixes).
- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).
- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).
- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).
- iio: adc: mcp3911: use correct id bits (git-fixes).
- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).
- iio: inkern: only release the device node when done with it (git-fixes).
- iio: light: tsl2583: Fix module unloading (git-fixes).
- iio: pressure: dps310: Refactor startup procedure (git-fixes).
- iio: pressure: dps310: Reset chip after timeout (git-fixes).
- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).
- kABI: arm64/crypto/sha512 Preserve function signature (git-fixes).
- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).
- kbuild: remove the target in signal traps when interrupted (git-fixes).
- kbuild: sink stdout from cmd for silent build (git-fixes).
- kbuild: skip per-CPU BTF generation for pahole v1.18-v1.21 (jsc#SLE-24559).
- kthread: Extract KTHREAD_IS_PER_CPU (bsc#1204753).
- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).
- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).
- locking/csd_lock: Change csdlock_debug from early_param to __setup (git-fixes).
- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).
- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).
- mac802154: Fix LQI recording (git-fixes).
- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).
- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).
- media: cedrus: Set the platform driver data earlier (git-fixes).
- media: coda: Add more H264 levels for CODA960 (git-fixes).
- media: coda: Fix reported H264 profile (git-fixes).
- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).
- media: dvb_vb2: fix possible out of bound access (git-fixes).
- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).
- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced' (git-fixes).
- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).
- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).
- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).
- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).
- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).
- mfd: sm501: Add check for platform_driver_register() (git-fixes).
- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).
- mm, memcg: avoid stale protection values when cgroup is above protection (bsc#1204754).
- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).
- mm: memcontrol: fix occasional OOMs due to proportional memory.low reclaim (bsc#1204754).
- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).
- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).
- mmc: core: Replace with already defined values for readability (git-fixes).
- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).
- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).
- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).
- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).
- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).
- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).
- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).
- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).
- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).
- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).
- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).
- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).
- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).
- openvswitch: switch from WARN to pr_warn (git-fixes).
- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).
- padata: make padata_free_shell() to respect pd's -&gt;refcnt (bsc#1202638).
- parisc/sticon: fix reverse colors (bsc#1152489) Backporting notes: 	* context changes
- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)
- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).
- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).
- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).
- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).
- pinctrl: rockchip: add pinmux_ops.gpio_set_direction callback (git-fixes).
- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).
- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).
- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).
- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).
- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).
- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).
- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).
- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
- powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h (bsc#1065729).
- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).
- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#PED-1931).
- quota: widen timestamps for the fs_disk_quota structure (bsc#1203387).
- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).
- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).
- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).
- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).
- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).
- sbitmap: fix possible io hung due to lost wakeup (git-fixes).
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).
- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).
- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).
- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#PED-1931).
- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).
- serial: Create uart_xmit_advance() (git-fixes).
- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- soc: qcom: smem_state: Add refcounting for the 'state-&gt;of_node' (git-fixes).
- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).
- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).
- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).
- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).
- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).
- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).
- spi: s3c64xx: Fix large transfers with DMA (git-fixes).
- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).
- staging: vt6655: fix potential memory leak (git-fixes).
- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).
- struct pci_config_window kABI workaround (bsc#1204382).
- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).
- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).
- tty/serial: atmel: RS485 &amp; ISO7816: wait for TXRDY before sending data (git-fixes).
- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).
- tty: xilinx_uartps: Fix the ignore_status (git-fixes).
- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
- uas: ignore UAS for Thinkplus chips (git-fixes).
- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: bdc: change state when port disconnected (git-fixes).
- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).
- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).
- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).
- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).
- usb: mon: make mmapped memory read only (git-fixes).
- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).
- usb: typec: ucsi: Remove incorrect warning (git-fixes).
- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).
- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).
- usb: xhci-mtk: add some schedule error number (git-fixes).
- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).
- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).
- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule (git-fixes).
- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).
- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).
- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).
- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).
- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).
- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).
- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).
- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).
- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).
- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).
- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).
- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).
- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).
- wifi: rt2x00: set SoC wmac clock register (git-fixes).
- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).
- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).
- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).
- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).
- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).
- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).
- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).
- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).
- xfs: add missing assert in xfs_fsmap_owner_from_rmap (git-fixes).
- xfs: enable big timestamps (bsc#1203387).
- xfs: enable new inode btree counters feature (bsc#1203387).
- xfs: explicitly define inode timestamp range (bsc#1203387).
- xfs: fix memory corruption during remote attr value buffer invalidation (git-fixes).
- xfs: fix s_maxbytes computation on 32-bit kernels (git-fixes).
- xfs: hoist out xfs_resizefs_init_new_ags() (git-fixes).
- xfs: move incore structures out of xfs_da_format.h (git-fixes).
- xfs: quota: move to time64_t interfaces (bsc#1203387).
- xfs: redefine xfs_ictimestamp_t (bsc#1203387).
- xfs: redefine xfs_timestamp_t (bsc#1203387).
- xfs: refactor remote attr value buffer invalidation (git-fixes).
- xfs: remove obsolete AGF counter debugging (git-fixes).
- xfs: rename `new' to `delta' in xfs_growfs_data_private() (git-fixes).
- xfs: reserve data and rt quota at the same time (bsc#1203496).
- xfs: slightly tweak an assert in xfs_fs_map_blocks (git-fixes).
- xfs: store inode btree block counts in AGI header (bsc#1203387).
- xfs: streamline xfs_attr3_leaf_inactive (git-fixes).
- xfs: use a struct timespec64 for the in-core crtime (bsc#1203387).
- xfs: use the finobt block counts to speed up mount times (bsc#1203387).
- xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387).
- xfs: widen ondisk quota expiration timestamps to handle y2038+ (bsc#1203387).
- xhci: Do not show warning for reinit on known broken suspend (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032323">SUSE bug 1032323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200788">SUSE bug 1200788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201725">SUSE bug 1201725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202638">SUSE bug 1202638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202700">SUSE bug 1202700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203066">SUSE bug 1203066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203098">SUSE bug 1203098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203387">SUSE bug 1203387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203391">SUSE bug 1203391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203496">SUSE bug 1203496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203802">SUSE bug 1203802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204053">SUSE bug 1204053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204168">SUSE bug 1204168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204355">SUSE bug 1204355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204382">SUSE bug 1204382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204402">SUSE bug 1204402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204415">SUSE bug 1204415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204417">SUSE bug 1204417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204439">SUSE bug 1204439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204470">SUSE bug 1204470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204479">SUSE bug 1204479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204574">SUSE bug 1204574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204575">SUSE bug 1204575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204635">SUSE bug 1204635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204637">SUSE bug 1204637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204646">SUSE bug 1204646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204647">SUSE bug 1204647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204728">SUSE bug 1204728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204753">SUSE bug 1204753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204754">SUSE bug 1204754</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3176/">CVE-2022-3176</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3521/">CVE-2022-3521</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3535/">CVE-2022-3535</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3542/">CVE-2022-3542</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3577/">CVE-2022-3577</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3629/">CVE-2022-3629</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724458" comment="cluster-md-kmp-64kb-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724441" comment="cluster-md-kmp-default-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724459" comment="cluster-md-kmp-preempt-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724460" comment="dlm-kmp-64kb-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724442" comment="dlm-kmp-default-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724461" comment="dlm-kmp-preempt-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724336" comment="dtb-al-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724462" comment="dtb-allwinner-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724463" comment="dtb-altera-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724464" comment="dtb-amd-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724465" comment="dtb-amlogic-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724466" comment="dtb-apm-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724467" comment="dtb-arm-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724468" comment="dtb-broadcom-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724469" comment="dtb-cavium-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724470" comment="dtb-exynos-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724471" comment="dtb-freescale-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724472" comment="dtb-hisilicon-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724473" comment="dtb-lg-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724474" comment="dtb-marvell-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724475" comment="dtb-mediatek-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724476" comment="dtb-nvidia-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724477" comment="dtb-qcom-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724478" comment="dtb-renesas-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724479" comment="dtb-rockchip-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724480" comment="dtb-socionext-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724481" comment="dtb-sprd-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724482" comment="dtb-xilinx-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724337" comment="dtb-zte-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724483" comment="gfs2-kmp-64kb-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724443" comment="gfs2-kmp-default-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724484" comment="gfs2-kmp-preempt-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724408" comment="kernel-64kb-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724409" comment="kernel-64kb-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724485" comment="kernel-64kb-extra-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724486" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724487" comment="kernel-64kb-optional-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724488" comment="kernel-debug-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724489" comment="kernel-debug-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724490" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724410" comment="kernel-default-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724411" comment="kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724491" comment="kernel-default-base-rebuild-5.3.18-150300.59.101.1.150300.18.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724412" comment="kernel-default-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724492" comment="kernel-default-extra-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724493" comment="kernel-default-livepatch-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724494" comment="kernel-default-livepatch-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724495" comment="kernel-default-optional-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724413" comment="kernel-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724417" comment="kernel-docs-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724496" comment="kernel-docs-html-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724497" comment="kernel-kvmsmall-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724498" comment="kernel-kvmsmall-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724499" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724414" comment="kernel-macros-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724418" comment="kernel-obs-build-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724500" comment="kernel-obs-qa-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724415" comment="kernel-preempt-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724419" comment="kernel-preempt-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724501" comment="kernel-preempt-extra-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724502" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724503" comment="kernel-preempt-optional-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724420" comment="kernel-source-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724504" comment="kernel-source-vanilla-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724421" comment="kernel-syms-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724416" comment="kernel-zfcpdump-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724505" comment="kselftests-kmp-64kb-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724506" comment="kselftests-kmp-default-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724507" comment="kselftests-kmp-preempt-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724508" comment="ocfs2-kmp-64kb-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724444" comment="ocfs2-kmp-default-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724509" comment="ocfs2-kmp-preempt-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724510" comment="reiserfs-kmp-64kb-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724422" comment="reiserfs-kmp-default-5.3.18-150300.59.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724511" comment="reiserfs-kmp-preempt-5.3.18-150300.59.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53018" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1204941" ref_url="https://bugzilla.suse.com/1204941" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41716" ref_url="https://www.suse.com/security/cve/CVE-2022-41716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012965.html" source="SUSE-SU"/>
		<description>
This update for go1.19 fixes the following issues:

  Update to go 1.19.3 (released 2022-11-01) (bsc#1200441):

  Security fixes:
  - CVE-2022-41716: Fixed unsanitized NUL in environment variables in syscalls, os/exec (go#56327) (bsc#1204941).

  Bugfixes:
  - runtime: lock count' fatal error when cgo is enabled (go#56308).
  - cmd/compile: libFuzzer instrumentation fakePC overflow on 386 arch (go#56168).
  - internal/fuzz: array literal initialization causes ICE 'unhandled stmt ASOP' while fuzzing (go#56106).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204941">SUSE bug 1204941</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41716/">CVE-2022-41716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722595" comment="go1.19-1.19.3-150000.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722596" comment="go1.19-doc-1.19.3-150000.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722597" comment="go1.19-race-1.19.3-150000.1.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53019" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1204941" ref_url="https://bugzilla.suse.com/1204941" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41716" ref_url="https://www.suse.com/security/cve/CVE-2022-41716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012970.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

  Update to go 1.18.8 (released 2022-11-01) (bsc#1193742):
  
  Security fixes:
  - CVE-2022-41716: Fixed unsanitized NUL in environment variables in syscalls, os/exec (go#56327) (bsc#1204941).

  Bugfixes:
  - runtime: lock count' fatal error when cgo is enabled (go#56308).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204941">SUSE bug 1204941</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41716/">CVE-2022-41716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722598" comment="go1.18-1.18.8-150000.1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722599" comment="go1.18-doc-1.18.8-150000.1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722600" comment="go1.18-race-1.18.8-150000.1.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53020" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204179" ref_url="https://bugzilla.suse.com/1204179" source="BUGZILLA"/>
		<reference ref_id="1204968" ref_url="https://bugzilla.suse.com/1204968" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012968.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).

- Import commit 56bee38fd0da18dad5fc5c5d12c02238a22b50e2
  * 8a70235d8a core: Add trigger limit for path units
  * 93e544f3a0 core/mount: also add default before dependency for automount mount units
  * 5916a7748c logind: fix crash in logind on user-specified message string

- Document udev naming scheme (bsc#1204179).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204179">SUSE bug 1204179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204968">SUSE bug 1204968</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009723127" comment="libsystemd0-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723128" comment="libsystemd0-32bit-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723129" comment="libudev-devel-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723296" comment="libudev-devel-32bit-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723130" comment="libudev1-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723131" comment="libudev1-32bit-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723297" comment="nss-myhostname-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723298" comment="nss-myhostname-32bit-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723119" comment="nss-mymachines-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723120" comment="nss-mymachines-32bit-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723121" comment="nss-resolve-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723299" comment="nss-systemd-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723132" comment="systemd-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723133" comment="systemd-32bit-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723134" comment="systemd-container-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723135" comment="systemd-coredump-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723136" comment="systemd-devel-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723137" comment="systemd-doc-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723138" comment="systemd-journal-remote-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723139" comment="systemd-lang-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723122" comment="systemd-logger-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723300" comment="systemd-network-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723140" comment="systemd-sysvinit-246.16-150300.7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723141" comment="udev-246.16-150300.7.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53021" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204781" ref_url="https://bugzilla.suse.com/1204781" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39348" ref_url="https://www.suse.com/security/cve/CVE-2022-39348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012969.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-39348: Fixed NameVirtualHost Host header injection (bsc#1204781).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1204781">SUSE bug 1204781</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39348/">CVE-2022-39348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009723301" comment="python-Twisted-doc-19.10.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723302" comment="python2-Twisted-19.10.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723142" comment="python3-Twisted-19.10.0-150200.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53022" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205270" ref_url="https://bugzilla.suse.com/1205270" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270):

- CVE-2022-45403: Service Workers might have learned size of cross-origin media files
- CVE-2022-45404: Fullscreen notification bypass
- CVE-2022-45405: Use-after-free in InputStream implementation
- CVE-2022-45406: Use-after-free of a JavaScript Realm
- CVE-2022-45408: Fullscreen notification bypass via windowName
- CVE-2022-45409: Use-after-free in Garbage Collection
- CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy
- CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers
- CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers
- CVE-2022-45416: Keystroke Side-Channel Leakage
- CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI
- CVE-2022-45420: Iframe contents could be rendered outside the iframe
- CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-17"/>
	<updated date="2022-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410</cve>
	<cve impact="critical" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416</cve>
	<cve impact="critical" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725334" comment="MozillaFirefox-102.5.0-150200.152.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725335" comment="MozillaFirefox-branding-upstream-102.5.0-150200.152.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725336" comment="MozillaFirefox-devel-102.5.0-150200.152.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725337" comment="MozillaFirefox-translations-common-102.5.0-150200.152.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725338" comment="MozillaFirefox-translations-other-102.5.0-150200.152.67.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53023" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203867" ref_url="https://bugzilla.suse.com/1203867" source="BUGZILLA"/>
		<reference ref_id="1203870" ref_url="https://bugzilla.suse.com/1203870" source="BUGZILLA"/>
		<reference ref_id="1204577" ref_url="https://bugzilla.suse.com/1204577" source="BUGZILLA"/>
		<reference ref_id="1204979" ref_url="https://bugzilla.suse.com/1204979" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8923" ref_url="https://www.suse.com/security/cve/CVE-2017-8923/" source="CVE"/>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<reference ref_id="CVE-2020-7069" ref_url="https://www.suse.com/security/cve/CVE-2020-7069/" source="CVE"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<reference ref_id="CVE-2021-21704" ref_url="https://www.suse.com/security/cve/CVE-2021-21704/" source="CVE"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<reference ref_id="CVE-2021-21706" ref_url="https://www.suse.com/security/cve/CVE-2021-21706/" source="CVE"/>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<reference ref_id="CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626/" source="CVE"/>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- Version update to 7.4.33:
- CVE-2022-31630: Fixed out-of-bounds read due to insufficient input validation in imageloadfont() (bsc#1204979).
- CVE-2022-37454: Fixed buffer overflow in hash_update() on long parameter (bsc#1204577).

- Version update to 7.4.32 (jsc#SLE-23639)
- CVE-2022-31628: Fixed an uncontrolled recursion in the phar uncompressor while decompressing 'quines' gzip files. (bsc#1203867)
- CVE-2022-31629: Fixed a bug which could lead an attacker to set an insecure cookie that will treated as secure in the victim's browser. (bsc#1203870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203867">SUSE bug 1203867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203870">SUSE bug 1203870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204577">SUSE bug 1204577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204979">SUSE bug 1204979</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8923/">CVE-2017-8923</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7069/">CVE-2020-7069</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21704/">CVE-2021-21704</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21706/">CVE-2021-21706</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009723657" comment="apache2-mod_php7-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723658" comment="php7-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723659" comment="php7-bcmath-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723660" comment="php7-bz2-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723661" comment="php7-calendar-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723662" comment="php7-ctype-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723663" comment="php7-curl-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723664" comment="php7-dba-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723665" comment="php7-devel-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723666" comment="php7-dom-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723653" comment="php7-embed-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723667" comment="php7-enchant-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723668" comment="php7-exif-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723669" comment="php7-fastcgi-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723670" comment="php7-fileinfo-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723624" comment="php7-firebird-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723671" comment="php7-fpm-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723672" comment="php7-ftp-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723673" comment="php7-gd-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723674" comment="php7-gettext-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723675" comment="php7-gmp-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723676" comment="php7-iconv-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723677" comment="php7-intl-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723678" comment="php7-json-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723679" comment="php7-ldap-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723680" comment="php7-mbstring-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723681" comment="php7-mysql-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723682" comment="php7-odbc-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723683" comment="php7-opcache-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723684" comment="php7-openssl-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723685" comment="php7-pcntl-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723686" comment="php7-pdo-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723687" comment="php7-pgsql-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723688" comment="php7-phar-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723689" comment="php7-posix-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723690" comment="php7-readline-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723691" comment="php7-shmop-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723692" comment="php7-snmp-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723693" comment="php7-soap-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723694" comment="php7-sockets-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723695" comment="php7-sodium-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723696" comment="php7-sqlite-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723697" comment="php7-sysvmsg-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723698" comment="php7-sysvsem-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723699" comment="php7-sysvshm-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724322" comment="php7-test-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723700" comment="php7-tidy-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723701" comment="php7-tokenizer-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723702" comment="php7-xmlreader-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723703" comment="php7-xmlrpc-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723704" comment="php7-xmlwriter-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723705" comment="php7-xsl-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723706" comment="php7-zip-7.4.33-150200.3.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723707" comment="php7-zlib-7.4.33-150200.3.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53024" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204886" ref_url="https://bugzilla.suse.com/1204886" source="BUGZILLA"/>
		<reference ref_id="1205244" ref_url="https://bugzilla.suse.com/1205244" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012988.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

Security fixes:

- CVE-2022-42919: Fixed local privilege escalation via the multiprocessing forkserver start method (bsc#1204886).
- CVE-2022-45061: Fixed a quadratic IDNA decoding time (bsc#1205244).

Other fixes:

- Allow building of documentation with the latest Sphinx 5.3.0 (gh#python/cpython#98366).
  
- Update to 3.9.15:
  - Fix multiplying a list by an integer (list *= int): detect
    the integer overflow when the new allocated length is close
    to the maximum size.
  - Fix a shell code injection vulnerability in the
    get-remote-certificate.py example script. The script no
    longer uses a shell to run openssl commands. (originally
    filed as CVE-2022-37460, later withdrawn)
  - Fix command line parsing: reject -X int_max_str_digits option
    with no value (invalid) when the PYTHONINTMAXSTRDIGITS
    environment variable is set to a valid limit.
  - When ValueError is raised if an integer is larger than the
    limit, mention the sys.set_int_max_str_digits() function in
    the error message.
  - Update bundled libexpat to 2.4.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204886">SUSE bug 1204886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725231" comment="libpython3_9-1_0-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725232" comment="libpython3_9-1_0-32bit-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725233" comment="python39-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725234" comment="python39-32bit-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725235" comment="python39-base-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725236" comment="python39-base-32bit-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725237" comment="python39-curses-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725238" comment="python39-dbm-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725239" comment="python39-devel-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725240" comment="python39-doc-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725241" comment="python39-doc-devhelp-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725242" comment="python39-idle-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725243" comment="python39-testsuite-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725244" comment="python39-tk-3.9.15-150300.4.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725245" comment="python39-tools-3.9.15-150300.4.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53025" version="1" class="patch">
	<metadata>
		<title>Security update for sccache (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1194119" ref_url="https://bugzilla.suse.com/1194119" source="BUGZILLA"/>
		<reference ref_id="1196972" ref_url="https://bugzilla.suse.com/1196972" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012987.html" source="SUSE-SU"/>
		<description>
This update for sccache fixes the following issues:

  Updated to version 0.3.0:

  - CVE-2022-24713: Fixed Regex denial of service (bsc#1196972).
  - CVE-2021-45710: Fixed tokio data race with memory corruption (bsc#1194119).
  - Added hardening to systemd service(s) (bsc#1181400).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194119">SUSE bug 1194119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196972">SUSE bug 1196972</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717506" comment="sccache-0.3.0~git5.14a4b8b-150300.7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53026" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190818" ref_url="https://bugzilla.suse.com/1190818" source="BUGZILLA"/>
		<reference ref_id="1203201" ref_url="https://bugzilla.suse.com/1203201" source="BUGZILLA"/>
		<reference ref_id="1204986" ref_url="https://bugzilla.suse.com/1204986" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43995" ref_url="https://www.suse.com/security/cve/CVE-2022-43995/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026309.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering a passwor dof seven characters or fewer and using the crypt() password backend (bsc#1204986).

- Fix wrong information output in the error message (bsc#1190818).
- Make sure SIGCHLD is not ignored when sudo is executed; fixes race condition (bsc#1203201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190818">SUSE bug 1190818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203201">SUSE bug 1203201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204986">SUSE bug 1204986</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43995/">CVE-2022-43995</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725722" comment="sudo-1.9.5p2-150300.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725723" comment="sudo-devel-1.9.5p2-150300.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725724" comment="sudo-plugin-python-1.9.5p2-150300.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725787" comment="sudo-test-1.9.5p2-150300.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53027" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203476" ref_url="https://bugzilla.suse.com/1203476" source="BUGZILLA"/>
		<reference ref_id="1204468" ref_url="https://bugzilla.suse.com/1204468" source="BUGZILLA"/>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="1204480" ref_url="https://bugzilla.suse.com/1204480" source="BUGZILLA"/>
		<reference ref_id="1204523" ref_url="https://bugzilla.suse.com/1204523" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to jdk-11.0.17+8 (October 2022 CPU)
- CVE-2022-39399: Improve HTTP/2 client usage(bsc#1204480)
- CVE-2022-21628: Better HttpServer service (bsc#1204472)
- CVE-2022-21624: Enhance icon presentations (bsc#1204475)
- CVE-2022-21619: Improve NTLM support (bsc#1204473)
- CVE-2022-21626: Key X509 usages (bsc#1204471)
- CVE-2022-21618: Wider MultiByte (bsc#1204468)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203476">SUSE bug 1203476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204468">SUSE bug 1204468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204480">SUSE bug 1204480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204523">SUSE bug 1204523</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721029" comment="java-11-openjdk-11.0.17.0-150000.3.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721706" comment="java-11-openjdk-accessibility-11.0.17.0-150000.3.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721030" comment="java-11-openjdk-demo-11.0.17.0-150000.3.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721031" comment="java-11-openjdk-devel-11.0.17.0-150000.3.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721032" comment="java-11-openjdk-headless-11.0.17.0-150000.3.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720886" comment="java-11-openjdk-javadoc-11.0.17.0-150000.3.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720887" comment="java-11-openjdk-jmods-11.0.17.0-150000.3.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721707" comment="java-11-openjdk-src-11.0.17.0-150000.3.86.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53028" version="1" class="patch">
	<metadata>
		<title>Security update for dpkg (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199944" ref_url="https://bugzilla.suse.com/1199944" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1664" ref_url="https://www.suse.com/security/cve/CVE-2022-1664/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012992.html" source="SUSE-SU"/>
		<description>
This update for dpkg fixes the following issues:

- CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1199944">SUSE bug 1199944</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1664/">CVE-2022-1664</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009723000" comment="dpkg-1.19.0.4-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723001" comment="dpkg-devel-1.19.0.4-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723002" comment="dpkg-lang-1.19.0.4-150000.4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723003" comment="update-alternatives-1.19.0.4-150000.4.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53029" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1149789" ref_url="https://bugzilla.suse.com/1149789" source="BUGZILLA"/>
		<reference ref_id="1179821" ref_url="https://bugzilla.suse.com/1179821" source="BUGZILLA"/>
		<reference ref_id="1180043" ref_url="https://bugzilla.suse.com/1180043" source="BUGZILLA"/>
		<reference ref_id="1180044" ref_url="https://bugzilla.suse.com/1180044" source="BUGZILLA"/>
		<reference ref_id="1180046" ref_url="https://bugzilla.suse.com/1180046" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010/" source="CVE"/>
		<reference ref_id="CVE-2020-27824" ref_url="https://www.suse.com/security/cve/CVE-2020-27824/" source="CVE"/>
		<reference ref_id="CVE-2020-27842" ref_url="https://www.suse.com/security/cve/CVE-2020-27842/" source="CVE"/>
		<reference ref_id="CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843/" source="CVE"/>
		<reference ref_id="CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012995.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

-  CVE-2018-20846: Fixed an Out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.  (bsc#1140205)
-  CVE-2018-21010: Fixed a heap buffer overflow in color_apply_icc_profile in bin/common/color.c  (bsc#1149789)
-  CVE-2020-27824: Fixed an OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821)
-  CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043)
-  CVE-2020-27843: Fixed an out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044)
-  CVE-2020-27845: Fixed a heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149789">SUSE bug 1149789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179821">SUSE bug 1179821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180043">SUSE bug 1180043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180044">SUSE bug 1180044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180046">SUSE bug 1180046</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27824/">CVE-2020-27824</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27842/">CVE-2020-27842</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722397" comment="libopenjpeg1-1.5.2-150000.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722398" comment="libopenjpeg1-32bit-1.5.2-150000.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722399" comment="openjpeg-1.5.2-150000.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722400" comment="openjpeg-devel-1.5.2-150000.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722401" comment="openjpeg-devel-32bit-1.5.2-150000.4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53030" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205119" ref_url="https://bugzilla.suse.com/1205119" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013001.html" source="SUSE-SU"/>
		<description>
This update for nodejs16 fixes the following issues:

- Update to LTS versino 16.18.1.

- CVE-2022-43548: Fixed DNS rebinding in --inspect via invalid octal IP address (bsc#1205119).

- Update to LTS version 16.18.0:
  * http: throw error on content-length mismatch
  * stream: add ReadableByteStream.tee()
  * deps: npm updated to 8.19.2
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205119">SUSE bug 1205119</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724662" comment="nodejs16-16.18.1-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724663" comment="nodejs16-devel-16.18.1-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724664" comment="nodejs16-docs-16.18.1-150300.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724665" comment="npm16-16.18.1-150300.7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53031" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204421" ref_url="https://bugzilla.suse.com/1204421" source="BUGZILLA"/>
		<reference ref_id="1205270" ref_url="https://bugzilla.suse.com/1205270" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Fixed various security issues (MFSA 2022-49, bsc#1205270):
  * CVE-2022-45403 (bmo#1762078)
    Service Workers might have learned size of cross-origin media
    files
  * CVE-2022-45404 (bmo#1790815)
    Fullscreen notification bypass
  * CVE-2022-45405 (bmo#1791314)
    Use-after-free in InputStream implementation
  * CVE-2022-45406 (bmo#1791975)
    Use-after-free of a JavaScript Realm
  * CVE-2022-45408 (bmo#1793829)
    Fullscreen notification bypass via windowName
  * CVE-2022-45409 (bmo#1796901)
    Use-after-free in Garbage Collection
  * CVE-2022-45410 (bmo#1658869)
    ServiceWorker-intercepted requests bypassed SameSite cookie
    policy
  * CVE-2022-45411 (bmo#1790311)
    Cross-Site Tracing was possible via non-standard override
    headers
  * CVE-2022-45412 (bmo#1791029)
    Symlinks may resolve to partially uninitialized buffers
  * CVE-2022-45416 (bmo#1793676)
    Keystroke Side-Channel Leakage
  * CVE-2022-45418 (bmo#1795815)
    Custom mouse cursor could have been drawn over browser UI
  * CVE-2022-45420 (bmo#1792643)
    Iframe contents could be rendered outside the iframe
  * CVE-2022-45421 (bmo#1767920, bmo#1789808, bmo#1794061)
    Memory safety bugs fixed in Thunderbird 102.5

- Fixed various security issues: (MFSA 2022-46, bsc#1204421):
  * CVE-2022-42927 (bmo#1789128)
    Same-origin policy violation could have leaked cross-origin
    URLs
  * CVE-2022-42928 (bmo#1791520)
    Memory Corruption in JS Engine
  * CVE-2022-42929 (bmo#1789439)
    Denial of Service via window.print
  * CVE-2022-42932 (bmo#1789729, bmo#1791363, bmo#1792041)
    Memory safety bugs fixed in Thunderbird 102.4

- Mozilla Thunderbird 102.5
  * changed: `Ctrl+N` shortcut to create new contacts from
    address book restored (bmo#1751288)
  * fixed: Account Settings UI did not update to reflect default
    identity changes (bmo#1782646)
  * fixed: New POP mail notifications were incorrectly shown for
    messages marked by filters as read or junk (bmo#1787531)
  * fixed: Connecting to an IMAP server configured to use
    `PREAUTH` caused Thunderbird to hang (bmo#1798161)
  * fixed: Error responses received in greeting header from NNTP
    servers did not display error message (bmo#1792281)
  * fixed: News messages sent using 'Send Later' failed to send
    after going back online (bmo#1794997)
  * fixed: 'Download/Sync Now...' did not completely sync all
    newsgroups before going offline (bmo#1795547)
  * fixed: Username was missing from error dialog on failed login
    to news server (bmo#1796964)
  * fixed: Thunderbird can now fetch RSS channel feeds with
    incomplete channel URL (bmo#1794775)
  * fixed: Add-on 'Contribute' button in Add-ons Manager did not
    work (bmo#1795751)
  * fixed: Help text for `/part` Matrix command was incorrect
    (bmo#1795578)
  * fixed: Invite Attendees dialog did not fetch free/busy info
    for attendees with encoded characters in their name
    (bmo#1797927)

- Mozilla Thunderbird 102.4.2
  * changed: 'Address Book' button in Account Central will now
    create a CardDAV address book instead of a local address book
    (bmo#1793903)
  * fixed: Messages fetched from POP server in `Fetch headers
    only` mode disappeared when moved to different folder by
    filter action (bmo#1793374)
  * fixed: Thunderbird re-downloaded locally deleted messages
    from a POP server when 'Leave messages on server' and 'Until
    I delete them' were enabled (bmo#1796903)
  * fixed: Multiple password prompts for the same POP account
    could be displayed (bmo#1786920)
  * fixed: IMAP authentication failed on next startup if ImapMail
    folder was deleted by user (bmo#1793599)
  * fixed: Retrieving passwords for authenticated NNTP accounts
    could fail due to obsolete preferences in a users profile on
    every startup (bmo#1770594)
  * fixed: `Get Next n Messages` did not consistently fetch all
    messages requested from NNTP server (bmo#1794185)
  * fixed: `Get Messages` button unable to fetch messages from
    NNTP server if root folder not selected (bmo#1792362)
  * fixed: Thunderbird text branding did not always match locale
    of localized build (bmo#1786199)
  * fixed: Thunderbird installer and Thunderbird updater created
    Windows shortcuts with different names (bmo#1787264)
  * fixed: LDAP search filters unable to work with non-ASCII
    characters (bmo#1794306)
  * fixed: 'Today' highlighting in Calendar Month view did not
    update after date change at midnight (bmo#1795176)

- Mozilla Thunderbird 102.4.1
  * new: Thunderbird will now catch and report errors parsing
    vCards that contain incorrectly formatted dates (bmo#1793415)
  * fixed: Dynamic language switching did not update interface
    when switched to right-to-left languages (bmo#1794289)
  * fixed: Custom header data was discarded after messages were
    saved as draft and reopened (bmo#195716)
  * fixed: `-remote` command line argument did not work,
    affecting integration with various applications such as
    LibreOffice (bmo#1793323)
  * fixed: Messages received via some SMS-to-email services could
    not display images (bmo#1774805)
  * fixed: VCards with nickname field set could not be edited
    (bmo#1793877)
  * fixed: Some recurring events were missing from Agenda on
    first load (bmo#1771168)
  * fixed: Download requests for remote ICS calendars incorrectly
    set 'Accept' header to text/xml (bmo#1793757)
  * fixed: Monthly events created on the 31st of a month with &lt;30
    days placed first occurrence 1-2 days after the beginning of
    the following month (bmo#1266797)
  * fixed: Various visual and UX improvements
    (bmo#1781437,bmo#1785314,bmo#1794139,bmo#1794155,bmo#1794399)

  * changed: Thunderbird will automatically detect and repair
    OpenPGP key storage corruption caused by using the profile
    import tool in Thunderbird 102 (bmo#1790610)
  * fixed: POP message download into a large folder (~13000
    messages) caused Thunderbird to temporarily freeze
    (bmo#1792675)
  * fixed: Forwarding messages with special characters in Subject
    failed on Windows (bmo#1782173)
  * fixed: Links for FileLink attachments were not added when
    attachment filename contained Unicode characters
    (bmo#1789589)
  * fixed: Address Book display pane continued to show contacts
    after deletion (bmo#1777808)
  * fixed: Printing address book did not include all contact
    details (bmo#1782076)
  * fixed: CardDAV contacts without a Name property did not save
    to Google Contacts (bmo#1792101)
  * fixed: 'Publish Calendar' did not work (bmo#1794471)
  * fixed: Calendar database storage improvements (bmo#1792124)
  * fixed: Incorrectly handled error responses from CalDAV
    servers sometimes caused events to disappear from calendar
    (bmo#1792923)
  * fixed: Various visual and UX improvements (bmo#1776093,bmo#17
    80040,bmo#1780425,bmo#1792876,bmo#1792872,bmo#1793466,bmo#179
    3543)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410</cve>
	<cve impact="critical" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416</cve>
	<cve impact="critical" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725711" comment="MozillaThunderbird-102.5.0-150200.8.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725712" comment="MozillaThunderbird-translations-common-102.5.0-150200.8.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725713" comment="MozillaThunderbird-translations-other-102.5.0-150200.8.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53032" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194119" ref_url="https://bugzilla.suse.com/1194119" source="BUGZILLA"/>
		<reference ref_id="1204493" ref_url="https://bugzilla.suse.com/1204493" source="BUGZILLA"/>
		<reference ref_id="1204748" ref_url="https://bugzilla.suse.com/1204748" source="BUGZILLA"/>
		<reference ref_id="1205146" ref_url="https://bugzilla.suse.com/1205146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013005.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2021-45710: Fixed tokio data race with memory corruption (bsc#1194119).

- Update to version 2.0.16~git56.d15a0a7.

- Failure to migrate from openldap if pwdPolicyChecker present (bsc#1205146).
- Resolve issue with checklist post migration when dds is present (bsc#1204748).
- Improve reliability of migrations from openldap when dynamic directory services is configured (bsc#1204493).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1194119">SUSE bug 1194119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204493">SUSE bug 1204493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204748">SUSE bug 1204748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205146">SUSE bug 1205146</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724891" comment="389-ds-1.4.4.19~git59.136fc84-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724892" comment="389-ds-devel-1.4.4.19~git59.136fc84-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725110" comment="389-ds-snmp-1.4.4.19~git59.136fc84-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724893" comment="lib389-1.4.4.19~git59.136fc84-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724894" comment="libsvrcore0-1.4.4.19~git59.136fc84-150300.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53033" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202085" ref_url="https://bugzilla.suse.com/1202085" source="BUGZILLA"/>
		<reference ref_id="1204124" ref_url="https://bugzilla.suse.com/1204124" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37035" ref_url="https://www.suse.com/security/cve/CVE-2022-37035/" source="CVE"/>
		<reference ref_id="CVE-2022-42917" ref_url="https://www.suse.com/security/cve/CVE-2022-42917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013004.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2022-37035: Fixed a possible use-after-free due to a race condition related to bgp_notify_send_with_data() and bgp_process_packet() (bsc#1202085).
- CVE-2022-42917: Fixed a privilege escalation from frr to root in frr config creation (bsc#1204124).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-18"/>
	<updated date="2022-11-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202085">SUSE bug 1202085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204124">SUSE bug 1204124</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37035/">CVE-2022-37035</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2022-42917/">CVE-2022-42917</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725842" comment="frr-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725843" comment="frr-devel-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725844" comment="libfrr0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725845" comment="libfrr_pb0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725846" comment="libfrrcares0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725847" comment="libfrrfpm_pb0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725848" comment="libfrrgrpc_pb0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725849" comment="libfrrospfapiclient0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725850" comment="libfrrsnmp0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725851" comment="libfrrzmq0-7.4-150300.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725852" comment="libmlag_pb0-7.4-150300.4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53034" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1142579" ref_url="https://bugzilla.suse.com/1142579" source="BUGZILLA"/>
		<reference ref_id="1185597" ref_url="https://bugzilla.suse.com/1185597" source="BUGZILLA"/>
		<reference ref_id="1185712" ref_url="https://bugzilla.suse.com/1185712" source="BUGZILLA"/>
		<reference ref_id="1188374" ref_url="https://bugzilla.suse.com/1188374" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1193929" ref_url="https://bugzilla.suse.com/1193929" source="BUGZILLA"/>
		<reference ref_id="1194783" ref_url="https://bugzilla.suse.com/1194783" source="BUGZILLA"/>
		<reference ref_id="1197592" ref_url="https://bugzilla.suse.com/1197592" source="BUGZILLA"/>
		<reference ref_id="1198237" ref_url="https://bugzilla.suse.com/1198237" source="BUGZILLA"/>
		<reference ref_id="1202816" ref_url="https://bugzilla.suse.com/1202816" source="BUGZILLA"/>
		<reference ref_id="1202966" ref_url="https://bugzilla.suse.com/1202966" source="BUGZILLA"/>
		<reference ref_id="1202967" ref_url="https://bugzilla.suse.com/1202967" source="BUGZILLA"/>
		<reference ref_id="1202969" ref_url="https://bugzilla.suse.com/1202969" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010204" ref_url="https://www.suse.com/security/cve/CVE-2019-1010204/" source="CVE"/>
		<reference ref_id="CVE-2021-3530" ref_url="https://www.suse.com/security/cve/CVE-2021-3530/" source="CVE"/>
		<reference ref_id="CVE-2021-3648" ref_url="https://www.suse.com/security/cve/CVE-2021-3648/" source="CVE"/>
		<reference ref_id="CVE-2021-3826" ref_url="https://www.suse.com/security/cve/CVE-2021-3826/" source="CVE"/>
		<reference ref_id="CVE-2021-45078" ref_url="https://www.suse.com/security/cve/CVE-2021-45078/" source="CVE"/>
		<reference ref_id="CVE-2021-46195" ref_url="https://www.suse.com/security/cve/CVE-2021-46195/" source="CVE"/>
		<reference ref_id="CVE-2022-27943" ref_url="https://www.suse.com/security/cve/CVE-2022-27943/" source="CVE"/>
		<reference ref_id="CVE-2022-38126" ref_url="https://www.suse.com/security/cve/CVE-2022-38126/" source="CVE"/>
		<reference ref_id="CVE-2022-38127" ref_url="https://www.suse.com/security/cve/CVE-2022-38127/" source="CVE"/>
		<reference ref_id="CVE-2022-38533" ref_url="https://www.suse.com/security/cve/CVE-2022-38533/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013047.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

The following security bugs were fixed:

- CVE-2019-1010204: Fixed out-of-bounds read in elfcpp/elfcpp_file.h (bsc#1142579).
- CVE-2021-3530: Fixed stack-based buffer overflow in demangle_path() in rust-demangle.c (bsc#1185597).
- CVE-2021-3648: Fixed infinite loop while demangling rust symbols (bsc#1188374).
- CVE-2021-3826: Fixed heap/stack buffer overflow in the dlang_lname function in d-demangle.c (bsc#1202969).
- CVE-2021-45078: Fixed out-of-bounds write in stab_xcoff_builtin_type() in stabs.c (bsc#1193929).
- CVE-2021-46195: Fixed uncontrolled recursion in libiberty/rust-demangle.c (bsc#1194783).
- CVE-2022-27943: Fixed stack exhaustion in demangle_const in (bsc#1197592).
- CVE-2022-38126: Fixed assertion fail in the display_debug_names() function in binutils/dwarf.c (bsc#1202966).
- CVE-2022-38127: Fixed NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c (bsc#1202967).
- CVE-2022-38533: Fixed heap out-of-bounds read in bfd_getl32 (bsc#1202816).


The following non-security bugs were fixed:
  
- SLE toolchain update of binutils, update to 2.39 from 2.37.
- Update to 2.39:  
  * The ELF linker will now generate a warning message if the stack is made
    executable.  Similarly it will warn if the output binary contains a
    segment with all three of the read, write and execute permission
    bits set.  These warnings are intended to help developers identify
    programs which might be vulnerable to attack via these executable
    memory regions.
    The warnings are enabled by default but can be disabled via a command
    line option.  It is also possible to build a linker with the warnings
    disabled, should that be necessary.
  * The ELF linker now supports a --package-metadata option that allows
    embedding a JSON payload in accordance to the Package Metadata
    specification. 
  * In linker scripts it is now possible to use TYPE=&lt;type&gt; in an output
    section description to set the section type value.
  * The objdump program now supports coloured/colored syntax
    highlighting of its disassembler output for some architectures.
    (Currently: AVR, RiscV, s390, x86, x86_64).
  * The nm program now supports a --no-weak/-W option to make it ignore
    weak symbols.
  * The readelf and objdump programs now support a -wE option to prevent
    them from attempting to access debuginfod servers when following
    links.
  * The objcopy program's --weaken, --weaken-symbol, and
    --weaken-symbols options now works with unique symbols as well.

- Update to 2.38:
  * elfedit: Add --output-abiversion option to update ABIVERSION.
  * Add support for the LoongArch instruction set.
  * Tools which display symbols or strings (readelf, strings, nm, objdump)
    have a new command line option which controls how unicode characters are
    handled.  By default they are treated as normal for the tool.  Using
    --unicode=locale will display them according to the current locale.
    Using --unicode=hex will display them as hex byte values, whilst
    --unicode=escape will display them as escape sequences.  In addition
    using --unicode=highlight will display them as unicode escape sequences
    highlighted in red (if supported by the output device).
  * readelf -r dumps RELR relative relocations now.
  * Support for efi-app-aarch64, efi-rtdrv-aarch64 and efi-bsdrv-aarch64 has been
    added to objcopy in order to enable UEFI development using binutils.
  * ar: Add --thin for creating thin archives. -T is a deprecated alias without
    diagnostics. In many ar implementations -T has a different meaning, as
    specified by X/Open System Interface.
  * Add support for AArch64 system registers that were missing in previous
    releases.
  * Add support for the LoongArch instruction set.
  * Add a command-line option, -muse-unaligned-vector-move, for x86 target
    to encode aligned vector move as unaligned vector move.
  * Add support for Cortex-R52+ for Arm.
  * Add support for Cortex-A510, Cortex-A710, Cortex-X2 for AArch64.
  * Add support for Cortex-A710 for Arm.
  * Add support for Scalable Matrix Extension (SME) for AArch64.
  * The --multibyte-handling=[allow|warn|warn-sym-only] option tells the
    assembler what to when it encoutners multibyte characters in the input.  The
    default is to allow them.  Setting the option to 'warn' will generate a
    warning message whenever any multibyte character is encountered.  Using the
    option to 'warn-sym-only' will make the assembler generate a warning whenever a
    symbol is defined containing multibyte characters.  (References to undefined
    symbols will not generate warnings).
  * Outputs of .ds.x directive and .tfloat directive with hex input from
    x86 assembler have been reduced from 12 bytes to 10 bytes to match the
    output of .tfloat directive.
  * Add support for 'armv8.8-a', 'armv9-a', 'armv9.1-a', 'armv9.2-a' and
    'armv9.3-a' for -march in AArch64 GAS.
  * Add support for 'armv8.7-a', 'armv8.8-a', 'armv9-a', 'armv9.1-a',
    'armv9.2-a' and 'armv9.3-a' for -march in Arm GAS.
  * Add support for Intel AVX512_FP16 instructions.
  * Add -z pack-relative-relocs/-z no pack-relative-relocs to x86 ELF
    linker to pack relative relocations in the DT_RELR section.
  * Add support for the LoongArch architecture.
  * Add -z indirect-extern-access/-z noindirect-extern-access to x86 ELF
    linker to control canonical function pointers and copy relocation.
  * Add --max-cache-size=SIZE to set the the maximum cache size to SIZE
    bytes.
- Explicitly enable --enable-warn-execstack=yes and	--enable-warn-rwx-segments=yes.
- Add gprofng subpackage.
- Include recognition of 'z16' name for 'arch14' on s390. (bsc#1198237).
- Add back fix for bsc#1191473, which got lost in the update to 2.38.
- Install symlinks for all target specific tools on arm-eabi-none (bsc#1185712).
- Enable PRU architecture for AM335x CPU (Beagle Bone Black board)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142579">SUSE bug 1142579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185597">SUSE bug 1185597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185712">SUSE bug 1185712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188374">SUSE bug 1188374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193929">SUSE bug 1193929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194783">SUSE bug 1194783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197592">SUSE bug 1197592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198237">SUSE bug 1198237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202816">SUSE bug 1202816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202966">SUSE bug 1202966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202967">SUSE bug 1202967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202969">SUSE bug 1202969</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010204/">CVE-2019-1010204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3530/">CVE-2021-3530</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3648/">CVE-2021-3648</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3826/">CVE-2021-3826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45078/">CVE-2021-45078</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46195/">CVE-2021-46195</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27943/">CVE-2022-27943</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38126/">CVE-2022-38126</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38127/">CVE-2022-38127</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38533/">CVE-2022-38533</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009723071" comment="binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723072" comment="binutils-devel-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723073" comment="binutils-devel-32bit-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723074" comment="binutils-gold-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723075" comment="cross-aarch64-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723076" comment="cross-arm-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723077" comment="cross-avr-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723078" comment="cross-epiphany-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723079" comment="cross-hppa-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723080" comment="cross-hppa64-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723081" comment="cross-i386-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723082" comment="cross-ia64-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723083" comment="cross-m68k-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723084" comment="cross-mips-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723085" comment="cross-ppc-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723086" comment="cross-ppc64-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723087" comment="cross-ppc64le-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723088" comment="cross-riscv64-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723089" comment="cross-rx-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723090" comment="cross-s390-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723091" comment="cross-s390x-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723092" comment="cross-sparc-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723093" comment="cross-sparc64-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723094" comment="cross-spu-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723095" comment="cross-x86_64-binutils-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723096" comment="libctf-nobfd0-2.39-150100.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723097" comment="libctf0-2.39-150100.7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53035" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205033" ref_url="https://bugzilla.suse.com/1205033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013043.html" source="SUSE-SU"/>
		<description>
This update for pixman fixes the following issues:

- CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-21"/>
	<updated date="2022-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205033">SUSE bug 1205033</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724868" comment="libpixman-1-0-0.34.0-150000.7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724872" comment="libpixman-1-0-32bit-0.34.0-150000.7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724869" comment="libpixman-1-0-devel-0.34.0-150000.7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53036" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1203556" ref_url="https://bugzilla.suse.com/1203556" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40617" ref_url="https://www.suse.com/security/cve/CVE-2022-40617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013067.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2022-40617: Fixed that using untrusted URIs for revocation checking could lead to denial of service (bsc#1203556)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2022-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203556">SUSE bug 1203556</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40617/">CVE-2022-40617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726476" comment="strongswan-5.8.2-150200.11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726477" comment="strongswan-doc-5.8.2-150200.11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726478" comment="strongswan-hmac-5.8.2-150200.11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726479" comment="strongswan-ipsec-5.8.2-150200.11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726480" comment="strongswan-libs0-5.8.2-150200.11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726608" comment="strongswan-mysql-5.8.2-150200.11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726482" comment="strongswan-nm-5.8.2-150200.11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726609" comment="strongswan-sqlite-5.8.2-150200.11.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53037" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201684" ref_url="https://bugzilla.suse.com/1201684" source="BUGZILLA"/>
		<reference ref_id="1201685" ref_url="https://bugzilla.suse.com/1201685" source="BUGZILLA"/>
		<reference ref_id="1201692" ref_url="https://bugzilla.suse.com/1201692" source="BUGZILLA"/>
		<reference ref_id="1201694" ref_url="https://bugzilla.suse.com/1201694" source="BUGZILLA"/>
		<reference ref_id="1202427" ref_url="https://bugzilla.suse.com/1202427" source="BUGZILLA"/>
		<reference ref_id="1204468" ref_url="https://bugzilla.suse.com/1204468" source="BUGZILLA"/>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="1204480" ref_url="https://bugzilla.suse.com/1204480" source="BUGZILLA"/>
		<reference ref_id="1205302" ref_url="https://bugzilla.suse.com/1205302" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- CVE-2022-21626: An unauthenticated attacker with network access via HTTPS can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204471).
- CVE-2022-21618: An unauthenticated attacker with network access via Kerberos can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204468).
- CVE-2022-21619: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE (bsc#1204473).
- CVE-2022-21628: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204472).
- CVE-2022-21624: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise (bsc#1204475).
- CVE-2022-39399: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204480).
- CVE-2022-21549: Fixed exponentials issue (bsc#1201685).
- CVE-2022-21541: Fixed an improper restriction of MethodHandle.invokeBasic() (bsc#1201692).
- CVE-2022-34169; Fixed an integer truncation issue in Xalan (bsc#1201684).
- CVE-2022-21540: Fixed a class compilation issue (bsc#1201694).


- Update to Java 8.0 Service Refresh 7 Fix Pack 20.
  * Security:
    - The IBM ORB Does Not Support Object-Serialisation Data Filtering
    - Large Allocation In CipherSuite
    - Avoid Evaluating Sslalgorithmconstraints Twice
    - Cache The Results Of Constraint Checks
    - An incorrect ShortBufferException is thrown by IBMJCEPlus,
      IBMJCEPlusFIPS during cipher update operation
    - Disable SHA-1 Signed Jars For Ea
    - JSSE Performance Improvement
    - Oracle Road Map Kerberos Deprecation Of 3DES And RC4 Encryption
  * Java 8/Orb:
    - Upgrade ibmcfw.jar To Version o2228.02
  * Class Libraries:
    - Crash In Libjsor.So During An Rdma Failover
    - High CPU Consumption Observed In ZosEventPort$EventHandlerTask.run
    - Update Timezone Information To The Latest tzdata2022c
  * Jit Compiler:
    - Crash During JIT Compilation
    - Incorrect JIT Optimization Of Java Code
    - Incorrect Return From Class.isArray()
    - Unexpected ClassCastException
    - Performance Regression When Calling VM Helper Code On X86
  * X/Os Extentions:
    - Add RSA-OAEP Cipher Function To IBMJCECCA

- Update to Java 8.0 Service Refresh 7 Fix Pack 16
  * Java Virtual Machine
    - Assertion failure at ClassLoaderRememberedSet.cpp
	- Assertion failure at StandardAccessBarrier.cpp when
	  -Xgc:concurrentScavenge is set.
    - GC can have unflushed ownable synchronizer objects which
	  can eventually lead to heap corruption and failure when
	  -Xgc:concurrentScavenge is set.
  *	JIT Compiler:
    - Incorrect JIT optimization of Java code
    - JAVA JIT Power: JIT compile time assert on AIX or LINUXPPC
  *	Reliability and Serviceability:
    - javacore with 'kill -3' SIGQUIT signal freezes Java process
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2022-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204468">SUSE bug 1204468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204480">SUSE bug 1204480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725714" comment="java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725715" comment="java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725716" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725717" comment="java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725718" comment="java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725719" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725720" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725721" comment="java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53038" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205126" ref_url="https://bugzilla.suse.com/1205126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013065.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2022-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726204" comment="krb5-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726205" comment="krb5-32bit-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726206" comment="krb5-client-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726207" comment="krb5-devel-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726380" comment="krb5-devel-32bit-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726381" comment="krb5-mini-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726382" comment="krb5-mini-devel-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726219" comment="krb5-plugin-kdb-ldap-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726208" comment="krb5-plugin-preauth-otp-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726209" comment="krb5-plugin-preauth-pkinit-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726210" comment="krb5-plugin-preauth-spake-1.19.2-150300.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726220" comment="krb5-server-1.19.2-150300.7.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53039" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204633" ref_url="https://bugzilla.suse.com/1204633" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3647" ref_url="https://www.suse.com/security/cve/CVE-2022-3647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013070.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

  - CVE-2022-3647: Fixed crash in sigsegvHandler debug function (bsc#1204633).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2022-11-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1204633">SUSE bug 1204633</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3647/">CVE-2022-3647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721341" comment="redis-6.0.14-150200.6.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53040" version="1" class="patch">
	<metadata>
		<title>Security update for colord (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1202802" ref_url="https://bugzilla.suse.com/1202802" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42523" ref_url="https://www.suse.com/security/cve/CVE-2021-42523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013068.html" source="SUSE-SU"/>
		<description>
This update for colord fixes the following issues:
  
- CVE-2021-42523: Fixed small memory leak in sqlite3_exec (bsc#1202802).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-22"/>
	<updated date="2022-11-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1202802">SUSE bug 1202802</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42523/">CVE-2021-42523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716323" comment="colord-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716209" comment="colord-color-profiles-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716235" comment="colord-lang-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716210" comment="libcolord-devel-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716203" comment="libcolord2-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716324" comment="libcolord2-32bit-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716211" comment="libcolorhug2-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716212" comment="typelib-1_0-Colord-1_0-1.4.4-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716213" comment="typelib-1_0-Colorhug-1_0-1.4.4-150200.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53041" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1122756" ref_url="https://bugzilla.suse.com/1122756" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013092.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2019-6502: Fixed memory leak in sc_context_create in ctx.c (bsc#1122756).

		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122756">SUSE bug 1122756</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714497" comment="opensc-0.19.0-150100.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714756" comment="opensc-32bit-0.19.0-150100.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53042" version="1" class="patch">
	<metadata>
		<title>Security update for nginx (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187685" ref_url="https://bugzilla.suse.com/1187685" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3618" ref_url="https://www.suse.com/security/cve/CVE-2021-3618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013099.html" source="SUSE-SU"/>
		<description>
This update for nginx fixes the following issues:

- CVE-2021-3618: Fixed the ALPACA attack limiting the number of errors after which the connection is closed (bsc#1187685).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187685">SUSE bug 1187685</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3618/">CVE-2021-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726222" comment="nginx-1.19.8-150300.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726223" comment="nginx-source-1.19.8-150300.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726178" comment="vim-plugin-nginx-1.19.8-150300.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53043" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205629" ref_url="https://bugzilla.suse.com/1205629" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013100.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2022-36227: Fixed potential NULL pointer dereference in __archive_write_allocate_filter() (bsc#1205629).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1205629">SUSE bug 1205629</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726481" comment="bsdtar-3.4.2-150200.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726474" comment="libarchive-devel-3.4.2-150200.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726475" comment="libarchive13-3.4.2-150200.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726607" comment="libarchive13-32bit-3.4.2-150200.4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53044" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201103" ref_url="https://bugzilla.suse.com/1201103" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24805" ref_url="https://www.suse.com/security/cve/CVE-2022-24805/" source="CVE"/>
		<reference ref_id="CVE-2022-24806" ref_url="https://www.suse.com/security/cve/CVE-2022-24806/" source="CVE"/>
		<reference ref_id="CVE-2022-24807" ref_url="https://www.suse.com/security/cve/CVE-2022-24807/" source="CVE"/>
		<reference ref_id="CVE-2022-24808" ref_url="https://www.suse.com/security/cve/CVE-2022-24808/" source="CVE"/>
		<reference ref_id="CVE-2022-24809" ref_url="https://www.suse.com/security/cve/CVE-2022-24809/" source="CVE"/>
		<reference ref_id="CVE-2022-24810" ref_url="https://www.suse.com/security/cve/CVE-2022-24810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

  Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203):

  - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access.
  - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference.
  - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously.
  - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access.
  - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference.
  - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-24805/">CVE-2022-24805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-24806/">CVE-2022-24806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-24807/">CVE-2022-24807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-24808/">CVE-2022-24808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-24809/">CVE-2022-24809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-24810/">CVE-2022-24810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717343" comment="libsnmp40-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717348" comment="libsnmp40-32bit-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717344" comment="net-snmp-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717345" comment="net-snmp-devel-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717468" comment="net-snmp-devel-32bit-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717346" comment="perl-SNMP-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717625" comment="python2-net-snmp-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717469" comment="python3-net-snmp-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717347" comment="snmp-mibs-5.9.3-150300.15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53045" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_8 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1174414" ref_url="https://bugzilla.suse.com/1174414" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2708" ref_url="https://www.suse.com/security/cve/CVE-2019-2708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013106.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_8 fixes the following issues:

- CVE-2019-2708: Fixed partial DoS due to data store execution (bsc#1174414).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-24"/>
	<updated date="2022-11-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1174414">SUSE bug 1174414</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2708/">CVE-2019-2708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725447" comment="db48-doc-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725448" comment="db48-utils-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725449" comment="libdb-4_8-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725450" comment="libdb-4_8-32bit-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725451" comment="libdb-4_8-devel-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725452" comment="libdb-4_8-devel-32bit-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725453" comment="libdb_java-4_8-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725454" comment="libdb_java-4_8-devel-4.8.30-150000.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53046" version="1" class="patch">
	<metadata>
		<title>Security update for erlang (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205318" ref_url="https://bugzilla.suse.com/1205318" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37026" ref_url="https://www.suse.com/security/cve/CVE-2022-37026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013107.html" source="SUSE-SU"/>
		<description>
This update for erlang fixes the following issues:

- CVE-2022-37026: fixed a client authorization bypass vulnerability for SSL,
  TLS, and DTLS in Erlang/OTP. [bsc#1205318]
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-24"/>
	<updated date="2022-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205318">SUSE bug 1205318</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-37026/">CVE-2022-37026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726648" comment="erlang-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726649" comment="erlang-debugger-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726650" comment="erlang-debugger-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726651" comment="erlang-dialyzer-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726652" comment="erlang-dialyzer-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726653" comment="erlang-diameter-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726654" comment="erlang-diameter-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726655" comment="erlang-doc-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726656" comment="erlang-epmd-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726657" comment="erlang-et-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726658" comment="erlang-et-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726659" comment="erlang-jinterface-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726660" comment="erlang-jinterface-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726661" comment="erlang-observer-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726662" comment="erlang-observer-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726663" comment="erlang-reltool-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726664" comment="erlang-reltool-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726665" comment="erlang-src-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726666" comment="erlang-wx-22.3-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726667" comment="erlang-wx-src-22.3-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53047" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205178" ref_url="https://bugzilla.suse.com/1205178" source="BUGZILLA"/>
		<reference ref_id="1205182" ref_url="https://bugzilla.suse.com/1205182" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013113.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178).
- CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182).
    
Other:

- Bump upstream SBAT generation to 3
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-25"/>
	<updated date="2022-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205178">SUSE bug 1205178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205182">SUSE bug 1205182</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726211" comment="grub2-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726212" comment="grub2-arm64-efi-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726383" comment="grub2-arm64-efi-debug-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726384" comment="grub2-branding-upstream-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726213" comment="grub2-i386-pc-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726385" comment="grub2-i386-pc-debug-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726214" comment="grub2-powerpc-ieee1275-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726386" comment="grub2-powerpc-ieee1275-debug-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726215" comment="grub2-s390x-emu-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726387" comment="grub2-s390x-emu-debug-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726216" comment="grub2-snapper-plugin-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726217" comment="grub2-systemd-sleep-plugin-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726218" comment="grub2-x86_64-efi-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726388" comment="grub2-x86_64-efi-debug-2.04-150300.22.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726221" comment="grub2-x86_64-xen-2.04-150300.22.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53048" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="1204703" ref_url="https://bugzilla.suse.com/1204703" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-3676" ref_url="https://www.suse.com/security/cve/CVE-2022-3676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

- Update to OpenJDK 8u352 build 08 with OpenJ9 0.35.0 virtual machine, including Oracle October 2022 CPU changes.

- CVE-2022-21619: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE (bsc#1204473).
- CVE-2022-21626: An unauthenticated attacker with network access via HTTPS can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204471).
- CVE-2022-21624: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise (bsc#1204475).
- CVE-2022-21628: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204472).
- CVE-2022-3676: Fixed interface than calls can be inlined without a runtime type check (bsc#1204703).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204703">SUSE bug 1204703</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3676/">CVE-2022-3676</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725111" comment="java-1_8_0-openj9-1.8.0.352-150200.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725112" comment="java-1_8_0-openj9-accessibility-1.8.0.352-150200.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725113" comment="java-1_8_0-openj9-demo-1.8.0.352-150200.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725114" comment="java-1_8_0-openj9-devel-1.8.0.352-150200.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725115" comment="java-1_8_0-openj9-headless-1.8.0.352-150200.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724808" comment="java-1_8_0-openj9-javadoc-1.8.0.352-150200.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725116" comment="java-1_8_0-openj9-src-1.8.0.352-150200.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53049" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205119" ref_url="https://bugzilla.suse.com/1205119" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013127.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- CVE-2022-43548: Fixed DNS rebinding in --inspect via invalid octal IP address (bsc#1205119).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205119">SUSE bug 1205119</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724624" comment="nodejs12-12.22.12-150200.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724625" comment="nodejs12-devel-12.22.12-150200.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724626" comment="nodejs12-docs-12.22.12-150200.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724627" comment="npm12-12.22.12-150200.4.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53050" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205119" ref_url="https://bugzilla.suse.com/1205119" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013130.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- Update to 14.21.1:
- CVE-2022-43548: Fixed DNS rebinding in --inspect via invalid octal IP address (bsc#1205119).

- Update to 14.21.0:
- src: add --openssl-shared-config option
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205119">SUSE bug 1205119</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724620" comment="nodejs14-14.21.1-150200.15.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724621" comment="nodejs14-devel-14.21.1-150200.15.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724622" comment="nodejs14-docs-14.21.1-150200.15.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724623" comment="npm14-14.21.1-150200.15.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53051" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204641" ref_url="https://bugzilla.suse.com/1204641" source="BUGZILLA"/>
		<reference ref_id="1204643" ref_url="https://bugzilla.suse.com/1204643" source="BUGZILLA"/>
		<reference ref_id="1204644" ref_url="https://bugzilla.suse.com/1204644" source="BUGZILLA"/>
		<reference ref_id="1204645" ref_url="https://bugzilla.suse.com/1204645" source="BUGZILLA"/>
		<reference ref_id="1205392" ref_url="https://bugzilla.suse.com/1205392" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597/" source="CVE"/>
		<reference ref_id="CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599/" source="CVE"/>
		<reference ref_id="CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626/" source="CVE"/>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-3597: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204641).
- CVE-2022-3599: Fixed out-of-bounds read in writeSingleSection in tools/tiffcrop.c (bnc#1204643).
- CVE-2022-3626: Fixed out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (bnc#1204644)
- CVE-2022-3627: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204645).
- CVE-2022-3970: Fixed unsigned integer overflow in TIFFReadRGBATileExt() (bnc#1205392).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204641">SUSE bug 1204641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204643">SUSE bug 1204643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204644">SUSE bug 1204644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204645">SUSE bug 1204645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205392">SUSE bug 1205392</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725455" comment="libtiff-devel-4.0.9-150000.45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725456" comment="libtiff-devel-32bit-4.0.9-150000.45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725457" comment="libtiff5-4.0.9-150000.45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725458" comment="libtiff5-32bit-4.0.9-150000.45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725459" comment="tiff-4.0.9-150000.45.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53052" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="914660" ref_url="https://bugzilla.suse.com/914660" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013133.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2014-9645: Fixed loading of unwanted module with / in module names (bsc#914660).

- Enable switch_root
  With this change virtme --force-initramfs works as expected.

- Enable udhcpc

Update to 1.35.0:
    
- awk: fix printf %%, fix read beyond end of buffer
- Adjust busybox.config for new features in find, date and cpio 
- chrt: silence analyzer warning
- libarchive: remove duplicate forward declaration
- mount: 'mount -o rw ....' should not fall back to RO mount
- ps: fix -o pid=PID,args interpreting entire 'PID,args' as header
- tar: prevent malicious archives with long name sizes causing OOM
- udhcpc6: fix udhcp_find_option to actually find DHCP6 options
- xxd: fix -p -r
- support for new optoins added to basename, cpio, date, find, 
  mktemp, wget and others

- Adjust busybox.config for new features in find, date and cpio 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-28"/>
	<updated date="2022-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914660">SUSE bug 914660</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725896" comment="busybox-1.35.0-150000.4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725897" comment="busybox-static-1.35.0-150000.4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53053" version="1" class="patch">
	<metadata>
		<title>Security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1050257" ref_url="https://bugzilla.suse.com/1050257" source="BUGZILLA"/>
		<reference ref_id="1095070" ref_url="https://bugzilla.suse.com/1095070" source="BUGZILLA"/>
		<reference ref_id="1110282" ref_url="https://bugzilla.suse.com/1110282" source="BUGZILLA"/>
		<reference ref_id="1119559" ref_url="https://bugzilla.suse.com/1119559" source="BUGZILLA"/>
		<reference ref_id="1119560" ref_url="https://bugzilla.suse.com/1119560" source="BUGZILLA"/>
		<reference ref_id="1119562" ref_url="https://bugzilla.suse.com/1119562" source="BUGZILLA"/>
		<reference ref_id="1142677" ref_url="https://bugzilla.suse.com/1142677" source="BUGZILLA"/>
		<reference ref_id="1142678" ref_url="https://bugzilla.suse.com/1142678" source="BUGZILLA"/>
		<reference ref_id="1153577" ref_url="https://bugzilla.suse.com/1153577" source="BUGZILLA"/>
		<reference ref_id="1186231" ref_url="https://bugzilla.suse.com/1186231" source="BUGZILLA"/>
		<reference ref_id="1189337" ref_url="https://bugzilla.suse.com/1189337" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2018-11531" ref_url="https://www.suse.com/security/cve/CVE-2018-11531/" source="CVE"/>
		<reference ref_id="CVE-2018-17581" ref_url="https://www.suse.com/security/cve/CVE-2018-17581/" source="CVE"/>
		<reference ref_id="CVE-2018-20097" ref_url="https://www.suse.com/security/cve/CVE-2018-20097/" source="CVE"/>
		<reference ref_id="CVE-2018-20098" ref_url="https://www.suse.com/security/cve/CVE-2018-20098/" source="CVE"/>
		<reference ref_id="CVE-2018-20099" ref_url="https://www.suse.com/security/cve/CVE-2018-20099/" source="CVE"/>
		<reference ref_id="CVE-2019-13109" ref_url="https://www.suse.com/security/cve/CVE-2019-13109/" source="CVE"/>
		<reference ref_id="CVE-2019-13110" ref_url="https://www.suse.com/security/cve/CVE-2019-13110/" source="CVE"/>
		<reference ref_id="CVE-2019-17402" ref_url="https://www.suse.com/security/cve/CVE-2019-17402/" source="CVE"/>
		<reference ref_id="CVE-2021-29473" ref_url="https://www.suse.com/security/cve/CVE-2021-29473/" source="CVE"/>
		<reference ref_id="CVE-2021-32815" ref_url="https://www.suse.com/security/cve/CVE-2021-32815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013143.html" source="SUSE-SU"/>
		<description>
This update for exiv2 fixes the following issues:

- CVE-2019-13110: Fixed an integer-overflow and out-of-bounds read in CiffDirectory:readDirectory leads to denail of service (bsc#1142678).
- CVE-2019-13109: Fixed a denial of service in PngImage:readMetadata (bsc#1142677).
- CVE-2018-17581: Fixed an excessive stack consumption CiffDirectory:readDirectory() at crwimage_int.cpp (bsc#1110282).
- CVE-2017-11591: Fixed a floating point exception in Exiv2::ValueType (bsc#1050257).
- CVE-2019-17402: Fixed an improper validation of the total size to the offset and size leads to a crash in Exiv2::getULong in types.cpp (bsc#1153577).
- CVE-2021-32815: Fixed a deny-of-service due to assertion failure in crwimage_int.cpp (bsc#1189337).
- CVE-2018-20097: Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu (bsc#1119562).
- CVE-2021-29473: Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata (bsc#1186231).
- CVE-2018-20098: Fixed a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header (bsc#1119560).
- CVE-2018-11531: Fixed a heap-based buffer overflow in getData in preview.cpp (bsc#1095070).
- CVE-2018-20099: exiv2: infinite loop in Exiv2::Jp2Image::encodeJp2Header (bsc#1119559).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050257">SUSE bug 1050257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095070">SUSE bug 1095070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110282">SUSE bug 1110282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119559">SUSE bug 1119559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119560">SUSE bug 1119560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119562">SUSE bug 1119562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142677">SUSE bug 1142677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142678">SUSE bug 1142678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153577">SUSE bug 1153577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186231">SUSE bug 1186231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189337">SUSE bug 1189337</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11531/">CVE-2018-11531</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17581/">CVE-2018-17581</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20097/">CVE-2018-20097</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20098/">CVE-2018-20098</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20099/">CVE-2018-20099</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13109/">CVE-2019-13109</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13110/">CVE-2019-13110</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17402/">CVE-2019-17402</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29473/">CVE-2021-29473</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32815/">CVE-2021-32815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725422" comment="exiv2-0.26-150000.6.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725423" comment="exiv2-lang-0.26-150000.6.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725374" comment="libexiv2-26-0.26-150000.6.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725424" comment="libexiv2-26-32bit-0.26-150000.6.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725375" comment="libexiv2-devel-0.26-150000.6.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725425" comment="libexiv2-doc-0.26-150000.6.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53054" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184689" ref_url="https://bugzilla.suse.com/1184689" source="BUGZILLA"/>
		<reference ref_id="1188086" ref_url="https://bugzilla.suse.com/1188086" source="BUGZILLA"/>
		<reference ref_id="1192252" ref_url="https://bugzilla.suse.com/1192252" source="BUGZILLA"/>
		<reference ref_id="1192648" ref_url="https://bugzilla.suse.com/1192648" source="BUGZILLA"/>
		<reference ref_id="1197428" ref_url="https://bugzilla.suse.com/1197428" source="BUGZILLA"/>
		<reference ref_id="1200330" ref_url="https://bugzilla.suse.com/1200330" source="BUGZILLA"/>
		<reference ref_id="1202269" ref_url="https://bugzilla.suse.com/1202269" source="BUGZILLA"/>
		<reference ref_id="1202337" ref_url="https://bugzilla.suse.com/1202337" source="BUGZILLA"/>
		<reference ref_id="1202417" ref_url="https://bugzilla.suse.com/1202417" source="BUGZILLA"/>
		<reference ref_id="1203818" ref_url="https://bugzilla.suse.com/1203818" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:4278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013146.html" source="SUSE-SU"/>
		<description>
This update for supportutils fixes the following issues:

Security issues fixed:

- Passwords correctly removed from email.txt, updates.txt and fs-iscsi.txt (bsc#1203818)

Bug fixes:

- Added lifecycle information
- Fixed KVM virtualization detection on bare metal (bsc#1184689)
- Added logging using journalctl (bsc#1200330)
- Get current sar data before collecting files (bsc#1192648)
- Collects everything in /etc/multipath/ (bsc#1192252)
- Collects power management information in hardware.txt (bsc#1197428)
- Checks for suseconnect-ng or SUSEConnect packages (bsc#1202337)
- Fixed conf_files and conf_text_files so y2log is gathered (bsc#1202269)
- Update to nvme_info and block_info (bsc#1202417)
- Added includedir directories from /etc/sudoers (bsc#1188086)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184689">SUSE bug 1184689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188086">SUSE bug 1188086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192252">SUSE bug 1192252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192648">SUSE bug 1192648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197428">SUSE bug 1197428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200330">SUSE bug 1200330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202269">SUSE bug 1202269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202337">SUSE bug 1202337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202417">SUSE bug 1202417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203818">SUSE bug 1203818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726756" comment="supportutils-3.1.21-150300.7.35.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53055" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188607" ref_url="https://bugzilla.suse.com/1188607" source="BUGZILLA"/>
		<reference ref_id="1203125" ref_url="https://bugzilla.suse.com/1203125" source="BUGZILLA"/>
		<reference ref_id="1204577" ref_url="https://bugzilla.suse.com/1204577" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2022-37454: Fixed a buffer overflow in hashlib.sha3_* implementations. (bsc#1204577)
- CVE-2020-10735: Fixed a bug to limit amount of digits converting text to int and vice vera. (bsc#1203125)

The following non-security bug was fixed:

- Fixed a crash in the garbage collection (bsc#1188607).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188607">SUSE bug 1188607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203125">SUSE bug 1203125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204577">SUSE bug 1204577</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726417" comment="libpython3_6m1_0-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726418" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726419" comment="python3-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726420" comment="python3-base-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726421" comment="python3-curses-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726422" comment="python3-dbm-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726423" comment="python3-devel-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726424" comment="python3-doc-3.6.15-150300.10.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726425" comment="python3-doc-devhelp-3.6.15-150300.10.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726426" comment="python3-idle-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726427" comment="python3-testsuite-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726428" comment="python3-tk-3.6.15-150300.10.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726429" comment="python3-tools-3.6.15-150300.10.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53056" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1202962" ref_url="https://bugzilla.suse.com/1202962" source="BUGZILLA"/>
		<reference ref_id="1203110" ref_url="https://bugzilla.suse.com/1203110" source="BUGZILLA"/>
		<reference ref_id="1203152" ref_url="https://bugzilla.suse.com/1203152" source="BUGZILLA"/>
		<reference ref_id="1203155" ref_url="https://bugzilla.suse.com/1203155" source="BUGZILLA"/>
		<reference ref_id="1203194" ref_url="https://bugzilla.suse.com/1203194" source="BUGZILLA"/>
		<reference ref_id="1203272" ref_url="https://bugzilla.suse.com/1203272" source="BUGZILLA"/>
		<reference ref_id="1203508" ref_url="https://bugzilla.suse.com/1203508" source="BUGZILLA"/>
		<reference ref_id="1203509" ref_url="https://bugzilla.suse.com/1203509" source="BUGZILLA"/>
		<reference ref_id="1203796" ref_url="https://bugzilla.suse.com/1203796" source="BUGZILLA"/>
		<reference ref_id="1203797" ref_url="https://bugzilla.suse.com/1203797" source="BUGZILLA"/>
		<reference ref_id="1203799" ref_url="https://bugzilla.suse.com/1203799" source="BUGZILLA"/>
		<reference ref_id="1203820" ref_url="https://bugzilla.suse.com/1203820" source="BUGZILLA"/>
		<reference ref_id="1203924" ref_url="https://bugzilla.suse.com/1203924" source="BUGZILLA"/>
		<reference ref_id="1204779" ref_url="https://bugzilla.suse.com/1204779" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2022-2980" ref_url="https://www.suse.com/security/cve/CVE-2022-2980/" source="CVE"/>
		<reference ref_id="CVE-2022-2982" ref_url="https://www.suse.com/security/cve/CVE-2022-2982/" source="CVE"/>
		<reference ref_id="CVE-2022-3037" ref_url="https://www.suse.com/security/cve/CVE-2022-3037/" source="CVE"/>
		<reference ref_id="CVE-2022-3099" ref_url="https://www.suse.com/security/cve/CVE-2022-3099/" source="CVE"/>
		<reference ref_id="CVE-2022-3134" ref_url="https://www.suse.com/security/cve/CVE-2022-3134/" source="CVE"/>
		<reference ref_id="CVE-2022-3153" ref_url="https://www.suse.com/security/cve/CVE-2022-3153/" source="CVE"/>
		<reference ref_id="CVE-2022-3234" ref_url="https://www.suse.com/security/cve/CVE-2022-3234/" source="CVE"/>
		<reference ref_id="CVE-2022-3235" ref_url="https://www.suse.com/security/cve/CVE-2022-3235/" source="CVE"/>
		<reference ref_id="CVE-2022-3278" ref_url="https://www.suse.com/security/cve/CVE-2022-3278/" source="CVE"/>
		<reference ref_id="CVE-2022-3296" ref_url="https://www.suse.com/security/cve/CVE-2022-3296/" source="CVE"/>
		<reference ref_id="CVE-2022-3297" ref_url="https://www.suse.com/security/cve/CVE-2022-3297/" source="CVE"/>
		<reference ref_id="CVE-2022-3324" ref_url="https://www.suse.com/security/cve/CVE-2022-3324/" source="CVE"/>
		<reference ref_id="CVE-2022-3352" ref_url="https://www.suse.com/security/cve/CVE-2022-3352/" source="CVE"/>
		<reference ref_id="CVE-2022-3705" ref_url="https://www.suse.com/security/cve/CVE-2022-3705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0 with patch level 0814:

- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2022-3234: Fixed heap-based buffer overflow (bsc#1203508).
- CVE-2022-3235: Fixed use-after-free (bsc#1203509).
- CVE-2022-3324: Fixed stack-based buffer overflow (bsc#1203820).
- CVE-2022-3705: Fixed use-after-free in function qf_update_buffer of the file quickfix.c (bsc#1204779).
- CVE-2022-2982: Fixed use-after-free in qf_fill_buffer() (bsc#1203152).
- CVE-2022-3296: Fixed stack out of bounds read in ex_finally() in ex_eval.c (bsc#1203796).
- CVE-2022-3297: Fixed use-after-free in process_next_cpt_value() at insexpand.c (bsc#1203797).
- CVE-2022-3099: Fixed use-after-free in ex_docmd.c (bsc#1203110).
- CVE-2022-3134: Fixed use-after-free in do_tag() (bsc#1203194).
- CVE-2022-3153: Fixed NULL pointer dereference (bsc#1203272).
- CVE-2022-3278: Fixed NULL pointer dereference in eval_next_non_blank() in eval.c (bsc#1203799).
- CVE-2022-3352: Fixed use-after-free (bsc#1203924).
- CVE-2022-2980: Fixed NULL pointer dereference in do_mouse() (bsc#1203155).
- CVE-2022-3037: Fixed use-after-free (bsc#1202962).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202962">SUSE bug 1202962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203110">SUSE bug 1203110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203152">SUSE bug 1203152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203155">SUSE bug 1203155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203194">SUSE bug 1203194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203272">SUSE bug 1203272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203508">SUSE bug 1203508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203509">SUSE bug 1203509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203796">SUSE bug 1203796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203797">SUSE bug 1203797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203799">SUSE bug 1203799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203820">SUSE bug 1203820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203924">SUSE bug 1203924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204779">SUSE bug 1204779</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2980/">CVE-2022-2980</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2982/">CVE-2022-2982</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3037/">CVE-2022-3037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3099/">CVE-2022-3099</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3134/">CVE-2022-3134</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3153/">CVE-2022-3153</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3234/">CVE-2022-3234</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3235/">CVE-2022-3235</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3278/">CVE-2022-3278</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3296/">CVE-2022-3296</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3297/">CVE-2022-3297</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3324/">CVE-2022-3324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3352/">CVE-2022-3352</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3705/">CVE-2022-3705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726767" comment="gvim-9.0.0814-150000.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726768" comment="vim-9.0.0814-150000.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726769" comment="vim-data-9.0.0814-150000.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726770" comment="vim-data-common-9.0.0814-150000.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726771" comment="vim-small-9.0.0814-150000.5.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53057" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205120" ref_url="https://bugzilla.suse.com/1205120" source="BUGZILLA"/>
		<reference ref_id="1205121" ref_url="https://bugzilla.suse.com/1205121" source="BUGZILLA"/>
		<reference ref_id="1205122" ref_url="https://bugzilla.suse.com/1205122" source="BUGZILLA"/>
		<reference ref_id="1205123" ref_url="https://bugzilla.suse.com/1205123" source="BUGZILLA"/>
		<reference ref_id="1205124" ref_url="https://bugzilla.suse.com/1205124" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32888" ref_url="https://www.suse.com/security/cve/CVE-2022-32888/" source="CVE"/>
		<reference ref_id="CVE-2022-32923" ref_url="https://www.suse.com/security/cve/CVE-2022-32923/" source="CVE"/>
		<reference ref_id="CVE-2022-42799" ref_url="https://www.suse.com/security/cve/CVE-2022-42799/" source="CVE"/>
		<reference ref_id="CVE-2022-42823" ref_url="https://www.suse.com/security/cve/CVE-2022-42823/" source="CVE"/>
		<reference ref_id="CVE-2022-42824" ref_url="https://www.suse.com/security/cve/CVE-2022-42824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013156.html" source="SUSE-SU"/>
		<description>

Security fixes:

- CVE-2022-32888: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205121).
- CVE-2022-32923: Fixed possible information leak via maliciously crafted web content (bsc#1205122).
- CVE-2022-42799: Fixed user interface spoofing when visiting a malicious website (bsc#1205123).
- CVE-2022-42823: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205120).
- CVE-2022-42824: Fixed possible sensitive user information leak via maliciously crafted web content (bsc#1205124).

Update to version 2.38.2:

  - Fix scrolling issues in some sites having fixed background.
  - Fix prolonged buffering during progressive live playback.
  - Fix the build with accessibility disabled.
  - Fix several crashes and rendering issues.
    
Update to version 2.38.1:

  - Make xdg-dbus-proxy work if host session bus address is an
    abstract socket.
  - Use a single xdg-dbus-proxy process when sandbox is enabled.
  - Fix high resolution video playback due to unimplemented
    changeType operation.
  - Ensure GSubprocess uses posix_spawn() again and inherit file
    descriptors.
  - Fix player stucking in buffering (paused) state for progressive
    streaming.
  - Do not try to preconnect on link click when link preconnect
    setting is disabled.
  - Fix close status code returned when the client closes a
    WebSocket in some cases.
  - Fix media player duration calculation.
  - Fix several crashes and rendering issues.

Update to version 2.38.0:

  - New media controls UI style.
  - Add new API to set WebView's Content-Security-Policy for web
    extensions support.
  - Make it possible to use the remote inspector from other
    browsers using WEBKIT_INSPECTOR_HTTP_SERVER env var.
  - MediaSession is enabled by default, allowing remote media
    control using MPRIS.
  - Add support for PDF documents using PDF.js.
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205120">SUSE bug 1205120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205121">SUSE bug 1205121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205122">SUSE bug 1205122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205123">SUSE bug 1205123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205124">SUSE bug 1205124</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32888/">CVE-2022-32888</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32923/">CVE-2022-32923</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42799/">CVE-2022-42799</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42823/">CVE-2022-42823</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42824/">CVE-2022-42824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726690" comment="libjavascriptcoregtk-4_0-18-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726750" comment="libjavascriptcoregtk-4_0-18-32bit-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726691" comment="libwebkit2gtk-4_0-37-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726751" comment="libwebkit2gtk-4_0-37-32bit-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726646" comment="libwebkit2gtk3-lang-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726693" comment="typelib-1_0-JavaScriptCore-4_0-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726694" comment="typelib-1_0-WebKit2-4_0-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726695" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726752" comment="webkit-jsc-4-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726692" comment="webkit2gtk-4_0-injected-bundles-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726696" comment="webkit2gtk3-devel-2.38.2-150200.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726753" comment="webkit2gtk3-minibrowser-2.38.2-150200.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53058" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205563" ref_url="https://bugzilla.suse.com/1205563" source="BUGZILLA"/>
		<reference ref_id="1205564" ref_url="https://bugzilla.suse.com/1205564" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39318" ref_url="https://www.suse.com/security/cve/CVE-2022-39318/" source="CVE"/>
		<reference ref_id="CVE-2022-39319" ref_url="https://www.suse.com/security/cve/CVE-2022-39319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013153.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:
  
- CVE-2022-39318: Fixed division by zero in urbdrc (bsc#1205563).
- CVE-2022-39319: Fixed missing input buffer length check in urbdrc (bsc#1205564).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2022-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205563">SUSE bug 1205563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205564">SUSE bug 1205564</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39318/">CVE-2022-39318</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39319/">CVE-2022-39319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726840" comment="freerdp-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726841" comment="freerdp-devel-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726842" comment="freerdp-proxy-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726843" comment="freerdp-server-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726844" comment="freerdp-wayland-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726845" comment="libfreerdp2-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726846" comment="libuwac0-0-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726847" comment="libwinpr2-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726848" comment="uwac0-0-devel-2.1.2-150200.15.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726849" comment="winpr2-devel-2.1.2-150200.15.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53059" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1190515" ref_url="https://bugzilla.suse.com/1190515" source="BUGZILLA"/>
		<reference ref_id="1194178" ref_url="https://bugzilla.suse.com/1194178" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3997" ref_url="https://www.suse.com/security/cve/CVE-2021-3997/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BMN5QRPEKDGOKDHBMC6SXHPA733I43MV/" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2021-3997: Fixed an uncontrolled recursion in systemd's systemd-tmpfiles which could cause a minor denial of service. (bsc#1194178)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190515">SUSE bug 1190515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194178">SUSE bug 1194178</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3997/">CVE-2021-3997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662913" comment="libsystemd0-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662914" comment="libsystemd0-32bit-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662915" comment="libudev-devel-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663198" comment="libudev-devel-32bit-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662916" comment="libudev1-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662917" comment="libudev1-32bit-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663199" comment="nss-myhostname-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663200" comment="nss-myhostname-32bit-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663201" comment="nss-mymachines-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663202" comment="nss-mymachines-32bit-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663203" comment="nss-resolve-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663204" comment="nss-systemd-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662918" comment="systemd-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662919" comment="systemd-32bit-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662920" comment="systemd-container-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662921" comment="systemd-coredump-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662922" comment="systemd-devel-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662923" comment="systemd-doc-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662924" comment="systemd-journal-remote-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662925" comment="systemd-lang-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663205" comment="systemd-logger-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663206" comment="systemd-network-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662926" comment="systemd-sysvinit-246.16-7.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662927" comment="udev-246.16-7.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53060" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205119" ref_url="https://bugzilla.suse.com/1205119" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013181.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

- CVE-2022-43548: Fixed DNS rebinding in --inspect via invalid octal IP address (bsc#1205119).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-01"/>
	<updated date="2022-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205119">SUSE bug 1205119</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009724643" comment="nodejs10-10.24.1-150000.1.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724644" comment="nodejs10-devel-10.24.1-150000.1.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724645" comment="nodejs10-docs-10.24.1-150000.1.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724646" comment="npm10-10.24.1-150000.1.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53061" version="1" class="patch">
	<metadata>
		<title>Security update for bcel (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205125" ref_url="https://bugzilla.suse.com/1205125" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013183.html" source="SUSE-SU"/>
		<description>
This update for bcel fixes the following issues:

- CVE-2022-42920: Fixed producing arbitrary bytecode via out-of-bounds writing (bsc#1205125).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-01"/>
	<updated date="2022-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205125">SUSE bug 1205125</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724862" comment="bcel-5.2-150200.11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53062" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1199744" ref_url="https://bugzilla.suse.com/1199744" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30065" ref_url="https://www.suse.com/security/cve/CVE-2022-30065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013185.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2022-30065: Fixed use-after-free in the AWK applet (bsc#1199744).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-01"/>
	<updated date="2022-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199744">SUSE bug 1199744</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30065/">CVE-2022-30065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727229" comment="busybox-1.35.0-150000.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727230" comment="busybox-static-1.35.0-150000.4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53063" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205822" ref_url="https://bugzilla.suse.com/1205822" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013190.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2022-45939: Fixed shell command injection via source code files when using ctags (bsc#1205822).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-02"/>
	<updated date="2022-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205822">SUSE bug 1205822</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727404" comment="emacs-25.3-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727405" comment="emacs-el-25.3-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727406" comment="emacs-info-25.3-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727407" comment="emacs-nox-25.3-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727409" comment="emacs-x11-25.3-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727408" comment="etags-25.3-150000.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53064" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205941" ref_url="https://bugzilla.suse.com/1205941" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45414" ref_url="https://www.suse.com/security/cve/CVE-2022-45414/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013195.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to version 102.5.1:

- CVE-2022-45414: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content (bsc#1205941).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-06"/>
	<updated date="2022-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205941">SUSE bug 1205941</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-45414/">CVE-2022-45414</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727583" comment="MozillaThunderbird-102.5.1-150200.8.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727584" comment="MozillaThunderbird-translations-common-102.5.1-150200.8.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727585" comment="MozillaThunderbird-translations-other-102.5.1-150200.8.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53065" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1167864" ref_url="https://bugzilla.suse.com/1167864" source="BUGZILLA"/>
		<reference ref_id="1202812" ref_url="https://bugzilla.suse.com/1202812" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013201.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

Version update to 1.28.2.

- CVE-2022-2990: Fixed a possible information disclosure and modification vulnerability (bsc#1202812).
- CVE-2020-10696: Fixed an issue with a crafted input tar file that may lead to a local file overwriting during image build process (bsc#1167864).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-07"/>
	<updated date="2022-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167864">SUSE bug 1167864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202812">SUSE bug 1202812</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727588" comment="buildah-1.28.2-150300.8.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53066" version="1" class="patch">
	<metadata>
		<title>Security update for rabbitmq-server (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205267" ref_url="https://bugzilla.suse.com/1205267" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31008" ref_url="https://www.suse.com/security/cve/CVE-2022-31008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013208.html" source="SUSE-SU"/>
		<description>
This update for rabbitmq-server fixes the following issues:

- CVE-2022-31008: Fixed predictable secret seed in URI encryption (bsc#1205267).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-08"/>
	<updated date="2022-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205267">SUSE bug 1205267</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31008/">CVE-2022-31008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727390" comment="erlang-rabbitmq-client-3.8.11-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727391" comment="rabbitmq-server-3.8.11-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727392" comment="rabbitmq-server-plugins-3.8.11-150300.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53067" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205418" ref_url="https://bugzilla.suse.com/1205418" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37290" ref_url="https://www.suse.com/security/cve/CVE-2022-37290/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013210.html" source="SUSE-SU"/>
		<description>
This update for nautilus fixes the following issues:

- CVE-2022-37290: Fixed a denial of service caused by pasted ZIP archives (bsc#1205418).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-09"/>
	<updated date="2022-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205418">SUSE bug 1205418</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37290/">CVE-2022-37290</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727660" comment="gnome-shell-search-provider-nautilus-3.34.3-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727661" comment="libnautilus-extension1-3.34.3-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727656" comment="libnautilus-extension1-32bit-3.34.3-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727662" comment="nautilus-3.34.3-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727663" comment="nautilus-devel-3.34.3-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727664" comment="nautilus-lang-3.34.3-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727665" comment="typelib-1_0-Nautilus-3_0-3.34.3-150200.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53068" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200102" ref_url="https://bugzilla.suse.com/1200102" source="BUGZILLA"/>
		<reference ref_id="1201490" ref_url="https://bugzilla.suse.com/1201490" source="BUGZILLA"/>
		<reference ref_id="1201492" ref_url="https://bugzilla.suse.com/1201492" source="BUGZILLA"/>
		<reference ref_id="1201493" ref_url="https://bugzilla.suse.com/1201493" source="BUGZILLA"/>
		<reference ref_id="1201495" ref_url="https://bugzilla.suse.com/1201495" source="BUGZILLA"/>
		<reference ref_id="1201496" ref_url="https://bugzilla.suse.com/1201496" source="BUGZILLA"/>
		<reference ref_id="1201689" ref_url="https://bugzilla.suse.com/1201689" source="BUGZILLA"/>
		<reference ref_id="1204254" ref_url="https://bugzilla.suse.com/1204254" source="BUGZILLA"/>
		<reference ref_id="1205126" ref_url="https://bugzilla.suse.com/1205126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2031" ref_url="https://www.suse.com/security/cve/CVE-2022-2031/" source="CVE"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<reference ref_id="CVE-2022-32744" ref_url="https://www.suse.com/security/cve/CVE-2022-32744/" source="CVE"/>
		<reference ref_id="CVE-2022-32745" ref_url="https://www.suse.com/security/cve/CVE-2022-32745/" source="CVE"/>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<reference ref_id="CVE-2022-3437" ref_url="https://www.suse.com/security/cve/CVE-2022-3437/" source="CVE"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Version update to 4.15.12.

Security issues fixed:

- CVE-2022-2031: Fixed AD users that could have bypassed certain restrictions associated with changing passwords (bsc#1201495).
- CVE-2022-32742: Fixed SMB1 code that does not correctly verify SMB1write, SMB1write_and_close, SMB1write_and_unlock lengths (bsc#1201496).
- CVE-2022-32744: Fixed AD users that could have forged password change requests for any user (bsc#1201493).
- CVE-2022-32745: Fixed AD users that could have crashed the server process with an LDAP add or modify request (bsc#1201492).
- CVE-2022-32746: Fixed a use-after-free occurring in database audit logging (bsc#1201490).
- CVE-2022-3437: Fixed buffer overflow in Heimdal unwrap_des3() (bsc#1204254).
- CVE-2022-42898: Fixed Samba buffer overflow vulnerabilities on 32-bit systems (bsc#1205126).

Bug fixes:

- Install a systemd drop-in file for named service to allow read/write access to the DLZ directory (bsc#1201689).
- Possible use after free of connection_struct when iterating smbd_server_connection-&gt;connections (bsc#1200102).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-09"/>
	<updated date="2022-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200102">SUSE bug 1200102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201490">SUSE bug 1201490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201492">SUSE bug 1201492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201493">SUSE bug 1201493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201495">SUSE bug 1201495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201496">SUSE bug 1201496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201689">SUSE bug 1201689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204254">SUSE bug 1204254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2031/">CVE-2022-2031</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32744/">CVE-2022-32744</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32745/">CVE-2022-32745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-3437/">CVE-2022-3437</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728124" comment="ctdb-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728209" comment="ctdb-pcp-pmda-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728098" comment="libsamba-policy-devel-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728099" comment="libsamba-policy-python3-devel-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728100" comment="libsamba-policy0-python3-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728210" comment="libsamba-policy0-python3-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728211" comment="libsamba-policy0-python3-64bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728101" comment="samba-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728123" comment="samba-ad-dc-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728102" comment="samba-ad-dc-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728103" comment="samba-ad-dc-libs-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728104" comment="samba-ceph-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728105" comment="samba-client-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728106" comment="samba-client-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728212" comment="samba-client-64bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728107" comment="samba-client-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728108" comment="samba-client-libs-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728109" comment="samba-devel-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728110" comment="samba-devel-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728213" comment="samba-doc-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728111" comment="samba-dsdb-modules-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728112" comment="samba-gpupdate-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728113" comment="samba-ldb-ldap-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728114" comment="samba-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728115" comment="samba-libs-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728214" comment="samba-libs-64bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728116" comment="samba-libs-python3-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728215" comment="samba-libs-python3-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728216" comment="samba-libs-python3-64bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728117" comment="samba-python3-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728217" comment="samba-test-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728118" comment="samba-tool-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728119" comment="samba-winbind-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728120" comment="samba-winbind-libs-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728121" comment="samba-winbind-libs-32bit-4.15.12+git.535.7750e5c95ef-150300.3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53069" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1206134" ref_url="https://bugzilla.suse.com/1206134" source="BUGZILLA"/>
		<reference ref_id="1206135" ref_url="https://bugzilla.suse.com/1206135" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2022-41720" ref_url="https://www.suse.com/security/cve/CVE-2022-41720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013213.html" source="SUSE-SU"/>
		<description>
This update for go1.19 fixes the following issues:

Update to version 1.19.4, includes the following security fixes:

- CVE-2022-41717: net/http: limit canonical header cache by bytes, not entries (bsc#1206135).
- CVE-2022-41720: os, net/http: avoid escapes from os.DirFS and http.Dir on Windows (bsc#1206134).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-09"/>
	<updated date="2022-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206134">SUSE bug 1206134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206135">SUSE bug 1206135</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41720/">CVE-2022-41720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727820" comment="go1.19-1.19.4-150000.1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727821" comment="go1.19-doc-1.19.4-150000.1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727822" comment="go1.19-race-1.19.4-150000.1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53070" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1206134" ref_url="https://bugzilla.suse.com/1206134" source="BUGZILLA"/>
		<reference ref_id="1206135" ref_url="https://bugzilla.suse.com/1206135" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2022-41720" ref_url="https://www.suse.com/security/cve/CVE-2022-41720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013214.html" source="SUSE-SU"/>
		<description>
This update for go1.18 fixes the following issues:

Update to version 1.18.9, includes the following security fixes:

- CVE-2022-41717: net/http: limit canonical header cache by bytes, not entries (bsc#1206135)
- CVE-2022-41720: os, net/http: avoid escapes from os.DirFS and http.Dir on Windows (bsc#1206134)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-09"/>
	<updated date="2022-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206134">SUSE bug 1206134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206135">SUSE bug 1206135</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41720/">CVE-2022-41720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727817" comment="go1.18-1.18.9-150000.1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727818" comment="go1.18-doc-1.18.9-150000.1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727819" comment="go1.18-race-1.18.9-150000.1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53071" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204642" ref_url="https://bugzilla.suse.com/1204642" source="BUGZILLA"/>
		<reference ref_id="1205422" ref_url="https://bugzilla.suse.com/1205422" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570/" source="CVE"/>
		<reference ref_id="CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013217.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-3570: Fixed heap buffer overflows in tiffcrop.c (bsc#1205422).
- CVE-2022-3598: Fixed out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c [bsc#1204642]
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204642">SUSE bug 1204642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205422">SUSE bug 1205422</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727224" comment="libtiff-devel-4.0.9-150000.45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727225" comment="libtiff-devel-32bit-4.0.9-150000.45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727226" comment="libtiff5-4.0.9-150000.45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727227" comment="libtiff5-32bit-4.0.9-150000.45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727228" comment="tiff-4.0.9-150000.45.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53072" version="1" class="patch">
	<metadata>
		<title>Security update for grafana (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188571" ref_url="https://bugzilla.suse.com/1188571" source="BUGZILLA"/>
		<reference ref_id="1189520" ref_url="https://bugzilla.suse.com/1189520" source="BUGZILLA"/>
		<reference ref_id="1192383" ref_url="https://bugzilla.suse.com/1192383" source="BUGZILLA"/>
		<reference ref_id="1192763" ref_url="https://bugzilla.suse.com/1192763" source="BUGZILLA"/>
		<reference ref_id="1193492" ref_url="https://bugzilla.suse.com/1193492" source="BUGZILLA"/>
		<reference ref_id="1193686" ref_url="https://bugzilla.suse.com/1193686" source="BUGZILLA"/>
		<reference ref_id="1199810" ref_url="https://bugzilla.suse.com/1199810" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="1203596" ref_url="https://bugzilla.suse.com/1203596" source="BUGZILLA"/>
		<reference ref_id="1203597" ref_url="https://bugzilla.suse.com/1203597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-29170" ref_url="https://www.suse.com/security/cve/CVE-2022-29170/" source="CVE"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<reference ref_id="CVE-2022-35957" ref_url="https://www.suse.com/security/cve/CVE-2022-35957/" source="CVE"/>
		<reference ref_id="CVE-2022-36062" ref_url="https://www.suse.com/security/cve/CVE-2022-36062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" source="SUSE-SU"/>
		<description>
This update for grafana fixes the following issues:

Version update from 8.3.10 to 8.5.13 (jsc#PED-2145):

- Security fixes:
  * CVE-2022-36062: (bsc#1203596)
  * CVE-2022-35957: (bsc#1203597)
  * CVE-2022-31107: (bsc#1201539)
  * CVE-2022-31097: (bsc#1201535)
  * CVE-2022-29170: (bsc#1199810)
  * CVE-2021-43813, CVE-2021-43815: (bsc#1193686)
  * CVE-2021-43798: (bsc#1193492)
  * CVE-2021-41244: (bsc#1192763)
  * CVE-2021-41174: (bsc#1192383)
  * CVE-2021-3711: (bsc#1189520)
  * CVE-2021-36222: (bsc#1188571)

- Features and enhancements:
  * AccessControl: Disable user remove and user update roles when they do not have the permissions
  * AccessControl: Provisioning for teams
  * Alerting: Add custom grouping to Alert Panel
  * Alerting: Add safeguard for migrations that might cause dataloss
  * Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled
  * Alerting: Grafana uses &gt; instead of &gt;= when checking the For duration
  * Alerting: Move slow queries in the scheduler to another goroutine
  * Alerting: Remove disabled flag for data source when migrating alerts
  * Alerting: Show notification tab of legacy alerting only to editor
  * Alerting: Update migration to migrate only alerts that belon to existing org\dashboard
  * Alerting: Use expanded labels in dashboard annotations
  * Alerting: Use time.Ticker instead of alerting.Ticker in ngalert
  * Analytics: Add user id tracking to google analytics
  * Angular: Add AngularJS plugin support deprecation plan to docs site
  * API: Add usage stats preview endpoint
  * API: Extract OpenAPI specification from source code using go-swagger
  * Auth: implement auto_sign_up for auth.jwt
  * Azure monitor Logs: Optimize data fetching in resource picker
  * Azure Monitor Logs: Order subscriptions in resource picker by name
  * Azure Monitor: Include datasource ref when interpolating variables.
  * AzureMonitor: Add support for not equals and startsWith operators when creating Azure Metrics dimension filters.
  * AzureMonitor: Do not quote variables when a custom 'All' variable option is used
  * AzureMonitor: Filter list of resources by resourceType
  * AzureMonitor: Update allowed namespaces
  * BarChart: color by field, x time field, bar radius, label skipping
  * Chore: Implement OpenTelemetry in Grafana
  * Cloud Monitoring: Adds metric type to Metric drop down options
  * CloudMonitor: Correctly encode default project response
  * CloudWatch: Add all ElastiCache Redis Metrics
  * CloudWatch: Add Data Lifecycle Manager metrics and dimension
  * CloudWatch: Add Missing Elasticache Host-level metrics
  * CloudWatch: Add multi-value template variable support for log group names in logs query builder
  * CloudWatch: Add new AWS/ES metrics. #43034, @sunker
  * Cloudwatch: Add support for AWS/PrivateLink* metrics and dimensions
  * Cloudwatch: Add support for new AWS/RDS EBS* metrics
  * Cloudwatch: Add syntax highlighting and autocomplete for 'Metric Search'
  * Cloudwatch: Add template variable query function for listing log groups
  * Configuration: Add ability to customize okta login button name and icon
  * Elasticsearch: Add deprecation notice for &lt; 7.10 versions.
  * Explore: Support custom display label for exemplar links for Prometheus datasource
  * Hotkeys: Make time range absolute/permanent
  * InfluxDB: Use backend for influxDB by default via feature toggle
  * Legend: Use correct unit for percent and count calculations
  * Logs: Escape windows newline into single newline
  * Loki: Add unpack to autocomplete suggestions
  * Loki: Use millisecond steps in Grafana 8.5.x.
  * Playlists: Enable sharing direct links to playlists
  * Plugins: Allow using both Function and Class components for app plugins
  * Plugins: Expose emotion/react to plugins to prevent load failures
  * Plugins: Introduce HTTP 207 Multi Status response to api/ds/query
  * Rendering: Add support for renderer token
  * Setting: Support configuring feature toggles with bools instead of just passing an array
  * SQLStore: Prevent concurrent migrations
  * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations
  * Tempo: Switch out Select with AsyncSelect component to get loading state in Tempo Search
  * TimeSeries: Add migration for Graph panel's transform series override
  * TimeSeries: Add support for negative Y and constant transform
  * TimeSeries: Preserve null/undefined values when performing negative y transform
  * Traces: Filter by service/span name and operation in Tempo and Jaeger
  * Transformations: Add 'JSON' field type to ConvertFieldTypeTransformer
  * Transformations: Add an All Unique Values Reducer
  * Transformers: avoid error when the ExtractFields source field is missing

- Breaking changes:
  * For a data source query made via /api/ds/query:
    + If the DatasourceQueryMultiStatus feature is enabled and the data source response has an error set as part of the
      DataResponse, the resulting HTTP status code is now '207 Multi Status' instead of '400 Bad gateway'
    + If the DatasourceQueryMultiStatus feature is not enabled and the data source response has an error set as part of
      the DataResponse, the resulting HTTP status code is '400 BadRequest' (no breaking change)
  * For a proxied request, e.g. Grafana's datasource or plugin proxy: 
    + If the request is cancelled, e.g. from the browser/by the client, the HTTP status code is now '499 Client closed'
      request instead of 502 Bad gateway If the request times out, e.g. takes longer time than allowed, the HTTP status
      code is now '504 Gateway timeout' instead of '502 Bad gateway'.
    + The change in behavior is that negative-valued series are now stacked downwards from 0 (in their own stacks),
      rather than downwards from the top of the positive stacks. We now automatically group stacks by Draw style, Line
      interpolation, and Bar alignment, making it impossible to stack bars on top of lines, or smooth lines on top of
      stepped lines
    + The meaning of the default data source has now changed from being a persisted property in a panel. Before when
      you selected the default data source for a panel and later changed the default data source to another data source
      it would change all panels who were configured to use the default data source. From  now on the default data
      source is just the default for new panels and changing the default will not impact any currently saved dashboards
    + The Tooltip component provided by @grafana/ui is no longer automatically interactive (that is you can hover onto
      it and click a link or select text). It will from now on by default close automatically when you mouse out
      from the trigger element. To make tooltips behave like before set the new interactive property to true.

- Deprecations:
  * /api/tsdb/query API has been deprecated, please use /api/ds/query instead
  * AngularJS plugin support is now in a deprecated state. The documentation site has an article with more details on why, when, and how
  
- Bug fixes:
  * Alerting: Add contact points provisioning API
  * Alerting: add field for custom slack endpoint
  * Alerting: Add resolved count to notification title when both firing and resolved present
  * Alerting: Alert rule should wait For duration when execution error state is Alerting
  * Alerting: Allow disabling override timings for notification policies
  * Alerting: Allow serving images from custom url path
  * Alerting: Apply Custom Headers to datasource queries
  * Alerting: Classic conditions can now display multiple values
  * Alerting: correctly show all alerts in a folder
  * Alerting: Display query from grafana-managed alert rules on /api/v1/rules
  * Alerting: Do not overwrite existing alert rule condition
  * Alerting: Enhance support for arbitrary group names in managed alerts
  * Alerting: Fix access to alerts for viewer with editor permissions when RBAC is disabled
  * Alerting: Fix anonymous access to alerting
  * Alerting: Fix migrations by making send_alerts_to field nullable
  * Alerting: Fix RBAC actions for notification policies
  * Alerting: Fix use of &gt; instead of &gt;= when checking the For duration
  * Alerting: Remove double quotes from matchers
  * API: Include userId, orgId, uname in request logging middleware
  * Auth: Guarantee consistency of signed SigV4 headers
  * Azure Monitor : Adding json formatting of error messages in Panel Header Corner and Inspect Error Tab
  * Azure Monitor: Add 2 more Curated Dashboards for VM Insights
  * Azure Monitor: Bug Fix for incorrect variable cascading for template variables
  * Azure Monitor: Fix space character encoding for metrics query link to Azure Portal
  * Azure Monitor: Fixes broken log queries that use workspace
  * Azure Monitor: Small bug fixes for Resource Picker
  * AzureAd Oauth: Fix strictMode to reject users without an assigned role
  * AzureMonitor: Fixes metric definition for Azure Storage queue/file/blob/table resources
  * Cloudwatch : Fixed reseting metric name when changing namespace in Metric Query
  * CloudWatch: Added missing MemoryDB Namespace metrics
  * CloudWatch: Fix MetricName resetting on Namespace change.
  * Cloudwatch: Fix template variables in variable queries.
  * CloudWatch: Fix variable query tag migration
  * CloudWatch: Handle new error codes for MetricInsights
  * CloudWatch: List all metrics properly in SQL autocomplete
  * CloudWatch: Prevent log groups from being removed on query change
  * CloudWatch: Remove error message when using multi-valued template vars in region field
  * CloudWatch: Run query on blur in logs query field
  * CloudWatch: Use default http client from aws-sdk-go
  * Dashboard: Fix dashboard update permission check
  * Dashboard: Fixes random scrolling on time range change
  * Dashboard: Template variables are now correctly persisted when clicking breadcrumb links
  * DashboardExport: Fix exporting and importing dashboards where query data source ended up as incorrect
  * DashboardPage: Remember scroll position when coming back panel edit / view panel
  * Dashboards: Fixes repeating by row and no refresh
  * Dashboards: Show changes in save dialog
  * DataSource: Default data source is no longer a persisted state but just the default data source for new panels
  * DataSourcePlugin API: Allow queries import when changing data source type
  * Elasticsearch: Respect maxConcurrentShardRequests datasource setting
  * Explore: Allow users to save Explore state to a new panel in a new dashboard
  * Explore: Avoid locking timepicker when range is inverted.
  * Explore: Fix closing split pane when logs panel is used
  * Explore: Prevent direct access to explore if disabled via feature toggle
  * Explore: Remove return to panel button
  * FileUpload: clicking the Upload file button now opens their modal correctly
  * Gauge: Fixes blank viz when data link exists and orientation was horizontal
  * GrafanaUI: Fix color of links in error Tooltips in light theme
  * Histogram Panel: Take decimal into consideration
  * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram
  * Instrumentation: Fix HTTP request instrumentation of authentication failures
  * Instrumentation: Make backend plugin metrics endpoints available with optional authentication
  * Instrumentation: Proxy status code correction and various improvements
  * LibraryPanels: Fix library panels not connecting properly in imported dashboards
  * LibraryPanels: Prevent long descriptions and names from obscuring the delete button
  * Logger: Use specified format for file logger
  * Logging: Introduce feature toggle to activate gokit/log format
  * Logs: Handle missing fields in dataframes better
  * Loki: Improve unpack parser handling
  * ManageDashboards: Fix error when deleting all dashboards from folder view
  * Middleware: Fix IPv6 host parsing in CSRF check
  * Navigation: Prevent navbar briefly showing on login
  * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney
  * OAuth: Fix parsing of ID token if header contains non-string value
  * Panel Edit: Options search now works correctly when a logarithmic scale option is set
  * Panel Edit: Visualization search now works correctly with special characters
  * Plugins Catalog: Fix styling of hyperlinks
  * Plugins: Add deprecation notice for /api/tsdb/query endpoint
  * Plugins: Adding support for traceID field to accept variables
  * Plugins: Ensure catching all appropriate 4xx api/ds/query scenarios
  * Postgres: Return tables with hyphenated schemes
  * PostgreSQL: __unixEpochGroup to support arithmetic expression as argument
  * Profile/Help: Expose option to disable profile section and help menu
  * Prometheus: Enable new visual query builder by default
  * Provisioning: Fix duplicate validation when multiple organizations have been configured inserted
  * RBAC: Fix Anonymous Editors missing dashboard controls
  * RolePicker: Fix menu position on smaller screens
  * SAML: Allow disabling of SAML signups
  * Search: Sort results correctly when using postgres
  * Security: Fixes minor code scanning security warnings in old vendored javascript libs
  * Table panel: Fix horizontal scrolling when pagination is enabled
  * Table panel: Show datalinks for cell display modes JSON View and Gauge derivates
  * Table: Fix filter crashes table
  * Table: New pagination option
  * TablePanel: Add cell inspect option
  * TablePanel: Do not prefix columns with frame name if multipleframes and override active
  * TagsInput: Fix tags remove button accessibility issues
  * Tempo / Trace Viewer: Support Span Links in Trace Viewer
  * Tempo: Download span references in data inspector
  * Tempo: Separate trace to logs and loki search datasource config
  * TextPanel: Sanitize after markdown has been rendered to html
  * TimeRange: Fixes updating time range from url and browser history
  * TimeSeries: Fix detection &amp; rendering of sparse datapoints
  * Timeseries: Fix outside range stale state
  * TimeSeries: Properly stack series with missing datapoints
  * TimeSeries: Sort tooltip values based on raw values
  * Tooltip: Fix links not legible in Tooltips when using light theme
  * Tooltip: Sort decimals using standard numeric compare
  * Trace View: Show number of child spans
  * Transformations: Support escaped characters in key-value pair parsing
  * Transforms: Labels to fields, fix label picker layout
  * Variables: Ensure variables in query params are correctly recognised
  * Variables: Fix crash when changing query variable datasource
  * Variables: Fixes issue with data source variables not updating queries with variable
  * Visualizations: Stack negative-valued series downwards

- Plugin development fixes:
  * Card: Increase clickable area when meta items are present.
  * ClipboardButton: Use a fallback when the Clipboard API is unavailable
  * Loki: Fix operator description propup from being shortened.
  * OAuth: Add setting to skip org assignment for external users
  * Tooltips: Make tooltips non interactive by default
  * Tracing: Add option to map tag names to log label names in trace to logs settings
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189520">SUSE bug 1189520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192383">SUSE bug 1192383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192763">SUSE bug 1192763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193492">SUSE bug 1193492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193686">SUSE bug 1193686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199810">SUSE bug 1199810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203596">SUSE bug 1203596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203597">SUSE bug 1203597</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-29170/">CVE-2022-29170</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35957/">CVE-2022-35957</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36062/">CVE-2022-36062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726647" comment="grafana-8.5.13-150200.3.29.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53073" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188571" ref_url="https://bugzilla.suse.com/1188571" source="BUGZILLA"/>
		<reference ref_id="1189520" ref_url="https://bugzilla.suse.com/1189520" source="BUGZILLA"/>
		<reference ref_id="1192383" ref_url="https://bugzilla.suse.com/1192383" source="BUGZILLA"/>
		<reference ref_id="1192763" ref_url="https://bugzilla.suse.com/1192763" source="BUGZILLA"/>
		<reference ref_id="1193492" ref_url="https://bugzilla.suse.com/1193492" source="BUGZILLA"/>
		<reference ref_id="1193686" ref_url="https://bugzilla.suse.com/1193686" source="BUGZILLA"/>
		<reference ref_id="1199810" ref_url="https://bugzilla.suse.com/1199810" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="1202945" ref_url="https://bugzilla.suse.com/1202945" source="BUGZILLA"/>
		<reference ref_id="1203283" ref_url="https://bugzilla.suse.com/1203283" source="BUGZILLA"/>
		<reference ref_id="1203596" ref_url="https://bugzilla.suse.com/1203596" source="BUGZILLA"/>
		<reference ref_id="1203597" ref_url="https://bugzilla.suse.com/1203597" source="BUGZILLA"/>
		<reference ref_id="1203599" ref_url="https://bugzilla.suse.com/1203599" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-41174" ref_url="https://www.suse.com/security/cve/CVE-2021-41174/" source="CVE"/>
		<reference ref_id="CVE-2021-41244" ref_url="https://www.suse.com/security/cve/CVE-2021-41244/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-29170" ref_url="https://www.suse.com/security/cve/CVE-2022-29170/" source="CVE"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<reference ref_id="CVE-2022-35957" ref_url="https://www.suse.com/security/cve/CVE-2022-35957/" source="CVE"/>
		<reference ref_id="CVE-2022-36062" ref_url="https://www.suse.com/security/cve/CVE-2022-36062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013220.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

dracut-saltboot:

- Update to version 0.1.1665997480.587fa10
  * Add dependencies on xz and gzip to support compressed images

golang-github-boynux-squid_exporter:

- Exclude s390 architecture
- Enhanced to build on Enterprise Linux 8.

grafana:

- Version update from 8.3.10 to 8.5.13 (jsc#PED-2145)
- Security fixes:
  * CVE-2022-36062: (bsc#1203596)
  * CVE-2022-35957: (bsc#1203597)
  * CVE-2022-31107: (bsc#1201539)
  * CVE-2022-31097: (bsc#1201535)
  * CVE-2022-29170: (bsc#1199810)
  * CVE-2021-43813, CVE-2021-43815: (bsc#1193686)
  * CVE-2021-43798: (bsc#1193492)
  * CVE-2021-41244: (bsc#1192763)
  * CVE-2021-41174: (bsc#1192383)
  * CVE-2021-3711: (bsc#1189520)
  * CVE-2021-36222: (bsc#1188571)
- Features and enhancements:
  * AccessControl: Disable user remove and user update roles when they do not have the permissions
  * AccessControl: Provisioning for teams
  * Alerting: Add custom grouping to Alert Panel
  * Alerting: Add safeguard for migrations that might cause dataloss
  * Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled
  * Alerting: Grafana uses &gt; instead of &gt;= when checking the For duration
  * Alerting: Move slow queries in the scheduler to another goroutine
  * Alerting: Remove disabled flag for data source when migrating alerts
  * Alerting: Show notification tab of legacy alerting only to editor
  * Alerting: Update migration to migrate only alerts that belon to existing org\dashboard
  * Alerting: Use expanded labels in dashboard annotations
  * Alerting: Use time.Ticker instead of alerting.Ticker in ngalert
  * Analytics: Add user id tracking to google analytics
  * Angular: Add AngularJS plugin support deprecation plan to docs site
  * API: Add usage stats preview endpoint
  * API: Extract OpenAPI specification from source code using go-swagger
  * Auth: implement auto_sign_up for auth.jwt
  * Azure monitor Logs: Optimize data fetching in resource picker
  * Azure Monitor Logs: Order subscriptions in resource picker by name
  * Azure Monitor: Include datasource ref when interpolating variables.
  * AzureMonitor: Add support for not equals and startsWith operators when creating Azure Metrics dimension filters.
  * AzureMonitor: Do not quote variables when a custom 'All' variable option is used
  * AzureMonitor: Filter list of resources by resourceType
  * AzureMonitor: Update allowed namespaces
  * BarChart: color by field, x time field, bar radius, label skipping
  * Chore: Implement OpenTelemetry in Grafana
  * Cloud Monitoring: Adds metric type to Metric drop down options
  * CloudMonitor: Correctly encode default project response
  * CloudWatch: Add all ElastiCache Redis Metrics
  * CloudWatch: Add Data Lifecycle Manager metrics and dimension
  * CloudWatch: Add Missing Elasticache Host-level metrics
  * CloudWatch: Add multi-value template variable support for log group names in logs query builder
  * CloudWatch: Add new AWS/ES metrics. #43034, @sunker
  * Cloudwatch: Add support for AWS/PrivateLink* metrics and dimensions
  * Cloudwatch: Add support for new AWS/RDS EBS* metrics
  * Cloudwatch: Add syntax highlighting and autocomplete for 'Metric Search'
  * Cloudwatch: Add template variable query function for listing log groups
  * Configuration: Add ability to customize okta login button name and icon
  * Elasticsearch: Add deprecation notice for &lt; 7.10 versions.
  * Explore: Support custom display label for exemplar links for Prometheus datasource
  * Hotkeys: Make time range absolute/permanent
  * InfluxDB: Use backend for influxDB by default via feature toggle
  * Legend: Use correct unit for percent and count calculations
  * Logs: Escape windows newline into single newline
  * Loki: Add unpack to autocomplete suggestions
  * Loki: Use millisecond steps in Grafana 8.5.x.
  * Playlists: Enable sharing direct links to playlists
  * Plugins: Allow using both Function and Class components for app plugins
  * Plugins: Expose emotion/react to plugins to prevent load failures
  * Plugins: Introduce HTTP 207 Multi Status response to api/ds/query
  * Rendering: Add support for renderer token
  * Setting: Support configuring feature toggles with bools instead of just passing an array
  * SQLStore: Prevent concurrent migrations
  * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations
  * Tempo: Switch out Select with AsyncSelect component to get loading state in Tempo Search
  * TimeSeries: Add migration for Graph panel's transform series override
  * TimeSeries: Add support for negative Y and constant transform
  * TimeSeries: Preserve null/undefined values when performing negative y transform
  * Traces: Filter by service/span name and operation in Tempo and Jaeger
  * Transformations: Add 'JSON' field type to ConvertFieldTypeTransformer
  * Transformations: Add an All Unique Values Reducer
  * Transformers: avoid error when the ExtractFields source field is missing
- Breaking changes:
  * For a data source query made via /api/ds/query:
    + If the DatasourceQueryMultiStatus feature is enabled and the data source response has an error set as part of the
      DataResponse, the resulting HTTP status code is now '207 Multi Status' instead of '400 Bad gateway'
    + If the DatasourceQueryMultiStatus feature is not enabled and the data source response has an error set as part of
      the DataResponse, the resulting HTTP status code is '400 BadRequest' (no breaking change)
  * For a proxied request, e.g. Grafana's datasource or plugin proxy: 
    + If the request is cancelled, e.g. from the browser/by the client, the HTTP status code is now '499 Client closed'
      request instead of 502 Bad gateway If the request times out, e.g. takes longer time than allowed, the HTTP status
      code is now '504 Gateway timeout' instead of '502 Bad gateway'.
    + The change in behavior is that negative-valued series are now stacked downwards from 0 (in their own stacks),
      rather than downwards from the top of the positive stacks. We now automatically group stacks by Draw style, Line
      interpolation, and Bar alignment, making it impossible to stack bars on top of lines, or smooth lines on top of
      stepped lines
    + The meaning of the default data source has now changed from being a persisted property in a panel. Before when
      you selected the default data source for a panel and later changed the default data source to another data source
      it would change all panels who were configured to use the default data source. From  now on the default data
      source is just the default for new panels and changing the default will not impact any currently saved dashboards
    + The Tooltip component provided by @grafana/ui is no longer automatically interactive (that is you can hover onto
      it and click a link or select text). It will from now on by default close automatically when you mouse out
      from the trigger element. To make tooltips behave like before set the new interactive property to true.
- Deprecations:
  * /api/tsdb/query API has been deprecated, please use /api/ds/query instead
  * AngularJS plugin support is now in a deprecated state. The documentation site has an article with more details on why, when, and how
- Bug fixes:
  * Alerting: Add contact points provisioning API
  * Alerting: add field for custom slack endpoint
  * Alerting: Add resolved count to notification title when both firing and resolved present
  * Alerting: Alert rule should wait For duration when execution error state is Alerting
  * Alerting: Allow disabling override timings for notification policies
  * Alerting: Allow serving images from custom url path
  * Alerting: Apply Custom Headers to datasource queries
  * Alerting: Classic conditions can now display multiple values
  * Alerting: correctly show all alerts in a folder
  * Alerting: Display query from grafana-managed alert rules on /api/v1/rules
  * Alerting: Do not overwrite existing alert rule condition
  * Alerting: Enhance support for arbitrary group names in managed alerts
  * Alerting: Fix access to alerts for viewer with editor permissions when RBAC is disabled
  * Alerting: Fix anonymous access to alerting
  * Alerting: Fix migrations by making send_alerts_to field nullable
  * Alerting: Fix RBAC actions for notification policies
  * Alerting: Fix use of &gt; instead of &gt;= when checking the For duration
  * Alerting: Remove double quotes from matchers
  * API: Include userId, orgId, uname in request logging middleware
  * Auth: Guarantee consistency of signed SigV4 headers
  * Azure Monitor : Adding json formatting of error messages in Panel Header Corner and Inspect Error Tab
  * Azure Monitor: Add 2 more Curated Dashboards for VM Insights
  * Azure Monitor: Bug Fix for incorrect variable cascading for template variables
  * Azure Monitor: Fix space character encoding for metrics query link to Azure Portal
  * Azure Monitor: Fixes broken log queries that use workspace
  * Azure Monitor: Small bug fixes for Resource Picker
  * AzureAd Oauth: Fix strictMode to reject users without an assigned role
  * AzureMonitor: Fixes metric definition for Azure Storage queue/file/blob/table resources
  * Cloudwatch : Fixed reseting metric name when changing namespace in Metric Query
  * CloudWatch: Added missing MemoryDB Namespace metrics
  * CloudWatch: Fix MetricName resetting on Namespace change.
  * Cloudwatch: Fix template variables in variable queries.
  * CloudWatch: Fix variable query tag migration
  * CloudWatch: Handle new error codes for MetricInsights
  * CloudWatch: List all metrics properly in SQL autocomplete
  * CloudWatch: Prevent log groups from being removed on query change
  * CloudWatch: Remove error message when using multi-valued template vars in region field
  * CloudWatch: Run query on blur in logs query field
  * CloudWatch: Use default http client from aws-sdk-go
  * Dashboard: Fix dashboard update permission check
  * Dashboard: Fixes random scrolling on time range change
  * Dashboard: Template variables are now correctly persisted when clicking breadcrumb links
  * DashboardExport: Fix exporting and importing dashboards where query data source ended up as incorrect
  * DashboardPage: Remember scroll position when coming back panel edit / view panel
  * Dashboards: Fixes repeating by row and no refresh
  * Dashboards: Show changes in save dialog
  * DataSource: Default data source is no longer a persisted state but just the default data source for new panels
  * DataSourcePlugin API: Allow queries import when changing data source type
  * Elasticsearch: Respect maxConcurrentShardRequests datasource setting
  * Explore: Allow users to save Explore state to a new panel in a new dashboard
  * Explore: Avoid locking timepicker when range is inverted.
  * Explore: Fix closing split pane when logs panel is used
  * Explore: Prevent direct access to explore if disabled via feature toggle
  * Explore: Remove return to panel button
  * FileUpload: clicking the Upload file button now opens their modal correctly
  * Gauge: Fixes blank viz when data link exists and orientation was horizontal
  * GrafanaUI: Fix color of links in error Tooltips in light theme
  * Histogram Panel: Take decimal into consideration
  * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram
  * Instrumentation: Fix HTTP request instrumentation of authentication failures
  * Instrumentation: Make backend plugin metrics endpoints available with optional authentication
  * Instrumentation: Proxy status code correction and various improvements
  * LibraryPanels: Fix library panels not connecting properly in imported dashboards
  * LibraryPanels: Prevent long descriptions and names from obscuring the delete button
  * Logger: Use specified format for file logger
  * Logging: Introduce feature toggle to activate gokit/log format
  * Logs: Handle missing fields in dataframes better
  * Loki: Improve unpack parser handling
  * ManageDashboards: Fix error when deleting all dashboards from folder view
  * Middleware: Fix IPv6 host parsing in CSRF check
  * Navigation: Prevent navbar briefly showing on login
  * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney
  * OAuth: Fix parsing of ID token if header contains non-string value
  * Panel Edit: Options search now works correctly when a logarithmic scale option is set
  * Panel Edit: Visualization search now works correctly with special characters
  * Plugins Catalog: Fix styling of hyperlinks
  * Plugins: Add deprecation notice for /api/tsdb/query endpoint
  * Plugins: Adding support for traceID field to accept variables
  * Plugins: Ensure catching all appropriate 4xx api/ds/query scenarios
  * Postgres: Return tables with hyphenated schemes
  * PostgreSQL: __unixEpochGroup to support arithmetic expression as argument
  * Profile/Help: Expose option to disable profile section and help menu
  * Prometheus: Enable new visual query builder by default
  * Provisioning: Fix duplicate validation when multiple organizations have been configured inserted
  * RBAC: Fix Anonymous Editors missing dashboard controls
  * RolePicker: Fix menu position on smaller screens
  * SAML: Allow disabling of SAML signups
  * Search: Sort results correctly when using postgres
  * Security: Fixes minor code scanning security warnings in old vendored javascript libs
  * Table panel: Fix horizontal scrolling when pagination is enabled
  * Table panel: Show datalinks for cell display modes JSON View and Gauge derivates
  * Table: Fix filter crashes table
  * Table: New pagination option
  * TablePanel: Add cell inspect option
  * TablePanel: Do not prefix columns with frame name if multipleframes and override active
  * TagsInput: Fix tags remove button accessibility issues
  * Tempo / Trace Viewer: Support Span Links in Trace Viewer
  * Tempo: Download span references in data inspector
  * Tempo: Separate trace to logs and loki search datasource config
  * TextPanel: Sanitize after markdown has been rendered to html
  * TimeRange: Fixes updating time range from url and browser history
  * TimeSeries: Fix detection &amp; rendering of sparse datapoints
  * Timeseries: Fix outside range stale state
  * TimeSeries: Properly stack series with missing datapoints
  * TimeSeries: Sort tooltip values based on raw values
  * Tooltip: Fix links not legible in Tooltips when using light theme
  * Tooltip: Sort decimals using standard numeric compare
  * Trace View: Show number of child spans
  * Transformations: Support escaped characters in key-value pair parsing
  * Transforms: Labels to fields, fix label picker layout
  * Variables: Ensure variables in query params are correctly recognised
  * Variables: Fix crash when changing query variable datasource
  * Variables: Fixes issue with data source variables not updating queries with variable
  * Visualizations: Stack negative-valued series downwards
- Plugin development fixes:
  * Card: Increase clickable area when meta items are present.
  * ClipboardButton: Use a fallback when the Clipboard API is unavailable
  * Loki: Fix operator description propup from being shortened.
  * OAuth: Add setting to skip org assignment for external users
  * Tooltips: Make tooltips non interactive by default
  * Tracing: Add option to map tag names to log label names in trace to logs settings

prometheus-blackbox_exporter:

- Add requirement for go1.18 (bsc#1203599)

spacecmd:

- Version 4.3.16-1
  * Fix dict_keys not supporting indexing in systems_setconfigchannelorger
  * Improve Proxy FQDN hint message
  * Added a warning message for traditional stack deprecation
  * Stop always showing help for valid proxy_container_config calls
  * Remove 'Undefined return code' from debug messages (bsc#1203283)

spacewalk-client-tools:

- Version 4.3.13-1
  * Update translation strings

uyuni-proxy-systemd-services:

- Version 4.3.7-1
  * Expose /etc/sysconfig/proxy variables to container services (bsc#1202945)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189520">SUSE bug 1189520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192383">SUSE bug 1192383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192763">SUSE bug 1192763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193492">SUSE bug 1193492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193686">SUSE bug 1193686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199810">SUSE bug 1199810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202945">SUSE bug 1202945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203283">SUSE bug 1203283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203596">SUSE bug 1203596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203597">SUSE bug 1203597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203599">SUSE bug 1203599</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41174/">CVE-2021-41174</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41244/">CVE-2021-41244</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-29170/">CVE-2022-29170</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35957/">CVE-2022-35957</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36062/">CVE-2022-36062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726468" comment="dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726469" comment="golang-github-boynux-squid_exporter-1.6-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726470" comment="golang-github-prometheus-promu-0.13.0-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726472" comment="spacecmd-4.3.16-150000.3.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53074" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204471" ref_url="https://bugzilla.suse.com/1204471" source="BUGZILLA"/>
		<reference ref_id="1204472" ref_url="https://bugzilla.suse.com/1204472" source="BUGZILLA"/>
		<reference ref_id="1204473" ref_url="https://bugzilla.suse.com/1204473" source="BUGZILLA"/>
		<reference ref_id="1204475" ref_url="https://bugzilla.suse.com/1204475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u352 (icedtea-3.25.0):

- CVE-2022-21619,CVE-2022-21624: Fixed difficult to exploit vulnerability allows unauthenticated attacker with network access and can cause unauthorized update, insert or delete access via multiple protocols (bsc#1204473,bsc#1204475).
- CVE-2022-21626: Fixed easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to cause partial denial of service (bsc#1204471).
- CVE-2022-21628: Fixed easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to cause partial denial of service (bsc#1204472).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727576" comment="java-1_8_0-openjdk-1.8.0.352-150000.3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727577" comment="java-1_8_0-openjdk-accessibility-1.8.0.352-150000.3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727578" comment="java-1_8_0-openjdk-demo-1.8.0.352-150000.3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727579" comment="java-1_8_0-openjdk-devel-1.8.0.352-150000.3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727580" comment="java-1_8_0-openjdk-headless-1.8.0.352-150000.3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727581" comment="java-1_8_0-openjdk-javadoc-1.8.0.352-150000.3.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727582" comment="java-1_8_0-openjdk-src-1.8.0.352-150000.3.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53075" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204822" ref_url="https://bugzilla.suse.com/1204822" source="BUGZILLA"/>
		<reference ref_id="1206189" ref_url="https://bugzilla.suse.com/1206189" source="BUGZILLA"/>
		<reference ref_id="1206190" ref_url="https://bugzilla.suse.com/1206190" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3725" ref_url="https://www.suse.com/security/cve/CVE-2022-3725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013223.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.10:

- CVE-2022-3725: OPUS dissector crash (bsc#1204822).
- Multiple dissector infinite loops (bsc#1206189).
- Kafka dissector memory exhaustion (bsc#1206190).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204822">SUSE bug 1204822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206189">SUSE bug 1206189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206190">SUSE bug 1206190</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3725/">CVE-2022-3725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727811" comment="libwireshark15-3.6.10-150000.3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727812" comment="libwiretap12-3.6.10-150000.3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727813" comment="libwsutil13-3.6.10-150000.3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727814" comment="wireshark-3.6.10-150000.3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727815" comment="wireshark-devel-3.6.10-150000.3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727816" comment="wireshark-ui-qt-3.6.10-150000.3.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53076" version="1" class="patch">
	<metadata>
		<title>Security update for libtpms (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187767" ref_url="https://bugzilla.suse.com/1187767" source="BUGZILLA"/>
		<reference ref_id="1204556" ref_url="https://bugzilla.suse.com/1204556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3623" ref_url="https://www.suse.com/security/cve/CVE-2021-3623/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013225.html" source="SUSE-SU"/>
		<description>
This update for libtpms fixes the following issues:

- CVE-2021-3623: Fixed out-of-bounds access when trying to resume the
  state of the vTPM (bsc#1187767)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187767">SUSE bug 1187767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204556">SUSE bug 1204556</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3623/">CVE-2021-3623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009727177" comment="libtpms-devel-0.8.2-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727178" comment="libtpms0-0.8.2-150300.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53077" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1206242" ref_url="https://bugzilla.suse.com/1206242" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 102.6.0 ESR (bsc#1206242):

- CVE-2022-46880: Use-after-free in WebGL
- CVE-2022-46872: Arbitrary file read from a compromised content process
- CVE-2022-46881: Memory corruption in WebGL
- CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions
- CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS
- CVE-2022-46882: Use-after-free in WebGL
- CVE-2022-46878: Memory safety bugs fixed in Firefox 108 and Firefox ESR 102.6
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<cve impact="critical" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728093" comment="MozillaFirefox-102.6.0-150200.152.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728094" comment="MozillaFirefox-branding-upstream-102.6.0-150200.152.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728095" comment="MozillaFirefox-devel-102.6.0-150200.152.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728096" comment="MozillaFirefox-translations-common-102.6.0-150200.152.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728097" comment="MozillaFirefox-translations-other-102.6.0-150200.152.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53078" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197284" ref_url="https://bugzilla.suse.com/1197284" source="BUGZILLA"/>
		<reference ref_id="1206065" ref_url="https://bugzilla.suse.com/1206065" source="BUGZILLA"/>
		<reference ref_id="1206235" ref_url="https://bugzilla.suse.com/1206235" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23471" ref_url="https://www.suse.com/security/cve/CVE-2022-23471/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013228.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

Update to containerd v1.6.12 including Docker v20.10.21-ce (bsc#1206065). 

Also includes the following fix:

- CVE-2022-23471: host memory exhaustion through Terminal resize goroutine leak (bsc#1206235).
- CVE-2022-27191: crash in a golang.org/x/crypto/ssh server (bsc#1197284).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-13"/>
	<updated date="2022-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197284">SUSE bug 1197284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206065">SUSE bug 1206065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206235">SUSE bug 1206235</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23471/">CVE-2022-23471</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728091" comment="containerd-1.6.12-150000.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728092" comment="containerd-ctr-1.6.12-150000.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53079" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1205874" ref_url="https://bugzilla.suse.com/1205874" source="BUGZILLA"/>
		<reference ref_id="1205875" ref_url="https://bugzilla.suse.com/1205875" source="BUGZILLA"/>
		<reference ref_id="1205876" ref_url="https://bugzilla.suse.com/1205876" source="BUGZILLA"/>
		<reference ref_id="1205877" ref_url="https://bugzilla.suse.com/1205877" source="BUGZILLA"/>
		<reference ref_id="1205878" ref_url="https://bugzilla.suse.com/1205878" source="BUGZILLA"/>
		<reference ref_id="1205879" ref_url="https://bugzilla.suse.com/1205879" source="BUGZILLA"/>
		<reference ref_id="1206017" ref_url="https://bugzilla.suse.com/1206017" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2022-46340: Server XTestSwapFakeInput stack overflow (bsc#1205874)
- CVE-2022-46341: Server XIPassiveUngrabDevice out-of-bounds access (bsc#1205877)
- CVE-2022-46342: Server XvdiSelectVideoNotify use-after-free (bsc#1205879)
- CVE-2022-46343: Server ScreenSaverSetAttributes use-after-free (bsc#1205878)
- CVE-2022-46344: Server XIChangeProperty out-of-bounds access (bsc#1205876)
- CVE-2022-4283: Reset the radio_groups pointer to NULL after freeing it (bsc#1206017)
- Xi: return an error from XI property changes if verification failed (bsc#1205875)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205875">SUSE bug 1205875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205876">SUSE bug 1205876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205877">SUSE bug 1205877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205878">SUSE bug 1205878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205879">SUSE bug 1205879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206017">SUSE bug 1206017</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728938" comment="xorg-x11-server-1.20.3-150200.22.5.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728939" comment="xorg-x11-server-extra-1.20.3-150200.22.5.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728941" comment="xorg-x11-server-sdk-1.20.3-150200.22.5.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728997" comment="xorg-x11-server-source-1.20.3-150200.22.5.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728931" comment="xorg-x11-server-wayland-1.20.3-150200.22.5.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53080" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_wsgi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1201634" ref_url="https://bugzilla.suse.com/1201634" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2255" ref_url="https://www.suse.com/security/cve/CVE-2022-2255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4488-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026894.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_wsgi fixes the following issues:

- CVE-2022-2255: Hardened the trusted proxy header filter to avoid bypass. (bsc#1201634)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-14"/>
	<updated date="2022-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201634">SUSE bug 1201634</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2255/">CVE-2022-2255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009716752" comment="apache2-mod_wsgi-4.5.18-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716753" comment="apache2-mod_wsgi-python3-4.5.18-150000.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53081" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178073" ref_url="https://bugzilla.suse.com/1178073" source="BUGZILLA"/>
		<reference ref_id="1194131" ref_url="https://bugzilla.suse.com/1194131" source="BUGZILLA"/>
		<reference ref_id="1194353" ref_url="https://bugzilla.suse.com/1194353" source="BUGZILLA"/>
		<reference ref_id="1194875" ref_url="https://bugzilla.suse.com/1194875" source="BUGZILLA"/>
		<reference ref_id="1195359" ref_url="https://bugzilla.suse.com/1195359" source="BUGZILLA"/>
		<reference ref_id="1196044" ref_url="https://bugzilla.suse.com/1196044" source="BUGZILLA"/>
		<reference ref_id="1196785" ref_url="https://bugzilla.suse.com/1196785" source="BUGZILLA"/>
		<reference ref_id="1196938" ref_url="https://bugzilla.suse.com/1196938" source="BUGZILLA"/>
		<reference ref_id="1200064" ref_url="https://bugzilla.suse.com/1200064" source="BUGZILLA"/>
		<reference ref_id="1200553" ref_url="https://bugzilla.suse.com/1200553" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3979" ref_url="https://www.suse.com/security/cve/CVE-2021-3979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013249.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

ceph was updated to the Pacific release (16.2.9-536-g41a9f9a5573):

+ (bsc#1195359, bsc#1200553) rgw: check bucket shard init status in RGWRadosBILogTrimCR 
+ (bsc#1194131) ceph-volume: honour osd_dmcrypt_key_size option (CVE-2021-3979)
+ (bsc#1200064,) Remove last vestiges of docker.io image paths
+ (bsc#1196044) cephadm: prometheus: The generatorURL in alerts is only using hostname
+ (bsc#1196785) cephadm: avoid crashing on expected non-zero exit
+ (jsc#SES-2515) High-availability NFS export 
+ (bsc#1194875) [SES7P] include/buffer: include &lt;memory&gt;
+ cephadm: update image paths to registry.suse.com
+ cephadm: use snmp-notifier image from registry.suse.de
+ cephadm: infer the default container image during pull 
+ mgr/cephadm: try to get FQDN for inventory address 
+ (bsc#1194875) common: fix FTBFS due to dout &amp; need_dynamic on GCC-12
+ (bsc#1196938) cephadm: preserve authorized_keys file during upgrade
+ Update Prometheus Container image paths (pr #459)
+ mgr/dashboard: Fix documentation URL (pr #456)
+ mgr/dashboard: Adapt downstream branded navigation page (pr #454)
+ Update prometheus-server version
+ (bsc#1194353) Downstream branding breaks dashboard npm build 
+ (bsc#1178073) mgr/dashboard: fix downstream NFS doc links
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2022-12-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178073">SUSE bug 1178073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194131">SUSE bug 1194131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194353">SUSE bug 1194353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194875">SUSE bug 1194875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195359">SUSE bug 1195359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196044">SUSE bug 1196044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196785">SUSE bug 1196785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196938">SUSE bug 1196938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200064">SUSE bug 1200064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200553">SUSE bug 1200553</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3979/">CVE-2021-3979</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009714720" comment="ceph-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714721" comment="ceph-base-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714478" comment="ceph-common-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714722" comment="ceph-fuse-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714723" comment="ceph-grafana-dashboards-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714724" comment="ceph-immutable-object-cache-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714725" comment="ceph-mds-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714726" comment="ceph-mgr-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714727" comment="ceph-mgr-cephadm-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714728" comment="ceph-mgr-dashboard-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714729" comment="ceph-mgr-diskprediction-local-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714730" comment="ceph-mgr-k8sevents-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714731" comment="ceph-mgr-modules-core-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714732" comment="ceph-mgr-rook-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714733" comment="ceph-mon-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714734" comment="ceph-osd-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714735" comment="ceph-prometheus-alerts-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714736" comment="ceph-radosgw-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714737" comment="ceph-test-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714738" comment="cephadm-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714739" comment="cephfs-shell-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714479" comment="libcephfs-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714480" comment="libcephfs2-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714481" comment="libfmt8-8.0.1-150300.7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714482" comment="librados-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714483" comment="librados2-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714484" comment="libradospp-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714485" comment="librbd-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714486" comment="librbd1-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714487" comment="librgw-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714488" comment="librgw2-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714489" comment="python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714490" comment="python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714491" comment="python3-cephfs-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714492" comment="python3-rados-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714493" comment="python3-rbd-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714494" comment="python3-rgw-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714495" comment="rados-objclass-devel-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714740" comment="rbd-fuse-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714741" comment="rbd-mirror-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714496" comment="rbd-nbd-16.2.9.536+g41a9f9a5573-150300.6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53082" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1192761" ref_url="https://bugzilla.suse.com/1192761" source="BUGZILLA"/>
		<reference ref_id="1200845" ref_url="https://bugzilla.suse.com/1200845" source="BUGZILLA"/>
		<reference ref_id="1201455" ref_url="https://bugzilla.suse.com/1201455" source="BUGZILLA"/>
		<reference ref_id="1203144" ref_url="https://bugzilla.suse.com/1203144" source="BUGZILLA"/>
		<reference ref_id="1203746" ref_url="https://bugzilla.suse.com/1203746" source="BUGZILLA"/>
		<reference ref_id="1203960" ref_url="https://bugzilla.suse.com/1203960" source="BUGZILLA"/>
		<reference ref_id="1204017" ref_url="https://bugzilla.suse.com/1204017" source="BUGZILLA"/>
		<reference ref_id="1204142" ref_url="https://bugzilla.suse.com/1204142" source="BUGZILLA"/>
		<reference ref_id="1204215" ref_url="https://bugzilla.suse.com/1204215" source="BUGZILLA"/>
		<reference ref_id="1204228" ref_url="https://bugzilla.suse.com/1204228" source="BUGZILLA"/>
		<reference ref_id="1204241" ref_url="https://bugzilla.suse.com/1204241" source="BUGZILLA"/>
		<reference ref_id="1204328" ref_url="https://bugzilla.suse.com/1204328" source="BUGZILLA"/>
		<reference ref_id="1204446" ref_url="https://bugzilla.suse.com/1204446" source="BUGZILLA"/>
		<reference ref_id="1204636" ref_url="https://bugzilla.suse.com/1204636" source="BUGZILLA"/>
		<reference ref_id="1204693" ref_url="https://bugzilla.suse.com/1204693" source="BUGZILLA"/>
		<reference ref_id="1204780" ref_url="https://bugzilla.suse.com/1204780" source="BUGZILLA"/>
		<reference ref_id="1204791" ref_url="https://bugzilla.suse.com/1204791" source="BUGZILLA"/>
		<reference ref_id="1204810" ref_url="https://bugzilla.suse.com/1204810" source="BUGZILLA"/>
		<reference ref_id="1204827" ref_url="https://bugzilla.suse.com/1204827" source="BUGZILLA"/>
		<reference ref_id="1204850" ref_url="https://bugzilla.suse.com/1204850" source="BUGZILLA"/>
		<reference ref_id="1204868" ref_url="https://bugzilla.suse.com/1204868" source="BUGZILLA"/>
		<reference ref_id="1204934" ref_url="https://bugzilla.suse.com/1204934" source="BUGZILLA"/>
		<reference ref_id="1204957" ref_url="https://bugzilla.suse.com/1204957" source="BUGZILLA"/>
		<reference ref_id="1204963" ref_url="https://bugzilla.suse.com/1204963" source="BUGZILLA"/>
		<reference ref_id="1204967" ref_url="https://bugzilla.suse.com/1204967" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205264" ref_url="https://bugzilla.suse.com/1205264" source="BUGZILLA"/>
		<reference ref_id="1205329" ref_url="https://bugzilla.suse.com/1205329" source="BUGZILLA"/>
		<reference ref_id="1205330" ref_url="https://bugzilla.suse.com/1205330" source="BUGZILLA"/>
		<reference ref_id="1205428" ref_url="https://bugzilla.suse.com/1205428" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1205567" ref_url="https://bugzilla.suse.com/1205567" source="BUGZILLA"/>
		<reference ref_id="1205617" ref_url="https://bugzilla.suse.com/1205617" source="BUGZILLA"/>
		<reference ref_id="1205671" ref_url="https://bugzilla.suse.com/1205671" source="BUGZILLA"/>
		<reference ref_id="1205700" ref_url="https://bugzilla.suse.com/1205700" source="BUGZILLA"/>
		<reference ref_id="1205705" ref_url="https://bugzilla.suse.com/1205705" source="BUGZILLA"/>
		<reference ref_id="1205709" ref_url="https://bugzilla.suse.com/1205709" source="BUGZILLA"/>
		<reference ref_id="1205753" ref_url="https://bugzilla.suse.com/1205753" source="BUGZILLA"/>
		<reference ref_id="1205984" ref_url="https://bugzilla.suse.com/1205984" source="BUGZILLA"/>
		<reference ref_id="1205985" ref_url="https://bugzilla.suse.com/1205985" source="BUGZILLA"/>
		<reference ref_id="1205986" ref_url="https://bugzilla.suse.com/1205986" source="BUGZILLA"/>
		<reference ref_id="1205987" ref_url="https://bugzilla.suse.com/1205987" source="BUGZILLA"/>
		<reference ref_id="1205988" ref_url="https://bugzilla.suse.com/1205988" source="BUGZILLA"/>
		<reference ref_id="1205989" ref_url="https://bugzilla.suse.com/1205989" source="BUGZILLA"/>
		<reference ref_id="1206207" ref_url="https://bugzilla.suse.com/1206207" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129/" source="CVE"/>
		<reference ref_id="CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c of the component IPsec (bsc#1204631).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() of the component IPv6 Handler (bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).
- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).
- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).

The following non-security bugs were fixed:

- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).
- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).
- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).
- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).
- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).
- ASoC: codecs: jz4725b: Fix spelling mistake 'Sourc' -&gt; 'Source', 'Routee' -&gt; 'Route' (git-fixes).
- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).
- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).
- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).
- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).
- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).
- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).
- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).
- ASoC: wm5102: Revert 'ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe' (git-fixes).
- ASoC: wm5110: Revert 'ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe' (git-fixes).
- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).
- ASoC: wm8997: Revert 'ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe' (git-fixes).
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).
- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)
- Drivers: hv: vmbus: Add /sys/bus/vmbus/hibernation (git-fixes).
- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).
- Drivers: hv: vmbus: Drop error message when 'No request id available' (bsc#1204017).
- Drivers: hv: vmbus: Fix duplicate CPU assignments within a device (git-fixes).
- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).
- Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).
- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).
- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).
- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).
- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).
- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).
- Drivers: hv: vmbus: Remove unused linux/version.h header (git-fixes).
- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (git-fixes).
- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).
- Drivers: hv: vmbus: remove unused function (git-fixes).
- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).
- Input: i8042 - fix leaking of platform device on module removal (git-fixes).
- Input: iforce - invert valid length check when fetching device IDs (git-fixes).
- KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support (git-fixes).
- KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1 (git-fixes).
- KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT) (git-fixes).
- KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only when apicv is globally disabled (git-fixes).
- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).
- KVM: s390: Fix handle_sske page fault handling (git-fixes).
- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).
- KVM: s390: get rid of register asm usage (git-fixes).
- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).
- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).
- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).
- KVM: s390: reduce number of IO pins to 1 (git-fixes).
- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).
- NFS: Refactor nfs_instantiate() for dentry referencing callers (bsc#1204215).
- NFSv3: use nfs_add_or_obtain() to create and reference inodes (bsc#1204215).
- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).
- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).
- PCI: hv: Drop msi_controller structure (bsc#1204446).
- PCI: hv: Fix a race condition when removing the device (bsc#1204446).
- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).
- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).
- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).
- PCI: hv: Fix typo (bsc#1204446).
- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).
- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).
- PCI: hv: Support for create interrupt v3 (bsc#1204446).
- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).
- RDMA/core/sa_query: Remove unused argument (git-fixes)
- RDMA/hns: Fix spelling mistakes of original (git-fixes)
- RDMA/qedr: Add support for user mode XRC-SRQ's (git-fixes)
- RDMA/qedr: Fix reporting max_{send/recv}_wr attrs (git-fixes)
- RDMA/qedr: Remove unsupported qedr_resize_cq callback (git-fixes)
- RDMA/rxe: Fix memory leak in error path code (git-fixes)
- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).
- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).
- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).
- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
- USB: serial: option: remove old LARA-R6 PID (git-fixes).
- USB: serial: option: remove old LARA-R6 PID.
- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).
- add another bug reference to some hyperv changes (bsc#1205617).
- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).
- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes)
- arm64: dts: juno: Add thermal critical trip points (git-fixes)
- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).
- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).
- blk-crypto: fix check for too-large dun_bytes (git-fixes).
- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).
- blk-mq: do not create hctx debugfs dir until q-&gt;debugfs_dir is created (git-fixes).
- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).
- blktrace: Trace remapped requests correctly (git-fixes).
- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern (git-fixes).
- block: Add a helper to validate the block size (git-fixes).
- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1204328).
- block: ataflop: fix breakage introduced at blk-mq refactoring (git-fixes).
- block: ataflop: more blk-mq refactoring fixes (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: limit request dispatch loop duration (git-fixes).
- block: nbd: add sanity check for first_minor (git-fixes).
- block: use 'unsigned long' for blk_validate_block_size() (git-fixes).
- bus: sunxi-rsb: Support atomic transfers (git-fixes).
- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).
- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).
- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1205989).
- ceph: do not access the kiocb after aio requests (bsc#1205984).
- ceph: fix fscache invalidation (bsc#1205985).
- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205988).
- ceph: remove bogus checks and WARN_ONs from ceph_set_page_dirty (bsc#1205986).
- ceph: request Fw caps before updating the mtime in ceph_write_iter (bsc#1205987).
- cifs: skip extra NULL byte in filenames (bsc#1204791).
- dm era: commit metadata in postsuspend after worker stops (git-fixes).
- dm integrity: set journal entry unused when shrinking device (git-fixes).
- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).
- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).
- dm raid: fix accesses beyond end of raid member array (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).
- dm verity fec: fix misaligned RS roots IO (git-fixes).
- dm writecache: fix writing beyond end of underlying device when shrinking (git-fixes).
- dm writecache: return the exact table values that were set (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix request-based DM to not bounce through indirect dm_submit_bio (git-fixes).
- dm: remove special-casing of bio-based immutable singleton target on NVMe (git-fixes).
- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).
- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).
- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).
- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).
- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).
- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).
- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).
- dmaengine: at_hdmac: Fix impossible condition (git-fixes).
- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).
- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).
- drivers/hv: remove obsolete TODO and fix misleading typo in comment (git-fixes).
- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (git-fixes).
- drivers: hv: Fix hyperv_record_panic_msg path on comment (git-fixes).
- drivers: hv: Fix missing error code in vmbus_connect() (git-fixes).
- drivers: hv: vmbus: Fix call msleep using &amp;lt; 20ms (git-fixes).
- drivers: hv: vmbus: Fix checkpatch LINE_SPACING (git-fixes).
- drivers: hv: vmbus: Fix checkpatch SPLIT_STRING (git-fixes).
- drivers: hv: vmbus: Replace symbolic permissions by octal permissions (git-fixes).
- drivers: net: slip: fix NPD bug in sl_tx_timeout() (git-fixes).
- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).
- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).
- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).
- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).
- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).
- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).
- drm/rockchip: dsi: Force synchronous probe (git-fixes).
- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).
- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).
- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).
- firmware: arm_scmi: Suppress the driver's bind attributes (git-fixes).
- ftrace: Fix char print issue in print_ip_ins() (git-fixes).
- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).
- ftrace: Fix the possible incorrect kernel message (git-fixes).
- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).
- ftrace: Optimize the allocation for mcount entries (git-fixes).
- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).
- fuse: add file_modified() to fallocate (bsc#1205330).
- fuse: fix readdir cache race (bsc#1205329).
- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).
- hv: hyperv.h: Remove unused inline functions (git-fixes).
- hv_netvsc: Add a comment clarifying batching logic (git-fixes).
- hv_netvsc: Add check for kvmalloc_array (git-fixes).
- hv_netvsc: Add error handling while switching data path (bsc#1204850).
- hv_netvsc: Allocate the recv_buf buffers after NVSP_MSG1_TYPE_SEND_RECV_BUF (git-fixes).
- hv_netvsc: Check VF datapath when sending traffic to VF (git-fixes).
- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).
- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).
- hv_netvsc: Use bitmap_zalloc() when applicable (git-fixes).
- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- hv_netvsc: Validate number of allocated sub-channels (git-fixes).
- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).
- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).
- hv_utils: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).
- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).
- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).
- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).
- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).
- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).
- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).
- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).
- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).
- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).
- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).
- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).
- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).
- iwlwifi: dbg: disable ini debug in 9000 family and below (git-fixes).
- kABI: Fix after adding trace_iterator.wait_index (git-fixes).
- kABI: remove new member of usbip_device (git-fixes).
- kabi: fix transport_add_device change (git-fixes).
- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).
- kvm: nVMX: reflect MTF VM-exits if injected by L1 (git-fixes).
- loop: Check for overflow while configuring loop (git-fixes).
- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).
- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).
- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).
- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).
- md: Replace snprintf with scnprintf (git-fixes).
- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).
- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).
- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).
- media: venus: dec: Handle the case where find_format fails (git-fixes).
- media: vim2m: initialize the media device earlier (git-fixes).
- media: vivid: fix assignment of dev-&gt;fbuf_out_flags (git-fixes).
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).
- mmc: core: properly select voltage range without power cycle (git-fixes).
- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).
- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).
- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).
- nbd: Fix use-after-free in pid_show (git-fixes).
- nbd: fix possible overflow for 'first_minor' in nbd_dev_add() (git-fixes).
- nbd: fix possible overflow on 'first_minor' in nbd_dev_add() (git-fixes).
- nbd: handle device refs for DESTROY_ON_DISCONNECT properly (git-fixes).
- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).
- net: ethernet: nixge: fix NULL dereference (git-fixes).
- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: netvsc: remove break after return (git-fixes).
- net: phy: fix null-ptr-deref while probe() failed (git-fixes).
- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for MR400 (git-fixes).
- net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch (git-fixes).
- nfc/nci: fix race with opening and closing (git-fixes).
- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).
- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).
- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).
- nfsd: set the server_scope during service startup (bsc#1203746).
- null_blk: Fail zone append to conventional zones (git-fixes).
- null_blk: synchronization fix for zoned device (git-fixes).
- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).
- panic, kexec: make __crash_kexec() NMI safe (git-fixes).
- parport_pc: Avoid FIFO port location truncation (git-fixes).
- phy: stm32: fix an error code in probe (git-fixes).
- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).
- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).
- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).
- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).
- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).
- printk: use atomic updates for klogd work (bsc#1204934).
- printk: wake waiters for safe and NMI contexts (bsc#1204934).
- r8152: Add MAC passthrough support to new device (git-fixes).
- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).
- r8152: use new helper tcp_v6_gso_csum_prep (git-fixes).
- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).
- regulator: core: fix UAF in destroy_regulator() (git-fixes).
- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).
- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).
- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Allow splice to read previous partially read pages (git-fixes).
- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).
- ring-buffer: Fix race between reset page and reading page (git-fixes).
- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).
- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).
- ring_buffer: Do not deactivate non-existant pages (git-fixes).
- rndis_host: increase sleep time in the query-response loop (git-fixes).
- rtc: mt6397: fix alarm register overwrite (git-fixes).
- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).
- s390/cpcmd: fix inline assembly register clobbering (git-fixes).
- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).
- s390/disassembler: increase ebpf disasm buffer size (git-fixes).
- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205428 LTC#200501).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203144 LTC#199881).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).
- s390/ptrace: return -ENOSYS when invalid syscall is supplied (git-fixes).
- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).
- s390/vtime: fix inline assembly clobber list (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- s390/zcrypt: fix zcard and zqueue hot-unplug memleak (git-fixes).
- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).
- s390: fix double free of GS and RI CBs on fork() failure (git-fixes).
- s390: fix nospec table alignments (git-fixes).
- s390: mark __cpacf_query() as __always_inline (git-fixes).
- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).
- scsi: drivers: base: Propagate errors through the transport component (git-fixes).
- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (git-fixes).
- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729 bsc#1204810 ltc#200162).
- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).
- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).
- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).
- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).
- scsi: lpfc: Fix spelling mistake 'unsolicted' -&gt; 'unsolicited' (bsc#1204957).
- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).
- scsi: lpfc: Set sli4_param's cmf option to zero when CMF is turned off (bsc#1204957).
- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).
- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).
- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).
- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).
- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).
- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).
- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).
- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).
- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).
- scsi: storvsc: Miscellaneous code cleanups (git-fixes).
- scsi: storvsc: Parameterize number hardware queues (git-fixes).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).
- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).
- scsi: storvsc: Update error logging (git-fixes).
- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).
- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).
- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).
- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).
- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).
- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).
- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).
- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).
- serial: imx: Add missing .thaw_noirq hook (git-fixes).
- siox: fix possible memory leak in siox_device_add() (git-fixes).
- slimbus: stream: correct presence rate frequencies (git-fixes).
- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).
- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).
- staging: greybus: light: fix a couple double frees (git-fixes).
- swiotlb-xen: use vmalloc_to_page on vmalloc virt addresses (git-fixes).
- tracing/ring-buffer: Have polling block on watermark (git-fixes).
- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).
- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).
- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).
- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).
- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).
- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).
- tracing: Wake up waiters when tracing is disabled (git-fixes).
- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: fix PHY disable sequence (git-fixes).
- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).
- usb: dwc3: gadget: Fix null pointer exception (git-fixes).
- usb: dwc3: qcom: fix runtime PM wakeup.
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).
- usbip: add sysfs_lock to synchronize sysfs code paths (git-fixes).
- usbip: stub-dev synchronize sysfs code paths (git-fixes).
- usbip: stub_dev: remake locking for kABI (git-fixes).
- usbip: synchronize event handler with sysfs code paths (git-fixes).
- usbip: usbip_event: use global lock (git-fixes).
- usbip: vudc synchronize sysfs code paths (git-fixes).
- usbip: vudc_sysfs: use global lock (git-fixes).
- use __netdev_notify_peers in hyperv (git-fixes).
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI'
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI' (bsc#1200845)
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).
- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).
- virtio_blk: eliminate anonymous module_init &amp; module_exit (git-fixes).
- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).
- vmlinux.lds.h: Fix placement of '.data..decrypted' section (git-fixes).
- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).
- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).
- wifi: cfg80211: silence a sparse RCU warning (git-fixes).
- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).
- workqueue: do not skip lockdep work dependency in cancel_work_sync() (bsc#1204967).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/hyperv: Output host build info as normal Windows version number (git-fixes).
- x86/hyperv: check cpu mask after interrupt has been disabled (git-fixes).
- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).
- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).
- x86/xen: Add xen_no_vector_callback option to test PCI INTX delivery (git-fixes).
- x86/xen: Distribute switch variables for initialization (git-fixes).
- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).
- xen-blkback: prevent premature module unload (git-fixes).
- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).
- xen/balloon: fix balloon kthread freezing (git-fixes).
- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).
- xen/balloon: fix cancelled balloon action (git-fixes).
- xen/balloon: use a kernel thread instead a workqueue (git-fixes).
- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).
- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).
- xen/gntdev: Prevent leaking grants (git-fixes).
- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).
- xen/privcmd: Corrected error handling path (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: Fix granting of vmalloc'd memory (git-fixes).
- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).
- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).
- xen: Fix event channel callback via INTX/GSI (git-fixes).
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu&gt;=32 (git-fixes).
- xenbus: req-&gt;body should be updated before req-&gt;state (git-fixes).
- xenbus: req-&gt;err should be updated before req-&gt;state (git-fixes).
- xfs: Lower CIL flush limit for large logs (git-fixes).
- xfs: Throttle commits on delayed background CIL push (git-fixes).
- xfs: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- xfs: check owner of dir3 blocks (git-fixes).
- xfs: factor common AIL item deletion code (git-fixes).
- xfs: open code insert range extent split helper (git-fixes).
- xfs: rework collapse range into an atomic operation (git-fixes).
- xfs: rework insert range into an atomic operation (git-fixes).
- xfs: tail updates only need to occur when LSN changes (git-fixes).
- xfs: trylock underlying buffer on dquot flush (git-fixes).
- xfs: xfs_buf_corruption_error should take __this_address (git-fixes).
- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-16"/>
	<updated date="2022-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192761">SUSE bug 1192761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200845">SUSE bug 1200845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201455">SUSE bug 1201455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203144">SUSE bug 1203144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203746">SUSE bug 1203746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203960">SUSE bug 1203960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204017">SUSE bug 1204017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204142">SUSE bug 1204142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204215">SUSE bug 1204215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204228">SUSE bug 1204228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204241">SUSE bug 1204241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204328">SUSE bug 1204328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204446">SUSE bug 1204446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204636">SUSE bug 1204636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204693">SUSE bug 1204693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204780">SUSE bug 1204780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204791">SUSE bug 1204791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204810">SUSE bug 1204810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204827">SUSE bug 1204827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204850">SUSE bug 1204850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204868">SUSE bug 1204868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204934">SUSE bug 1204934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204957">SUSE bug 1204957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204963">SUSE bug 1204963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204967">SUSE bug 1204967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205264">SUSE bug 1205264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205329">SUSE bug 1205329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205330">SUSE bug 1205330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205428">SUSE bug 1205428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205567">SUSE bug 1205567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205617">SUSE bug 1205617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205700">SUSE bug 1205700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205705">SUSE bug 1205705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205709">SUSE bug 1205709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205753">SUSE bug 1205753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205984">SUSE bug 1205984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205985">SUSE bug 1205985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205986">SUSE bug 1205986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205987">SUSE bug 1205987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205988">SUSE bug 1205988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205989">SUSE bug 1205989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206207">SUSE bug 1206207</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729413" comment="cluster-md-kmp-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729414" comment="dlm-kmp-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729415" comment="gfs2-kmp-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729156" comment="kernel-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729157" comment="kernel-azure-devel-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729416" comment="kernel-azure-extra-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729417" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729418" comment="kernel-azure-optional-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729158" comment="kernel-devel-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729159" comment="kernel-source-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729160" comment="kernel-syms-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729419" comment="kselftests-kmp-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729420" comment="ocfs2-kmp-azure-5.3.18-150300.38.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729421" comment="reiserfs-kmp-azure-5.3.18-150300.38.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53083" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1198702" ref_url="https://bugzilla.suse.com/1198702" source="BUGZILLA"/>
		<reference ref_id="1199365" ref_url="https://bugzilla.suse.com/1199365" source="BUGZILLA"/>
		<reference ref_id="1200788" ref_url="https://bugzilla.suse.com/1200788" source="BUGZILLA"/>
		<reference ref_id="1200845" ref_url="https://bugzilla.suse.com/1200845" source="BUGZILLA"/>
		<reference ref_id="1201455" ref_url="https://bugzilla.suse.com/1201455" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1203008" ref_url="https://bugzilla.suse.com/1203008" source="BUGZILLA"/>
		<reference ref_id="1203183" ref_url="https://bugzilla.suse.com/1203183" source="BUGZILLA"/>
		<reference ref_id="1203290" ref_url="https://bugzilla.suse.com/1203290" source="BUGZILLA"/>
		<reference ref_id="1203322" ref_url="https://bugzilla.suse.com/1203322" source="BUGZILLA"/>
		<reference ref_id="1203514" ref_url="https://bugzilla.suse.com/1203514" source="BUGZILLA"/>
		<reference ref_id="1203860" ref_url="https://bugzilla.suse.com/1203860" source="BUGZILLA"/>
		<reference ref_id="1203960" ref_url="https://bugzilla.suse.com/1203960" source="BUGZILLA"/>
		<reference ref_id="1204017" ref_url="https://bugzilla.suse.com/1204017" source="BUGZILLA"/>
		<reference ref_id="1204166" ref_url="https://bugzilla.suse.com/1204166" source="BUGZILLA"/>
		<reference ref_id="1204170" ref_url="https://bugzilla.suse.com/1204170" source="BUGZILLA"/>
		<reference ref_id="1204354" ref_url="https://bugzilla.suse.com/1204354" source="BUGZILLA"/>
		<reference ref_id="1204355" ref_url="https://bugzilla.suse.com/1204355" source="BUGZILLA"/>
		<reference ref_id="1204402" ref_url="https://bugzilla.suse.com/1204402" source="BUGZILLA"/>
		<reference ref_id="1204414" ref_url="https://bugzilla.suse.com/1204414" source="BUGZILLA"/>
		<reference ref_id="1204415" ref_url="https://bugzilla.suse.com/1204415" source="BUGZILLA"/>
		<reference ref_id="1204424" ref_url="https://bugzilla.suse.com/1204424" source="BUGZILLA"/>
		<reference ref_id="1204431" ref_url="https://bugzilla.suse.com/1204431" source="BUGZILLA"/>
		<reference ref_id="1204432" ref_url="https://bugzilla.suse.com/1204432" source="BUGZILLA"/>
		<reference ref_id="1204439" ref_url="https://bugzilla.suse.com/1204439" source="BUGZILLA"/>
		<reference ref_id="1204446" ref_url="https://bugzilla.suse.com/1204446" source="BUGZILLA"/>
		<reference ref_id="1204479" ref_url="https://bugzilla.suse.com/1204479" source="BUGZILLA"/>
		<reference ref_id="1204574" ref_url="https://bugzilla.suse.com/1204574" source="BUGZILLA"/>
		<reference ref_id="1204576" ref_url="https://bugzilla.suse.com/1204576" source="BUGZILLA"/>
		<reference ref_id="1204631" ref_url="https://bugzilla.suse.com/1204631" source="BUGZILLA"/>
		<reference ref_id="1204635" ref_url="https://bugzilla.suse.com/1204635" source="BUGZILLA"/>
		<reference ref_id="1204636" ref_url="https://bugzilla.suse.com/1204636" source="BUGZILLA"/>
		<reference ref_id="1204646" ref_url="https://bugzilla.suse.com/1204646" source="BUGZILLA"/>
		<reference ref_id="1204647" ref_url="https://bugzilla.suse.com/1204647" source="BUGZILLA"/>
		<reference ref_id="1204653" ref_url="https://bugzilla.suse.com/1204653" source="BUGZILLA"/>
		<reference ref_id="1204850" ref_url="https://bugzilla.suse.com/1204850" source="BUGZILLA"/>
		<reference ref_id="1204868" ref_url="https://bugzilla.suse.com/1204868" source="BUGZILLA"/>
		<reference ref_id="1205006" ref_url="https://bugzilla.suse.com/1205006" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205473" ref_url="https://bugzilla.suse.com/1205473" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1205617" ref_url="https://bugzilla.suse.com/1205617" source="BUGZILLA"/>
		<reference ref_id="1205671" ref_url="https://bugzilla.suse.com/1205671" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206113" ref_url="https://bugzilla.suse.com/1206113" source="BUGZILLA"/>
		<reference ref_id="1206114" ref_url="https://bugzilla.suse.com/1206114" source="BUGZILLA"/>
		<reference ref_id="1206207" ref_url="https://bugzilla.suse.com/1206207" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037/" source="CVE"/>
		<reference ref_id="CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-3169" ref_url="https://www.suse.com/security/cve/CVE-2022-3169/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3521" ref_url="https://www.suse.com/security/cve/CVE-2022-3521/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3542" ref_url="https://www.suse.com/security/cve/CVE-2022-3542/" source="CVE"/>
		<reference ref_id="CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-3629" ref_url="https://www.suse.com/security/cve/CVE-2022-3629/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3643" ref_url="https://www.suse.com/security/cve/CVE-2022-3643/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-40307" ref_url="https://www.suse.com/security/cve/CVE-2022-40307/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-42328" ref_url="https://www.suse.com/security/cve/CVE-2022-42328/" source="CVE"/>
		<reference ref_id="CVE-2022-42329" ref_url="https://www.suse.com/security/cve/CVE-2022-42329/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).
- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).
- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bsc#1204653).
- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).
- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).
- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).
- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).
- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).
- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).
- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).
- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).
- CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bsc#1203322).
- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).
- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).
- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).
- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).

The following non-security bugs were fixed:

- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017, bsc#1205617).
- Drivers: hv: vmbus: Drop error message when 'No request id available' (bsc#1204017).
- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).
- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).
- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017, bsc#1205617).
- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017, bsc#1205617).
- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017, bsc#1205617).
- Drivers: hv: vmbus: Move __vmbus_open() (bsc#1204017).
- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).
- hv_netvsc: Add check for kvmalloc_array (git-fixes).
- hv_netvsc: Add error handling while switching data path (bsc#1204850).
- hv_netvsc: Add validation for untrusted Hyper-V values (bsc#1204017).
- hv_netvsc: Cache the current data path to avoid duplicate call and message (bsc#1204017).
- hv_netvsc: Check VF datapath when sending traffic to VF (bsc#1204017).
- hv_netvsc: Fix error handling in netvsc_set_features() (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (bsc#1204017).
- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).
- hv_netvsc: Remove unnecessary round_up for recv_completion_cnt (bsc#1204017).
- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (bsc#1204017).
- hv_netvsc: Sync offloading features to VF NIC (git-fixes).
- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).
- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).
- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: netvsc: remove break after return (git-fixes).
- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).
- PCI: hv: Add validation for untrusted Hyper-V values (bsc#1204017).
- PCI: hv: Drop msi_controller structure (bsc#1204446).
- PCI: hv: Fix a race condition when removing the device (bsc#1204446).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).
- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).
- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017, bsc#1203860, bsc#1205617).
- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017, bsc#1205617).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).
- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).
- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: hv: Support for create interrupt v3 (git-fixes).
- PCI: hv: Use struct_size() helper (bsc#1204446).
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).
- Revert 'scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()' (bsc#1204017).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).
- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).
- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).
- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).
- sunrpc: Re-purpose trace_svc_process (bsc#1205006).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/hyperv: Output host build info as normal Windows version number (git-fixes).
- x86/hyperv: Set pv_info.name to 'Hyper-V' (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-19"/>
	<updated date="2022-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199365">SUSE bug 1199365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200788">SUSE bug 1200788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200845">SUSE bug 1200845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201455">SUSE bug 1201455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203008">SUSE bug 1203008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203183">SUSE bug 1203183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203290">SUSE bug 1203290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203322">SUSE bug 1203322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203514">SUSE bug 1203514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203860">SUSE bug 1203860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203960">SUSE bug 1203960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204017">SUSE bug 1204017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204170">SUSE bug 1204170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204355">SUSE bug 1204355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204402">SUSE bug 1204402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204414">SUSE bug 1204414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204415">SUSE bug 1204415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204424">SUSE bug 1204424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204432">SUSE bug 1204432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204439">SUSE bug 1204439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204446">SUSE bug 1204446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204479">SUSE bug 1204479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204574">SUSE bug 1204574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204576">SUSE bug 1204576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204631">SUSE bug 1204631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204635">SUSE bug 1204635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204636">SUSE bug 1204636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204646">SUSE bug 1204646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204647">SUSE bug 1204647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204850">SUSE bug 1204850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204868">SUSE bug 1204868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205006">SUSE bug 1205006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205473">SUSE bug 1205473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205617">SUSE bug 1205617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206113">SUSE bug 1206113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206114">SUSE bug 1206114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206207">SUSE bug 1206207</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3169/">CVE-2022-3169</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3521/">CVE-2022-3521</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3542/">CVE-2022-3542</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3629/">CVE-2022-3629</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-3643/">CVE-2022-3643</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40307/">CVE-2022-40307</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42328/">CVE-2022-42328</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42329/">CVE-2022-42329</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728697" comment="kernel-debug-base-4.12.14-150100.197.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728698" comment="kernel-default-man-4.12.14-150100.197.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728699" comment="kernel-kvmsmall-base-4.12.14-150100.197.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728700" comment="kernel-vanilla-4.12.14-150100.197.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728701" comment="kernel-vanilla-base-4.12.14-150100.197.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728702" comment="kernel-vanilla-devel-4.12.14-150100.197.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728703" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728704" comment="kernel-zfcpdump-man-4.12.14-150100.197.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53084" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1206242" ref_url="https://bugzilla.suse.com/1206242" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46875" ref_url="https://www.suse.com/security/cve/CVE-2022-46875/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to version 102.6 (bsc#1206242):

- CVE-2022-46880: Use-after-free in WebGL
- CVE-2022-46872: Arbitrary file read from a compromised content process
- CVE-2022-46881: Memory corruption in WebGL
- CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions
- CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS
- CVE-2022-46882: Use-after-free in WebGL
- CVE-2022-46878: Memory safety bugs fixed in Thunderbird 102.6
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2022-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<cve impact="critical" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46875/">CVE-2022-46875</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009728924" comment="MozillaThunderbird-102.6.0-150200.8.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728925" comment="MozillaThunderbird-translations-common-102.6.0-150200.8.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728926" comment="MozillaThunderbird-translations-other-102.6.0-150200.8.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53085" version="1" class="patch">
	<metadata>
		<title>Security update for cni (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181961" ref_url="https://bugzilla.suse.com/1181961" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013299.html" source="SUSE-SU"/>
		<description>
This update for cni fixes the following issues:

- CVE-2021-20206: Fixed arbitrary path injection via type field in CNI configuration (bsc#1181961).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2022-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181961">SUSE bug 1181961</bugzilla>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725840" comment="cni-0.7.1-150100.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53086" version="1" class="patch">
	<metadata>
		<title>Security update for cni-plugins (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181961" ref_url="https://bugzilla.suse.com/1181961" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013297.html" source="SUSE-SU"/>
		<description>
This update for cni-plugins fixes the following issues:

- CVE-2021-20206: Fixed arbitrary path injection via type field in CNI configuration (bsc#1181961).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2022-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181961">SUSE bug 1181961</bugzilla>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725841" comment="cni-plugins-0.8.6-150100.3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53087" version="1" class="patch">
	<metadata>
		<title>Security update for helm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181419" ref_url="https://bugzilla.suse.com/1181419" source="BUGZILLA"/>
		<reference ref_id="1206467" ref_url="https://bugzilla.suse.com/1206467" source="BUGZILLA"/>
		<reference ref_id="1206469" ref_url="https://bugzilla.suse.com/1206469" source="BUGZILLA"/>
		<reference ref_id="1206471" ref_url="https://bugzilla.suse.com/1206471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21272" ref_url="https://www.suse.com/security/cve/CVE-2021-21272/" source="CVE"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-23524" ref_url="https://www.suse.com/security/cve/CVE-2022-23524/" source="CVE"/>
		<reference ref_id="CVE-2022-23525" ref_url="https://www.suse.com/security/cve/CVE-2022-23525/" source="CVE"/>
		<reference ref_id="CVE-2022-23526" ref_url="https://www.suse.com/security/cve/CVE-2022-23526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013326.html" source="SUSE-SU"/>
		<description>
This update for helm fixes the following issues:

Update to version 3.10.3:

- CVE-2022-23524: Fixed a denial of service in the string value parsing (bsc#1206467).
- CVE-2022-23525: Fixed a denial of service with the repository index file (bsc#1206469).
- CVE-2022-23526: Fixed a denial of service in the schema file handling (bsc#1206471).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-22"/>
	<updated date="2022-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181419">SUSE bug 1181419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206467">SUSE bug 1206467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206469">SUSE bug 1206469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206471">SUSE bug 1206471</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21272/">CVE-2021-21272</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23524/">CVE-2022-23524</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23525/">CVE-2022-23525</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23526/">CVE-2022-23526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729562" comment="helm-3.10.3-150000.1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729563" comment="helm-bash-completion-3.10.3-150000.1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729564" comment="helm-fish-completion-3.10.3-150000.1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729565" comment="helm-zsh-completion-3.10.3-150000.1.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53088" version="1" class="patch">
	<metadata>
		<title>Security update for conmon (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200285" ref_url="https://bugzilla.suse.com/1200285" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013327.html" source="SUSE-SU"/>
		<description>
This update for conmon fixes the following issues:

conmon was updated to version 2.1.5:

* don't leak syslog_identifier
* logging: do not read more that the buf size
* logging: fix error handling
* Makefile: Fix install for FreeBSD
* signal: Track changes to get_signal_descriptor in the FreeBSD version
* Packit: initial enablement

Update to version 2.1.4:

* Fix a bug where conmon crashed when it got a SIGCHLD

update to 2.1.3:

* Stop using g_unix_signal_add() to avoid threads
* Rename CLI optionlog-size-global-max to log-global-size-max 

Update to version 2.1.2:

* add log-global-size-max option to limit the total output conmon processes (CVE-2022-1708 bsc#1200285)
* journald: print tag and name if both are specified
* drop some logs to debug level

Update to version 2.1.0

* logging: buffer partial messages to journald
* exit: close all fds &gt;= 3
* fix: cgroup: Free memory_cgroup_file_path if open fails.

Update to version 2.0.32

* Fix: Avoid mainfd_std{in,out} sharing the same file descriptor.
* exit_command: Fix: unset subreaper attribute before running exit command

Update to version 2.0.31
* logging: new mode -l passthrough
* ctr_logs: use container name or ID as SYSLOG_IDENTIFIER for journald
* conmon: Fix: free userdata files before exec cleanup
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-22"/>
	<updated date="2022-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200285">SUSE bug 1200285</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728940" comment="conmon-2.1.5-150300.8.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53089" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1192761" ref_url="https://bugzilla.suse.com/1192761" source="BUGZILLA"/>
		<reference ref_id="1200845" ref_url="https://bugzilla.suse.com/1200845" source="BUGZILLA"/>
		<reference ref_id="1201455" ref_url="https://bugzilla.suse.com/1201455" source="BUGZILLA"/>
		<reference ref_id="1203144" ref_url="https://bugzilla.suse.com/1203144" source="BUGZILLA"/>
		<reference ref_id="1203746" ref_url="https://bugzilla.suse.com/1203746" source="BUGZILLA"/>
		<reference ref_id="1204017" ref_url="https://bugzilla.suse.com/1204017" source="BUGZILLA"/>
		<reference ref_id="1204142" ref_url="https://bugzilla.suse.com/1204142" source="BUGZILLA"/>
		<reference ref_id="1204215" ref_url="https://bugzilla.suse.com/1204215" source="BUGZILLA"/>
		<reference ref_id="1204241" ref_url="https://bugzilla.suse.com/1204241" source="BUGZILLA"/>
		<reference ref_id="1204328" ref_url="https://bugzilla.suse.com/1204328" source="BUGZILLA"/>
		<reference ref_id="1204446" ref_url="https://bugzilla.suse.com/1204446" source="BUGZILLA"/>
		<reference ref_id="1204631" ref_url="https://bugzilla.suse.com/1204631" source="BUGZILLA"/>
		<reference ref_id="1204636" ref_url="https://bugzilla.suse.com/1204636" source="BUGZILLA"/>
		<reference ref_id="1204693" ref_url="https://bugzilla.suse.com/1204693" source="BUGZILLA"/>
		<reference ref_id="1204780" ref_url="https://bugzilla.suse.com/1204780" source="BUGZILLA"/>
		<reference ref_id="1204791" ref_url="https://bugzilla.suse.com/1204791" source="BUGZILLA"/>
		<reference ref_id="1204810" ref_url="https://bugzilla.suse.com/1204810" source="BUGZILLA"/>
		<reference ref_id="1204827" ref_url="https://bugzilla.suse.com/1204827" source="BUGZILLA"/>
		<reference ref_id="1204850" ref_url="https://bugzilla.suse.com/1204850" source="BUGZILLA"/>
		<reference ref_id="1204868" ref_url="https://bugzilla.suse.com/1204868" source="BUGZILLA"/>
		<reference ref_id="1204934" ref_url="https://bugzilla.suse.com/1204934" source="BUGZILLA"/>
		<reference ref_id="1204957" ref_url="https://bugzilla.suse.com/1204957" source="BUGZILLA"/>
		<reference ref_id="1204963" ref_url="https://bugzilla.suse.com/1204963" source="BUGZILLA"/>
		<reference ref_id="1204967" ref_url="https://bugzilla.suse.com/1204967" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1205130" ref_url="https://bugzilla.suse.com/1205130" source="BUGZILLA"/>
		<reference ref_id="1205186" ref_url="https://bugzilla.suse.com/1205186" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205329" ref_url="https://bugzilla.suse.com/1205329" source="BUGZILLA"/>
		<reference ref_id="1205330" ref_url="https://bugzilla.suse.com/1205330" source="BUGZILLA"/>
		<reference ref_id="1205428" ref_url="https://bugzilla.suse.com/1205428" source="BUGZILLA"/>
		<reference ref_id="1205473" ref_url="https://bugzilla.suse.com/1205473" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1205617" ref_url="https://bugzilla.suse.com/1205617" source="BUGZILLA"/>
		<reference ref_id="1205671" ref_url="https://bugzilla.suse.com/1205671" source="BUGZILLA"/>
		<reference ref_id="1205700" ref_url="https://bugzilla.suse.com/1205700" source="BUGZILLA"/>
		<reference ref_id="1205705" ref_url="https://bugzilla.suse.com/1205705" source="BUGZILLA"/>
		<reference ref_id="1205709" ref_url="https://bugzilla.suse.com/1205709" source="BUGZILLA"/>
		<reference ref_id="1205753" ref_url="https://bugzilla.suse.com/1205753" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1205984" ref_url="https://bugzilla.suse.com/1205984" source="BUGZILLA"/>
		<reference ref_id="1205985" ref_url="https://bugzilla.suse.com/1205985" source="BUGZILLA"/>
		<reference ref_id="1205986" ref_url="https://bugzilla.suse.com/1205986" source="BUGZILLA"/>
		<reference ref_id="1205987" ref_url="https://bugzilla.suse.com/1205987" source="BUGZILLA"/>
		<reference ref_id="1205988" ref_url="https://bugzilla.suse.com/1205988" source="BUGZILLA"/>
		<reference ref_id="1205989" ref_url="https://bugzilla.suse.com/1205989" source="BUGZILLA"/>
		<reference ref_id="1206032" ref_url="https://bugzilla.suse.com/1206032" source="BUGZILLA"/>
		<reference ref_id="1206037" ref_url="https://bugzilla.suse.com/1206037" source="BUGZILLA"/>
		<reference ref_id="1206207" ref_url="https://bugzilla.suse.com/1206207" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129/" source="CVE"/>
		<reference ref_id="CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).
- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).
- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).

The following non-security bugs were fixed:

- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).
- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).
- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).
- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).
- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).
- ASoC: codecs: jz4725b: Fix spelling mistake 'Sourc' -&gt; 'Source', 'Routee' -&gt; 'Route' (git-fixes).
- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).
- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).
- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).
- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).
- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).
- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).
- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).
- ASoC: wm5102: Revert 'ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe' (git-fixes).
- ASoC: wm5110: Revert 'ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe' (git-fixes).
- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).
- ASoC: wm8997: Revert 'ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe' (git-fixes).
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).
- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)
- Drivers: hv: vmbus: Add /sys/bus/vmbus/hibernation (git-fixes).
- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).
- Drivers: hv: vmbus: Drop error message when 'No request id available' (bsc#1204017).
- Drivers: hv: vmbus: Fix duplicate CPU assignments within a device (git-fixes).
- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).
- Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).
- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).
- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).
- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).
- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).
- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).
- Drivers: hv: vmbus: Remove unused linux/version.h header (git-fixes).
- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (git-fixes).
- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).
- Drivers: hv: vmbus: remove unused function (git-fixes).
- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).
- Input: i8042 - fix leaking of platform device on module removal (git-fixes).
- Input: iforce - invert valid length check when fetching device IDs (git-fixes).
- KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support (git-fixes).
- KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1 (git-fixes).
- KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT) (git-fixes).
- KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only when apicv is globally disabled (git-fixes).
- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).
- KVM: s390: Fix handle_sske page fault handling (git-fixes).
- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).
- KVM: s390: get rid of register asm usage (git-fixes).
- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).
- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).
- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).
- KVM: s390: reduce number of IO pins to 1 (git-fixes).
- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).
- NFS: Refactor nfs_instantiate() for dentry referencing callers (bsc#1204215).
- NFSv3: use nfs_add_or_obtain() to create and reference inodes (bsc#1204215).
- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).
- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).
- PCI: hv: Drop msi_controller structure (bsc#1204446).
- PCI: hv: Fix a race condition when removing the device (bsc#1204446).
- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).
- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).
- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).
- PCI: hv: Fix typo (bsc#1204446).
- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).
- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).
- PCI: hv: Support for create interrupt v3 (bsc#1204446).
- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).
- RDMA/core/sa_query: Remove unused argument (git-fixes)
- RDMA/hns: Fix spelling mistakes of original (git-fixes)
- RDMA/qedr: Add support for user mode XRC-SRQ's (git-fixes)
- RDMA/qedr: Fix reporting max_{send/recv}_wr attrs (git-fixes)
- RDMA/qedr: Remove unsupported qedr_resize_cq callback (git-fixes)
- RDMA/rxe: Fix memory leak in error path code (git-fixes)
- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).
- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).
- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).
- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
- USB: serial: option: remove old LARA-R6 PID (git-fixes).
- USB: serial: option: remove old LARA-R6 PID.
- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).
- add another bug reference to some hyperv changes (bsc#1205617).
- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).
- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes)
- arm64: dts: juno: Add thermal critical trip points (git-fixes)
- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes)
- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).
- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).
- blk-crypto: fix check for too-large dun_bytes (git-fixes).
- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).
- blk-mq: do not create hctx debugfs dir until q-&gt;debugfs_dir is created (git-fixes).
- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).
- blktrace: Trace remapped requests correctly (git-fixes).
- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern (git-fixes).
- block: Add a helper to validate the block size (git-fixes).
- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1204328).
- block: ataflop: fix breakage introduced at blk-mq refactoring (git-fixes).
- block: ataflop: more blk-mq refactoring fixes (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: limit request dispatch loop duration (git-fixes).
- block: nbd: add sanity check for first_minor (git-fixes).
- block: use 'unsigned long' for blk_validate_block_size() (git-fixes).
- bus: sunxi-rsb: Support atomic transfers (git-fixes).
- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).
- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).
- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1205989).
- ceph: do not access the kiocb after aio requests (bsc#1205984).
- ceph: fix fscache invalidation (bsc#1205985).
- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205988).
- ceph: remove bogus checks and WARN_ONs from ceph_set_page_dirty (bsc#1205986).
- ceph: request Fw caps before updating the mtime in ceph_write_iter (bsc#1205987).
- cifs: skip extra NULL byte in filenames (bsc#1204791).
- dm era: commit metadata in postsuspend after worker stops (git-fixes).
- dm integrity: set journal entry unused when shrinking device (git-fixes).
- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).
- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).
- dm raid: fix accesses beyond end of raid member array (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).
- dm verity fec: fix misaligned RS roots IO (git-fixes).
- dm writecache: fix writing beyond end of underlying device when shrinking (git-fixes).
- dm writecache: return the exact table values that were set (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix request-based DM to not bounce through indirect dm_submit_bio (git-fixes).
- dm: remove special-casing of bio-based immutable singleton target on NVMe (git-fixes).
- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).
- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).
- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).
- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).
- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).
- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).
- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).
- dmaengine: at_hdmac: Fix impossible condition (git-fixes).
- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).
- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).
- drivers/hv: remove obsolete TODO and fix misleading typo in comment (git-fixes).
- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (git-fixes).
- drivers: hv: Fix hyperv_record_panic_msg path on comment (git-fixes).
- drivers: hv: Fix missing error code in vmbus_connect() (git-fixes).
- drivers: hv: vmbus: Fix call msleep using &amp;lt; 20ms (git-fixes).
- drivers: hv: vmbus: Fix checkpatch LINE_SPACING (git-fixes).
- drivers: hv: vmbus: Fix checkpatch SPLIT_STRING (git-fixes).
- drivers: hv: vmbus: Replace symbolic permissions by octal permissions (git-fixes).
- drivers: net: slip: fix NPD bug in sl_tx_timeout() (git-fixes).
- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).
- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).
- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).
- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).
- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).
- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).
- drm/rockchip: dsi: Force synchronous probe (git-fixes).
- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).
- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).
- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).
- firmware: arm_scmi: Suppress the driver's bind attributes (git-fixes).
- ftrace: Fix char print issue in print_ip_ins() (git-fixes).
- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).
- ftrace: Fix the possible incorrect kernel message (git-fixes).
- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).
- ftrace: Optimize the allocation for mcount entries (git-fixes).
- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).
- fuse: add file_modified() to fallocate (bsc#1205330).
- fuse: fix readdir cache race (bsc#1205329).
- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).
- hv: hyperv.h: Remove unused inline functions (git-fixes).
- hv_netvsc: Add a comment clarifying batching logic (git-fixes).
- hv_netvsc: Add check for kvmalloc_array (git-fixes).
- hv_netvsc: Add error handling while switching data path (bsc#1204850).
- hv_netvsc: Allocate the recv_buf buffers after NVSP_MSG1_TYPE_SEND_RECV_BUF (git-fixes).
- hv_netvsc: Check VF datapath when sending traffic to VF (git-fixes).
- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).
- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).
- hv_netvsc: Use bitmap_zalloc() when applicable (git-fixes).
- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- hv_netvsc: Validate number of allocated sub-channels (git-fixes).
- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).
- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).
- hv_utils: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).
- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).
- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).
- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).
- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).
- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).
- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).
- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).
- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).
- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).
- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).
- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).
- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).
- iwlwifi: dbg: disable ini debug in 9000 family and below (git-fixes).
- kABI: Fix after adding trace_iterator.wait_index (git-fixes).
- kABI: remove new member of usbip_device (git-fixes).
- kabi: fix transport_add_device change (git-fixes).
- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).
- kvm: nVMX: reflect MTF VM-exits if injected by L1 (git-fixes).
- loop: Check for overflow while configuring loop (git-fixes).
- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).
- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).
- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).
- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).
- md: Replace snprintf with scnprintf (git-fixes).
- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).
- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).
- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).
- media: venus: dec: Handle the case where find_format fails (git-fixes).
- media: vim2m: initialize the media device earlier (git-fixes).
- media: vivid: fix assignment of dev-&gt;fbuf_out_flags (git-fixes).
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).
- mmc: core: properly select voltage range without power cycle (git-fixes).
- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).
- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).
- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).
- nbd: Fix use-after-free in pid_show (git-fixes).
- nbd: fix possible overflow for 'first_minor' in nbd_dev_add() (git-fixes).
- nbd: fix possible overflow on 'first_minor' in nbd_dev_add() (git-fixes).
- nbd: handle device refs for DESTROY_ON_DISCONNECT properly (git-fixes).
- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).
- net: ethernet: nixge: fix NULL dereference (git-fixes).
- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: netvsc: remove break after return (git-fixes).
- net: phy: fix null-ptr-deref while probe() failed (git-fixes).
- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for MR400 (git-fixes).
- net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch (git-fixes).
- nfc/nci: fix race with opening and closing (git-fixes).
- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).
- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).
- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).
- nfsd: set the server_scope during service startup (bsc#1203746).
- null_blk: Fail zone append to conventional zones (git-fixes).
- null_blk: synchronization fix for zoned device (git-fixes).
- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).
- panic, kexec: make __crash_kexec() NMI safe (git-fixes).
- parport_pc: Avoid FIFO port location truncation (git-fixes).
- phy: stm32: fix an error code in probe (git-fixes).
- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).
- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).
- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).
- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).
- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).
- printk: use atomic updates for klogd work (bsc#1204934).
- printk: wake waiters for safe and NMI contexts (bsc#1204934).
- r8152: Add MAC passthrough support to new device (git-fixes).
- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).
- r8152: use new helper tcp_v6_gso_csum_prep (git-fixes).
- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).
- regulator: core: fix UAF in destroy_regulator() (git-fixes).
- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).
- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).
- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Allow splice to read previous partially read pages (git-fixes).
- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).
- ring-buffer: Fix race between reset page and reading page (git-fixes).
- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).
- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).
- ring_buffer: Do not deactivate non-existant pages (git-fixes).
- rndis_host: increase sleep time in the query-response loop (git-fixes).
- rtc: mt6397: fix alarm register overwrite (git-fixes).
- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).
- s390/cpcmd: fix inline assembly register clobbering (git-fixes).
- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).
- s390/disassembler: increase ebpf disasm buffer size (git-fixes).
- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205428 LTC#200501).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203144 LTC#199881).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).
- s390/ptrace: return -ENOSYS when invalid syscall is supplied (git-fixes).
- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).
- s390/vtime: fix inline assembly clobber list (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- s390/zcrypt: fix zcard and zqueue hot-unplug memleak (git-fixes).
- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).
- s390: fix double free of GS and RI CBs on fork() failure (git-fixes).
- s390: fix nospec table alignments (git-fixes).
- s390: mark __cpacf_query() as __always_inline (git-fixes).
- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).
- scsi: drivers: base: Propagate errors through the transport component (git-fixes).
- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (git-fixes).
- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729 bsc#1204810 ltc#200162).
- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).
- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).
- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).
- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).
- scsi: lpfc: Fix spelling mistake 'unsolicted' -&gt; 'unsolicited' (bsc#1204957).
- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).
- scsi: lpfc: Set sli4_param's cmf option to zero when CMF is turned off (bsc#1204957).
- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).
- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).
- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).
- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).
- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).
- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).
- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).
- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).
- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).
- scsi: storvsc: Miscellaneous code cleanups (git-fixes).
- scsi: storvsc: Parameterize number hardware queues (git-fixes).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).
- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).
- scsi: storvsc: Update error logging (git-fixes).
- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).
- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).
- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).
- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).
- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).
- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).
- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).
- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).
- serial: imx: Add missing .thaw_noirq hook (git-fixes).
- siox: fix possible memory leak in siox_device_add() (git-fixes).
- slimbus: stream: correct presence rate frequencies (git-fixes).
- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).
- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).
- staging: greybus: light: fix a couple double frees (git-fixes).
- swiotlb-xen: use vmalloc_to_page on vmalloc virt addresses (git-fixes).
- tracing/ring-buffer: Have polling block on watermark (git-fixes).
- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).
- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).
- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).
- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).
- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).
- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).
- tracing: Wake up waiters when tracing is disabled (git-fixes).
- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: fix PHY disable sequence (git-fixes).
- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).
- usb: dwc3: gadget: Fix null pointer exception (git-fixes).
- usb: dwc3: qcom: fix runtime PM wakeup.
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).
- usbip: add sysfs_lock to synchronize sysfs code paths (git-fixes).
- usbip: stub-dev synchronize sysfs code paths (git-fixes).
- usbip: stub_dev: remake locking for kABI (git-fixes).
- usbip: synchronize event handler with sysfs code paths (git-fixes).
- usbip: usbip_event: use global lock (git-fixes).
- usbip: vudc synchronize sysfs code paths (git-fixes).
- usbip: vudc_sysfs: use global lock (git-fixes).
- use __netdev_notify_peers in hyperv (git-fixes).
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI'
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI' (bsc#1200845)
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).
- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).
- virtio_blk: eliminate anonymous module_init &amp; module_exit (git-fixes).
- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).
- vmlinux.lds.h: Fix placement of '.data..decrypted' section (git-fixes).
- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).
- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).
- wifi: cfg80211: silence a sparse RCU warning (git-fixes).
- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).
- workqueue: do not skip lockdep work dependency in cancel_work_sync() (bsc#1204967).
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/hyperv: Output host build info as normal Windows version number (git-fixes).
- x86/hyperv: check cpu mask after interrupt has been disabled (git-fixes).
- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).
- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).
- x86/xen: Add xen_no_vector_callback option to test PCI INTX delivery (git-fixes).
- x86/xen: Distribute switch variables for initialization (git-fixes).
- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).
- xen-blkback: prevent premature module unload (git-fixes).
- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).
- xen/balloon: fix balloon kthread freezing (git-fixes).
- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).
- xen/balloon: fix cancelled balloon action (git-fixes).
- xen/balloon: use a kernel thread instead a workqueue (git-fixes).
- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).
- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).
- xen/gntdev: Prevent leaking grants (git-fixes).
- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).
- xen/privcmd: Corrected error handling path (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: Fix granting of vmalloc'd memory (git-fixes).
- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).
- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).
- xen: Fix event channel callback via INTX/GSI (git-fixes).
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu&gt;=32 (git-fixes).
- xenbus: req-&gt;body should be updated before req-&gt;state (git-fixes).
- xenbus: req-&gt;err should be updated before req-&gt;state (git-fixes).
- xfs: Lower CIL flush limit for large logs (git-fixes).
- xfs: Throttle commits on delayed background CIL push (git-fixes).
- xfs: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- xfs: check owner of dir3 blocks (git-fixes).
- xfs: factor common AIL item deletion code (git-fixes).
- xfs: open code insert range extent split helper (git-fixes).
- xfs: rework collapse range into an atomic operation (git-fixes).
- xfs: rework insert range into an atomic operation (git-fixes).
- xfs: tail updates only need to occur when LSN changes (git-fixes).
- xfs: trylock underlying buffer on dquot flush (git-fixes).
- xfs: xfs_buf_corruption_error should take __this_address (git-fixes).
- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-23"/>
	<updated date="2022-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192761">SUSE bug 1192761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200845">SUSE bug 1200845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201455">SUSE bug 1201455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203144">SUSE bug 1203144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203746">SUSE bug 1203746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204017">SUSE bug 1204017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204142">SUSE bug 1204142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204215">SUSE bug 1204215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204241">SUSE bug 1204241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204328">SUSE bug 1204328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204446">SUSE bug 1204446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204631">SUSE bug 1204631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204636">SUSE bug 1204636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204693">SUSE bug 1204693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204780">SUSE bug 1204780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204791">SUSE bug 1204791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204810">SUSE bug 1204810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204827">SUSE bug 1204827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204850">SUSE bug 1204850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204868">SUSE bug 1204868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204934">SUSE bug 1204934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204957">SUSE bug 1204957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204963">SUSE bug 1204963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204967">SUSE bug 1204967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205130">SUSE bug 1205130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205186">SUSE bug 1205186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205329">SUSE bug 1205329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205330">SUSE bug 1205330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205428">SUSE bug 1205428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205473">SUSE bug 1205473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205617">SUSE bug 1205617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205700">SUSE bug 1205700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205705">SUSE bug 1205705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205709">SUSE bug 1205709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205753">SUSE bug 1205753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205984">SUSE bug 1205984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205985">SUSE bug 1205985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205986">SUSE bug 1205986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205987">SUSE bug 1205987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205988">SUSE bug 1205988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205989">SUSE bug 1205989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206032">SUSE bug 1206032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206037">SUSE bug 1206037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206207">SUSE bug 1206207</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729404" comment="cluster-md-kmp-rt-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729405" comment="dlm-kmp-rt-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729406" comment="gfs2-kmp-rt-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729407" comment="kernel-devel-rt-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729347" comment="kernel-rt-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729408" comment="kernel-rt-devel-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729409" comment="kernel-rt_debug-devel-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729410" comment="kernel-source-rt-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729411" comment="kernel-syms-rt-5.3.18-150300.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729412" comment="ocfs2-kmp-rt-5.3.18-150300.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53090" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1192761" ref_url="https://bugzilla.suse.com/1192761" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200845" ref_url="https://bugzilla.suse.com/1200845" source="BUGZILLA"/>
		<reference ref_id="1201455" ref_url="https://bugzilla.suse.com/1201455" source="BUGZILLA"/>
		<reference ref_id="1201469" ref_url="https://bugzilla.suse.com/1201469" source="BUGZILLA"/>
		<reference ref_id="1203144" ref_url="https://bugzilla.suse.com/1203144" source="BUGZILLA"/>
		<reference ref_id="1203746" ref_url="https://bugzilla.suse.com/1203746" source="BUGZILLA"/>
		<reference ref_id="1203960" ref_url="https://bugzilla.suse.com/1203960" source="BUGZILLA"/>
		<reference ref_id="1204017" ref_url="https://bugzilla.suse.com/1204017" source="BUGZILLA"/>
		<reference ref_id="1204142" ref_url="https://bugzilla.suse.com/1204142" source="BUGZILLA"/>
		<reference ref_id="1204215" ref_url="https://bugzilla.suse.com/1204215" source="BUGZILLA"/>
		<reference ref_id="1204228" ref_url="https://bugzilla.suse.com/1204228" source="BUGZILLA"/>
		<reference ref_id="1204241" ref_url="https://bugzilla.suse.com/1204241" source="BUGZILLA"/>
		<reference ref_id="1204328" ref_url="https://bugzilla.suse.com/1204328" source="BUGZILLA"/>
		<reference ref_id="1204414" ref_url="https://bugzilla.suse.com/1204414" source="BUGZILLA"/>
		<reference ref_id="1204446" ref_url="https://bugzilla.suse.com/1204446" source="BUGZILLA"/>
		<reference ref_id="1204636" ref_url="https://bugzilla.suse.com/1204636" source="BUGZILLA"/>
		<reference ref_id="1204693" ref_url="https://bugzilla.suse.com/1204693" source="BUGZILLA"/>
		<reference ref_id="1204780" ref_url="https://bugzilla.suse.com/1204780" source="BUGZILLA"/>
		<reference ref_id="1204791" ref_url="https://bugzilla.suse.com/1204791" source="BUGZILLA"/>
		<reference ref_id="1204810" ref_url="https://bugzilla.suse.com/1204810" source="BUGZILLA"/>
		<reference ref_id="1204827" ref_url="https://bugzilla.suse.com/1204827" source="BUGZILLA"/>
		<reference ref_id="1204850" ref_url="https://bugzilla.suse.com/1204850" source="BUGZILLA"/>
		<reference ref_id="1204868" ref_url="https://bugzilla.suse.com/1204868" source="BUGZILLA"/>
		<reference ref_id="1204934" ref_url="https://bugzilla.suse.com/1204934" source="BUGZILLA"/>
		<reference ref_id="1204957" ref_url="https://bugzilla.suse.com/1204957" source="BUGZILLA"/>
		<reference ref_id="1204963" ref_url="https://bugzilla.suse.com/1204963" source="BUGZILLA"/>
		<reference ref_id="1204967" ref_url="https://bugzilla.suse.com/1204967" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1205130" ref_url="https://bugzilla.suse.com/1205130" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205264" ref_url="https://bugzilla.suse.com/1205264" source="BUGZILLA"/>
		<reference ref_id="1205329" ref_url="https://bugzilla.suse.com/1205329" source="BUGZILLA"/>
		<reference ref_id="1205330" ref_url="https://bugzilla.suse.com/1205330" source="BUGZILLA"/>
		<reference ref_id="1205428" ref_url="https://bugzilla.suse.com/1205428" source="BUGZILLA"/>
		<reference ref_id="1205473" ref_url="https://bugzilla.suse.com/1205473" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1205567" ref_url="https://bugzilla.suse.com/1205567" source="BUGZILLA"/>
		<reference ref_id="1205617" ref_url="https://bugzilla.suse.com/1205617" source="BUGZILLA"/>
		<reference ref_id="1205671" ref_url="https://bugzilla.suse.com/1205671" source="BUGZILLA"/>
		<reference ref_id="1205700" ref_url="https://bugzilla.suse.com/1205700" source="BUGZILLA"/>
		<reference ref_id="1205705" ref_url="https://bugzilla.suse.com/1205705" source="BUGZILLA"/>
		<reference ref_id="1205709" ref_url="https://bugzilla.suse.com/1205709" source="BUGZILLA"/>
		<reference ref_id="1205753" ref_url="https://bugzilla.suse.com/1205753" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1205984" ref_url="https://bugzilla.suse.com/1205984" source="BUGZILLA"/>
		<reference ref_id="1205985" ref_url="https://bugzilla.suse.com/1205985" source="BUGZILLA"/>
		<reference ref_id="1205986" ref_url="https://bugzilla.suse.com/1205986" source="BUGZILLA"/>
		<reference ref_id="1205987" ref_url="https://bugzilla.suse.com/1205987" source="BUGZILLA"/>
		<reference ref_id="1205988" ref_url="https://bugzilla.suse.com/1205988" source="BUGZILLA"/>
		<reference ref_id="1205989" ref_url="https://bugzilla.suse.com/1205989" source="BUGZILLA"/>
		<reference ref_id="1206032" ref_url="https://bugzilla.suse.com/1206032" source="BUGZILLA"/>
		<reference ref_id="1206037" ref_url="https://bugzilla.suse.com/1206037" source="BUGZILLA"/>
		<reference ref_id="1206207" ref_url="https://bugzilla.suse.com/1206207" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129/" source="CVE"/>
		<reference ref_id="CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).
- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).
- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).

The following non-security bugs were fixed:

- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).
- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).
- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).
- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).
- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).
- ASoC: codecs: jz4725b: Fix spelling mistake 'Sourc' -&gt; 'Source', 'Routee' -&gt; 'Route' (git-fixes).
- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).
- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).
- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).
- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).
- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).
- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).
- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).
- ASoC: wm5102: Revert 'ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe' (git-fixes).
- ASoC: wm5110: Revert 'ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe' (git-fixes).
- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).
- ASoC: wm8997: Revert 'ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe' (git-fixes).
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).
- Do not enable CONFIG_ATARI_PARTITION (jsc#PED-1573)
- Drivers: hv: vmbus: Add /sys/bus/vmbus/hibernation (git-fixes).
- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening (bsc#1204017).
- Drivers: hv: vmbus: Drop error message when 'No request id available' (bsc#1204017).
- Drivers: hv: vmbus: Fix duplicate CPU assignments within a device (git-fixes).
- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).
- Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).
- Drivers: hv: vmbus: Fix potential crash on module unload (git-fixes).
- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).
- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).
- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).
- Drivers: hv: vmbus: Prevent load re-ordering when reading ring buffer (git-fixes).
- Drivers: hv: vmbus: Remove unused linux/version.h header (git-fixes).
- Drivers: hv: vmbus: Replace smp_store_mb() with virt_store_mb() (git-fixes).
- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).
- Drivers: hv: vmbus: remove unused function (git-fixes).
- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).
- Input: i8042 - fix leaking of platform device on module removal (git-fixes).
- Input: iforce - invert valid length check when fetching device IDs (git-fixes).
- KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support (git-fixes).
- KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1 (git-fixes).
- KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT) (git-fixes).
- KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only when apicv is globally disabled (git-fixes).
- KVM: s390: Add a routine for setting userspace CPU state (git-fixes).
- KVM: s390: Fix handle_sske page fault handling (git-fixes).
- KVM: s390: Simplify SIGP Set Arch handling (git-fixes).
- KVM: s390: get rid of register asm usage (git-fixes).
- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).
- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).
- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).
- KVM: s390: reduce number of IO pins to 1 (git-fixes).
- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).
- NFS: Refactor nfs_instantiate() for dentry referencing callers (bsc#1204215).
- NFSv3: use nfs_add_or_obtain() to create and reference inodes (bsc#1204215).
- PCI: hv: Add check for hyperv_initialized in init_hv_pci_drv() (bsc#1204446).
- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).
- PCI: hv: Drop msi_controller structure (bsc#1204446).
- PCI: hv: Fix a race condition when removing the device (bsc#1204446).
- PCI: hv: Fix sleep while in non-sleep context when removing child devices from the bus (bsc#1204446).
- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).
- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (bsc#1200845).
- PCI: hv: Fix typo (bsc#1204446).
- PCI: hv: Remove bus device removal unused refcount/functions (bsc#1204446).
- PCI: hv: Remove unnecessary use of %hx (bsc#1204446).
- PCI: hv: Support for create interrupt v3 (bsc#1204446).
- PCI: hv: Use PCI_ERROR_RESPONSE to identify config read errors (bsc#1204446).
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).
- RDMA/core/sa_query: Remove unused argument (git-fixes)
- RDMA/hns: Fix spelling mistakes of original (git-fixes)
- RDMA/qedr: Add support for user mode XRC-SRQ's (git-fixes)
- RDMA/qedr: Fix reporting max_{send/recv}_wr attrs (git-fixes)
- RDMA/qedr: Remove unsupported qedr_resize_cq callback (git-fixes)
- RDMA/rxe: Fix memory leak in error path code (git-fixes)
- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).
- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).
- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).
- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
- USB: serial: option: remove old LARA-R6 PID (git-fixes).
- USB: serial: option: remove old LARA-R6 PID.
- Xen/gntdev: do not ignore kernel unmapping error (git-fixes).
- add another bug reference to some hyperv changes (bsc#1205617).
- arm/xen: Do not probe xenbus as part of an early initcall (git-fixes).
- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes)
- arm64: dts: juno: Add thermal critical trip points (git-fixes)
- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).
- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).
- blk-crypto: fix check for too-large dun_bytes (git-fixes).
- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).
- blk-mq: do not create hctx debugfs dir until q-&gt;debugfs_dir is created (git-fixes).
- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).
- blktrace: Trace remapped requests correctly (git-fixes).
- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern (git-fixes).
- block: Add a helper to validate the block size (git-fixes).
- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1204328).
- block: ataflop: fix breakage introduced at blk-mq refactoring (git-fixes).
- block: ataflop: more blk-mq refactoring fixes (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: limit request dispatch loop duration (git-fixes).
- block: nbd: add sanity check for first_minor (git-fixes).
- block: use 'unsigned long' for blk_validate_block_size() (git-fixes).
- bus: sunxi-rsb: Support atomic transfers (git-fixes).
- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).
- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).
- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1205989).
- ceph: do not access the kiocb after aio requests (bsc#1205984).
- ceph: fix fscache invalidation (bsc#1205985).
- ceph: lockdep annotations for try_nonblocking_invalidate (bsc#1205988).
- ceph: remove bogus checks and WARN_ONs from ceph_set_page_dirty (bsc#1205986).
- ceph: request Fw caps before updating the mtime in ceph_write_iter (bsc#1205987).
- cifs: skip extra NULL byte in filenames (bsc#1204791).
- dm era: commit metadata in postsuspend after worker stops (git-fixes).
- dm integrity: set journal entry unused when shrinking device (git-fixes).
- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).
- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).
- dm raid: fix accesses beyond end of raid member array (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).
- dm verity fec: fix misaligned RS roots IO (git-fixes).
- dm writecache: fix writing beyond end of underlying device when shrinking (git-fixes).
- dm writecache: return the exact table values that were set (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix request-based DM to not bounce through indirect dm_submit_bio (git-fixes).
- dm: remove special-casing of bio-based immutable singleton target on NVMe (git-fixes).
- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).
- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).
- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).
- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).
- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).
- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).
- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).
- dmaengine: at_hdmac: Fix impossible condition (git-fixes).
- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).
- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).
- drivers/hv: remove obsolete TODO and fix misleading typo in comment (git-fixes).
- drivers: hv: Fix EXPORT_SYMBOL and tab spaces issue (git-fixes).
- drivers: hv: Fix hyperv_record_panic_msg path on comment (git-fixes).
- drivers: hv: Fix missing error code in vmbus_connect() (git-fixes).
- drivers: hv: vmbus: Fix call msleep using &amp;lt; 20ms (git-fixes).
- drivers: hv: vmbus: Fix checkpatch LINE_SPACING (git-fixes).
- drivers: hv: vmbus: Fix checkpatch SPLIT_STRING (git-fixes).
- drivers: hv: vmbus: Replace symbolic permissions by octal permissions (git-fixes).
- drivers: net: slip: fix NPD bug in sl_tx_timeout() (git-fixes).
- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).
- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).
- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).
- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).
- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).
- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).
- drm/rockchip: dsi: Force synchronous probe (git-fixes).
- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).
- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).
- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).
- firmware: arm_scmi: Suppress the driver's bind attributes (git-fixes).
- ftrace: Fix char print issue in print_ip_ins() (git-fixes).
- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).
- ftrace: Fix the possible incorrect kernel message (git-fixes).
- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).
- ftrace: Optimize the allocation for mcount entries (git-fixes).
- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).
- fuse: add file_modified() to fallocate (bsc#1205330).
- fuse: fix readdir cache race (bsc#1205329).
- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).
- hv: hyperv.h: Remove unused inline functions (git-fixes).
- hv_netvsc: Add a comment clarifying batching logic (git-fixes).
- hv_netvsc: Add check for kvmalloc_array (git-fixes).
- hv_netvsc: Add error handling while switching data path (bsc#1204850).
- hv_netvsc: Allocate the recv_buf buffers after NVSP_MSG1_TYPE_SEND_RECV_BUF (git-fixes).
- hv_netvsc: Check VF datapath when sending traffic to VF (git-fixes).
- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).
- hv_netvsc: Process NETDEV_GOING_DOWN on VF hot remove (bsc#1204850).
- hv_netvsc: Use bitmap_zalloc() when applicable (git-fixes).
- hv_netvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- hv_netvsc: Validate number of allocated sub-channels (git-fixes).
- hv_netvsc: Wait for completion on request SWITCH_DATA_PATH (bsc#1204017).
- hv_netvsc: use netif_is_bond_master() instead of open code (git-fixes).
- hv_utils: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).
- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).
- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).
- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).
- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).
- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).
- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).
- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).
- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).
- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).
- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).
- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).
- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).
- iwlwifi: dbg: disable ini debug in 9000 family and below (git-fixes).
- kABI: Fix after adding trace_iterator.wait_index (git-fixes).
- kABI: remove new member of usbip_device (git-fixes).
- kabi: fix transport_add_device change (git-fixes).
- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).
- kvm: nVMX: reflect MTF VM-exits if injected by L1 (git-fixes).
- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).
- livepatch: fix race between fork and KLP transition (bsc#1071995).
- loop: Check for overflow while configuring loop (git-fixes).
- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).
- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).
- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).
- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).
- md: Replace snprintf with scnprintf (git-fixes).
- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).
- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).
- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).
- media: venus: dec: Handle the case where find_format fails (git-fixes).
- media: vim2m: initialize the media device earlier (git-fixes).
- media: vivid: fix assignment of dev-&gt;fbuf_out_flags (git-fixes).
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).
- mmc: core: properly select voltage range without power cycle (git-fixes).
- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).
- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).
- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).
- nbd: Fix use-after-free in pid_show (git-fixes).
- nbd: fix possible overflow for 'first_minor' in nbd_dev_add() (git-fixes).
- nbd: fix possible overflow on 'first_minor' in nbd_dev_add() (git-fixes).
- nbd: handle device refs for DESTROY_ON_DISCONNECT properly (git-fixes).
- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).
- net: ethernet: nixge: fix NULL dereference (git-fixes).
- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: netvsc: remove break after return (git-fixes).
- net: phy: fix null-ptr-deref while probe() failed (git-fixes).
- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for MR400 (git-fixes).
- net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch (git-fixes).
- nfc/nci: fix race with opening and closing (git-fixes).
- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).
- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).
- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).
- nfsd: set the server_scope during service startup (bsc#1203746).
- null_blk: Fail zone append to conventional zones (git-fixes).
- null_blk: synchronization fix for zoned device (git-fixes).
- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).
- panic, kexec: make __crash_kexec() NMI safe (git-fixes).
- parport_pc: Avoid FIFO port location truncation (git-fixes).
- phy: stm32: fix an error code in probe (git-fixes).
- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).
- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).
- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).
- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).
- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).
- printk: use atomic updates for klogd work (bsc#1204934).
- printk: wake waiters for safe and NMI contexts (bsc#1204934).
- r8152: Add MAC passthrough support to new device (git-fixes).
- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).
- r8152: use new helper tcp_v6_gso_csum_prep (git-fixes).
- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).
- regulator: core: fix UAF in destroy_regulator() (git-fixes).
- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).
- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).
- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Allow splice to read previous partially read pages (git-fixes).
- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).
- ring-buffer: Fix race between reset page and reading page (git-fixes).
- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).
- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).
- ring_buffer: Do not deactivate non-existant pages (git-fixes).
- rndis_host: increase sleep time in the query-response loop (git-fixes).
- rtc: mt6397: fix alarm register overwrite (git-fixes).
- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).
- s390/cpcmd: fix inline assembly register clobbering (git-fixes).
- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).
- s390/disassembler: increase ebpf disasm buffer size (git-fixes).
- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205428 LTC#200501).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203144 LTC#199881).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (git-fixes).
- s390/ptrace: return -ENOSYS when invalid syscall is supplied (git-fixes).
- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).
- s390/vtime: fix inline assembly clobber list (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- s390/zcrypt: fix zcard and zqueue hot-unplug memleak (git-fixes).
- s390: Remove arch_has_random, arch_has_random_seed (git-fixes).
- s390: fix double free of GS and RI CBs on fork() failure (git-fixes).
- s390: fix nospec table alignments (git-fixes).
- s390: mark __cpacf_query() as __always_inline (git-fixes).
- scsi: bsg: Remove support for SCSI_IOCTL_SEND_COMMAND (git-fixes).
- scsi: drivers: base: Propagate errors through the transport component (git-fixes).
- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (git-fixes).
- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729 bsc#1204810 ltc#200162).
- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).
- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).
- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).
- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).
- scsi: lpfc: Fix spelling mistake 'unsolicted' -&gt; 'unsolicited' (bsc#1204957).
- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).
- scsi: lpfc: Set sli4_param's cmf option to zero when CMF is turned off (bsc#1204957).
- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).
- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).
- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).
- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).
- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).
- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).
- scsi: storvsc: Fix max_outstanding_req_per_channel for Win8 and newer (bsc#1204017).
- scsi: storvsc: Fix validation for unsolicited incoming packets (bsc#1204017).
- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).
- scsi: storvsc: Miscellaneous code cleanups (git-fixes).
- scsi: storvsc: Parameterize number hardware queues (git-fixes).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: Resolve data race in storvsc_probe() (bsc#1204017).
- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).
- scsi: storvsc: Update error logging (git-fixes).
- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs (bsc#1204017).
- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).
- scsi: storvsc: Use vmbus_requestor to generate transaction IDs for VMBus hardening (bsc#1204017).
- scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() (bsc#1204017).
- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).
- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).
- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).
- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).
- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).
- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).
- serial: imx: Add missing .thaw_noirq hook (git-fixes).
- siox: fix possible memory leak in siox_device_add() (git-fixes).
- slimbus: stream: correct presence rate frequencies (git-fixes).
- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).
- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).
- staging: greybus: light: fix a couple double frees (git-fixes).
- swiotlb-xen: use vmalloc_to_page on vmalloc virt addresses (git-fixes).
- tracing/ring-buffer: Have polling block on watermark (git-fixes).
- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).
- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).
- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).
- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).
- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).
- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).
- tracing: Wake up waiters when tracing is disabled (git-fixes).
- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: fix PHY disable sequence (git-fixes).
- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).
- usb: dwc3: gadget: Fix null pointer exception (git-fixes).
- usb: dwc3: qcom: fix runtime PM wakeup.
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).
- usbip: add sysfs_lock to synchronize sysfs code paths (git-fixes).
- usbip: stub-dev synchronize sysfs code paths (git-fixes).
- usbip: stub_dev: remake locking for kABI (git-fixes).
- usbip: synchronize event handler with sysfs code paths (git-fixes).
- usbip: usbip_event: use global lock (git-fixes).
- usbip: vudc synchronize sysfs code paths (git-fixes).
- usbip: vudc_sysfs: use global lock (git-fixes).
- use __netdev_notify_peers in hyperv (git-fixes).
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI'
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI' (bsc#1200845)
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).
- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).
- virtio_blk: eliminate anonymous module_init &amp; module_exit (git-fixes).
- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).
- vmlinux.lds.h: Fix placement of '.data..decrypted' section (git-fixes).
- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).
- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).
- wifi: cfg80211: silence a sparse RCU warning (git-fixes).
- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).
- workqueue: do not skip lockdep work dependency in cancel_work_sync() (bsc#1204967).
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/hyperv: Output host build info as normal Windows version number (git-fixes).
- x86/hyperv: check cpu mask after interrupt has been disabled (git-fixes).
- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).
- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).
- x86/xen: Add xen_no_vector_callback option to test PCI INTX delivery (git-fixes).
- x86/xen: Distribute switch variables for initialization (git-fixes).
- x86/xen: do not unbind uninitialized lock_kicker_irq (git-fixes).
- xen-blkback: prevent premature module unload (git-fixes).
- xen-netback: correct success/error reporting for the SKB-with-fraglist case (git-fixes).
- xen/balloon: fix balloon kthread freezing (git-fixes).
- xen/balloon: fix ballooned page accounting without hotplug enabled (git-fixes).
- xen/balloon: fix cancelled balloon action (git-fixes).
- xen/balloon: use a kernel thread instead a workqueue (git-fixes).
- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).
- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).
- xen/gntdev: Prevent leaking grants (git-fixes).
- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).
- xen/privcmd: Corrected error handling path (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: Fix granting of vmalloc'd memory (git-fixes).
- xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status (git-fixes).
- xen: Fix XenStore initialisation for XS_LOCAL (git-fixes).
- xen: Fix event channel callback via INTX/GSI (git-fixes).
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu&gt;=32 (git-fixes).
- xenbus: req-&gt;body should be updated before req-&gt;state (git-fixes).
- xenbus: req-&gt;err should be updated before req-&gt;state (git-fixes).
- xfs: Lower CIL flush limit for large logs (git-fixes).
- xfs: Throttle commits on delayed background CIL push (git-fixes).
- xfs: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- xfs: check owner of dir3 blocks (git-fixes).
- xfs: factor common AIL item deletion code (git-fixes).
- xfs: open code insert range extent split helper (git-fixes).
- xfs: rework collapse range into an atomic operation (git-fixes).
- xfs: rework insert range into an atomic operation (git-fixes).
- xfs: tail updates only need to occur when LSN changes (git-fixes).
- xfs: trylock underlying buffer on dquot flush (git-fixes).
- xfs: xfs_buf_corruption_error should take __this_address (git-fixes).
- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-23"/>
	<updated date="2022-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192761">SUSE bug 1192761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200845">SUSE bug 1200845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201455">SUSE bug 1201455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203144">SUSE bug 1203144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203746">SUSE bug 1203746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203960">SUSE bug 1203960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204017">SUSE bug 1204017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204142">SUSE bug 1204142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204215">SUSE bug 1204215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204228">SUSE bug 1204228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204241">SUSE bug 1204241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204328">SUSE bug 1204328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204414">SUSE bug 1204414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204446">SUSE bug 1204446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204636">SUSE bug 1204636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204693">SUSE bug 1204693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204780">SUSE bug 1204780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204791">SUSE bug 1204791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204810">SUSE bug 1204810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204827">SUSE bug 1204827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204850">SUSE bug 1204850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204868">SUSE bug 1204868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204934">SUSE bug 1204934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204957">SUSE bug 1204957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204963">SUSE bug 1204963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204967">SUSE bug 1204967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205130">SUSE bug 1205130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205264">SUSE bug 1205264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205329">SUSE bug 1205329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205330">SUSE bug 1205330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205428">SUSE bug 1205428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205473">SUSE bug 1205473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205567">SUSE bug 1205567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205617">SUSE bug 1205617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205700">SUSE bug 1205700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205705">SUSE bug 1205705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205709">SUSE bug 1205709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205753">SUSE bug 1205753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205984">SUSE bug 1205984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205985">SUSE bug 1205985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205986">SUSE bug 1205986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205987">SUSE bug 1205987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205988">SUSE bug 1205988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205989">SUSE bug 1205989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206032">SUSE bug 1206032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206037">SUSE bug 1206037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206207">SUSE bug 1206207</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139</cve>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729350" comment="cluster-md-kmp-64kb-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729161" comment="cluster-md-kmp-default-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729351" comment="cluster-md-kmp-preempt-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729352" comment="dlm-kmp-64kb-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729162" comment="dlm-kmp-default-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729353" comment="dlm-kmp-preempt-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729073" comment="dtb-al-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729354" comment="dtb-allwinner-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729355" comment="dtb-altera-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729356" comment="dtb-amd-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729357" comment="dtb-amlogic-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729358" comment="dtb-apm-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729359" comment="dtb-arm-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729360" comment="dtb-broadcom-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729361" comment="dtb-cavium-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729362" comment="dtb-exynos-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729363" comment="dtb-freescale-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729364" comment="dtb-hisilicon-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729365" comment="dtb-lg-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729366" comment="dtb-marvell-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729367" comment="dtb-mediatek-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729368" comment="dtb-nvidia-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729369" comment="dtb-qcom-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729370" comment="dtb-renesas-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729371" comment="dtb-rockchip-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729372" comment="dtb-socionext-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729373" comment="dtb-sprd-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729374" comment="dtb-xilinx-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729074" comment="dtb-zte-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729375" comment="gfs2-kmp-64kb-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729163" comment="gfs2-kmp-default-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729376" comment="gfs2-kmp-preempt-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729119" comment="kernel-64kb-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729120" comment="kernel-64kb-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729377" comment="kernel-64kb-extra-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729378" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729379" comment="kernel-64kb-optional-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729380" comment="kernel-debug-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729381" comment="kernel-debug-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729382" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729121" comment="kernel-default-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729122" comment="kernel-default-base-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729383" comment="kernel-default-base-rebuild-5.3.18-150300.59.106.1.150300.18.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729123" comment="kernel-default-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729384" comment="kernel-default-extra-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729385" comment="kernel-default-livepatch-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729386" comment="kernel-default-livepatch-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729387" comment="kernel-default-optional-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729124" comment="kernel-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729128" comment="kernel-docs-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729388" comment="kernel-docs-html-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729389" comment="kernel-kvmsmall-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729390" comment="kernel-kvmsmall-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729391" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729125" comment="kernel-macros-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729129" comment="kernel-obs-build-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729392" comment="kernel-obs-qa-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729126" comment="kernel-preempt-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729130" comment="kernel-preempt-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729393" comment="kernel-preempt-extra-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729394" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729395" comment="kernel-preempt-optional-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729131" comment="kernel-source-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729396" comment="kernel-source-vanilla-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729132" comment="kernel-syms-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729127" comment="kernel-zfcpdump-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729397" comment="kselftests-kmp-64kb-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729398" comment="kselftests-kmp-default-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729399" comment="kselftests-kmp-preempt-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729400" comment="ocfs2-kmp-64kb-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729164" comment="ocfs2-kmp-default-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729401" comment="ocfs2-kmp-preempt-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729402" comment="reiserfs-kmp-64kb-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729133" comment="reiserfs-kmp-default-5.3.18-150300.59.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729403" comment="reiserfs-kmp-preempt-5.3.18-150300.59.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53091" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1206204" ref_url="https://bugzilla.suse.com/1206204" source="BUGZILLA"/>
		<reference ref_id="1206205" ref_url="https://bugzilla.suse.com/1206205" source="BUGZILLA"/>
		<reference ref_id="1206206" ref_url="https://bugzilla.suse.com/1206206" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41859" ref_url="https://www.suse.com/security/cve/CVE-2022-41859/" source="CVE"/>
		<reference ref_id="CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860/" source="CVE"/>
		<reference ref_id="CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013346.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2022-41859: Fixes an information leakage in EAP-PWD (bsc#1206204).
- CVE-2022-41860: Fixes a crash on unknown option in EAP-SIM (bsc#1206205).
- CVE-2022-41861: Fixes a crash on invalid abinary data (bsc#1206206).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-27"/>
	<updated date="2022-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206204">SUSE bug 1206204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206205">SUSE bug 1206205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206206">SUSE bug 1206206</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41859/">CVE-2022-41859</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729740" comment="freeradius-server-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729741" comment="freeradius-server-devel-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729742" comment="freeradius-server-doc-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729743" comment="freeradius-server-krb5-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729744" comment="freeradius-server-ldap-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729745" comment="freeradius-server-libs-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729746" comment="freeradius-server-mysql-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729747" comment="freeradius-server-perl-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729748" comment="freeradius-server-postgresql-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729749" comment="freeradius-server-python3-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729750" comment="freeradius-server-sqlite-3.0.21-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729751" comment="freeradius-server-utils-3.0.21-150200.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53092" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1206337" ref_url="https://bugzilla.suse.com/1206337" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46908" ref_url="https://www.suse.com/security/cve/CVE-2022-46908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013354.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism, 
  when relying on --safe for execution of an untrusted CLI script (bsc#1206337).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-28"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206337">SUSE bug 1206337</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46908/">CVE-2022-46908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729556" comment="libsqlite3-0-3.39.3-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729557" comment="libsqlite3-0-32bit-3.39.3-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729558" comment="sqlite3-3.39.3-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729559" comment="sqlite3-devel-3.39.3-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729560" comment="sqlite3-doc-3.39.3-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729561" comment="sqlite3-tcl-3.39.3-150000.3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53093" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1200723" ref_url="https://bugzilla.suse.com/1200723" source="BUGZILLA"/>
		<reference ref_id="1203857" ref_url="https://bugzilla.suse.com/1203857" source="BUGZILLA"/>
		<reference ref_id="1204423" ref_url="https://bugzilla.suse.com/1204423" source="BUGZILLA"/>
		<reference ref_id="1205000" ref_url="https://bugzilla.suse.com/1205000" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013356.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).

Bug fixes:

- Support by-path devlink for multipath nvme block devices (bsc#1200723).
- Set SYSTEMD_NSS_DYNAMIC_BYPASS=1 env var for dbus-daemon (bsc#1203857).
- Restrict cpu rule to x86_64, and also update the rule files to make use of the 'CONST{arch}' syntax (bsc#1204423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-28"/>
	<updated date="2022-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200723">SUSE bug 1200723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203857">SUSE bug 1203857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204423">SUSE bug 1204423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205000">SUSE bug 1205000</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730353" comment="libsystemd0-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730354" comment="libsystemd0-32bit-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730355" comment="libudev-devel-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730682" comment="libudev-devel-32bit-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730356" comment="libudev1-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730357" comment="libudev1-32bit-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730683" comment="nss-myhostname-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730684" comment="nss-myhostname-32bit-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730253" comment="nss-mymachines-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730254" comment="nss-mymachines-32bit-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730255" comment="nss-resolve-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730685" comment="nss-systemd-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730358" comment="systemd-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730359" comment="systemd-32bit-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730360" comment="systemd-container-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730361" comment="systemd-coredump-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730362" comment="systemd-devel-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730363" comment="systemd-doc-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730364" comment="systemd-journal-remote-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730365" comment="systemd-lang-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730256" comment="systemd-logger-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730686" comment="systemd-network-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730366" comment="systemd-sysvinit-246.16-150300.7.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730367" comment="udev-246.16-150300.7.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53094" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204779" ref_url="https://bugzilla.suse.com/1204779" source="BUGZILLA"/>
		<reference ref_id="1205797" ref_url="https://bugzilla.suse.com/1205797" source="BUGZILLA"/>
		<reference ref_id="1206028" ref_url="https://bugzilla.suse.com/1206028" source="BUGZILLA"/>
		<reference ref_id="1206071" ref_url="https://bugzilla.suse.com/1206071" source="BUGZILLA"/>
		<reference ref_id="1206072" ref_url="https://bugzilla.suse.com/1206072" source="BUGZILLA"/>
		<reference ref_id="1206075" ref_url="https://bugzilla.suse.com/1206075" source="BUGZILLA"/>
		<reference ref_id="1206077" ref_url="https://bugzilla.suse.com/1206077" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3491" ref_url="https://www.suse.com/security/cve/CVE-2022-3491/" source="CVE"/>
		<reference ref_id="CVE-2022-3520" ref_url="https://www.suse.com/security/cve/CVE-2022-3520/" source="CVE"/>
		<reference ref_id="CVE-2022-3591" ref_url="https://www.suse.com/security/cve/CVE-2022-3591/" source="CVE"/>
		<reference ref_id="CVE-2022-3705" ref_url="https://www.suse.com/security/cve/CVE-2022-3705/" source="CVE"/>
		<reference ref_id="CVE-2022-4141" ref_url="https://www.suse.com/security/cve/CVE-2022-4141/" source="CVE"/>
		<reference ref_id="CVE-2022-4292" ref_url="https://www.suse.com/security/cve/CVE-2022-4292/" source="CVE"/>
		<reference ref_id="CVE-2022-4293" ref_url="https://www.suse.com/security/cve/CVE-2022-4293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013353.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0.1040:

- CVE-2022-3491: vim: Heap-based Buffer Overflow prior to 9.0.0742 (bsc#1206028).
- CVE-2022-3520: vim: Heap-based Buffer Overflow (bsc#1206071).
- CVE-2022-3591: vim: Use After Free (bsc#1206072).
- CVE-2022-4292: vim: Use After Free in GitHub repository vim/vim prior to 9.0.0882 (bsc#1206075).
- CVE-2022-4293: vim: Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804 (bsc#1206077).
- CVE-2022-4141: vim: heap-buffer-overflow in alloc.c 246:11 (bsc#1205797).
- CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c (bsc#1204779).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-28"/>
	<updated date="2022-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204779">SUSE bug 1204779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205797">SUSE bug 1205797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206028">SUSE bug 1206028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206071">SUSE bug 1206071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206072">SUSE bug 1206072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206075">SUSE bug 1206075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206077">SUSE bug 1206077</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3491/">CVE-2022-3491</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3520/">CVE-2022-3520</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3591/">CVE-2022-3591</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3705/">CVE-2022-3705</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4141/">CVE-2022-4141</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4292/">CVE-2022-4292</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4293/">CVE-2022-4293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729551" comment="gvim-9.0.1040-150000.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729552" comment="vim-9.0.1040-150000.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729553" comment="vim-data-9.0.1040-150000.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729554" comment="vim-data-common-9.0.1040-150000.5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729555" comment="vim-small-9.0.1040-150000.5.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53095" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1206309" ref_url="https://bugzilla.suse.com/1206309" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013355.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-43552: HTTP Proxy deny use-after-free (bsc#1206309).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-12-28"/>
	<updated date="2022-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206309">SUSE bug 1206309</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729981" comment="curl-7.66.0-150200.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729982" comment="libcurl-devel-7.66.0-150200.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729983" comment="libcurl-devel-32bit-7.66.0-150200.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729984" comment="libcurl4-7.66.0-150200.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729917" comment="libcurl4-32bit-7.66.0-150200.4.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53096" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EQXVEUIFIMFD6G5N2JBQ2A6XUYVZBCSY/" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667312" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667313" comment="virglrenderer-devel-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667340" comment="virglrenderer-test-server-0.6.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53097" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665431" comment="libtiff-devel-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666516" comment="libtiff-devel-32bit-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665432" comment="libtiff5-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665439" comment="libtiff5-32bit-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665440" comment="tiff-4.0.9-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53098" version="1" class="patch">
	<metadata>
		<title>Security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0491-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL7GUT2ZSPRSFN52THPCRG67APLUTSL7/" source="SUSE-SU"/>
		<description>
This update for rust fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664840" comment="cargo-doc-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664557" comment="rust-analysis-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664841" comment="rust-doc-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664558" comment="rust-src-1.53.0-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53099" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0492-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDDGV75VWTCAFSBICC2NAFQ3EN5G6NAI/" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664852" comment="strongswan-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664853" comment="strongswan-doc-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664854" comment="strongswan-hmac-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664855" comment="strongswan-ipsec-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664856" comment="strongswan-libs0-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665039" comment="strongswan-mysql-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664858" comment="strongswan-nm-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665040" comment="strongswan-sqlite-5.8.2-11.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53100" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0493-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCT6DXOWMADGOBQLVFVTQMZKCFCV2BAQ/" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664496" comment="clamav-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664497" comment="clamav-devel-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664498" comment="libclamav9-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664499" comment="libfreshclam2-0.103.5-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53101" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BCJZG2PLWMYBP7YS7O3T6NSE3AKSEBB/" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665433" comment="expat-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665434" comment="libexpat-devel-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666517" comment="libexpat-devel-32bit-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665435" comment="libexpat1-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665436" comment="libexpat1-32bit-2.2.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53102" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0499-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/233XDDM6URC3DPBBAKQV2AZQY6TBXJRV/" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects by
  properly removing sensitive headers when redirecting to a different origin
  (bsc#1195667).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667854" comment="python-Twisted-doc-19.10.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667855" comment="python2-Twisted-19.10.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667814" comment="python3-Twisted-19.10.0-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53103" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1108471" ref_url="https://bugzilla.suse.com/1108471" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="1116807" ref_url="https://bugzilla.suse.com/1116807" source="BUGZILLA"/>
		<reference ref_id="1140341" ref_url="https://bugzilla.suse.com/1140341" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1181591" ref_url="https://bugzilla.suse.com/1181591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQK3YBZP7LLGFOZF2RYGZC5GDDRHRI6/" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
- CVE-2018-18065: Fix remote DoS in agent/helpers/table.c (bsc#1111122)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108471">SUSE bug 1108471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116807">SUSE bug 1116807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140341">SUSE bug 1140341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181591">SUSE bug 1181591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661027" comment="libsnmp30-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661035" comment="libsnmp30-32bit-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661028" comment="net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661029" comment="net-snmp-devel-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661802" comment="net-snmp-devel-32bit-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661030" comment="perl-SNMP-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661803" comment="python2-net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661804" comment="python3-net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661031" comment="snmp-mibs-5.7.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53104" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGEARHFYVIAKL4GTM5XYZEDPPE7QH6IR/" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:
	  
- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667948" comment="xerces-j2-scripts-2.11.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667903" comment="xerces-j2-xml-apis-2.11.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667904" comment="xerces-j2-xml-resolver-2.11.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53105" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7E32672AADOJILNWAAKOTVLBYTBDBKD/" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667862" comment="xerces-j2-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667946" comment="xerces-j2-demo-2.12.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667947" comment="xerces-j2-javadoc-2.12.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53106" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DAZJOOODJLFD53X2AQIEWTT3MS53WDSD/" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662457" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662536" comment="libsndfile-progs-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662458" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662463" comment="libsndfile1-32bit-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53107" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195542" ref_url="https://bugzilla.suse.com/1195542" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0525-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6R7S5GYVKZ4LZLTJ5KNEDZRGJISXBAZ/" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4115: Fixed a denial of service via file descriptor leak (bsc#1195542).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195542">SUSE bug 1195542</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668273" comment="libpolkit0-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668422" comment="libpolkit0-32bit-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668274" comment="polkit-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668275" comment="polkit-devel-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668423" comment="polkit-doc-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668276" comment="typelib-1_0-Polkit-1_0-0.116-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53108" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0526-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HOBR6WV7O5C5LLCJ6DZK4KZKG37EDV4/" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container fixes the following issues:

- Update to version 0.49.0
  Release notes https://github.com/kubevirt/kubevirt/releases/tag/v0.49.0
- Drop kubevirt-psp-caasp.yaml

- Install curl and lsscsi (needed for testing)

- Symlink UEFI firmware with AMD SEV support

- Install tar package to enable kubectl cp ...

- Make a 'fixed appliance' for libguestfs
- Explicitly install libguestfs{,-devel} and supermin
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666508" comment="kubevirt-container-disk-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665437" comment="kubevirt-manifests-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666509" comment="kubevirt-tests-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666510" comment="kubevirt-virt-api-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666511" comment="kubevirt-virt-controller-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666512" comment="kubevirt-virt-handler-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666513" comment="kubevirt-virt-launcher-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666514" comment="kubevirt-virt-operator-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665438" comment="kubevirt-virtctl-0.49.0-150300.8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666515" comment="obs-service-kubevirt_containers_meta-0.49.0-150300.8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53109" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191826" ref_url="https://bugzilla.suse.com/1191826" source="BUGZILLA"/>
		<reference ref_id="1192637" ref_url="https://bugzilla.suse.com/1192637" source="BUGZILLA"/>
		<reference ref_id="1194178" ref_url="https://bugzilla.suse.com/1194178" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3997" ref_url="https://www.suse.com/security/cve/CVE-2021-3997/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0539-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VLDAI5QR7ALPYFJ4GNL2TIX7IMLOLXUU/" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2021-3997: Fixed an uncontrolled recursion in systemd's systemd-tmpfiles (bsc#1194178).

The following non-security bugs were fixed:
- udev/net_id: don't generate slot based names if multiple devices might claim the same slot (bsc#1192637)
- localectl: don't omit keymaps files that are symlinks (bsc#1191826)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191826">SUSE bug 1191826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192637">SUSE bug 1192637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194178">SUSE bug 1194178</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3997/">CVE-2021-3997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667424" comment="libsystemd0-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667425" comment="libsystemd0-32bit-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667426" comment="libudev-devel-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667741" comment="libudev-devel-32bit-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667427" comment="libudev1-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667428" comment="libudev1-32bit-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667742" comment="nss-myhostname-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667743" comment="nss-myhostname-32bit-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667744" comment="nss-mymachines-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667745" comment="nss-mymachines-32bit-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667746" comment="nss-resolve-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667747" comment="nss-systemd-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667429" comment="systemd-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667430" comment="systemd-32bit-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667431" comment="systemd-container-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667432" comment="systemd-coredump-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667433" comment="systemd-devel-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667434" comment="systemd-doc-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667435" comment="systemd-journal-remote-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667436" comment="systemd-lang-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667748" comment="systemd-logger-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667749" comment="systemd-network-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667437" comment="systemd-sysvinit-246.16-150300.7.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667438" comment="udev-246.16-150300.7.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53110" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195563" ref_url="https://bugzilla.suse.com/1195563" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0284" ref_url="https://www.suse.com/security/cve/CVE-2022-0284/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0540-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUE6OO6UE5NEQ2LYEJSEB2AXREVWZVMB/" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-0284: Fixed heap buffer overread in GetPixelAlpha() in MagickCore/pixel-accessor.h (bsc#1195563).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195563">SUSE bug 1195563</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0284/">CVE-2022-0284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667439" comment="ImageMagick-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667440" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667441" comment="ImageMagick-config-7-upstream-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667442" comment="ImageMagick-devel-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667750" comment="ImageMagick-devel-32bit-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667751" comment="ImageMagick-doc-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667752" comment="ImageMagick-extra-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667443" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667753" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667444" comment="libMagick++-devel-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667754" comment="libMagick++-devel-32bit-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667445" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667755" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667446" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667756" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667453" comment="perl-PerlMagick-7.0.7.34-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53111" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="1196072" ref_url="https://bugzilla.suse.com/1196072" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0566" ref_url="https://www.suse.com/security/cve/CVE-2022-0566/" source="CVE"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 91.6.1 / MFSA 2022-07 (bsc#1196072)
  * CVE-2022-0566 (bmo#1753094)
    Crafted email could trigger an out-of-bounds write

- Mozilla Thunderbird 91.6 / MFSA 2022-06 (bsc#1195682)
  * CVE-2022-22753 (bmo#1732435)
    Privilege Escalation to SYSTEM on Windows via Maintenance
    Service
  * CVE-2022-22754 (bmo#1750565)
    Extensions could have bypassed permission confirmation during
    update
  * CVE-2022-22756 (bmo#1317873)
    Drag and dropping an image could have resulted in the dropped
    object being an executable
  * CVE-2022-22759 (bmo#1739957)
    Sandboxed iframes could have executed script if the parent
    appended elements
  * CVE-2022-22760 (bmo#1740985, bmo#1748503)
    Cross-Origin responses could be distinguished between script
    and non-script content-types
  * CVE-2022-22761 (bmo#1745566)
    frame-ancestors Content Security Policy directive was not
    enforced for framed extension pages
  * CVE-2022-22763 (bmo#1740534)
    Script Execution during invalid object state
  * CVE-2022-22764 (bmo#1742682, bmo#1744165, bmo#1746545,
    bmo#1748210, bmo#1748279)
    Memory safety bugs fixed in Thunderbird 91.6
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196072">SUSE bug 1196072</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0566/">CVE-2022-0566</cve>
	<cve impact="critical" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669124" comment="MozillaThunderbird-91.6.1-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669125" comment="MozillaThunderbird-translations-common-91.6.1-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669126" comment="MozillaThunderbird-translations-other-91.6.1-8.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53112" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176774" ref_url="https://bugzilla.suse.com/1176774" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1182404" ref_url="https://bugzilla.suse.com/1182404" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184318" ref_url="https://bugzilla.suse.com/1184318" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186332" ref_url="https://bugzilla.suse.com/1186332" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192320" ref_url="https://bugzilla.suse.com/1192320" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192691" ref_url="https://bugzilla.suse.com/1192691" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192874" ref_url="https://bugzilla.suse.com/1192874" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193139" ref_url="https://bugzilla.suse.com/1193139" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193655" ref_url="https://bugzilla.suse.com/1193655" source="BUGZILLA"/>
		<reference ref_id="1193993" ref_url="https://bugzilla.suse.com/1193993" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194266" ref_url="https://bugzilla.suse.com/1194266" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24504" ref_url="https://www.suse.com/security/cve/CVE-2020-24504/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP3 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45485: Fixed an information leak because of certain use of a hash table which use IPv6 source addresses. (bsc#1194094)
- CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c. (bnc#1194087).
- CVE-2021-4001: Fixed a race condition when the EBPF map is frozen. (bsc#1192990)
- CVE-2021-28715: Fixed an issue where a guest could force Linux netback driver to hog large amounts of kernel memory by do not queueing unlimited number of packages.  (bsc#1193442)
- CVE-2021-28714: Fixed an issue where a guest could force Linux netback driver to hog large amounts of kernel memory by fixing rx queue stall detection. (bsc#1193442)
- CVE-2021-28713: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening hvc_xen against event channel storms. (bsc#1193440)
- CVE-2021-28712: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening netfront against event channel storms. (bsc#1193440)
- CVE-2021-28711: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening blkfront against event channel storms. (bsc#1193440)
- CVE-2020-24504: Fixed an uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers that may have allowed an authenticated user to potentially enable denial of service via local access. (bnc#1182404)
- CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bnc#1192845)
- CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847)
- CVE-2021-4002: Added a missing TLB flush that could lead to leak or corruption of data in hugetlbfs. (bsc#1192946)
- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device. (bnc#1179599)
- CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet ixgbe driver due to improper input validation. (bnc#1192877)

The following non-security bugs were fixed:

- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: tse850: the emaclt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: mt7623: add missing pause for switchport (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).
- bfq: Store full bitmap depth in bfq_data (bsc#1184318).
- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- block: Provide blk_mq_sched_get_icq() (bsc#1184318).
- Bluetooth: Add additional Bluetooth part for Realtek 8852AE (bsc#1193655).
- Bluetooth: btrtl: Refine the ic_id_table for clearer and more regular (bsc#1193655).
- Bluetooth: btusb: Add another Bluetooth part for Realtek 8852AE (bsc#1193655).
- Bluetooth: btusb: Add the more support IDs for Realtek RTL8822CE (bsc#1193655).
- Bluetooth: btusb: Add the new support ID for Realtek RTL8852A (bsc#1193655).
- Bluetooth: btusb: btrtl: Add support for RTL8852A (bsc#1193655).
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- bpf, s390: Fix potential memory leak about jit_data (git-fixes).
- bpf, x86: Fix 'no previous prototype' warning (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: Assign boolean values to a bool variable (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- cifs: call wake_up(server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check new file size when extending file by fallocate (bsc#1192606).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: Clarify SMB1 code for delete (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX Create (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- cifs: Clarify SMB1 code for rename open file (bsc#1192606).
- cifs: Clarify SMB1 code for SetFileSize (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- cifs: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: Close cached root handle only if it had a lease (bsc#1164565).
- cifs: Close open handle after interrupted close (bsc#1164565).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not miss cancelled OPEN responses (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not set -&gt;i_mode of something we had not created (bsc#1192606).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix atime update check vs mtime (bsc#1164565).
- cifs: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: Fix data inconsistent when punch hole (bsc#1176544).
- cifs: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix double-put on late allocation failure (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix gcc warning in sid_to_id (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: fix max ea value size (bnc#1151927 5.3.4).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix misspellings using codespell tool (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix NULL pointer dereference in mid callback (bsc#1164565).
- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- cifs: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: Fix resource leak (bsc#1192606).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix task struct use-after-free on reconnect (bsc#1164565).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: Fix use after free of file info structures (bnc#1151927 5.3.8).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- cifs: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle ERRBaduid for SMB1 (bsc#1192606).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB  cache=strict  vers=2.1+ (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: Make SMB2_notify_init static (bsc#1164565).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- cifs: New optype for session operations (bsc#1181507).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: Properly process SMB3 lease breaks (bsc#1164565).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor cifs_get_inode_info() (bsc#1164565).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: Remove repeated struct declaration (bsc#1192606).
- cifs: Remove set but not used variable 'capabilities' (bsc#1164565).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: Remove unnecessary struct declaration (bsc#1192606).
- cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: Remove useless variable (bsc#1192606).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify bool comparison (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: Standardize logging output (bsc#1192606).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- cifs: use mod_delayed_work() for server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: use true,false for bool variable (bsc#1164565).
- cifs: use true,false for bool variable (bsc#1164565).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: Warn less noisily on default mount (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dm: fix deadlock when swapping to encrypted device (bsc#1186332).
- dm: remove unnecessary discard limits for raid0 and raid10 (bsc#1192320).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- drm/amd/display: Set plane update flags for all planes in reset (git-fixes).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/msm/a6xx: Allocate enough space for GMU registers (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/nouveau/acr: fix a couple NULL vs IS_ERR() checks (git-fixes).
- drm/nouveau/svm: Fix refcount leak bug and missing check against null bug (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/pl111: Actually fix CONFIG_VEXPRESS_CONFIG depends (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- e1000e: Separate TGP board type from SPT (bsc#1192874).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ethtool: fix ethtool msg len calculation for pause stats (jsc#SLE-15075).
- firmware: qcom_scm: Mark string array const (git-fixes).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- hwmon: (k10temp) Add additional missing Zen2 and Zen3 APUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Add support for yellow carp (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Add support for Zen3 CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Create common functions and macros for Zen CPU families (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Define SVI telemetry and current factors for Zen2 CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Do not show Tdie for all Zen/Zen2/Zen3 CPU/APU (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) make some symbols static (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Remove residues of current and voltage (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Remove support for displaying voltage and current on Zen CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Reorganize and simplify temperature support detection (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Rework the temperature offset calculation (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) support Zen3 APUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Swap Tdie and Tctl on Family 17h CPUs (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Update documentation and add temp2_input info (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Update driver documentation (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- hwmon: (k10temp) Zen3 Ryzen Desktop CPUs support (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for setting queues to 0 (jsc#SLE-12877).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Fix return of set the new channel count (jsc#SLE-12877).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: Fix not stopping Tx queues for VFs (jsc#SLE-7926).
- ice: Fix VF true promiscuous mode (jsc#SLE-12878).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- ice: Remove toggling of antispoof for VF trusted promiscuous mode (jsc#SLE-12878).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- Input: iforce - fix control-message timeout (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu/mediatek: Fix out-of-range warning with clang (git-fixes).
- iommu/vt-d: Consolidate duplicate cache invaliation code (git-fixes).
- iommu/vt-d: Fix incomplete cache flush in intel_pasid_tear_down_entry() (git-fixes).
- iommu/vt-d: Update the virtual command related registers (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kABI: dm: fix deadlock when swapping to encrypted device (bsc#1186332).
- kabi: hide changes to struct uv_info (git-fixes).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: add md_submit_discard_bio() for submitting discard bio (bsc#1192320).
- md: extend r10bio devs to raid disks (bsc#1192320).
- md: fix a lock order reversal in md_alloc (git-fixes).
- md: improve discard request for far layout (bsc#1192320).
- md: improve raid10 discard request (bsc#1192320).
- md: initialize r10_bio-&gt;read_slot before use (bsc#1192320).
- md: pull the code that wait for blocked dev into one function (bsc#1192320).
- md: Remove unnecessary rcu_dereference in raid10_handle_discard (bsc#1192320).
- mdio: aspeed: Fix 'Link is Down' issue (bsc#1176447).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: bridge: fix under estimation in br_get_linkxstats_size() (bsc#1176447).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hns3: change affinity_mask to numa node range (bsc#1154353).
- net: hns3: fix misuse vf id and vport id in some logs (bsc#1154353).
- net: hns3: remove check VF uc mac exist when set by PF (bsc#1154353).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: stmmac: add EHL 2.5Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add EHL PSE0  PSE1 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add EHL RGMII 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add EHL SGMII 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: add TGL SGMII 1Gbps PCI info and PCI ID (bsc#1192691).
- net: stmmac: create dwmac-intel.c to contain all Intel platform (bsc#1192691).
- net: stmmac: pci: Add HAPS support using GMAC5 (bsc#1192691).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: E-Switch, return error if encap isn't supported (jsc#SLE-15172).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1176774).
- netfilter: ctnetlink: do not erase error code with EINVAL (bsc#1176447).
- netfilter: ctnetlink: fix filtering with CTA_TUPLE_REPLY (bsc#1176447).
- netfilter: flowtable: fix IPv6 tunnel addr match (bsc#1176447).
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- NFS: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- nvme: add NO APST quirk for Kioxia device (git-fixes).
- nvme: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606). [ ematsumiya: - drop the case fs_param_is_fd - leave .has_value in fs_parse_result so it does not break kabi - still set .has_value in fs_parse() for real kabi compatibility ]
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- perf/x86/intel: Fix unchecked MSR access error caused by VLBR_EVENT (git-fixes).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf/x86/vlbr: Add c-&gt;flags to vlbr event constraints (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc/iommu: Report the correct most efficient DMA mask for PCI devices (git-fixes).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/perf: Fix cycles/instructions as PM_CYC/PM_INST_CMPL in power10 (jsc#SLE-13513 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- RDMA/bnxt_re: Update statistics counter name (jsc#SLE-16649).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/*.spec.in: use buildroot macro instead of env variable The RPM_BUILD_ROOT variable is considered deprecated over a buildroot macro. future proof the spec files.
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306) After usrmerge, vmlinux file is not named vmlinux-lt;version&gt;, but simply vmlinux. And this is not reflected in STRIP_KEEP_SYMTAB we set. So fix this by removing the dash...
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd Newer distros have capability to decompress zstd, which provides a 2-5% better compression ratio at very similar cpu overhead. Plus this tests the zstd codepaths now as well.
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1193993).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Add additional debugfs support for CMF (bsc#1194266).
- scsi: lpfc: Adjust CMF total bytes and rxmonitor (bsc#1194266).
- scsi: lpfc: Cap CMF read bytes to MBPI (bsc#1194266).
- scsi: lpfc: Change return code on I/Os received during link bounce (bsc#1194266).
- scsi: lpfc: Fix leaked lpfc_dmabuf mbox allocations with NPIV (bsc#1194266).
- scsi: lpfc: Fix lpfc_force_rscn ndlp kref imbalance (bsc#1194266).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: lpfc: Fix NPIV port deletion crash (bsc#1194266).
- scsi: lpfc: Trigger SLI4 firmware dump before doing driver cleanup (bsc#1194266).
- scsi: lpfc: Update lpfc version to 14.0.0.4 (bsc#1194266).
- scsi: mpi3mr: Fix duplicate device entries when scanning through sysfs (git-fixes).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: pm80xx: Do not call scsi_remove_host() in pm8001_alloc() (git-fixes).
- scsi: qla2xxx: edif: Fix app start delay (git-fixes).
- scsi: qla2xxx: edif: Fix app start fail (git-fixes).
- scsi: qla2xxx: edif: Fix EDIF bsg (git-fixes).
- scsi: qla2xxx: edif: Fix off by one bug in qla_edif_app_getfcinfo() (git-fixes).
- scsi: qla2xxx: edif: Flush stale events and msgs on session down (git-fixes).
- scsi: qla2xxx: edif: Increase ELS payload (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Fix mailbox direction flags in qla2xxx_get_adapter_id() (git-fixes).
- scsi: qla2xxx: Format log strings only if needed (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: 8250: Fix RTS modem control while in rs485 mode (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: add defines for new signing negotiate context (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: Add new compression flags (bsc#1192606).
- smb3: Add new info level for query directory (bsc#1192606).
- smb3: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3: add new module load parm require_gcm_256 (bsc#1192606).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: Add support for getting and setting SACLs (bsc#1192606).
- smb3: Add support for lookup with posix extensions query info (bsc#1192606).
- smb3: Add support for negotiating signing algorithm (bsc#1192606).
- smb3: Add support for query info using posix extensions (level 100) (bsc#1192606).
- smb3: add support for recognizing WSL reparse tags (bsc#1192606).
- smb3: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: add support for using info level for posix extensions query (bsc#1192606).
- smb3: Add tracepoints for new compound posix query info (bsc#1192606).
- smb3: Additional compression structures (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: avoid confusing warning message on mount to Azure (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Backup intent flag missing from some more ops (bsc#1164565).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3: do not log warning message if server does not populate salt (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable negotiating stronger encryption by default (bsc#1192606).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: Fix ids returned in POSIX query dir (bsc#1192606).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix mount failure to some servers when compression enabled (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix readpage for large swap cache (bsc#1192606).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in compression flag (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- smb3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- smb3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- smb3: Honor lease disabling for multiuser mounts (git-fixes).
- smb3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: incorrect file id in requests compounded with open (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: Minor cleanup of protocol definitions (bsc#1192606).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: print warning if server does not support requested encryption type (bsc#1192606).
- smb3: print warning once if posix context returned on open  (bsc#1164565).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- smb3: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3: Resolve data corruption of TCP server info fields (bsc#1192606).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: set gcm256 when requested (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: update structures for new compression protocol definitions (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- SUNRPC: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- supported.conf: add pwm-rockchip References: jsc#SLE-22615
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: chipidea: ci_hdrc_imx: fix potential error pointer dereference in probe (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: serial: option: add Fibocom FM101-GL variants (git-fixes).
- usb: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: do not parse forbidden flags (bsc#1192606).
- wireguard: allowedips: add missing __rcu annotation to satisfy sparse (git-fixes).
- wireguard: device: reset peer src endpoint when netns exits (git-fixes).
- wireguard: ratelimiter: use kvcalloc() instead of kvzalloc() (git-fixes).
- wireguard: receive: drop handshakes if queue lock is contended (git-fixes).
- wireguard: receive: use ring buffer for incoming handshakes (git-fixes).
- wireguard: selftests: actually test for routing loops (git-fixes).
- wireguard: selftests: increase default dmesg log size (git-fixes).
- x86/amd_nb: Add AMD family 19h model 50h PCI ids (jsc#SLE-17823 jsc#SLE-23139 jsc#ECO-3666).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/efi: Restore Firmware IDT before calling ExitBootServices() (git-fixes).
- x86/entry: Add a fence for kernel entry SWAPGS in paranoid_entry() (bsc#1178134).
- x86/mpx: Disable MPX for 32-bit userland (bsc#1193139).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/sev: Allow #VC exceptions on the VC2 stack (git-fixes).
- x86/sev: Fix SEV-ES INS/OUTS instructions for word, dword, and qword (bsc#1178134).
- x86/sev: Fix stack type check in vc_switch_off_ist() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176774">SUSE bug 1176774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182404">SUSE bug 1182404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184318">SUSE bug 1184318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186332">SUSE bug 1186332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192320">SUSE bug 1192320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192691">SUSE bug 1192691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192874">SUSE bug 1192874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193139">SUSE bug 1193139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193655">SUSE bug 1193655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193993">SUSE bug 1193993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194266">SUSE bug 1194266</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24504/">CVE-2020-24504</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663207" comment="cluster-md-kmp-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663208" comment="dlm-kmp-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663209" comment="gfs2-kmp-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662938" comment="kernel-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662939" comment="kernel-azure-devel-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663210" comment="kernel-azure-extra-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663211" comment="kernel-azure-livepatch-devel-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663212" comment="kernel-azure-optional-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662940" comment="kernel-devel-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662941" comment="kernel-source-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662942" comment="kernel-syms-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663213" comment="kselftests-kmp-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663214" comment="ocfs2-kmp-azure-5.3.18-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663215" comment="reiserfs-kmp-azure-5.3.18-38.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53113" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188437" ref_url="https://bugzilla.suse.com/1188437" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0562-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5RBUBOWU2ZWM5DFWVKEIL4FWPETOKDU/" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188437">SUSE bug 1188437</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668420" comment="jasper-2.0.14-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668281" comment="libjasper-devel-2.0.14-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668272" comment="libjasper4-2.0.14-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668421" comment="libjasper4-32bit-2.0.14-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53114" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53115" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194020" ref_url="https://bugzilla.suse.com/1194020" source="BUGZILLA"/>
		<reference ref_id="1194215" ref_url="https://bugzilla.suse.com/1194215" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4126" ref_url="https://www.suse.com/security/cve/CVE-2021-4126/" source="CVE"/>
		<reference ref_id="CVE-2021-44538" ref_url="https://www.suse.com/security/cve/CVE-2021-44538/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTUQBSMWYBVSTVDYNNRW5EOI5CCOSTPZ/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 91.4.1
- CVE-2021-4126: OpenPGP signature status doesn't consider additional message content. (bsc#1194215)
- CVE-2021-44538: Matrix chat library libolm bundled with Thunderbird vulnerable to a buffer overflow. (bsc#1194020)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194020">SUSE bug 1194020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194215">SUSE bug 1194215</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4126/">CVE-2021-4126</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44538/">CVE-2021-44538</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662578" comment="MozillaThunderbird-91.4.1-8.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662579" comment="MozillaThunderbird-translations-common-91.4.1-8.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662580" comment="MozillaThunderbird-translations-other-91.4.1-8.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53116" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194333" ref_url="https://bugzilla.suse.com/1194333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45942" ref_url="https://www.suse.com/security/cve/CVE-2021-45942/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QYJBECOXKL6LM6PP3ZL5EKF4GRPTFTD5/" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-45942: Fixed heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute. (bsc#1194333)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194333">SUSE bug 1194333</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45942/">CVE-2021-45942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662616" comment="libIlmImf-2_2-23-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662633" comment="libIlmImf-2_2-23-32bit-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662617" comment="libIlmImfUtil-2_2-23-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662634" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662635" comment="openexr-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662618" comment="openexr-devel-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662636" comment="openexr-doc-2.2.1-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53117" version="1" class="patch">
	<metadata>
		<title>Security update for python39-pip (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2476MS7B5R3KZZUCZGHTC6PPIJ5FNFI/" source="SUSE-SU"/>
		<description>
This update for python39-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662912" comment="python39-pip-20.2.4-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53118" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0657-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NCH4EEBMT6XZIRNVGTNBOCQCY4JVZ4IN/" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	  
- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668508" comment="nodejs12-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668509" comment="nodejs12-devel-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668510" comment="nodejs12-docs-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668511" comment="npm12-12.22.10-4.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53119" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195557" ref_url="https://bugzilla.suse.com/1195557" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2471" ref_url="https://www.suse.com/security/cve/CVE-2021-2471/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FPABDE53LLJDPCFTIOU2DXOPZRS7JPVT/" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- CVE-2021-2471: Fixed unauthorized access to critical data or complete access to all MySQL Connectors (bsc#1195557).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195557">SUSE bug 1195557</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2471/">CVE-2021-2471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670272" comment="mysql-connector-java-5.1.47-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53120" version="1" class="patch">
	<metadata>
		<title>Security update for ldns (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195057" ref_url="https://bugzilla.suse.com/1195057" source="BUGZILLA"/>
		<reference ref_id="1195058" ref_url="https://bugzilla.suse.com/1195058" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19860" ref_url="https://www.suse.com/security/cve/CVE-2020-19860/" source="CVE"/>
		<reference ref_id="CVE-2020-19861" ref_url="https://www.suse.com/security/cve/CVE-2020-19861/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UGIOR5OPYQTAQRTVNXBBH25LGJ74XJJ/" source="SUSE-SU"/>
		<description>
This update for ldns fixes the following issues:

- CVE-2020-19860: Fixed heap-based out of bounds read when verifying a zone file (bsc#1195057).
- CVE-2020-19861: Fixed heap-based out of bounds read in ldns_nsec3_salt_data() (bsc#1195058).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195057">SUSE bug 1195057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195058">SUSE bug 1195058</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19860/">CVE-2020-19860</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-19861/">CVE-2020-19861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667683" comment="ldns-1.7.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667413" comment="ldns-devel-1.7.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667414" comment="libldns2-1.7.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667447" comment="perl-DNS-LDNS-1.7.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667684" comment="python3-ldns-1.7.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53121" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1113040" ref_url="https://bugzilla.suse.com/1113040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18586" ref_url="https://www.suse.com/security/cve/CVE-2018-18586/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0069-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IRYD4Y2CDUYSBVQUIDXTTBL6H6XYW54G/" source="SUSE-SU"/>
		<description>
This update for libmspack fixes the following issues:

- CVE-2018-18586: Fixed directory traversal in chmextract by adding anti '../' and leading slash protection (bsc#1113040).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-13"/>
	<updated date="2022-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1113040">SUSE bug 1113040</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18586/">CVE-2018-18586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662614" comment="libmspack-devel-0.6-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662615" comment="libmspack0-0.6-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662631" comment="libmspack0-32bit-0.6-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662632" comment="mspack-tools-0.6-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53122" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="critical" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668193" comment="MozillaFirefox-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668250" comment="MozillaFirefox-branding-upstream-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668251" comment="MozillaFirefox-devel-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668195" comment="MozillaFirefox-translations-common-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668196" comment="MozillaFirefox-translations-other-91.6.0-152.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53123" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1038980" ref_url="https://bugzilla.suse.com/1038980" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8923" ref_url="https://www.suse.com/security/cve/CVE-2017-8923/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTK7KI5DNPAM32GVDSKIK3NDYP7OGBGQ/" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2017-8923: Fixed denial of service (application crash) when using .= with a long string (zend_string_extend func in Zend/zend_string.h) (bsc#1038980).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038980">SUSE bug 1038980</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8923/">CVE-2017-8923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667951" comment="apache2-mod_php7-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667952" comment="php7-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667953" comment="php7-bcmath-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667954" comment="php7-bz2-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667955" comment="php7-calendar-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667956" comment="php7-ctype-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667957" comment="php7-curl-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667958" comment="php7-dba-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667959" comment="php7-devel-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667960" comment="php7-dom-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667950" comment="php7-embed-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667961" comment="php7-enchant-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667962" comment="php7-exif-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667963" comment="php7-fastcgi-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667964" comment="php7-fileinfo-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668191" comment="php7-firebird-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667965" comment="php7-fpm-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667966" comment="php7-ftp-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667967" comment="php7-gd-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667968" comment="php7-gettext-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667969" comment="php7-gmp-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667970" comment="php7-iconv-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667971" comment="php7-intl-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667972" comment="php7-json-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667973" comment="php7-ldap-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667974" comment="php7-mbstring-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667975" comment="php7-mysql-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667976" comment="php7-odbc-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667977" comment="php7-opcache-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667978" comment="php7-openssl-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667979" comment="php7-pcntl-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667980" comment="php7-pdo-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667981" comment="php7-pgsql-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667982" comment="php7-phar-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667983" comment="php7-posix-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667984" comment="php7-readline-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667985" comment="php7-shmop-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667986" comment="php7-snmp-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667987" comment="php7-soap-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667988" comment="php7-sockets-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667989" comment="php7-sodium-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667990" comment="php7-sqlite-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667991" comment="php7-sysvmsg-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667992" comment="php7-sysvsem-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667993" comment="php7-sysvshm-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668192" comment="php7-test-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667994" comment="php7-tidy-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667995" comment="php7-tokenizer-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667996" comment="php7-xmlreader-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667997" comment="php7-xmlrpc-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667998" comment="php7-xmlwriter-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667999" comment="php7-xsl-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668000" comment="php7-zip-7.4.6-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668001" comment="php7-zlib-7.4.6-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53124" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0704-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BTHU2F626CTZYCXOBT5S7GWU3QXNTMZ/" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669854" comment="nodejs8-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669855" comment="nodejs8-devel-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669768" comment="nodejs8-docs-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669856" comment="npm8-8.17.0-10.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53125" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670663" comment="libjavascriptcoregtk-4_0-18-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670986" comment="libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670664" comment="libwebkit2gtk-4_0-37-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670987" comment="libwebkit2gtk-4_0-37-32bit-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670665" comment="libwebkit2gtk3-lang-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670668" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670669" comment="typelib-1_0-WebKit2-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670988" comment="webkit-jsc-4-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670666" comment="webkit2gtk-4_0-injected-bundles-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670671" comment="webkit2gtk3-devel-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670989" comment="webkit2gtk3-minibrowser-2.34.6-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53126" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194610" ref_url="https://bugzilla.suse.com/1194610" source="BUGZILLA"/>
		<reference ref_id="1194611" ref_url="https://bugzilla.suse.com/1194611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4OG73MX3JPZBHYMUXUULPTVL7ZOOTZ5/" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

Update to flatpak 1.10.7:

- CVE-2022-21682: Introduce new option --nofilesystem=host:reset to support flatpak-builder 1.2.2 (bsc#1194611).
- CVE-2021-43860: A malicious repository could hav sent invalid application metadata in a way that hides some of the app permissions displayed during installation (bsc#1194610).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194610">SUSE bug 1194610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194611">SUSE bug 1194611</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669930" comment="flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669931" comment="flatpak-devel-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669932" comment="flatpak-zsh-completion-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669933" comment="libflatpak0-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669934" comment="system-user-flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669935" comment="typelib-1_0-Flatpak-1_0-1.10.7-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53127" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669162" comment="expat-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669163" comment="libexpat-devel-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669531" comment="libexpat-devel-32bit-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669164" comment="libexpat1-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669165" comment="libexpat1-32bit-2.2.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53128" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAM6LOV2R24IH5PPUWLXB64PALLMBOTU/" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669194" comment="nodejs14-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669195" comment="nodejs14-devel-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669196" comment="nodejs14-docs-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669197" comment="npm14-14.19.0-15.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53129" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZLUSHYXTE7JA3KCOVKZ5L36DTZE7VZM/" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:
	  
- CVE-2022-23303: Fixed side-channel attacks in SAE (bsc#1194732).
- CVE-2022-23304: Fixed side-channel attacks in EAP-pwd (bsc#1194733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669161" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669530" comment="wpa_supplicant-gui-2.9-4.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53130" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196167" ref_url="https://bugzilla.suse.com/1196167" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4209" ref_url="https://www.suse.com/security/cve/CVE-2021-4209/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0717-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RI5PFWTNO6UDYFJ3HLMKV5PQYAJ77E46/" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2021-4209: Fixed null pointer dereference in MD_UPDATE (bsc#1196167).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196167">SUSE bug 1196167</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4209/">CVE-2021-4209</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669014" comment="gnutls-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669127" comment="gnutls-guile-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669015" comment="libgnutls-devel-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669128" comment="libgnutls-devel-32bit-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669016" comment="libgnutls30-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669017" comment="libgnutls30-32bit-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669018" comment="libgnutls30-hmac-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669019" comment="libgnutls30-hmac-32bit-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669020" comment="libgnutlsxx-devel-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669021" comment="libgnutlsxx28-3.6.7-14.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53131" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196441" ref_url="https://bugzilla.suse.com/1196441" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZII6Q7ZAGJJ37CB2SMGVMILNG766D3EX/" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- CVE-2022-23648: A specially-crafted image configuration could gain access to 
  read-only copies of arbitrary files and directories on the host (bsc#1196441).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196441">SUSE bug 1196441</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670667" comment="containerd-1.4.12-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670990" comment="containerd-ctr-1.4.12-63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53132" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195866" ref_url="https://bugzilla.suse.com/1195866" source="BUGZILLA"/>
		<reference ref_id="1195867" ref_url="https://bugzilla.suse.com/1195867" source="BUGZILLA"/>
		<reference ref_id="1195868" ref_url="https://bugzilla.suse.com/1195868" source="BUGZILLA"/>
		<reference ref_id="1195869" ref_url="https://bugzilla.suse.com/1195869" source="BUGZILLA"/>
		<reference ref_id="1195870" ref_url="https://bugzilla.suse.com/1195870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0722-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7AGXUOAQTRI5GT64S2AG6NRTU42WI6GH/" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.2:

- CVE-2022-0586: RTMPT dissector infinite loop (bsc#1195866)
- CVE-2022-0585: Large loops in multiple dissectors (bsc#1195867)
- CVE-2022-0583: PVFS dissector crash (bsc#1195868)
- CVE-2022-0582: CSN.1 dissector crash (bsc#1195869)
- CVE-2022-0581: CMS dissector crash (bsc#1195870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195866">SUSE bug 1195866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195867">SUSE bug 1195867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195868">SUSE bug 1195868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195869">SUSE bug 1195869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195870">SUSE bug 1195870</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669010" comment="libwireshark15-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669011" comment="libwiretap12-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669012" comment="libwsutil13-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669013" comment="wireshark-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669022" comment="wireshark-devel-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669023" comment="wireshark-ui-qt-3.6.2-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53133" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OPXUBD6DBIW4WEXMYCUH5OXEVJIKJHR4/" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50978 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50701 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50687 cmd/go: do not treat branches with semantic-version names as releases
- go#50942 cmd/asm: 'compile: loop' compiler bug?
- go#50867 cmd/compile: incorrect use of CMN on arm64
- go#50812 cmd/go: remove bitbucket VCS probing
- go#50781 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50722 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50683 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50586 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50297 cmd/link: does not set section type of .init_array correctly
- go#50246 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669729" comment="go1.17-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669730" comment="go1.17-doc-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669572" comment="go1.17-race-1.17.7-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53134" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0724-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IMRYQV73OUYCKMEO4GSE5KGQ7EEQYJHV/" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50686 cmd/go: do not treat branches with semantic-version names as releases
- go#50866 cmd/compile: incorrect use of CMN on arm64
- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures
- go#50811 cmd/go: remove bitbucket VCS probing
- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50645 testing: surprising interaction of subtests with TempDir
- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669567" comment="go1.16-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669568" comment="go1.16-doc-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669569" comment="go1.16-race-1.16.14-1.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53135" version="1" class="patch">
	<metadata>
		<title>Security update for libeconf, shadow and util-linux (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1188507" ref_url="https://bugzilla.suse.com/1188507" source="BUGZILLA"/>
		<reference ref_id="1192954" ref_url="https://bugzilla.suse.com/1192954" source="BUGZILLA"/>
		<reference ref_id="1193632" ref_url="https://bugzilla.suse.com/1193632" source="BUGZILLA"/>
		<reference ref_id="1194976" ref_url="https://bugzilla.suse.com/1194976" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3995" ref_url="https://www.suse.com/security/cve/CVE-2021-3995/" source="CVE"/>
		<reference ref_id="CVE-2021-3996" ref_url="https://www.suse.com/security/cve/CVE-2021-3996/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0727-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUBUSLRBG42MLRL65HHMLIWQIKS3SKKP/" source="SUSE-SU"/>
		<description>
This security update for libeconf, shadow and util-linux fix the following issues:

libeconf:

- Add libeconf to SLE-Module-Basesystem_15-SP3 because needed by 'util-linux' and 'shadow' 
  to fix autoyast handling of security related parameters (bsc#1192954, jsc#SLE-23384, jsc#SLE-23402)

Issues fixed in libeconf:
- Reading numbers with different bases (e.g. oktal) (bsc#1193632) (#157)
- Fixed different issues while writing string values to file.
- Writing comments to file too.
- Fixed crash while merging values.
- Added econftool cat option (#146)
- new API call: econf_readDirsHistory (showing ALL locations)
- new API call: econf_getPath (absolute path of the configuration file)
- Man pages libeconf.3 and econftool.8.
- Handling multiline strings.
- Added libeconf_ext which returns more information like
  line_nr, comments, path of the configuration file,...
- Econftool, an command line interface for handling configuration
  files.
- Generating HTML API documentation with doxygen.
- Improving error handling and semantic file check.
- Joining entries with the same key to one single entry if
  env variable ECONF_JOIN_SAME_ENTRIES has been set.

shadow:

- The legacy code does not support /etc/login.defs.d used by YaST. Enable libeconf to 
  read it (bsc#1192954, jsc#SLE-23384, jsc#SLE-23402)

util-linux:

- The legacy code does not support /etc/login.defs.d used by YaST. Enable libeconf to 
  read it (bsc#1192954, jsc#SLE-23384, jsc#SLE-23402)
- Allow use of larger values for start sector to prevent `blockdev --report` aborting (bsc#1188507)
- Fixed `blockdev --report` using non-space characters as a field separator (bsc#1188507)
- CVE-2021-3995: Fixed unauthorized unmount in util-linux's libmount. (bsc#1194976) 
- CVE-2021-3996: Fixed unauthorized unmount in util-linux's libmount. (bsc#1194976)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188507">SUSE bug 1188507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192954">SUSE bug 1192954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193632">SUSE bug 1193632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194976">SUSE bug 1194976</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3995/">CVE-2021-3995</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3996/">CVE-2021-3996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669140" comment="libblkid-devel-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669517" comment="libblkid-devel-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669141" comment="libblkid-devel-static-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669142" comment="libblkid1-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669143" comment="libblkid1-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669518" comment="libeconf-devel-0.4.4+git20220104.962774f-150300.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669144" comment="libeconf0-0.4.4+git20220104.962774f-150300.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669519" comment="libeconf0-32bit-0.4.4+git20220104.962774f-150300.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669145" comment="libfdisk-devel-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669520" comment="libfdisk-devel-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669521" comment="libfdisk-devel-static-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669146" comment="libfdisk1-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669522" comment="libfdisk1-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669147" comment="libmount-devel-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669523" comment="libmount-devel-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669524" comment="libmount-devel-static-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669148" comment="libmount1-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669149" comment="libmount1-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669150" comment="libsmartcols-devel-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669525" comment="libsmartcols-devel-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669526" comment="libsmartcols-devel-static-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669151" comment="libsmartcols1-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669527" comment="libsmartcols1-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669152" comment="libuuid-devel-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669528" comment="libuuid-devel-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669153" comment="libuuid-devel-static-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669154" comment="libuuid1-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669155" comment="libuuid1-32bit-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669156" comment="login_defs-4.8.1-150300.4.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669529" comment="python3-libmount-2.36.2-150300.4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669157" comment="shadow-4.8.1-150300.4.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669158" comment="util-linux-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669159" comment="util-linux-lang-2.36.2-150300.4.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669160" comment="util-linux-systemd-2.36.2-150300.4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669191" comment="uuidd-2.36.2-150300.4.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53136" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195325" ref_url="https://bugzilla.suse.com/1195325" source="BUGZILLA"/>
		<reference ref_id="1195334" ref_url="https://bugzilla.suse.com/1195334" source="BUGZILLA"/>
		<reference ref_id="1195339" ref_url="https://bugzilla.suse.com/1195339" source="BUGZILLA"/>
		<reference ref_id="1196016" ref_url="https://bugzilla.suse.com/1196016" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.5.15 (bsc#1196016):
    * 10.5.15: CVE-2021-46665
             CVE-2021-46664
             CVE-2021-46661
             CVE-2021-46668
             CVE-2021-46663
    * 10.5.14: CVE-2022-24052
             CVE-2022-24051
             CVE-2022-24050
             CVE-2022-24048
             CVE-2021-46659, bsc#1195339
	     
- The following issues have already been fixed in this package but weren't
  previously mentioned in the changes file:
  CVE-2021-46658, bsc#1195334
  CVE-2021-46657, bsc#1195325
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195325">SUSE bug 1195325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195334">SUSE bug 1195334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669750" comment="libmariadbd-devel-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669751" comment="libmariadbd19-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669752" comment="mariadb-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669857" comment="mariadb-bench-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669753" comment="mariadb-client-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669754" comment="mariadb-errormessages-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669858" comment="mariadb-rpm-macros-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669859" comment="mariadb-test-10.5.15-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669755" comment="mariadb-tools-10.5.15-150300.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53137" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYQO6XCA5HFPKOF2ANXLGSZGFT63LHPA/" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670453" comment="zsh-5.6-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670572" comment="zsh-htmldoc-5.6-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53138" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669929" comment="gvim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669881" comment="vim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669882" comment="vim-data-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669884" comment="vim-small-8.0.1568-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53139" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194265" ref_url="https://bugzilla.suse.com/1194265" source="BUGZILLA"/>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPABQLPWLWVSDVE54YNNZUHMKWEV6F3X/" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).

The following non-security bugs were fixed:

- postfix: sasl authentication with password fails (bsc#1194265).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-07"/>
	<updated date="2022-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194265">SUSE bug 1194265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669166" comment="cyrus-sasl-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669167" comment="cyrus-sasl-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669181" comment="cyrus-sasl-bdb-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669532" comment="cyrus-sasl-bdb-crammd5-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669192" comment="cyrus-sasl-bdb-devel-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669182" comment="cyrus-sasl-bdb-digestmd5-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669183" comment="cyrus-sasl-bdb-gs2-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669184" comment="cyrus-sasl-bdb-gssapi-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669185" comment="cyrus-sasl-bdb-ntlm-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669186" comment="cyrus-sasl-bdb-otp-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669187" comment="cyrus-sasl-bdb-plain-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669188" comment="cyrus-sasl-bdb-scram-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669168" comment="cyrus-sasl-crammd5-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669169" comment="cyrus-sasl-crammd5-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669170" comment="cyrus-sasl-devel-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669533" comment="cyrus-sasl-devel-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669171" comment="cyrus-sasl-digestmd5-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669172" comment="cyrus-sasl-digestmd5-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669534" comment="cyrus-sasl-gs2-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669173" comment="cyrus-sasl-gssapi-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669174" comment="cyrus-sasl-gssapi-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669535" comment="cyrus-sasl-ldap-auxprop-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669536" comment="cyrus-sasl-ldap-auxprop-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669537" comment="cyrus-sasl-ldap-auxprop-bdb-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669538" comment="cyrus-sasl-ntlm-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669175" comment="cyrus-sasl-otp-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669539" comment="cyrus-sasl-otp-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669176" comment="cyrus-sasl-plain-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669177" comment="cyrus-sasl-plain-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669178" comment="cyrus-sasl-saslauthd-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669189" comment="cyrus-sasl-saslauthd-bdb-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669540" comment="cyrus-sasl-scram-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669193" comment="cyrus-sasl-sqlauxprop-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669541" comment="cyrus-sasl-sqlauxprop-32bit-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669190" comment="cyrus-sasl-sqlauxprop-bdb-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669179" comment="libsasl2-3-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669180" comment="libsasl2-3-32bit-2.1.27-150300.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53140" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1181147" ref_url="https://bugzilla.suse.com/1181147" source="BUGZILLA"/>
		<reference ref_id="1181588" ref_url="https://bugzilla.suse.com/1181588" source="BUGZILLA"/>
		<reference ref_id="1183872" ref_url="https://bugzilla.suse.com/1183872" source="BUGZILLA"/>
		<reference ref_id="1187716" ref_url="https://bugzilla.suse.com/1187716" source="BUGZILLA"/>
		<reference ref_id="1188404" ref_url="https://bugzilla.suse.com/1188404" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1190812" ref_url="https://bugzilla.suse.com/1190812" source="BUGZILLA"/>
		<reference ref_id="1190972" ref_url="https://bugzilla.suse.com/1190972" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1191655" ref_url="https://bugzilla.suse.com/1191655" source="BUGZILLA"/>
		<reference ref_id="1191741" ref_url="https://bugzilla.suse.com/1191741" source="BUGZILLA"/>
		<reference ref_id="1192210" ref_url="https://bugzilla.suse.com/1192210" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193233" ref_url="https://bugzilla.suse.com/1193233" source="BUGZILLA"/>
		<reference ref_id="1193243" ref_url="https://bugzilla.suse.com/1193243" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1194163" ref_url="https://bugzilla.suse.com/1194163" source="BUGZILLA"/>
		<reference ref_id="1194967" ref_url="https://bugzilla.suse.com/1194967" source="BUGZILLA"/>
		<reference ref_id="1195012" ref_url="https://bugzilla.suse.com/1195012" source="BUGZILLA"/>
		<reference ref_id="1195081" ref_url="https://bugzilla.suse.com/1195081" source="BUGZILLA"/>
		<reference ref_id="1195142" ref_url="https://bugzilla.suse.com/1195142" source="BUGZILLA"/>
		<reference ref_id="1195352" ref_url="https://bugzilla.suse.com/1195352" source="BUGZILLA"/>
		<reference ref_id="1195378" ref_url="https://bugzilla.suse.com/1195378" source="BUGZILLA"/>
		<reference ref_id="1195476" ref_url="https://bugzilla.suse.com/1195476" source="BUGZILLA"/>
		<reference ref_id="1195477" ref_url="https://bugzilla.suse.com/1195477" source="BUGZILLA"/>
		<reference ref_id="1195478" ref_url="https://bugzilla.suse.com/1195478" source="BUGZILLA"/>
		<reference ref_id="1195479" ref_url="https://bugzilla.suse.com/1195479" source="BUGZILLA"/>
		<reference ref_id="1195480" ref_url="https://bugzilla.suse.com/1195480" source="BUGZILLA"/>
		<reference ref_id="1195481" ref_url="https://bugzilla.suse.com/1195481" source="BUGZILLA"/>
		<reference ref_id="1195482" ref_url="https://bugzilla.suse.com/1195482" source="BUGZILLA"/>
		<reference ref_id="1195506" ref_url="https://bugzilla.suse.com/1195506" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195668" ref_url="https://bugzilla.suse.com/1195668" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195798" ref_url="https://bugzilla.suse.com/1195798" source="BUGZILLA"/>
		<reference ref_id="1195799" ref_url="https://bugzilla.suse.com/1195799" source="BUGZILLA"/>
		<reference ref_id="1195823" ref_url="https://bugzilla.suse.com/1195823" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195928" ref_url="https://bugzilla.suse.com/1195928" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195957" ref_url="https://bugzilla.suse.com/1195957" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196195" ref_url="https://bugzilla.suse.com/1196195" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196339" ref_url="https://bugzilla.suse.com/1196339" source="BUGZILLA"/>
		<reference ref_id="1196400" ref_url="https://bugzilla.suse.com/1196400" source="BUGZILLA"/>
		<reference ref_id="1196403" ref_url="https://bugzilla.suse.com/1196403" source="BUGZILLA"/>
		<reference ref_id="1196516" ref_url="https://bugzilla.suse.com/1196516" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).

The following non-security bugs were fixed:

- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).
- Bluetooth: refactor malicious adv data check (git-fixes).
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cm: Avoid a loop when device has 255 ports (git-fixes)
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/isert: Fix a use after free in isert_connect_request (git-fixes)
- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)
- IB/mlx5: Add missing error code (git-fixes)
- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)
- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)
- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- Input: wm97xx: Simplify resource management (git-fixes).
- KVM: remember position in kvm-&gt;vcpus array (bsc#1190972 LTC#194674).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/core: Do not access cm_id after its destruction (git-fixes)
- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)
- RDMA/core: Fix corrupted SL on passive side (git-fixes)
- RDMA/core: Unify RoCE check and re-factor code (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)
- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)
- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)
- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)
- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)
- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)
- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)
- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)
- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)
- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)
- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)
- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: fix probe error handling (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags-&gt;rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags-&gt;rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq-&gt;refcount before calling -&gt;fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: introduce blk_mq_set_request_complete (git-fixes).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).
- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- i40iw: Add support to make destroy QP synchronous (git-fixes)
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).
- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).
- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).
- nvme-multipath: fix ANA state updates when a namespace is not present (git-fixes).
- nvme-tcp: fix data digest pointer calculation (git-fixes).
- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).
- nvme-tcp: fix memory leak when freeing a queue (git-fixes).
- nvme-tcp: fix possible use-after-completion (git-fixes).
- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).
- nvme: introduce a nvme_host_path_error helper (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- nvme: refactor ns-&gt;ctrl by request (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).
- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).
- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- tty: Add support for Brainboxes UC cards (git-fixes).
- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).
- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).
- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget-&gt;is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181147">SUSE bug 1181147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181588">SUSE bug 1181588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183872">SUSE bug 1183872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187716">SUSE bug 1187716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188404">SUSE bug 1188404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190812">SUSE bug 1190812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190972">SUSE bug 1190972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191655">SUSE bug 1191655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191741">SUSE bug 1191741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192210">SUSE bug 1192210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193233">SUSE bug 1193233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193243">SUSE bug 1193243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194163">SUSE bug 1194163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194967">SUSE bug 1194967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195012">SUSE bug 1195012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195081">SUSE bug 1195081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195142">SUSE bug 1195142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195352">SUSE bug 1195352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195378">SUSE bug 1195378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195476">SUSE bug 1195476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195477">SUSE bug 1195477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195478">SUSE bug 1195478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195479">SUSE bug 1195479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195480">SUSE bug 1195480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195481">SUSE bug 1195481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195482">SUSE bug 1195482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195506">SUSE bug 1195506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195668">SUSE bug 1195668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195798">SUSE bug 1195798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195799">SUSE bug 1195799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195823">SUSE bug 1195823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195928">SUSE bug 1195928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195957">SUSE bug 1195957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196195">SUSE bug 1196195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196339">SUSE bug 1196339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196400">SUSE bug 1196400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196403">SUSE bug 1196403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196516">SUSE bug 1196516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671899" comment="cluster-md-kmp-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671900" comment="dlm-kmp-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671901" comment="gfs2-kmp-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671408" comment="kernel-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671409" comment="kernel-azure-devel-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671902" comment="kernel-azure-extra-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671903" comment="kernel-azure-livepatch-devel-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671904" comment="kernel-azure-optional-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671410" comment="kernel-devel-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671411" comment="kernel-source-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671412" comment="kernel-syms-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671905" comment="kselftests-kmp-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671906" comment="ocfs2-kmp-azure-5.3.18-150300.38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671907" comment="reiserfs-kmp-azure-5.3.18-150300.38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53141" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1176447" ref_url="https://bugzilla.suse.com/1176447" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1178134" ref_url="https://bugzilla.suse.com/1178134" source="BUGZILLA"/>
		<reference ref_id="1181147" ref_url="https://bugzilla.suse.com/1181147" source="BUGZILLA"/>
		<reference ref_id="1181588" ref_url="https://bugzilla.suse.com/1181588" source="BUGZILLA"/>
		<reference ref_id="1183872" ref_url="https://bugzilla.suse.com/1183872" source="BUGZILLA"/>
		<reference ref_id="1187716" ref_url="https://bugzilla.suse.com/1187716" source="BUGZILLA"/>
		<reference ref_id="1188404" ref_url="https://bugzilla.suse.com/1188404" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1190812" ref_url="https://bugzilla.suse.com/1190812" source="BUGZILLA"/>
		<reference ref_id="1190972" ref_url="https://bugzilla.suse.com/1190972" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1191655" ref_url="https://bugzilla.suse.com/1191655" source="BUGZILLA"/>
		<reference ref_id="1191741" ref_url="https://bugzilla.suse.com/1191741" source="BUGZILLA"/>
		<reference ref_id="1192210" ref_url="https://bugzilla.suse.com/1192210" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193233" ref_url="https://bugzilla.suse.com/1193233" source="BUGZILLA"/>
		<reference ref_id="1193243" ref_url="https://bugzilla.suse.com/1193243" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1194163" ref_url="https://bugzilla.suse.com/1194163" source="BUGZILLA"/>
		<reference ref_id="1194967" ref_url="https://bugzilla.suse.com/1194967" source="BUGZILLA"/>
		<reference ref_id="1195012" ref_url="https://bugzilla.suse.com/1195012" source="BUGZILLA"/>
		<reference ref_id="1195081" ref_url="https://bugzilla.suse.com/1195081" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195352" ref_url="https://bugzilla.suse.com/1195352" source="BUGZILLA"/>
		<reference ref_id="1195378" ref_url="https://bugzilla.suse.com/1195378" source="BUGZILLA"/>
		<reference ref_id="1195506" ref_url="https://bugzilla.suse.com/1195506" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195668" ref_url="https://bugzilla.suse.com/1195668" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195798" ref_url="https://bugzilla.suse.com/1195798" source="BUGZILLA"/>
		<reference ref_id="1195799" ref_url="https://bugzilla.suse.com/1195799" source="BUGZILLA"/>
		<reference ref_id="1195823" ref_url="https://bugzilla.suse.com/1195823" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195928" ref_url="https://bugzilla.suse.com/1195928" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195957" ref_url="https://bugzilla.suse.com/1195957" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196195" ref_url="https://bugzilla.suse.com/1196195" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196339" ref_url="https://bugzilla.suse.com/1196339" source="BUGZILLA"/>
		<reference ref_id="1196373" ref_url="https://bugzilla.suse.com/1196373" source="BUGZILLA"/>
		<reference ref_id="1196400" ref_url="https://bugzilla.suse.com/1196400" source="BUGZILLA"/>
		<reference ref_id="1196403" ref_url="https://bugzilla.suse.com/1196403" source="BUGZILLA"/>
		<reference ref_id="1196516" ref_url="https://bugzilla.suse.com/1196516" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196585" ref_url="https://bugzilla.suse.com/1196585" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).

The following non-security bugs were fixed:

- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).
- Drop PCI xgene patch that caused a regression for mxl4 (bsc#1195352)
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- KVM: remember position in kvm-&gt;vcpus array (bsc#1190972 LTC#194674).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags-&gt;rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags-&gt;rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq-&gt;refcount before calling -&gt;fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget-&gt;is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176447">SUSE bug 1176447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178134">SUSE bug 1178134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181147">SUSE bug 1181147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181588">SUSE bug 1181588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183872">SUSE bug 1183872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187716">SUSE bug 1187716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188404">SUSE bug 1188404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190812">SUSE bug 1190812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190972">SUSE bug 1190972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191655">SUSE bug 1191655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191741">SUSE bug 1191741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192210">SUSE bug 1192210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193233">SUSE bug 1193233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193243">SUSE bug 1193243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194163">SUSE bug 1194163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194967">SUSE bug 1194967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195012">SUSE bug 1195012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195081">SUSE bug 1195081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195352">SUSE bug 1195352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195378">SUSE bug 1195378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195506">SUSE bug 1195506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195668">SUSE bug 1195668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195798">SUSE bug 1195798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195799">SUSE bug 1195799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195823">SUSE bug 1195823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195928">SUSE bug 1195928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195957">SUSE bug 1195957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196195">SUSE bug 1196195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196339">SUSE bug 1196339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196373">SUSE bug 1196373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196400">SUSE bug 1196400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196403">SUSE bug 1196403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196516">SUSE bug 1196516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196585">SUSE bug 1196585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671908" comment="cluster-md-kmp-64kb-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671446" comment="cluster-md-kmp-default-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671909" comment="cluster-md-kmp-preempt-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671910" comment="dlm-kmp-64kb-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671447" comment="dlm-kmp-default-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671911" comment="dlm-kmp-preempt-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671912" comment="dtb-al-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671913" comment="dtb-allwinner-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671914" comment="dtb-altera-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671915" comment="dtb-amd-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671916" comment="dtb-amlogic-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671917" comment="dtb-apm-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671918" comment="dtb-arm-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671919" comment="dtb-broadcom-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671920" comment="dtb-cavium-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671921" comment="dtb-exynos-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671922" comment="dtb-freescale-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671923" comment="dtb-hisilicon-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671924" comment="dtb-lg-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671925" comment="dtb-marvell-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671926" comment="dtb-mediatek-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671927" comment="dtb-nvidia-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671928" comment="dtb-qcom-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671929" comment="dtb-renesas-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671930" comment="dtb-rockchip-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671931" comment="dtb-socionext-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671932" comment="dtb-sprd-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671933" comment="dtb-xilinx-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671934" comment="dtb-zte-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671935" comment="gfs2-kmp-64kb-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671448" comment="gfs2-kmp-default-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671936" comment="gfs2-kmp-preempt-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671371" comment="kernel-64kb-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671372" comment="kernel-64kb-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671937" comment="kernel-64kb-extra-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671938" comment="kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671939" comment="kernel-64kb-optional-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671940" comment="kernel-debug-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671941" comment="kernel-debug-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671942" comment="kernel-debug-livepatch-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671373" comment="kernel-default-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671374" comment="kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671943" comment="kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671375" comment="kernel-default-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671944" comment="kernel-default-extra-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671945" comment="kernel-default-livepatch-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671946" comment="kernel-default-livepatch-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671947" comment="kernel-default-optional-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671376" comment="kernel-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671391" comment="kernel-docs-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671948" comment="kernel-docs-html-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671949" comment="kernel-kvmsmall-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671950" comment="kernel-kvmsmall-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671951" comment="kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671377" comment="kernel-macros-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671392" comment="kernel-obs-build-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671952" comment="kernel-obs-qa-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671378" comment="kernel-preempt-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671393" comment="kernel-preempt-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671953" comment="kernel-preempt-extra-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671954" comment="kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671955" comment="kernel-preempt-optional-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671394" comment="kernel-source-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671956" comment="kernel-source-vanilla-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671395" comment="kernel-syms-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671379" comment="kernel-zfcpdump-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671957" comment="kselftests-kmp-64kb-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671958" comment="kselftests-kmp-default-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671959" comment="kselftests-kmp-preempt-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671960" comment="ocfs2-kmp-64kb-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671449" comment="ocfs2-kmp-default-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671961" comment="ocfs2-kmp-preempt-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671962" comment="reiserfs-kmp-64kb-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671396" comment="reiserfs-kmp-default-5.3.18-150300.59.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671963" comment="reiserfs-kmp-preempt-5.3.18-150300.59.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53142" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185973" ref_url="https://bugzilla.suse.com/1185973" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195536" ref_url="https://bugzilla.suse.com/1195536" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195840" ref_url="https://bugzilla.suse.com/1195840" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).


The following non-security bugs were fixed:

- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185973">SUSE bug 1185973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195536">SUSE bug 1195536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195840">SUSE bug 1195840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671964" comment="kernel-debug-base-4.12.14-197.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671630" comment="kernel-default-man-4.12.14-197.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671965" comment="kernel-kvmsmall-base-4.12.14-197.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671966" comment="kernel-vanilla-4.12.14-197.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671967" comment="kernel-vanilla-base-4.12.14-197.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671968" comment="kernel-vanilla-devel-4.12.14-197.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671969" comment="kernel-vanilla-livepatch-devel-4.12.14-197.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671970" comment="kernel-zfcpdump-man-4.12.14-197.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53143" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRWTKUG6M4N5W7U2DBAJ4MTXKVSEHRXW/" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670981" comment="caca-utils-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670660" comment="libcaca-devel-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670982" comment="libcaca-ruby-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670661" comment="libcaca0-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670983" comment="libcaca0-32bit-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670662" comment="libcaca0-plugins-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670984" comment="libcaca0-plugins-32bit-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670985" comment="python3-caca-0.99.beta19.git20171003-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53144" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1187812" ref_url="https://bugzilla.suse.com/1187812" source="BUGZILLA"/>
		<reference ref_id="1192999" ref_url="https://bugzilla.suse.com/1192999" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

buildah was updated to version 1.23.1:

Update to version 1.22.3:

* Update dependencies
* Post-branch commit
* Accept repositories on login/logout

Update to version 1.22.0:

* c/image, c/storage, c/common vendor before Podman 3.3 release
* Proposed patch for 3399 (shadowutils)
* Fix handling of --restore shadow-utils
* runtime-flag (debug) test: handle old &amp; new runc
* Allow dst and destination for target in secret mounts
* Multi-arch: Always push updated version-tagged img
* imagebuildah.stageExecutor.prepare(): remove pseudonym check
* refine dangling filter
* Chown with environment variables not set should fail
* Just restore protections of shadow-utils
* Remove specific kernel version number requirement from install.md
* Multi-arch image workflow: Make steps generic
* chroot: fix environment value leakage to intermediate processes
* Update nix pin with `make nixpkgs`
* buildah source - create and manage source images
* Update cirrus-cron notification GH workflow
* Reuse code from containers/common/pkg/parse
* Cirrus: Freshen VM images
* Fix excludes exception begining with / or ./
* Fix syntax for --manifest example
* vendor containers/common@main
* Cirrus: Drop dependence on fedora-minimal
* Adjust conformance-test error-message regex
* Workaround appearance of differing debug messages
* Cirrus: Install docker from package cache
* Switch rusagelogfile to use options.Out
* Turn stdio back to blocking when command finishes
* Add support for default network creation
* Cirrus: Updates for master-&gt;main rename
* Change references from master to main
* Add `--env` and `--workingdir` flags to run command
* [CI:DOCS] buildah bud: spelling --ignore-file requires parameter
* [CI:DOCS] push/pull: clarify supported transports
* Remove unused function arguments
* Create mountOptions for mount command flags
* Extract version command implementation to function
* Add --json flags to `mount` and `version` commands
* copier.Put(): set xattrs after ownership
* buildah add/copy: spelling
* buildah copy and buildah add should support .containerignore
* Remove unused util.StartsWithValidTransport
* Fix documentation of the --format option of buildah push
* Don't use alltransports.ParseImageName with known transports
* man pages: clarify `rmi` removes dangling parents
* [CI:DOCS] Fix links to c/image master branch
* imagebuildah: use the specified logger for logging preprocessing warnings
* Fix copy into workdir for a single file
* Fix docs links due to branch rename
* Update nix pin with `make nixpkgs`
* fix(docs): typo
* Move to v1.22.0-dev
* Fix handling of auth.json file while in a user namespace
* Add rusage-logfile flag to optionally send rusage to a file
* imagebuildah: redo step logging
* Add volumes to make running buildah within a container easier
* Add and use a 'copy' helper instead of podman load/save
* Bump github.com/containers/common from 0.38.4 to 0.39.0
* containerImageRef/containerImageSource: don't buffer uncompressed layers
* containerImageRef(): squashed images have no parent images
* Sync. workflow across skopeo, buildah, and podman
* Bump github.com/containers/storage from 1.31.1 to 1.31.2
* Bump github.com/opencontainers/runc from 1.0.0-rc94 to 1.0.0-rc95
* Bump to v1.21.1-dev [NO TESTS NEEDED]

		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187812">SUSE bug 1187812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192999">SUSE bug 1192999</bugzilla>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667813" comment="buildah-1.23.1-150300.8.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53145" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7F42RBJPTM53DGGULUXWD56J42LIIEII/" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667949" comment="tcpdump-4.9.2-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53146" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZLR36GLK5UWW34Z6YUDXKWIHXMQEYSY/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671381" comment="MozillaFirefox-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671897" comment="MozillaFirefox-branding-upstream-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671898" comment="MozillaFirefox-devel-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671383" comment="MozillaFirefox-translations-common-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671384" comment="MozillaFirefox-translations-other-91.6.1-152.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53147" version="1" class="patch">
	<metadata>
		<title>Security update for python-libxml2-python (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGCK33AJ4DGXLWFFRJOHKOZBZ7OBQCE4/" source="SUSE-SU"/>
		<description>
This update for python-libxml2-python fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670467" comment="python2-libxml2-python-2.9.7-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670465" comment="python3-libxml2-python-2.9.7-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53148" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXPBEANDVGCE6ASRYRQYWM4CLYAJ6TAE/" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667470" comment="python2-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667471" comment="python2-lxml-devel-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667411" comment="python3-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667412" comment="python3-lxml-devel-4.7.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53149" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2QKMX6IGL25P7OFW2JTNRZ4AD2EN4OAZ/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 91.6.2 (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672506" comment="MozillaThunderbird-91.6.2-8.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672507" comment="MozillaThunderbird-translations-common-91.6.2-8.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672508" comment="MozillaThunderbird-translations-other-91.6.2-8.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53150" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196660" ref_url="https://bugzilla.suse.com/1196660" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XL4H6UZUJ7J37CDBIJWGDOHX5XDWRWL6/" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2021-0561: Fixed out of bound write in append_to_verify_fifo_interleaved_ (bsc#1196660).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671009" comment="flac-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671006" comment="flac-devel-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671055" comment="flac-devel-32bit-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671056" comment="flac-doc-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671007" comment="libFLAC++6-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671057" comment="libFLAC++6-32bit-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671008" comment="libFLAC8-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671010" comment="libFLAC8-32bit-1.3.2-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53151" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21248: Fixed incomplete deserialization class filtering in ObjectInputStream. (bnc#1194926)
- CVE-2022-21277: Fixed incorrect reading of TIFF files in TIFFNullDecompressor. (bnc#1194930)
- CVE-2022-21282: Fixed Insufficient URI checks in the XSLT TransformerImpl. (bnc#1194933)
- CVE-2022-21283: Fixed unexpected exception thrown in regex Pattern. (bnc#1194937)
- CVE-2022-21291: Fixed Incorrect marking of writeable fields. (bnc#1194925)
- CVE-2022-21293: Fixed Incomplete checks of StringBuffer and StringBuilder during deserialization. (bnc#1194935)
- CVE-2022-21294: Fixed Incorrect IdentityHashMap size checks during deserialization. (bnc#1194934)
- CVE-2022-21296: Fixed Incorrect access checks in XMLEntityManager. (bnc#1194932)
- CVE-2022-21299: Fixed Infinite loop related to incorrect handling of newlines in XMLEntityScanner. (bnc#1194931)
- CVE-2022-21305: Fixed Array indexing issues in LIRGenerator. (bnc#1194939)
- CVE-2022-21340: Fixed Excessive resource use when reading JAR manifest attributes. (bnc#1194940)
- CVE-2022-21341: Fixed OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream. (bnc#1194941)
- CVE-2022-21360: Fixed Excessive memory allocation in BMPImageReader. (bnc#1194929)
- CVE-2022-21365: Fixed Integer overflow in BMPImageReader. (bnc#1194928)
- CVE-2022-21366: Fixed Excessive memory allocation in TIFF*Decompressor. (bnc#1194927)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667407" comment="java-11-openjdk-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667681" comment="java-11-openjdk-accessibility-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667408" comment="java-11-openjdk-demo-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667409" comment="java-11-openjdk-devel-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667410" comment="java-11-openjdk-headless-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667463" comment="java-11-openjdk-javadoc-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667464" comment="java-11-openjdk-jmods-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667682" comment="java-11-openjdk-src-11.0.14.0-3.74.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53152" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195458" ref_url="https://bugzilla.suse.com/1195458" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43859" ref_url="https://www.suse.com/security/cve/CVE-2021-43859/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZZMZMEXJXNF2NQNIXETAFBVRAZVIVSO/" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:
 
- CVE-2021-43859: Fixed a denial of service when unmarshalling highly recursive collections or maps (bsc#1195458).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195458">SUSE bug 1195458</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43859/">CVE-2021-43859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667358" comment="xstream-1.4.19-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667389" comment="xstream-benchmark-1.4.19-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667390" comment="xstream-javadoc-1.4.19-3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667391" comment="xstream-parent-1.4.19-3.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53153" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0818-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4SBF2QAXCDZCB26LZTI2RH7Q33DJRIB/" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Make calculation of session storage location more robust (bsc#1195255)
- Remove log4j (bsc#1196137) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671229" comment="tomcat-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671230" comment="tomcat-admin-webapps-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671298" comment="tomcat-docs-webapp-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671231" comment="tomcat-el-3_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671299" comment="tomcat-embed-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671300" comment="tomcat-javadoc-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671232" comment="tomcat-jsp-2_3-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671301" comment="tomcat-jsvc-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671233" comment="tomcat-lib-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671234" comment="tomcat-servlet-4_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671235" comment="tomcat-webapps-9.0.36-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53154" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="critical" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672020" comment="MozillaFirefox-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672509" comment="MozillaFirefox-branding-upstream-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672510" comment="MozillaFirefox-devel-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672022" comment="MozillaFirefox-translations-common-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672023" comment="MozillaFirefox-translations-other-91.7.0-152.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53155" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195258" ref_url="https://bugzilla.suse.com/1195258" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0823-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYCKEL27LS2QTHCEAYFVLKKSZP4MBBJQ/" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195258">SUSE bug 1195258</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673464" comment="libprotobuf-lite15-3.5.0-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673465" comment="libprotobuf-lite15-32bit-3.5.0-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673466" comment="libprotobuf15-3.5.0-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673467" comment="libprotobuf15-32bit-3.5.0-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673468" comment="libprotoc15-3.5.0-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673469" comment="libprotoc15-32bit-3.5.0-5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53156" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195386" ref_url="https://bugzilla.suse.com/1195386" source="BUGZILLA"/>
		<reference ref_id="1196501" ref_url="https://bugzilla.suse.com/1196501" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIPE5FF5VKMSL2BZDJ46HDRCTHGR7IUG/" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2022-23853, CVE-2022-25255: Avoid unintentionally using binaries from CWD
  (bsc#1195386, bsc#1196501).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195386">SUSE bug 1195386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672468" comment="libQt5Bootstrap-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672469" comment="libQt5Bootstrap-devel-static-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671971" comment="libQt5Concurrent-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672470" comment="libQt5Concurrent-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671972" comment="libQt5Concurrent5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672471" comment="libQt5Concurrent5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671973" comment="libQt5Core-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672472" comment="libQt5Core-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671974" comment="libQt5Core-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671975" comment="libQt5Core5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672473" comment="libQt5Core5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671976" comment="libQt5DBus-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672474" comment="libQt5DBus-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671977" comment="libQt5DBus-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671978" comment="libQt5DBus5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672475" comment="libQt5DBus5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671979" comment="libQt5Gui-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672476" comment="libQt5Gui-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671980" comment="libQt5Gui-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671981" comment="libQt5Gui5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672477" comment="libQt5Gui5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671982" comment="libQt5KmsSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671983" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671984" comment="libQt5Network-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672478" comment="libQt5Network-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671985" comment="libQt5Network-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671986" comment="libQt5Network5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672479" comment="libQt5Network5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671987" comment="libQt5OpenGL-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672480" comment="libQt5OpenGL-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671988" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671989" comment="libQt5OpenGL5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672481" comment="libQt5OpenGL5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672015" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672482" comment="libQt5OpenGLExtensions-devel-static-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671990" comment="libQt5PlatformHeaders-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671991" comment="libQt5PlatformSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672483" comment="libQt5PlatformSupport-devel-static-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671992" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671993" comment="libQt5PrintSupport-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672484" comment="libQt5PrintSupport-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671994" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671995" comment="libQt5PrintSupport5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672485" comment="libQt5PrintSupport5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671996" comment="libQt5Sql-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672486" comment="libQt5Sql-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671997" comment="libQt5Sql-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671998" comment="libQt5Sql5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672487" comment="libQt5Sql5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672016" comment="libQt5Sql5-mysql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672488" comment="libQt5Sql5-mysql-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672017" comment="libQt5Sql5-postgresql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672489" comment="libQt5Sql5-postgresql-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671999" comment="libQt5Sql5-sqlite-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672490" comment="libQt5Sql5-sqlite-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672018" comment="libQt5Sql5-unixODBC-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672491" comment="libQt5Sql5-unixODBC-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672000" comment="libQt5Test-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672492" comment="libQt5Test-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672001" comment="libQt5Test-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672002" comment="libQt5Test5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672493" comment="libQt5Test5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672003" comment="libQt5Widgets-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672494" comment="libQt5Widgets-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672004" comment="libQt5Widgets-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672005" comment="libQt5Widgets5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672495" comment="libQt5Widgets5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672006" comment="libQt5Xml-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672496" comment="libQt5Xml-devel-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672007" comment="libQt5Xml5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672497" comment="libQt5Xml5-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672008" comment="libqt5-qtbase-common-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672009" comment="libqt5-qtbase-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672498" comment="libqt5-qtbase-examples-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672499" comment="libqt5-qtbase-examples-32bit-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672019" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672500" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672010" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53157" version="1" class="patch">
	<metadata>
		<title>Security update for rust, rust1.58, rust1.59 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZODX3XK3LNWUDIGOVAOXXYOTCRZZ4CMJ/" source="SUSE-SU"/>
		<description>
This update for rust, rust1.58, rust1.59 fixes the following issues:

This update provides both rust1.58 and rust1.59.

Changes in rust1.58:

- Add recommends for GCC for installs to be able to link.
- Add suggests for lld/clang which are faster than gcc for linking to
  allow users choice on what they use.
- CVE-2022-21658: Resolve race condition in std::fs::remove_dir_all (bsc#1194767)

Version 1.58.0 (2022-01-13)
==========================

Language
--------
- [Format strings can now capture arguments simply by writing `{ident}` in the string.][90473] This works in all macros accepting format strings. Support for this in `panic!` (`panic!('{ident}')`) requires the 2021 edition; panic invocations in previous editions that appear to be trying to use this will result in a warning lint about not having the intended effect.
- [`*const T` pointers can now be dereferenced in const contexts.][89551]
- [The rules for when a generic struct implements `Unsize` have been relaxed.][90417]
Compiler
--------
- [Add LLVM CFI support to the Rust compiler][89652]
- [Stabilize -Z strip as -C strip][90058]. Note that while release builds already don't add debug symbols for the code you compile, the compiled standard library that ships with Rust includes debug symbols, so you may want to use the `strip` option to remove these symbols to produce smaller release binaries. Note that this release only includes support in rustc, not directly in cargo.
- [Add support for LLVM coverage mapping format versions 5 and 6][91207]
- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]
- [Update the minimum external LLVM to 12][90175]
- [Add `x86_64-unknown-none` at Tier 3*][89062]
- [Build musl dist artifacts with debuginfo enabled][90733]. When building release binaries using musl, you may want to use the newly stabilized strip option to remove these debug symbols, reducing the size of your binaries.
- [Don't abort compilation after giving a lint error][87337]
- [Error messages point at the source of trait bound obligations in more places][89580]
\* Refer to Rust's [platform support page][platform-support-doc] for more
   information on Rust's tiered platform support.

Libraries
---------

- [All remaining functions in the standard library have `#[must_use]` annotations where appropriate][89692], producing a warning when ignoring their return value. This helps catch mistakes such as expecting a function to mutate a value in place rather than return a new value.
- [Paths are automatically canonicalized on Windows for operations that support it][89174]
- [Re-enable debug checks for `copy` and `copy_nonoverlapping`][90041]
- [Implement `RefUnwindSafe` for `Rc&lt;T&gt;`][87467]
- [Make RSplit&lt;T, P&gt;: Clone not require T: Clone][90117]
- [Implement `Termination` for `Result&lt;Infallible, E&gt;`][88601]. This allows writing `fn main() -&gt; Result&lt;Infallible, ErrorType&gt;`, for a program whose successful exits never involve returning from `main` (for instance, a program that calls `exit`, or that uses `exec` to run another program).

Stabilized APIs
---------------

- [`Metadata::is_symlink`]
- [`Path::is_symlink`]
- [`{integer}::saturating_div`]
- [`Option::unwrap_unchecked`]
- [`Result::unwrap_unchecked`]
- [`Result::unwrap_err_unchecked`]
- [`NonZero{unsigned}::is_power_of_two`]
- [`File::options`]
These APIs are now usable in const contexts:
- [`Duration::new`]
- [`Duration::checked_add`]
- [`Duration::saturating_add`]
- [`Duration::checked_sub`]
- [`Duration::saturating_sub`]
- [`Duration::checked_mul`]
- [`Duration::saturating_mul`]
- [`Duration::checked_div`]
- [`MaybeUninit::as_ptr`]
- [`MaybeUninit::as_mut_ptr`]
- [`MaybeUninit::assume_init`]
- [`MaybeUninit::assume_init_ref`]

Cargo
-----

- [Add --message-format for install command][cargo/10107]
- [Warn when alias shadows external subcommand][cargo/10082]

Rustdoc
-------

- [Show all Deref implementations recursively in rustdoc][90183]
- [Use computed visibility in rustdoc][88447]

Compatibility Notes
-------------------

- [Try all stable method candidates first before trying unstable ones][90329]. This change ensures that adding new nightly-only methods to the Rust standard library will not break code invoking methods of the same name from traits outside the standard library.
- Windows: [`std::process::Command` will no longer search the current directory for executables.][87704]
- [All proc-macro backward-compatibility lints are now deny-by-default.][88041]
- [proc_macro: Append .0 to unsuffixed float if it would otherwise become int token][90297]
- [Refactor weak symbols in std::sys::unix][90846]. This optimizes accesses to glibc functions, by avoiding the use of dlopen. This does not increase the [minimum expected version of glibc](https://doc.rust-lang.org/nightly/rustc/platform-support.html). However, software distributions that use symbol versions to detect library dependencies, and which take weak symbols into account in that analysis, may detect rust binaries as requiring newer versions of glibc.
- [rustdoc now rejects some unexpected semicolons in doctests][91026]

Version 1.59.0 (2022-02-24)
==========================

Language
--------

- [Stabilize default arguments for const generics][90207]
- [Stabilize destructuring assignment][90521]
- [Relax private in public lint on generic bounds and where clauses of trait impls][90586]
- [Stabilize asm! and global_asm! for x86, x86_64, ARM, Aarch64, and RISC-V][91728]

Compiler
--------

- [Stabilize new symbol mangling format, leaving it opt-in (-Csymbol-mangling-version=v0)][90128]
- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]
- [Fix sparc64 ABI for aggregates with floating point members][91003]
- [Warn when a `#[test]`-like built-in attribute macro is present multiple times.][91172]
- [Add support for riscv64gc-unknown-freebsd][91284]
- [Stabilize `-Z emit-future-incompat` as `--json future-incompat`][91535]

Libraries
---------

- [Remove unnecessary bounds for some Hash{Map,Set} methods][91593]

Stabilized APIs
---------------

- [`std::thread::available_parallelism`][available_parallelism]
- [`Result::copied`][result-copied]
- [`Result::cloned`][result-cloned]
- [`arch::asm!`][asm]
- [`arch::global_asm!`][global_asm]
- [`ops::ControlFlow::is_break`][is_break]
- [`ops::ControlFlow::is_continue`][is_continue]
- [`TryFrom&lt;char&gt; for u8`][try_from_char_u8]
- [`char::TryFromCharError`][try_from_char_err]
  implementing `Clone`, `Debug`, `Display`, `PartialEq`, `Copy`, `Eq`, `Error`
- [`iter::zip`][zip]
- [`NonZeroU8::is_power_of_two`][is_power_of_two8]
- [`NonZeroU16::is_power_of_two`][is_power_of_two16]
- [`NonZeroU32::is_power_of_two`][is_power_of_two32]
- [`NonZeroU64::is_power_of_two`][is_power_of_two64]
- [`NonZeroU128::is_power_of_two`][is_power_of_two128]
- [`DoubleEndedIterator for ToLowercase`][lowercase]
- [`DoubleEndedIterator for ToUppercase`][uppercase]
- [`TryFrom&lt;&amp;mut [T]&gt; for [T; N]`][tryfrom_ref_arr]
- [`UnwindSafe for Once`][unwindsafe_once]
- [`RefUnwindSafe for Once`][refunwindsafe_once]
- [armv8 neon intrinsics for aarch64][stdarch/1266]
Const-stable:
- [`mem::MaybeUninit::as_ptr`][muninit_ptr]
- [`mem::MaybeUninit::assume_init`][muninit_init]
- [`mem::MaybeUninit::assume_init_ref`][muninit_init_ref]
- [`ffi::CStr::from_bytes_with_nul_unchecked`][cstr_from_bytes]

Cargo
-----

- [Stabilize the `strip` profile option][cargo/10088]
- [Stabilize future-incompat-report][cargo/10165]
- [Support abbreviating `--release` as `-r`][cargo/10133]
- [Support `term.quiet` configuration][cargo/10152]
- [Remove `--host` from cargo {publish,search,login}][cargo/10145]

Compatibility Notes
-------------------

- [Refactor weak symbols in std::sys::unix][90846]
  This may add new, versioned, symbols when building with a newer glibc, as the
  standard library uses weak linkage rather than dynamically attempting to load
  certain symbols at runtime.
- [Deprecate crate_type and crate_name nested inside `#![cfg_attr]`][83744]
  This adds a future compatibility lint to supporting the use of cfg_attr
  wrapping either crate_type or crate_name specification within Rust files;
  it is recommended that users migrate to setting the equivalent command line
  flags.
- [Remove effect of `#[no_link]` attribute on name resolution][92034]
  This may expose new names, leading to conflicts with preexisting names in a
  given namespace and a compilation failure.
- [Cargo will document libraries before binaries.][cargo/10172]
- [Respect doc=false in dependencies, not just the root crate][cargo/10201]
- [Weaken guarantee around advancing underlying iterators in zip][83791]
- [Make split_inclusive() on an empty slice yield an empty output][89825]
- [Update std::env::temp_dir to use GetTempPath2 on Windows when available.][89999]

Changes in rust wrapper package:

- Update to version 1.59.0 - for details see the rust1.59 package

- Update package description to help users choose what tooling
  to install.

- Provide rust+cargo by cargo: all cargo&lt;n&gt; package provide this
  symbol too. Having the meta package provide it allows OBS to have
  a generic prefernece on the meta package for all packages 'just'
  requiring rust+cargo.

- Update to version 1.58.0
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671385" comment="cargo-1.59.0-150300.21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671386" comment="cargo1.58-1.58.0-150300.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671387" comment="cargo1.59-1.59.0-150300.7.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671388" comment="rust-1.59.0-150300.21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671389" comment="rust1.58-1.58.0-150300.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671390" comment="rust1.59-1.59.0-150300.7.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53158" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAE6CSZY5X5K62OKNSD5W35BIQQRELP4/" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671081" comment="expat-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671082" comment="libexpat-devel-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671324" comment="libexpat-devel-32bit-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671083" comment="libexpat1-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671084" comment="libexpat1-32bit-2.2.5-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53159" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="1194229" ref_url="https://bugzilla.suse.com/1194229" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIUHNUKYNY5JRZHWXP7NXCJOMX4HEQMQ/" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1, bringing features and bugfixes.

Update to 4.1

  * Add support for NTS servers specified by IP address (matching
    Subject Alternative Name in server certificate)
  * Add source-specific configuration of trusted certificates
  * Allow multiple files and directories with trusted certificates
  * Allow multiple pairs of server keys and certificates
  * Add copy option to server/pool directive
  * Increase PPS lock limit to 40% of pulse interval
  * Perform source selection immediately after loading dump files
  * Reload dump files for addresses negotiated by NTS-KE server
  * Update seccomp filter and add less restrictive level
  * Restart ongoing name resolution on online command
  * Fix dump files to not include uncorrected offset
  * Fix initstepslew to accept time from own NTP clients
  * Reset NTP address and port when no longer negotiated by NTS-KE
    server

- Ensure the correct pool packages are installed for openSUSE
  and SLE (bsc#1180689).
- Fix pool package dependencies, so that SLE prefers chrony-pool-suse
  over chrony-pool-empty. (bsc#1194229)

- Enable syscallfilter unconditionally [bsc#1181826].

Update to 4.0

  - Enhancements

    - Add support for Network Time Security (NTS) authentication
    - Add support for AES-CMAC keys (AES128, AES256) with Nettle
    - Add authselectmode directive to control selection of
      unauthenticated sources
    - Add binddevice, bindacqdevice, bindcmddevice directives
    - Add confdir directive to better support fragmented
      configuration
    - Add sourcedir directive and 'reload sources' command to
      support dynamic NTP sources specified in files
    - Add clockprecision directive
    - Add dscp directive to set Differentiated Services Code Point
      (DSCP)
    - Add -L option to limit log messages by severity
    - Add -p option to print whole configuration with included
      files
    - Add -U option to allow start under non-root user
    - Allow maxsamples to be set to 1 for faster update with -q/-Q
      option
    - Avoid replacing NTP sources with sources that have
      unreachable address
    - Improve pools to repeat name resolution to get 'maxsources'
      sources
    - Improve source selection with trusted sources
    - Improve NTP loop test to prevent synchronisation to itself
    - Repeat iburst when NTP source is switched from offline state
      to online
    - Update clock synchronisation status and leap status more
      frequently
    - Update seccomp filter
    - Add 'add pool' command
    - Add 'reset sources' command to drop all measurements
    - Add authdata command to print details about NTP
      authentication
    - Add selectdata command to print details about source
      selection
    - Add -N option and sourcename command to print original names
      of sources
    - Add -a option to some commands to print also unresolved
      sources
    - Add -k, -p, -r options to clients command to select, limit,
      reset data

  - Bug fixes

    - Don’t set interface for NTP responses to allow asymmetric
      routing
    - Handle RTCs that don’t support interrupts
    - Respond to command requests with correct address on
      multihomed hosts
  - Removed features
    - Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
    - Drop support for long (non-standard) MACs in NTPv4 packets
      (chrony 2.x clients using non-MD5/SHA1 keys need to use
      option 'version 3')
    - Drop support for line editing with GNU Readline

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Update to 3.5.1:

  * Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)

- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).




Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service
  (bsc#1128846).


- Read runtime servers from /var/run/netconfig/chrony.servers to
  fix bsc#1099272.
- Move chrony-helper to /usr/lib/chrony/helper, because there
  should be no executables in /usr/share.

Update to version 3.4

  * Enhancements

    + Add filter option to server/pool/peer directive
    + Add minsamples and maxsamples options to hwtimestamp directive
    + Add support for faster frequency adjustments in Linux 4.19
    + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
      without root privileges to remove it on exit
    + Disable sub-second polling intervals for distant NTP sources
    + Extend range of supported sub-second polling intervals
    + Get/set IPv4 destination/source address of NTP packets on FreeBSD
    + Make burst options and command useful with short polling intervals
    + Modify auto_offline option to activate when sending request failed
    + Respond from interface that received NTP request if possible
    + Add onoffline command to switch between online and offline state 
      according to current system network configuration
    + Improve example NetworkManager dispatcher script

  * Bug fixes

    + Avoid waiting in Linux getrandom system call
    + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

  * Enhancements:

    + Add burst option to server/pool directive
    + Add stratum and tai options to refclock directive
    + Add support for Nettle crypto library
    + Add workaround for missing kernel receive timestamps on Linux
    + Wait for late hardware transmit timestamps
    + Improve source selection with unreachable sources
    + Improve protection against replay attacks on symmetric mode
    + Allow PHC refclock to use socket in /var/run/chrony
    + Add shutdown command to stop chronyd
    + Simplify format of response to manual list command
    + Improve handling of unknown responses in chronyc

  * Bug fixes:

    + Respond to NTPv1 client requests with zero mode
    + Fix -x option to not require CAP_SYS_TIME under non-root user
    + Fix acquisitionport directive to work with privilege separation
    + Fix handling of socket errors on Linux to avoid high CPU usage
    + Fix chronyc to not get stuck in infinite loop after clock step		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194229">SUSE bug 1194229</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672011" comment="augeas-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672012" comment="augeas-devel-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672501" comment="augeas-devel-32bit-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672502" comment="augeas-lense-tests-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672013" comment="augeas-lenses-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670461" comment="chrony-4.1-150300.16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670462" comment="chrony-pool-empty-4.1-150300.16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670587" comment="chrony-pool-openSUSE-4.1-150300.16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670463" comment="chrony-pool-suse-4.1-150300.16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672014" comment="libaugeas0-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672503" comment="libaugeas0-32bit-1.10.1-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53160" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196252" ref_url="https://bugzilla.suse.com/1196252" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KW6LMSP5SUI42MJ5THSQEU35CZFOBTL3/" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21708: Fixed a memory corruption issue when processing integers
  from an untrusted source (bsc#1196252).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196252">SUSE bug 1196252</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672028" comment="apache2-mod_php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672029" comment="php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672030" comment="php7-bcmath-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672031" comment="php7-bz2-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672032" comment="php7-calendar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672033" comment="php7-ctype-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672034" comment="php7-curl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672035" comment="php7-dba-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672036" comment="php7-devel-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672037" comment="php7-dom-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672024" comment="php7-embed-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672038" comment="php7-enchant-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672039" comment="php7-exif-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672040" comment="php7-fastcgi-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672041" comment="php7-fileinfo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672504" comment="php7-firebird-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672042" comment="php7-fpm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672043" comment="php7-ftp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672044" comment="php7-gd-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672045" comment="php7-gettext-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672046" comment="php7-gmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672047" comment="php7-iconv-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672048" comment="php7-intl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672049" comment="php7-json-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672050" comment="php7-ldap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672051" comment="php7-mbstring-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672052" comment="php7-mysql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672053" comment="php7-odbc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672054" comment="php7-opcache-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672055" comment="php7-openssl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672056" comment="php7-pcntl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672057" comment="php7-pdo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672058" comment="php7-pgsql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672059" comment="php7-phar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672060" comment="php7-posix-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672061" comment="php7-readline-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672062" comment="php7-shmop-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672063" comment="php7-snmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672064" comment="php7-soap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672065" comment="php7-sockets-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672066" comment="php7-sodium-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672067" comment="php7-sqlite-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672068" comment="php7-sysvmsg-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672069" comment="php7-sysvsem-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672070" comment="php7-sysvshm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672505" comment="php7-test-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672071" comment="php7-tidy-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672072" comment="php7-tokenizer-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672073" comment="php7-xmlreader-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672074" comment="php7-xmlrpc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672075" comment="php7-xmlwriter-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672076" comment="php7-xsl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672077" comment="php7-zip-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672078" comment="php7-zlib-7.4.6-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53161" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7FRPEEZ7WUHWJ2PK7C5GZJJTXRGWJB2/" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672865" comment="libopenssl-1_0_0-devel-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673161" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672866" comment="libopenssl10-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672867" comment="libopenssl1_0_0-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673162" comment="libopenssl1_0_0-32bit-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673163" comment="libopenssl1_0_0-hmac-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673164" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673165" comment="libopenssl1_0_0-steam-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673166" comment="libopenssl1_0_0-steam-32bit-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672868" comment="openssl-1_0_0-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673167" comment="openssl-1_0_0-cavs-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673168" comment="openssl-1_0_0-doc-1.0.2p-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53162" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1  (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="1195149" ref_url="https://bugzilla.suse.com/1195149" source="BUGZILLA"/>
		<reference ref_id="1195792" ref_url="https://bugzilla.suse.com/1195792" source="BUGZILLA"/>
		<reference ref_id="1195856" ref_url="https://bugzilla.suse.com/1195856" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl-1_1 fixes the following issues:

openssl-1_1:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
    
glibc:

- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    
linux-glibc-devel:

- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

libxcrypt:

- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

zlib:

- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195149">SUSE bug 1195149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195792">SUSE bug 1195792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195856">SUSE bug 1195856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673187" comment="glibc-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673188" comment="glibc-32bit-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673189" comment="glibc-devel-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673218" comment="glibc-devel-32bit-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673219" comment="glibc-devel-static-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673470" comment="glibc-devel-static-32bit-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673190" comment="glibc-extra-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673471" comment="glibc-html-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673191" comment="glibc-i18ndata-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673192" comment="glibc-info-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673193" comment="glibc-lang-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673194" comment="glibc-locale-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673195" comment="glibc-locale-base-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673196" comment="glibc-locale-base-32bit-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673197" comment="glibc-profile-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673472" comment="glibc-profile-32bit-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673220" comment="glibc-utils-2.31-150300.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673473" comment="glibc-utils-32bit-2.31-150300.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673198" comment="libcrypt1-4.4.15-150300.4.2.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673199" comment="libcrypt1-32bit-4.4.15-150300.4.2.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673200" comment="libminizip1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673474" comment="libminizip1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673201" comment="libopenssl-1_1-devel-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673475" comment="libopenssl-1_1-devel-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673202" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673203" comment="libopenssl1_1-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673204" comment="libopenssl1_1-hmac-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673205" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673206" comment="libxcrypt-devel-4.4.15-150300.4.2.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673476" comment="libxcrypt-devel-32bit-4.4.15-150300.4.2.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673221" comment="libxcrypt-devel-static-4.4.15-150300.4.2.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673207" comment="libz1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673208" comment="libz1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673209" comment="linux-glibc-devel-5.3-3.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673210" comment="minizip-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673211" comment="nscd-2.31-150300.20.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673212" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673477" comment="openssl-1_1-doc-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673213" comment="zlib-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673222" comment="zlib-devel-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673214" comment="zlib-devel-static-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673478" comment="zlib-devel-static-32bit-1.2.11-3.26.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53163" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

Update to OpenJDK 8u322 build 04 with OpenJ9 0.30.0:

- Fixing the following vulnerabilities:
  CVE-2022-21248 (bsc#1194926), CVE-2022-21277 (bsc#1194930),
  CVE-2022-21282 (bsc#1194933), CVE-2022-21291 (bsc#1194925),
  CVE-2022-21293 (bsc#1194935), CVE-2022-21294 (bsc#1194934),
  CVE-2022-21296 (bsc#1194932), CVE-2022-21299 (bsc#1194931),
  CVE-2022-21305 (bsc#1194939), CVE-2022-21340 (bsc#1194940),
  CVE-2022-21341 (bsc#1194941), CVE-2022-21360 (bsc#1194929),
  CVE-2022-21365 (bsc#1194928), CVE-2022-21366 (bsc#1194927).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672659" comment="java-1_8_0-openj9-1.8.0.322-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672660" comment="java-1_8_0-openj9-accessibility-1.8.0.322-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672661" comment="java-1_8_0-openj9-demo-1.8.0.322-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672662" comment="java-1_8_0-openj9-devel-1.8.0.322-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672663" comment="java-1_8_0-openj9-headless-1.8.0.322-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672664" comment="java-1_8_0-openj9-javadoc-1.8.0.322-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672665" comment="java-1_8_0-openj9-src-1.8.0.322-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53164" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SF6GP7Y7QBDPSDEMYQPWKSOXKRHILQVP/" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

  * Security bugfixes
    - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529).
    - Fixed a double free with OpenSSL older than 1.1.0.
    - Added hardening to systemd service (bsc#1181400).
  * New features
    - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options.
    - Added support for the new SSL_set_options() values.
    - Added a bash completion script.
    - New 'sessionResume' service-level option to allow or disallow session resumption
    - Download fresh ca-certs.pem for each new release.
    - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
      This feature can be used to impersonate other software (e.g. web browsers).
    - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
    - Initial FIPS 3.0 support.
    - Client-side 'protocol = ldap' support
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed reloading configuration with 'systemctl reload stunnel.service'.
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
    - Fixed a tiny memory leak in configuration file reload error handling.
    - Fixed engine initialization.
    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
    - Fix configuration reload when compression is used
    - Fix test suite fixed not to require external connectivity
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672634" comment="stunnel-5.62-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672669" comment="stunnel-doc-5.62-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53165" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672630" comment="java-1_8_0-openjdk-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672666" comment="java-1_8_0-openjdk-accessibility-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672631" comment="java-1_8_0-openjdk-demo-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672632" comment="java-1_8_0-openjdk-devel-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672633" comment="java-1_8_0-openjdk-headless-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672667" comment="java-1_8_0-openjdk-javadoc-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672668" comment="java-1_8_0-openjdk-src-1.8.0.322-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53166" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194303" ref_url="https://bugzilla.suse.com/1194303" source="BUGZILLA"/>
		<reference ref_id="1194304" ref_url="https://bugzilla.suse.com/1194304" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45944" ref_url="https://www.suse.com/security/cve/CVE-2021-45944/" source="CVE"/>
		<reference ref_id="CVE-2021-45949" ref_url="https://www.suse.com/security/cve/CVE-2021-45949/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UJWNOWSKPBGYUCFFUB7ANJL7A2J2AML/" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-45944: Fixed use-after-free in sampled_data_sample (bsc#1194303)
- CVE-2021-45949: Fixed heap-based buffer overflow in sampled_data_finish (bsc#1194304)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-17"/>
	<updated date="2022-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194303">SUSE bug 1194303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194304">SUSE bug 1194304</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45944/">CVE-2021-45944</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45949/">CVE-2021-45949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663282" comment="ghostscript-9.52-161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663283" comment="ghostscript-devel-9.52-161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663284" comment="ghostscript-x11-9.52-161.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53167" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196456" ref_url="https://bugzilla.suse.com/1196456" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25636" ref_url="https://www.suse.com/security/cve/CVE-2021-25636/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0886-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJ4E4JWVNOUJ5BNESH2IF34TBNSWMRGO/" source="SUSE-SU"/>
		<description>
This update for libreoffice fixes the following issues:

Update to version 7.2.5.1 (jsc#SLE-18214):
- CVE-2021-25636: Fixed an incorrect vadidation of digitally signed documents (bsc#1196456).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-17"/>
	<updated date="2022-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196456">SUSE bug 1196456</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25636/">CVE-2021-25636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671302" comment="libreoffice-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671303" comment="libreoffice-base-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671304" comment="libreoffice-base-drivers-postgresql-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671088" comment="libreoffice-branding-upstream-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671305" comment="libreoffice-calc-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671306" comment="libreoffice-calc-extensions-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671307" comment="libreoffice-draw-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671308" comment="libreoffice-filters-optional-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671093" comment="libreoffice-gdb-pretty-printers-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671094" comment="libreoffice-glade-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671309" comment="libreoffice-gnome-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671310" comment="libreoffice-gtk3-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671097" comment="libreoffice-icon-themes-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671311" comment="libreoffice-impress-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671099" comment="libreoffice-l10n-af-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671100" comment="libreoffice-l10n-am-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671101" comment="libreoffice-l10n-ar-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671102" comment="libreoffice-l10n-as-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671103" comment="libreoffice-l10n-ast-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671104" comment="libreoffice-l10n-be-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671105" comment="libreoffice-l10n-bg-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671106" comment="libreoffice-l10n-bn-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671107" comment="libreoffice-l10n-bn_IN-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671108" comment="libreoffice-l10n-bo-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671109" comment="libreoffice-l10n-br-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671110" comment="libreoffice-l10n-brx-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671111" comment="libreoffice-l10n-bs-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671112" comment="libreoffice-l10n-ca-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671113" comment="libreoffice-l10n-ca_valencia-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671114" comment="libreoffice-l10n-ckb-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671115" comment="libreoffice-l10n-cs-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671116" comment="libreoffice-l10n-cy-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671117" comment="libreoffice-l10n-da-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671118" comment="libreoffice-l10n-de-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671119" comment="libreoffice-l10n-dgo-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671120" comment="libreoffice-l10n-dsb-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671121" comment="libreoffice-l10n-dz-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671122" comment="libreoffice-l10n-el-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671123" comment="libreoffice-l10n-en-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671124" comment="libreoffice-l10n-en_GB-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671125" comment="libreoffice-l10n-en_ZA-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671126" comment="libreoffice-l10n-eo-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671127" comment="libreoffice-l10n-es-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671128" comment="libreoffice-l10n-et-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671129" comment="libreoffice-l10n-eu-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671130" comment="libreoffice-l10n-fa-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671131" comment="libreoffice-l10n-fi-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671132" comment="libreoffice-l10n-fr-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671133" comment="libreoffice-l10n-fur-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671134" comment="libreoffice-l10n-fy-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671135" comment="libreoffice-l10n-ga-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671136" comment="libreoffice-l10n-gd-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671137" comment="libreoffice-l10n-gl-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671138" comment="libreoffice-l10n-gu-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671139" comment="libreoffice-l10n-gug-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671140" comment="libreoffice-l10n-he-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671141" comment="libreoffice-l10n-hi-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671142" comment="libreoffice-l10n-hr-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671143" comment="libreoffice-l10n-hsb-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671144" comment="libreoffice-l10n-hu-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671145" comment="libreoffice-l10n-id-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671146" comment="libreoffice-l10n-is-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671147" comment="libreoffice-l10n-it-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671148" comment="libreoffice-l10n-ja-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671149" comment="libreoffice-l10n-ka-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671150" comment="libreoffice-l10n-kab-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671151" comment="libreoffice-l10n-kk-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671152" comment="libreoffice-l10n-km-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671153" comment="libreoffice-l10n-kmr_Latn-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671154" comment="libreoffice-l10n-kn-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671155" comment="libreoffice-l10n-ko-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671156" comment="libreoffice-l10n-kok-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671157" comment="libreoffice-l10n-ks-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671158" comment="libreoffice-l10n-lb-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671159" comment="libreoffice-l10n-lo-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671160" comment="libreoffice-l10n-lt-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671161" comment="libreoffice-l10n-lv-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671162" comment="libreoffice-l10n-mai-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671163" comment="libreoffice-l10n-mk-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671164" comment="libreoffice-l10n-ml-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671165" comment="libreoffice-l10n-mn-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671166" comment="libreoffice-l10n-mni-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671167" comment="libreoffice-l10n-mr-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671168" comment="libreoffice-l10n-my-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671169" comment="libreoffice-l10n-nb-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671170" comment="libreoffice-l10n-ne-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671171" comment="libreoffice-l10n-nl-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671172" comment="libreoffice-l10n-nn-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671173" comment="libreoffice-l10n-nr-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671174" comment="libreoffice-l10n-nso-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671175" comment="libreoffice-l10n-oc-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671176" comment="libreoffice-l10n-om-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671177" comment="libreoffice-l10n-or-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671178" comment="libreoffice-l10n-pa-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671179" comment="libreoffice-l10n-pl-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671180" comment="libreoffice-l10n-pt_BR-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671181" comment="libreoffice-l10n-pt_PT-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671182" comment="libreoffice-l10n-ro-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671183" comment="libreoffice-l10n-ru-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671184" comment="libreoffice-l10n-rw-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671185" comment="libreoffice-l10n-sa_IN-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671186" comment="libreoffice-l10n-sat-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671187" comment="libreoffice-l10n-sd-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671188" comment="libreoffice-l10n-si-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671189" comment="libreoffice-l10n-sid-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671190" comment="libreoffice-l10n-sk-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671191" comment="libreoffice-l10n-sl-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671192" comment="libreoffice-l10n-sq-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671193" comment="libreoffice-l10n-sr-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671194" comment="libreoffice-l10n-ss-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671195" comment="libreoffice-l10n-st-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671196" comment="libreoffice-l10n-sv-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671197" comment="libreoffice-l10n-sw_TZ-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671198" comment="libreoffice-l10n-szl-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671199" comment="libreoffice-l10n-ta-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671200" comment="libreoffice-l10n-te-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671201" comment="libreoffice-l10n-tg-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671202" comment="libreoffice-l10n-th-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671203" comment="libreoffice-l10n-tn-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671204" comment="libreoffice-l10n-tr-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671205" comment="libreoffice-l10n-ts-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671206" comment="libreoffice-l10n-tt-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671207" comment="libreoffice-l10n-ug-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671208" comment="libreoffice-l10n-uk-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671209" comment="libreoffice-l10n-uz-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671210" comment="libreoffice-l10n-ve-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671211" comment="libreoffice-l10n-vec-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671212" comment="libreoffice-l10n-vi-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671213" comment="libreoffice-l10n-xh-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671214" comment="libreoffice-l10n-zh_CN-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671215" comment="libreoffice-l10n-zh_TW-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671216" comment="libreoffice-l10n-zu-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671312" comment="libreoffice-librelogo-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671313" comment="libreoffice-mailmerge-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671314" comment="libreoffice-math-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671315" comment="libreoffice-officebean-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671316" comment="libreoffice-pyuno-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671317" comment="libreoffice-qt5-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671318" comment="libreoffice-sdk-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671319" comment="libreoffice-sdk-doc-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671320" comment="libreoffice-writer-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671321" comment="libreoffice-writer-extensions-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671322" comment="libreofficekit-7.2.5.1-150300.14.22.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671323" comment="libreofficekit-devel-7.2.5.1-150300.14.22.18.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53168" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1180217" ref_url="https://bugzilla.suse.com/1180217" source="BUGZILLA"/>
		<reference ref_id="1196503" ref_url="https://bugzilla.suse.com/1196503" source="BUGZILLA"/>
		<reference ref_id="1196504" ref_url="https://bugzilla.suse.com/1196504" source="BUGZILLA"/>
		<reference ref_id="1196505" ref_url="https://bugzilla.suse.com/1196505" source="BUGZILLA"/>
		<reference ref_id="1196506" ref_url="https://bugzilla.suse.com/1196506" source="BUGZILLA"/>
		<reference ref_id="1196507" ref_url="https://bugzilla.suse.com/1196507" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26125" ref_url="https://www.suse.com/security/cve/CVE-2022-26125/" source="CVE"/>
		<reference ref_id="CVE-2022-26126" ref_url="https://www.suse.com/security/cve/CVE-2022-26126/" source="CVE"/>
		<reference ref_id="CVE-2022-26127" ref_url="https://www.suse.com/security/cve/CVE-2022-26127/" source="CVE"/>
		<reference ref_id="CVE-2022-26128" ref_url="https://www.suse.com/security/cve/CVE-2022-26128/" source="CVE"/>
		<reference ref_id="CVE-2022-26129" ref_url="https://www.suse.com/security/cve/CVE-2022-26129/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0901-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IMU2X5TQEN42TVGMLEB32I5WD3N5Z2FU/" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2022-26125, CVE-2022-26126: Fixed buffer overflows in unpack_tlv_router_cap() (bsc#1196505, bsc#1196506).
- CVE-2022-26127: Fixed heap buffer overflow in babel_packet_examin() (bsc#1196503).
- CVE-2022-26128: Fixed buffer overflows in babel_packet_examin() (bsc#1196507).
- CVE-2022-26129: Fixed buffer overflows in parse_hello_subtlv(), parse_ihu_subtlv() and parse_update_subtlv() (bsc#1196504).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-18"/>
	<updated date="2022-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180217">SUSE bug 1180217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196503">SUSE bug 1196503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196504">SUSE bug 1196504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196505">SUSE bug 1196505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196506">SUSE bug 1196506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196507">SUSE bug 1196507</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26125/">CVE-2022-26125</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26126/">CVE-2022-26126</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26127/">CVE-2022-26127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26128/">CVE-2022-26128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26129/">CVE-2022-26129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672870" comment="frr-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672871" comment="frr-devel-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672872" comment="libfrr0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672873" comment="libfrr_pb0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672874" comment="libfrrcares0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672875" comment="libfrrfpm_pb0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672876" comment="libfrrgrpc_pb0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672877" comment="libfrrospfapiclient0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672878" comment="libfrrsnmp0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672879" comment="libfrrzmq0-7.4-150300.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672880" comment="libmlag_pb0-7.4-150300.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53169" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Updated to version 91.7 (bsc#1196900):
  - CVE-2022-26381: Fixed an invalid memory access due to text reflow when SVG
    objects were present.
  - CVE-2022-26383: Fixed an issue where, when resizing a popup after requesting
    fullscreen access, the popup would not display the fullscreen notification.
  - CVE-2022-26384: Fixed an iframe XSS sandbox bypass when allow-popups was used
    on the iframe.
  - CVE-2022-26386: Fixed an issue where downloadable temporary files were
    accessible to other local users.
  - CVE-2022-26387: Fixed a potential add-on signature verification bypass due to
    a race condition.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="critical" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="critical" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674194" comment="MozillaThunderbird-91.7.0-150200.8.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674195" comment="MozillaThunderbird-translations-common-91.7.0-150200.8.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674196" comment="MozillaThunderbird-translations-other-91.7.0-150200.8.62.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53170" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQX4BVMFKUTV6DOPDTL26H5DQJJFUPXZ/" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Apache2 was updated to the current stable version 2.4.51 (jsc#SLE-22733 jsc#SLE-22849)

It fixes all CVEs and selected bugs represented by patches found between 2.4.23 and 2.4.51.

See https://downloads.apache.org/httpd/CHANGES_2.4 for a complete change log.

Also fixed:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua (bsc#1193942)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-17"/>
	<updated date="2022-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662900" comment="apache2-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662953" comment="apache2-devel-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662954" comment="apache2-doc-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662937" comment="apache2-event-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663140" comment="apache2-example-pages-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662901" comment="apache2-prefork-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662902" comment="apache2-utils-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662955" comment="apache2-worker-2.4.51-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53171" version="1" class="patch">
	<metadata>
		<title>Security update for lapack (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1193562" ref_url="https://bugzilla.suse.com/1193562" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4048" ref_url="https://www.suse.com/security/cve/CVE-2021-4048/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6Y4WJU3KSP5LSKZL7KZ3ZTSCG3EWFTGE/" source="SUSE-SU"/>
		<description>
This update for lapack fixes the following issues:

- CVE-2021-4048: Fixed an out of bounds read when user input was not validated properly (bsc#1193562).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193562">SUSE bug 1193562</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4048/">CVE-2021-4048</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670454" comment="blas-devel-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670573" comment="blas-devel-32bit-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670574" comment="blas-devel-static-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670575" comment="blas-man-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670455" comment="lapack-devel-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670576" comment="lapack-devel-32bit-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670577" comment="lapack-devel-static-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670578" comment="lapack-man-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670579" comment="lapacke-devel-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670580" comment="lapacke-devel-32bit-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670581" comment="lapacke-devel-static-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670456" comment="libblas3-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670582" comment="libblas3-32bit-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670457" comment="liblapack3-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670583" comment="liblapack3-32bit-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670466" comment="liblapacke3-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670584" comment="liblapacke3-32bit-3.5.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53172" version="1" class="patch">
	<metadata>
		<title>Test update for SUSE:SLE-15-SP4:Update (security) (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1194507" ref_url="https://bugzilla.suse.com/1194507" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJA3J2QL4G6LCJHC2XZT2XWXJRGJTCS7/" source="SUSE-SU"/>
		<description>
This is a security test update for SUSE:SLE-15-SP4:Update		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194507">SUSE bug 1194507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673896" comment="update-test-security-5.1-150200.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53173" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1192525" ref_url="https://bugzilla.suse.com/1192525" source="BUGZILLA"/>
		<reference ref_id="1193364" ref_url="https://bugzilla.suse.com/1193364" source="BUGZILLA"/>
		<reference ref_id="1193545" ref_url="https://bugzilla.suse.com/1193545" source="BUGZILLA"/>
		<reference ref_id="1194938" ref_url="https://bugzilla.suse.com/1194938" source="BUGZILLA"/>
		<reference ref_id="1195161" ref_url="https://bugzilla.suse.com/1195161" source="BUGZILLA"/>
		<reference ref_id="1196087" ref_url="https://bugzilla.suse.com/1196087" source="BUGZILLA"/>
		<reference ref_id="1196737" ref_url="https://bugzilla.suse.com/1196737" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3930" ref_url="https://www.suse.com/security/cve/CVE-2021-3930/" source="CVE"/>
		<reference ref_id="CVE-2022-0358" ref_url="https://www.suse.com/security/cve/CVE-2022-0358/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VFLDWSRMX7BN3NXC6GXAFPJLCC5D5KIJ/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2022-0358: Fixed a potential privilege escalation via virtiofsd (bsc#1195161).
- CVE-2021-3930: Fixed a potential denial of service in the emulated SCSI device (bsc#1192525).

Non-security fixes:

- Fixed a kernel data corruption via a long kernel boot cmdline (bsc#1196737).
- Included vmxcap in the qemu-tools package (bsc#1193364).
- Fixed package dependencies (bsc#1196087).
- Fixed an issue were PowerPC firmwares would not be built for non-PowerPC
  builds (bsc#1193545).
- Fixed multiple issues in I/O (bsc#1178049 bsc#1194938).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-22"/>
	<updated date="2022-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192525">SUSE bug 1192525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193364">SUSE bug 1193364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193545">SUSE bug 1193545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194938">SUSE bug 1194938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195161">SUSE bug 1195161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196087">SUSE bug 1196087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196737">SUSE bug 1196737</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3930/">CVE-2021-3930</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0358/">CVE-2022-0358</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673223" comment="qemu-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673224" comment="qemu-SLOF-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674135" comment="qemu-arm-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674136" comment="qemu-audio-alsa-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674137" comment="qemu-audio-pa-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674138" comment="qemu-audio-spice-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673229" comment="qemu-block-curl-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674139" comment="qemu-block-dmg-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674140" comment="qemu-block-gluster-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673230" comment="qemu-block-iscsi-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674141" comment="qemu-block-nfs-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673231" comment="qemu-block-rbd-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673232" comment="qemu-block-ssh-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673233" comment="qemu-chardev-baum-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674142" comment="qemu-chardev-spice-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674143" comment="qemu-extra-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673235" comment="qemu-guest-agent-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674144" comment="qemu-hw-display-qxl-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674145" comment="qemu-hw-display-virtio-gpu-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674146" comment="qemu-hw-display-virtio-gpu-pci-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674147" comment="qemu-hw-display-virtio-vga-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674148" comment="qemu-hw-s390x-virtio-gpu-ccw-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674149" comment="qemu-hw-usb-redirect-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674150" comment="qemu-hw-usb-smartcard-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673242" comment="qemu-ipxe-1.0.0+-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674151" comment="qemu-ivshmem-tools-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673243" comment="qemu-ksm-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673244" comment="qemu-kvm-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673245" comment="qemu-lang-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674152" comment="qemu-linux-user-5.2.0-150300.112.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674153" comment="qemu-microvm-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674154" comment="qemu-ppc-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674155" comment="qemu-s390x-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673248" comment="qemu-seabios-1.14.0_0_g155821a-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673249" comment="qemu-sgabios-8-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673250" comment="qemu-skiboot-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674156" comment="qemu-testsuite-5.2.0-150300.112.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673183" comment="qemu-tools-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673251" comment="qemu-ui-curses-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674157" comment="qemu-ui-gtk-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674158" comment="qemu-ui-opengl-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674159" comment="qemu-ui-spice-app-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674160" comment="qemu-ui-spice-core-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673256" comment="qemu-vgabios-1.14.0_0_g155821a-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674161" comment="qemu-vhost-user-gpu-5.2.0-150300.112.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674162" comment="qemu-x86-5.2.0-150300.112.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53174" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1194267" ref_url="https://bugzilla.suse.com/1194267" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Update Xen to version 4.14.4 (bsc#1027519)

Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

Security issues fixed:

- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: BHB speculation issues (bsc#1196915).

Non-security issues fixed:

- Fixed issue around xl and virsh operation - virsh list not giving any output (bsc#1191668).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-23"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194267">SUSE bug 1194267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674163" comment="xen-4.14.4_02-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674164" comment="xen-devel-4.14.4_02-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674165" comment="xen-doc-html-4.14.4_02-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674166" comment="xen-libs-4.14.4_02-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674167" comment="xen-libs-32bit-4.14.4_02-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674168" comment="xen-tools-4.14.4_02-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674169" comment="xen-tools-domU-4.14.4_02-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673261" comment="xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53175" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WIJEKYM4YUBF5BNOIOCERQP3O7PRCGXB/" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673175" comment="libpython3_6m1_0-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674127" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673176" comment="python3-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673177" comment="python3-base-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673178" comment="python3-curses-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673179" comment="python3-dbm-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673180" comment="python3-devel-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674128" comment="python3-doc-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674129" comment="python3-doc-devhelp-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673181" comment="python3-idle-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674130" comment="python3-testsuite-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673182" comment="python3-tk-3.6.15-150300.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673217" comment="python3-tools-3.6.15-150300.10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53176" version="1" class="patch">
	<metadata>
		<title>Security update for slirp4netns (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBLIOF4HVH74MTJYI7P5QNH2RNAYWU5E/" source="SUSE-SU"/>
		<description>
This update for slirp4netns fixes the following issues:

- CVE-2020-29130: Fixed an invalid memory access while processing ARP packets (bsc#1179467).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672521" comment="slirp4netns-0.4.7-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53177" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1022528" ref_url="https://bugzilla.suse.com/1022528" source="BUGZILLA"/>
		<reference ref_id="1188572" ref_url="https://bugzilla.suse.com/1188572" source="BUGZILLA"/>
		<reference ref_id="1189528" ref_url="https://bugzilla.suse.com/1189528" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5601" ref_url="https://www.suse.com/security/cve/CVE-2017-5601/" source="CVE"/>
		<reference ref_id="CVE-2021-36976" ref_url="https://www.suse.com/security/cve/CVE-2021-36976/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0944-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GOSOUIKGPKMNRIKY4M2SLF54G6W2YC4/" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2021-36976: Fixed an invalid memory access that could cause data
  corruption (bsc#1188572).

Non-security updates:

- Updated references for CVE-2017-5601, which was already fixed in a previous
  version (bsc#1022528 bsc#1189528).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022528">SUSE bug 1022528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188572">SUSE bug 1188572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189528">SUSE bug 1189528</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5601/">CVE-2017-5601</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36976/">CVE-2021-36976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673536" comment="bsdtar-3.4.2-150200.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673531" comment="libarchive-devel-3.4.2-150200.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673532" comment="libarchive13-3.4.2-150200.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674171" comment="libarchive13-32bit-3.4.2-150200.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53178" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMT7WJZ5DRHFL7RDXL4VX4ECRDHO6Z74/" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673901" comment="bind-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673902" comment="bind-chrootenv-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673885" comment="bind-devel-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673903" comment="bind-doc-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673886" comment="bind-utils-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673887" comment="libbind9-1600-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673888" comment="libdns1605-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673889" comment="libirs-devel-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673890" comment="libirs1601-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673891" comment="libisc1606-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673892" comment="libisccc1600-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673893" comment="libisccfg1600-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673894" comment="libns1604-9.16.6-150300.22.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673895" comment="python3-bind-9.16.6-150300.22.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53179" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H45VCAWRRO6SPMMAFDPU45PJLVOMA44Y/" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674182" comment="bind-devel-32bit-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674183" comment="libbind9-1600-32bit-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674184" comment="libdns1605-32bit-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674185" comment="libirs1601-32bit-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674186" comment="libisc1606-32bit-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674187" comment="libisccc1600-32bit-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674188" comment="libisccfg1600-32bit-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674189" comment="libns1604-32bit-9.16.6-150000.12.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53180" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-SQLite (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195771" ref_url="https://bugzilla.suse.com/1195771" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2022:0953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VRQ7IRKZITJLT44RH5PJICZIIRQJLXEE/" source="SUSE-SU"/>
		<description>
This update for perl-DBD-SQLite fixes the following issues:

- updated to 1.66
- Use external sqlite3 library rather than internal code. (bsc#1195771)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-28"/>
	<updated date="2022-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195771">SUSE bug 1195771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672864" comment="perl-DBD-SQLite-1.66-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53181" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1197020" ref_url="https://bugzilla.suse.com/1197020" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44269" ref_url="https://www.suse.com/security/cve/CVE-2021-44269/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:0954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MA3ZHJ2SJ5F7RD4MVUADLVJ2VXDS4AOS/" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2021-44269: Fixed out of bounds read in processing .wav files (bsc#1197020).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-28"/>
	<updated date="2022-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197020">SUSE bug 1197020</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44269/">CVE-2021-44269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673186" comment="libwavpack1-5.4.0-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674170" comment="libwavpack1-32bit-5.4.0-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673215" comment="wavpack-5.4.0-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673216" comment="wavpack-devel-5.4.0-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53182" version="1" class="patch">
	<metadata>
		<title>Security update for rmt-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1204285" ref_url="https://bugzilla.suse.com/1204285" source="BUGZILLA"/>
		<reference ref_id="1204769" ref_url="https://bugzilla.suse.com/1204769" source="BUGZILLA"/>
		<reference ref_id="1205089" ref_url="https://bugzilla.suse.com/1205089" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31254" ref_url="https://www.suse.com/security/cve/CVE-2022-31254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013421.html" source="SUSE-SU"/>
		<description>
This update for rmt-server fixes the following issues:

Update to version 2.10:

- Add option to turn off system token support (bsc#1205089)
- Update the `last_seen_at` column on zypper service refresh
- Do not retry to import non-existing files in air-gapped mode (bsc#1204769)
- CVE-2022-31254: Fixed a local privilege escalation related to the packaging of rmt-server (bsc#1204285).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2023-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204285">SUSE bug 1204285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204769">SUSE bug 1204769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205089">SUSE bug 1205089</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31254/">CVE-2022-31254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730916" comment="rmt-server-2.10-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730917" comment="rmt-server-config-2.10-150300.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730907" comment="rmt-server-pubcloud-2.10-150300.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53183" version="1" class="patch">
	<metadata>
		<title>Security update for tcl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1195773" ref_url="https://bugzilla.suse.com/1195773" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013426.html" source="SUSE-SU"/>
		<description>
This update for tcl fixes the following issues:

- Fixed a race condition in test socket-13.1.
- Removed the SQLite extension and use the packaged sqlite3 instead (bsc#1195773).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-05"/>
	<updated date="2023-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195773">SUSE bug 1195773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009722775" comment="tcl-8.6.12-150300.14.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722776" comment="tcl-32bit-8.6.12-150300.14.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722777" comment="tcl-devel-8.6.12-150300.14.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53184" version="1" class="patch">
	<metadata>
		<title>Security update for saphanabootstrap-formula (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.3</platform>
		</affected>
		<reference ref_id="1185643" ref_url="https://bugzilla.suse.com/1185643" source="BUGZILLA"/>
		<reference ref_id="1205990" ref_url="https://bugzilla.suse.com/1205990" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45153" ref_url="https://www.suse.com/security/cve/CVE-2022-45153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013410.html" source="SUSE-SU"/>
		<description>
This update for saphanabootstrap-formula fixes the following issues:

- Version bump 0.13.1
  * revert changes to spec file to re-enable SLES RPM builds
  * CVE-2022-45153: Fixed privilege escalation for arbitrary users in hana/ha_cluster.sls (bsc#1205990)

- Version bump 0.13.0
  * pass sid to sudoers in a SLES12 compatible way
  * add location constraint to gcp_stonith

- Version bump 0.12.1
  * moved templates dir into hana dir in repository to be gitfs compatible

- Version bump 0.12.0
  * add SAPHanaSR takeover blocker

- Version bump 0.11.0
  * use check_cmd instead of tmp sudoers file
  * make sudoers rules more secure
  * migrate sudoers to template file

- Version bump 0.10.1
  * fix hook removal conditions
  * fix majority_maker code on case grain is empty

- Version bump 0.10.0
  * allow to disable shared HANA basepath and rework add_hosts code
    (enables HANA scale-out on AWS)
  * do not edit global.ini directly (if not needed)

- Version bump 0.9.1
  * fix majority_maker code on case grain is empty

- Version bump 0.9.0
  * define vip_mechanism for every provider and reorder resources
    (same schema for all SAP related formulas)

- Version bump 0.8.1
  * use multi-target Hook on HANA scale-out

- Version bump 0.8.0
  * add HANA scale-out support
  * add idempotence to not affect a running HANA and cluster

- Version bump 0.7.2
  * add native fencing for microsoft-azure

- fixes a not working import of dbapi in SUSE/ha-sap-terraform-deployments#703
- removes the installation and extraction of all hdbcli files in the /hana/shared/srHook directory
- fixes execution order of srTakeover/srCostOptMemConfig hook
- renames and updates hook srTakeover to srCostOptMemConfig

- Changing exporter stickiness to =&gt; 0 and adjusting the colocation 
  score from +inf to -inf and changing the colocation from Master to Slave. 
  This change fix the impact of a failed exporter in regards to the HANA DB.

- Document extra_parameters in pillar.example (bsc#1185643)

- Change hanadb_exporter default timeout value to 30 seconds

- Set correct stickiness for the azure-lb resource
  The azure-lb resource receives an stickiness=0 to not influence on
  transitions calculations as the HANA resources have more priority
		</description>
<advisory from="security@suse.de">
	<issued date="2023-01-02"/>
	<updated date="2023-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185643">SUSE bug 1185643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205990">SUSE bug 1205990</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45153/">CVE-2022-45153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009616492" comment="openSUSE Leap 15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730838" comment="saphanabootstrap-formula-0.13.1+git.1667812208.4db963e-150200.3.15.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629076" version="1" comment="ImageMagick is &lt;7.0.7.34-10.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629077" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629080" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629082" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629083" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616492" version="1" comment="openSUSE-release is ==15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009074736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628228" version="1" comment="Mesa is &lt;20.2.4-57.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628232" version="1" comment="Mesa-dri is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684212" version="1" comment="Mesa-dri-nouveau is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628235" version="1" comment="Mesa-gallium is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628238" version="1" comment="Mesa-libEGL1 is &lt;20.2.4-57.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628241" version="1" comment="Mesa-libGL1 is &lt;20.2.4-57.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628250" version="1" comment="Mesa-libglapi0 is &lt;20.2.4-57.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628252" version="1" comment="Mesa-libva is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628258" version="1" comment="libgbm1 is &lt;20.2.4-57.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684214" version="1" comment="libvdpau_nouveau is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628260" version="1" comment="libvdpau_r300 is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628261" version="1" comment="libvdpau_r600 is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628262" version="1" comment="libvdpau_radeonsi is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628263" version="1" comment="libvulkan_intel is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628264" version="1" comment="libvulkan_radeon is &lt;20.2.4-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628266" version="1" comment="libxatracker2 is &lt;1.0.0-57.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629084" version="1" comment="MozillaFirefox is &lt;78.10.0-8.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629086" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-8.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629087" version="1" comment="MozillaFirefox-translations-other is &lt;78.10.0-8.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694708" version="1" comment="MozillaThunderbird is &lt;78.10.0-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694709" version="1" comment="MozillaThunderbird-translations-common is &lt;78.10.0-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694710" version="1" comment="MozillaThunderbird-translations-other is &lt;78.10.0-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629088" version="1" comment="NetworkManager is &lt;1.22.10-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684219" version="1" comment="NetworkManager-lang is &lt;1.22.10-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628810" version="1" comment="libnm0 is &lt;1.22.10-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628811" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.22.10-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489177" version="1" comment="NetworkManager-applet is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489178" version="1" comment="NetworkManager-applet-lang is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489179" version="1" comment="NetworkManager-connection-editor is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487559" version="1" comment="libnma0 is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487560" version="1" comment="nma-data is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487561" version="1" comment="typelib-1_0-NMA-1_0 is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694711" version="1" comment="NetworkManager-vpnc is &lt;1.2.6-lp153.1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694712" version="1" comment="NetworkManager-vpnc-gnome is &lt;1.2.6-lp153.1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694713" version="1" comment="NetworkManager-vpnc-lang is &lt;1.2.6-lp153.1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629089" version="1" comment="PackageKit is &lt;1.1.13-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629090" version="1" comment="PackageKit-backend-zypp is &lt;1.1.13-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684220" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.13-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684221" version="1" comment="PackageKit-gtk3-module is &lt;1.1.13-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629092" version="1" comment="PackageKit-lang is &lt;1.1.13-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629093" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.13-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629095" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.13-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487192" version="1" comment="accountsservice is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487194" version="1" comment="accountsservice-lang is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487195" version="1" comment="libaccountsservice0 is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487196" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628269" version="1" comment="apache2 is &lt;2.4.43-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629758" version="1" comment="apache2-doc is &lt;2.4.43-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694714" version="1" comment="apache2-example-pages is &lt;2.4.43-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628270" version="1" comment="apache2-prefork is &lt;2.4.43-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628271" version="1" comment="apache2-utils is &lt;2.4.43-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630004" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630005" version="1" comment="php7 is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630009" version="1" comment="php7-ctype is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630013" version="1" comment="php7-dom is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630023" version="1" comment="php7-iconv is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630025" version="1" comment="php7-json is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630028" version="1" comment="php7-mysql is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630033" version="1" comment="php7-pdo is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630034" version="1" comment="php7-pgsql is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630043" version="1" comment="php7-sqlite is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630048" version="1" comment="php7-tokenizer is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630049" version="1" comment="php7-xmlreader is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630051" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628272" version="1" comment="apparmor-abstractions is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628273" version="1" comment="apparmor-docs is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628274" version="1" comment="apparmor-parser is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628275" version="1" comment="apparmor-parser-lang is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628276" version="1" comment="apparmor-profiles is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628277" version="1" comment="apparmor-utils is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628278" version="1" comment="apparmor-utils-lang is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628281" version="1" comment="perl-apparmor is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628282" version="1" comment="python3-apparmor is &lt;2.13.6-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488880" version="1" comment="argyllcms is &lt;1.9.2-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694715" version="1" comment="ark is &lt;20.04.2-bp153.2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694716" version="1" comment="ark-lang is &lt;20.04.2-bp153.2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694717" version="1" comment="libkerfuffle20 is &lt;20.04.2-bp153.2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480071" version="1" comment="augeas is &lt;1.10.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480073" version="1" comment="augeas-lenses is &lt;1.10.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480074" version="1" comment="libaugeas0 is &lt;1.10.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694718" version="1" comment="autofs is &lt;5.1.3-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628289" version="1" comment="autoyast2 is &lt;4.3.77-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628290" version="1" comment="autoyast2-installation is &lt;4.3.77-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694719" version="1" comment="avahi is &lt;0.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694720" version="1" comment="avahi-lang is &lt;0.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694721" version="1" comment="libavahi-client3 is &lt;0.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694722" version="1" comment="libavahi-client3-32bit is &lt;0.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694723" version="1" comment="libavahi-common3 is &lt;0.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694724" version="1" comment="libavahi-common3-32bit is &lt;0.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694725" version="1" comment="libavahi-core7 is &lt;0.7-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628304" version="1" comment="bash is &lt;4.4-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628306" version="1" comment="bash-doc is &lt;4.4-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628307" version="1" comment="bash-lang is &lt;4.4-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628308" version="1" comment="libreadline7 is &lt;7.0-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628311" version="1" comment="readline-doc is &lt;7.0-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629761" version="1" comment="bind is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629762" version="1" comment="bind-chrootenv is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628313" version="1" comment="bind-utils is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628314" version="1" comment="libbind9-1600 is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628315" version="1" comment="libdns1605 is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628317" version="1" comment="libirs1601 is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628318" version="1" comment="libisc1606 is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628319" version="1" comment="libisccc1600 is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628320" version="1" comment="libisccfg1600 is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628321" version="1" comment="libns1604 is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628322" version="1" comment="python3-bind is &lt;9.16.6-20.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628323" version="1" comment="binutils is &lt;2.35.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628325" version="1" comment="libctf-nobfd0 is &lt;2.35.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628326" version="1" comment="libctf0 is &lt;2.35.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487734" version="1" comment="blktrace is &lt;1.1.0+git.20170126-3.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628327" version="1" comment="bluez is &lt;5.55-1.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628328" version="1" comment="libbluetooth3 is &lt;5.55-1.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481038" version="1" comment="btrfsmaintenance is &lt;0.4.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481773" version="1" comment="bubblewrap is &lt;0.4.1-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694726" version="1" comment="bzip2 is &lt;1.0.6-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694727" version="1" comment="libbz2-1 is &lt;1.0.6-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694728" version="1" comment="libbz2-1-32bit is &lt;1.0.6-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694729" version="1" comment="chromium is &lt;90.0.4430.212-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694730" version="1" comment="chrony is &lt;3.2-9.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694731" version="1" comment="chrony-pool-openSUSE is &lt;3.2-9.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628352" version="1" comment="cifs-utils is &lt;6.9-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488885" version="1" comment="colord-gtk-lang is &lt;0.1.26-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482646" version="1" comment="libcolord-gtk1 is &lt;0.1.26-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628358" version="1" comment="coreutils is &lt;8.32-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694732" version="1" comment="coreutils-doc is &lt;8.32-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628359" version="1" comment="coreutils-lang is &lt;8.32-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481843" version="1" comment="cpio is &lt;2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481844" version="1" comment="cpio-lang is &lt;2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481845" version="1" comment="cpio-mt is &lt;2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628360" version="1" comment="cpp7 is &lt;7.5.0+r278197-4.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628366" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-4.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628370" version="1" comment="cracklib is &lt;2.9.7-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628373" version="1" comment="libcrack2 is &lt;2.9.7-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628374" version="1" comment="libcrack2-32bit is &lt;2.9.7-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481890" version="1" comment="cron is &lt;4.2-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481891" version="1" comment="cronie is &lt;1.5.1-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628375" version="1" comment="cryptsetup is &lt;2.3.4-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628376" version="1" comment="cryptsetup-lang is &lt;2.3.4-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628378" version="1" comment="libcryptsetup12 is &lt;2.3.4-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628382" version="1" comment="cups is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628383" version="1" comment="cups-client is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628384" version="1" comment="cups-config is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628386" version="1" comment="libcups2 is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628387" version="1" comment="libcups2-32bit is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628388" version="1" comment="libcupscgi1 is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628389" version="1" comment="libcupsimage2 is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628390" version="1" comment="libcupsmime1 is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628391" version="1" comment="libcupsppdc1 is &lt;2.2.7-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685444" version="1" comment="cups-filters is &lt;1.25.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482654" version="1" comment="cups-pk-helper is &lt;0.2.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482655" version="1" comment="cups-pk-helper-lang is &lt;0.2.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628392" version="1" comment="curl is &lt;7.66.0-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628394" version="1" comment="libcurl4 is &lt;7.66.0-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628395" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628396" version="1" comment="cyrus-sasl is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628397" version="1" comment="cyrus-sasl-32bit is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628398" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628399" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628401" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628402" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628403" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628404" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628406" version="1" comment="cyrus-sasl-plain is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628407" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628408" version="1" comment="libsasl2-3 is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628409" version="1" comment="libsasl2-3-32bit is &lt;2.1.27-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481908" version="1" comment="dbus-1 is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481910" version="1" comment="dbus-1-x11 is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481911" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481912" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480190" version="1" comment="dbus-1-glib is &lt;0.108-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480191" version="1" comment="dbus-1-glib-32bit is &lt;0.108-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480193" version="1" comment="dbus-1-glib-tool is &lt;0.108-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628411" version="1" comment="dhcp is &lt;4.3.5-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628412" version="1" comment="dhcp-client is &lt;4.3.5-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628414" version="1" comment="dirmngr is &lt;2.2.27-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628415" version="1" comment="gpg2 is &lt;2.2.27-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628416" version="1" comment="gpg2-lang is &lt;2.2.27-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694733" version="1" comment="dnsmasq is &lt;2.78-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694734" version="1" comment="dracut is &lt;049.1+suse.188.gbf445638-3.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628421" version="1" comment="e2fsprogs is &lt;1.43.8-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628425" version="1" comment="libcom_err2 is &lt;1.43.8-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628426" version="1" comment="libcom_err2-32bit is &lt;1.43.8-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628429" version="1" comment="libext2fs2 is &lt;1.43.8-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481929" version="1" comment="elfutils is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481930" version="1" comment="elfutils-lang is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481932" version="1" comment="libasm1 is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481934" version="1" comment="libdw1 is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481935" version="1" comment="libdw1-32bit is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481937" version="1" comment="libebl-plugins is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481938" version="1" comment="libebl-plugins-32bit is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481940" version="1" comment="libelf1 is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481941" version="1" comment="libelf1-32bit is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628430" version="1" comment="emacs is &lt;25.3-3.6.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628432" version="1" comment="emacs-info is &lt;25.3-3.6.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628433" version="1" comment="emacs-nox is &lt;25.3-3.6.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628434" version="1" comment="etags is &lt;25.3-3.6.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487201" version="1" comment="eog is &lt;3.34.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487203" version="1" comment="eog-lang is &lt;3.34.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487204" version="1" comment="evince is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487206" version="1" comment="evince-lang is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487209" version="1" comment="evince-plugin-pdfdocument is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487213" version="1" comment="libevdocument3-4 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487214" version="1" comment="libevview3-3 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487215" version="1" comment="nautilus-evince is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487216" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487217" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489187" version="1" comment="evolution is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489189" version="1" comment="evolution-lang is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630123" version="1" comment="evolution-data-server is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630125" version="1" comment="evolution-data-server-lang is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630126" version="1" comment="libcamel-1_2-62 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630127" version="1" comment="libebackend-1_2-10 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630128" version="1" comment="libebook-1_2-20 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630129" version="1" comment="libebook-contacts-1_2-3 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630130" version="1" comment="libecal-2_0-1 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630131" version="1" comment="libedata-book-1_2-26 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630132" version="1" comment="libedata-cal-2_0-1 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630133" version="1" comment="libedataserver-1_2-24 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630134" version="1" comment="libedataserverui-1_2-2 is &lt;3.34.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481942" version="1" comment="expat is &lt;2.2.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481944" version="1" comment="libexpat1 is &lt;2.2.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481945" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628435" version="1" comment="file is &lt;5.32-7.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628437" version="1" comment="file-magic is &lt;5.32-7.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628438" version="1" comment="libmagic1 is &lt;5.32-7.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628439" version="1" comment="libmagic1-32bit is &lt;5.32-7.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487218" version="1" comment="file-roller is &lt;3.32.5-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487219" version="1" comment="file-roller-lang is &lt;3.32.5-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628440" version="1" comment="firewall-macros is &lt;0.9.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628441" version="1" comment="firewalld is &lt;0.9.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628442" version="1" comment="firewalld-lang is &lt;0.9.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628443" version="1" comment="python3-firewall is &lt;0.9.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629101" version="1" comment="flatpak is &lt;1.10.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629104" version="1" comment="libflatpak0 is &lt;1.10.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629105" version="1" comment="system-user-flatpak is &lt;1.10.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694735" version="1" comment="freerdp is &lt;2.1.2-bp153.1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694736" version="1" comment="libfreerdp2 is &lt;2.1.2-bp153.1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694737" version="1" comment="libwinpr2 is &lt;2.1.2-bp153.1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481128" version="1" comment="fuse is &lt;2.9.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481131" version="1" comment="libfuse2 is &lt;2.9.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629109" version="1" comment="fwupd is &lt;1.5.8-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629111" version="1" comment="fwupd-lang is &lt;1.5.8-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629114" version="1" comment="libfwupd2 is &lt;1.5.8-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629115" version="1" comment="libfwupdplugin1 is &lt;1.5.8-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629117" version="1" comment="libjcat1 is &lt;0.1.3-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629118" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.5.8-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482681" version="1" comment="gcab is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482683" version="1" comment="gcab-lang is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482684" version="1" comment="libgcab-1_0-0 is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629348" version="1" comment="gdb is &lt;10.1-8.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628451" version="1" comment="gdk-pixbuf-lang is &lt;2.40.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628452" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628453" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.40.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628454" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628455" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628457" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.46.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628458" version="1" comment="librsvg-2-2 is &lt;2.46.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694738" version="1" comment="librsvg-lang is &lt;2.46.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694739" version="1" comment="rsvg-thumbnailer is &lt;2.46.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629215" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.46.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694740" version="1" comment="gdm is &lt;3.34.1-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694741" version="1" comment="gdm-lang is &lt;3.34.1-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694742" version="1" comment="gdmflexiserver is &lt;3.34.1-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694743" version="1" comment="libgdm1 is &lt;3.34.1-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694744" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.34.1-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489199" version="1" comment="gegl-0_4 is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489200" version="1" comment="gegl-0_4-lang is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489202" version="1" comment="libgegl-0_4-0 is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628459" version="1" comment="ghostscript is &lt;9.52-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628461" version="1" comment="ghostscript-x11 is &lt;9.52-3.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630151" version="1" comment="gimp is &lt;2.10.12-7.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630153" version="1" comment="gimp-lang is &lt;2.10.12-7.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630154" version="1" comment="gimp-plugin-aa is &lt;2.10.12-7.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684230" version="1" comment="gimp-plugins-python is &lt;2.10.12-3.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630155" version="1" comment="libgimp-2_0-0 is &lt;2.10.12-7.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630156" version="1" comment="libgimpui-2_0-0 is &lt;2.10.12-7.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628466" version="1" comment="glib2-lang is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628467" version="1" comment="glib2-tools is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628468" version="1" comment="libgio-2_0-0 is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628469" version="1" comment="libgio-2_0-0-32bit is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628470" version="1" comment="libglib-2_0-0 is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628471" version="1" comment="libglib-2_0-0-32bit is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628472" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628473" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628474" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628475" version="1" comment="libgobject-2_0-0-32bit is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628476" version="1" comment="libgthread-2_0-0 is &lt;2.62.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628477" version="1" comment="glibc is &lt;2.31-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628478" version="1" comment="glibc-32bit is &lt;2.31-7.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628480" version="1" comment="glibc-extra is &lt;2.31-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628483" version="1" comment="glibc-lang is &lt;2.31-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628484" version="1" comment="glibc-locale is &lt;2.31-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628485" version="1" comment="glibc-locale-base is &lt;2.31-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628486" version="1" comment="glibc-locale-base-32bit is &lt;2.31-7.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628488" version="1" comment="nscd is &lt;2.31-7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481163" version="1" comment="glibc-locale-32bit is &lt;2.26-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629134" version="1" comment="gnome-desktop-lang is &lt;3.34.7-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629135" version="1" comment="gnome-version is &lt;3.34.7-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629136" version="1" comment="libgnome-desktop-3-18 is &lt;3.34.7-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629138" version="1" comment="libgnome-desktop-3_0-common is &lt;3.34.7-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629139" version="1" comment="typelib-1_0-GnomeDesktop-3_0 is &lt;3.34.7-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489210" version="1" comment="gnome-photos is &lt;3.34.1-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489211" version="1" comment="gnome-photos-lang is &lt;3.34.1-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489212" version="1" comment="gnome-shell-search-provider-gnome-photos is &lt;3.34.1-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487294" version="1" comment="gtk2-data is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694745" version="1" comment="gtk2-immodule-amharic is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694746" version="1" comment="gtk2-immodule-inuktitut is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694747" version="1" comment="gtk2-immodule-thai is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694748" version="1" comment="gtk2-immodule-tigrigna is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694749" version="1" comment="gtk2-immodule-vietnamese is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694750" version="1" comment="gtk2-immodule-xim is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482037" version="1" comment="gtk2-lang is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482038" version="1" comment="gtk2-tools is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482039" version="1" comment="libgtk-2_0-0 is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629140" version="1" comment="gnome-settings-daemon is &lt;3.34.2+0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629142" version="1" comment="gnome-settings-daemon-lang is &lt;3.34.2+0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629143" version="1" comment="gnome-shell is &lt;3.34.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684231" version="1" comment="gnome-shell-calendar is &lt;3.34.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629145" version="1" comment="gnome-shell-lang is &lt;3.34.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629146" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.34.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629147" version="1" comment="libnautilus-extension1 is &lt;3.34.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629148" version="1" comment="nautilus is &lt;3.34.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629150" version="1" comment="nautilus-lang is &lt;3.34.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694751" version="1" comment="gnuchess is &lt;6.2.6-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628489" version="1" comment="gnutls is &lt;3.6.7-14.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628491" version="1" comment="libgnutls30 is &lt;3.6.7-14.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628492" version="1" comment="libgnutls30-32bit is &lt;3.6.7-14.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628497" version="1" comment="graphviz is &lt;2.40.1-6.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694752" version="1" comment="graphviz-gd is &lt;2.40.1-6.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630157" version="1" comment="graphviz-gnome is &lt;2.40.1-6.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628499" version="1" comment="graphviz-plugins-core is &lt;2.40.1-6.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628500" version="1" comment="libgraphviz6 is &lt;2.40.1-6.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482006" version="1" comment="grep is &lt;3.1-4.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482007" version="1" comment="grep-lang is &lt;3.1-4.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628501" version="1" comment="groff is &lt;1.22.3-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628502" version="1" comment="groff-full is &lt;1.22.3-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628503" version="1" comment="gxditview is &lt;1.22.3-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628504" version="1" comment="grub2 is &lt;2.04-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628505" version="1" comment="grub2-arm64-efi is &lt;2.04-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628506" version="1" comment="grub2-i386-pc is &lt;2.04-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628507" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628509" version="1" comment="grub2-snapper-plugin is &lt;2.04-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628510" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628511" version="1" comment="grub2-x86_64-efi is &lt;2.04-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482016" version="1" comment="gstreamer is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482017" version="1" comment="gstreamer-lang is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487262" version="1" comment="gstreamer-utils is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482018" version="1" comment="libgstreamer-1_0-0 is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482019" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694753" version="1" comment="gstreamer-plugins-bad is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694754" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694755" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694756" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694757" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694758" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694759" version="1" comment="libgstisoff-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694760" version="1" comment="libgstmpegts-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694761" version="1" comment="libgstphotography-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694762" version="1" comment="libgstsctp-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694763" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694764" version="1" comment="libgstwayland-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694765" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.16.2-lp153.2.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482020" version="1" comment="gstreamer-plugins-base is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482021" version="1" comment="gstreamer-plugins-base-lang is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482022" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482023" version="1" comment="libgstapp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482024" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482025" version="1" comment="libgstfft-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482026" version="1" comment="libgstgl-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482027" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482028" version="1" comment="libgstriff-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482029" version="1" comment="libgstrtp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482030" version="1" comment="libgstrtsp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482031" version="1" comment="libgstsdp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482032" version="1" comment="libgsttag-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482033" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487286" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487288" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487292" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487293" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482034" version="1" comment="gstreamer-plugins-good is &lt;1.16.2-1.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694766" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.16.2-1.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482035" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.2-1.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489214" version="1" comment="gstreamer-plugins-ugly is &lt;1.16.2-1.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489215" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.16.2-1.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694767" version="1" comment="gtk-vnc-lang is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482239" version="1" comment="libgtk-vnc-2_0-0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482240" version="1" comment="libgvnc-1_0-0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488509" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488511" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487297" version="1" comment="gvfs is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487298" version="1" comment="gvfs-backend-afc is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487299" version="1" comment="gvfs-backend-samba is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487300" version="1" comment="gvfs-backends is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487302" version="1" comment="gvfs-fuse is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487303" version="1" comment="gvfs-lang is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628514" version="1" comment="hplip-hpijs is &lt;3.20.11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628515" version="1" comment="hplip-sane is &lt;3.20.11-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629174" version="1" comment="ibus is &lt;1.5.23-1.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629176" version="1" comment="ibus-dict-emoji is &lt;1.5.23-1.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629177" version="1" comment="ibus-gtk is &lt;1.5.23-1.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629178" version="1" comment="ibus-gtk3 is &lt;1.5.23-1.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629179" version="1" comment="ibus-lang is &lt;1.5.23-1.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629180" version="1" comment="libibus-1_0-5 is &lt;1.5.23-1.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629181" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.23-1.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487314" version="1" comment="ibus-chewing is &lt;1.6.1-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486644" version="1" comment="ibus-pinyin is &lt;1.5.0-4.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628520" version="1" comment="iscsiuio is &lt;0.7.8.6-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628521" version="1" comment="libopeniscsiusr0_2_0 is &lt;2.1.4-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628522" version="1" comment="open-iscsi is &lt;2.1.4-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694768" version="1" comment="java-11-openjdk is &lt;11.0.11.0-3.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694769" version="1" comment="java-11-openjdk-headless is &lt;11.0.11.0-3.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482049" version="1" comment="jq is &lt;1.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482051" version="1" comment="libjq1 is &lt;1.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694770" version="1" comment="kconf_update5 is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694771" version="1" comment="libKF5ConfigCore5 is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694772" version="1" comment="libKF5ConfigCore5-lang is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694773" version="1" comment="libKF5ConfigGui5 is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694774" version="1" comment="kcoreaddons is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694775" version="1" comment="kcoreaddons-lang is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694776" version="1" comment="libKF5CoreAddons5 is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628528" version="1" comment="kdump is &lt;0.9.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628529" version="1" comment="kernel-64kb is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694777" version="1" comment="kernel-64kb-extra is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694778" version="1" comment="kernel-64kb-optional is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684232" version="1" comment="kernel-default-extra is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694779" version="1" comment="kernel-default-optional is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694780" version="1" comment="kernel-kvmsmall is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628535" version="1" comment="kernel-preempt is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684233" version="1" comment="kernel-preempt-extra is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694781" version="1" comment="kernel-preempt-optional is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694782" version="1" comment="kernel-firmware-all is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694783" version="1" comment="kernel-firmware-amdgpu is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694784" version="1" comment="kernel-firmware-ath10k is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694785" version="1" comment="kernel-firmware-ath11k is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694786" version="1" comment="kernel-firmware-atheros is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694787" version="1" comment="kernel-firmware-bluetooth is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694788" version="1" comment="kernel-firmware-bnx2 is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628538" version="1" comment="kernel-firmware-brcm is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694789" version="1" comment="kernel-firmware-chelsio is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694790" version="1" comment="kernel-firmware-dpaa2 is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694791" version="1" comment="kernel-firmware-i915 is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694792" version="1" comment="kernel-firmware-intel is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694793" version="1" comment="kernel-firmware-iwlwifi is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694794" version="1" comment="kernel-firmware-liquidio is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694795" version="1" comment="kernel-firmware-marvell is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694796" version="1" comment="kernel-firmware-media is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694797" version="1" comment="kernel-firmware-mediatek is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694798" version="1" comment="kernel-firmware-mellanox is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694799" version="1" comment="kernel-firmware-mwifiex is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694800" version="1" comment="kernel-firmware-network is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694801" version="1" comment="kernel-firmware-nfp is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694802" version="1" comment="kernel-firmware-nvidia is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694803" version="1" comment="kernel-firmware-platform is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694804" version="1" comment="kernel-firmware-prestera is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694805" version="1" comment="kernel-firmware-qlogic is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694806" version="1" comment="kernel-firmware-radeon is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694807" version="1" comment="kernel-firmware-realtek is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694808" version="1" comment="kernel-firmware-serial is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694809" version="1" comment="kernel-firmware-sound is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694810" version="1" comment="kernel-firmware-ti is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694811" version="1" comment="kernel-firmware-ueagle is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694812" version="1" comment="kernel-firmware-usb-network is &lt;20210208-2.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628539" version="1" comment="ucode-amd is &lt;20210208-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694813" version="1" comment="kinit is &lt;5.76.0-bp153.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694814" version="1" comment="kinit-lang is &lt;5.76.0-bp153.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694815" version="1" comment="kio-extras5 is &lt;20.04.2-bp153.2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694816" version="1" comment="kio-extras5-lang is &lt;20.04.2-bp153.2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694817" version="1" comment="libkioarchive5 is &lt;20.04.2-bp153.2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694818" version="1" comment="konversation is &lt;1.7.5-bp153.1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694819" version="1" comment="konversation-lang is &lt;1.7.5-bp153.1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694820" version="1" comment="krb5 is &lt;1.16.3-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694821" version="1" comment="krb5-32bit is &lt;1.16.3-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694822" version="1" comment="kscreenlocker is &lt;5.18.5-bp153.1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694823" version="1" comment="kscreenlocker-lang is &lt;5.18.5-bp153.1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694824" version="1" comment="libKScreenLocker5 is &lt;5.18.5-bp153.1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694825" version="1" comment="ktexteditor is &lt;5.76.0-bp153.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694826" version="1" comment="ktexteditor-lang is &lt;5.76.0-bp153.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480353" version="1" comment="less is &lt;530-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694827" version="1" comment="libBasicUsageEnvironment1 is &lt;2019.06.28-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694828" version="1" comment="libUsageEnvironment3 is &lt;2019.06.28-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694829" version="1" comment="libgroupsock8 is &lt;2019.06.28-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694830" version="1" comment="libliveMedia66 is &lt;2019.06.28-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628446" version="1" comment="libFLAC8 is &lt;1.3.2-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630148" version="1" comment="libFLAC8-32bit is &lt;1.3.2-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480358" version="1" comment="libHX28 is &lt;3.22-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480361" version="1" comment="libICE6 is &lt;1.0.9-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694831" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694832" version="1" comment="libKF5Auth5 is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694833" version="1" comment="libKF5Auth5-lang is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694834" version="1" comment="libKF5AuthCore5 is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694835" version="1" comment="libKF5Codecs5 is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694836" version="1" comment="libKF5Codecs5-lang is &lt;5.76.0-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628554" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628557" version="1" comment="libQt5Core5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628560" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628563" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628568" version="1" comment="libQt5Network5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628571" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628577" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628580" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629186" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628581" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628584" version="1" comment="libQt5Test5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628587" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628589" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629189" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629190" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-3.12.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487325" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-9.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486657" version="1" comment="libSoundTouch0 is &lt;1.8.0-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628593" version="1" comment="libX11-6 is &lt;1.6.5-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628595" version="1" comment="libX11-data is &lt;1.6.5-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628597" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480408" version="1" comment="libXRes1 is &lt;1.2.0-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480411" version="1" comment="libXcursor1 is &lt;1.1.15-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480413" version="1" comment="libXdmcp6 is &lt;1.1.2-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480415" version="1" comment="libXext6 is &lt;1.3.3-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480418" version="1" comment="libXfixes3 is &lt;5.0.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480421" version="1" comment="libXfont1 is &lt;1.5.4-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480422" version="1" comment="libXfont2-2 is &lt;2.0.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482117" version="1" comment="libXi6 is &lt;1.7.9-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480427" version="1" comment="libXinerama1 is &lt;1.1.3-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480431" version="1" comment="libXrandr2 is &lt;1.5.1-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480433" version="1" comment="libXrender1 is &lt;0.9.10-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480436" version="1" comment="libXt6 is &lt;1.1.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480438" version="1" comment="libXtst6 is &lt;1.2.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480441" version="1" comment="libXv1 is &lt;1.0.11-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480443" version="1" comment="libXvMC1 is &lt;1.0.10-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628599" version="1" comment="libXvnc1 is &lt;1.9.0-19.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628600" version="1" comment="tigervnc is &lt;1.9.0-19.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628601" version="1" comment="xorg-x11-Xvnc is &lt;1.9.0-19.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628602" version="1" comment="xorg-x11-Xvnc-module is &lt;1.9.0-19.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480451" version="1" comment="libXxf86vm1 is &lt;1.1.4-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628284" version="1" comment="libapr-util1 is &lt;1.6.1-16.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482125" version="1" comment="libarchive13 is &lt;3.4.2-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629194" version="1" comment="libass9 is &lt;0.14.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628286" version="1" comment="libaudit1 is &lt;2.8.5-3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628287" version="1" comment="libaudit1-32bit is &lt;2.8.5-3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628288" version="1" comment="libauparse0 is &lt;2.8.5-3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487328" version="1" comment="libavcodec57 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487329" version="1" comment="libavformat57 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487331" version="1" comment="libavutil55 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487335" version="1" comment="libswresample2 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487337" version="1" comment="libswscale4 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694837" version="1" comment="libavcodec58_134 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694838" version="1" comment="libavdevice58_13 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694839" version="1" comment="libavfilter7_110 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694840" version="1" comment="libavformat58_76 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694841" version="1" comment="libavresample4_0 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694842" version="1" comment="libavutil56_70 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694843" version="1" comment="libpostproc55_9 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694844" version="1" comment="libswresample3_9 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694845" version="1" comment="libswscale5_9 is &lt;4.4-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628636" version="1" comment="libblkid1 is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628637" version="1" comment="libblkid1-32bit is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628639" version="1" comment="libfdisk1 is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628641" version="1" comment="libmount1 is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628642" version="1" comment="libmount1-32bit is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628644" version="1" comment="libsmartcols1 is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628647" version="1" comment="libuuid1 is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628648" version="1" comment="libuuid1-32bit is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628649" version="1" comment="util-linux is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628650" version="1" comment="util-linux-lang is &lt;2.36.2-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628651" version="1" comment="util-linux-systemd is &lt;2.36.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482145" version="1" comment="libbsd0 is &lt;0.8.7-3.3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482147" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488173" version="1" comment="libcacard0 is &lt;2.5.3-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481781" version="1" comment="libcairo-gobject2 is &lt;1.16.0-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481783" version="1" comment="libcairo2 is &lt;1.16.0-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628330" version="1" comment="libcares2 is &lt;1.17.0-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487341" version="1" comment="libcdio16 is &lt;0.94-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629197" version="1" comment="libcdio19 is &lt;2.1.0-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694846" version="1" comment="libcfitsio6 is &lt;3.440-bp153.1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482151" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628655" version="1" comment="libdcerpc-binding0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628656" version="1" comment="libdcerpc-binding0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628660" version="1" comment="libdcerpc0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628661" version="1" comment="libdcerpc0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628664" version="1" comment="libndr-krb5pac0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628665" version="1" comment="libndr-krb5pac0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628667" version="1" comment="libndr-nbt0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628668" version="1" comment="libndr-nbt0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628670" version="1" comment="libndr-standard0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628671" version="1" comment="libndr-standard0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628672" version="1" comment="libndr1 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628673" version="1" comment="libndr1-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628675" version="1" comment="libnetapi0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628676" version="1" comment="libnetapi0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628678" version="1" comment="libsamba-credentials0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628679" version="1" comment="libsamba-credentials0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628681" version="1" comment="libsamba-errors0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628682" version="1" comment="libsamba-errors0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628684" version="1" comment="libsamba-hostconfig0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628685" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628687" version="1" comment="libsamba-passdb0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628688" version="1" comment="libsamba-passdb0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628691" version="1" comment="libsamba-policy0-python3 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628693" version="1" comment="libsamba-util0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628694" version="1" comment="libsamba-util0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628696" version="1" comment="libsamdb0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628697" version="1" comment="libsamdb0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628699" version="1" comment="libsmbclient0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628701" version="1" comment="libsmbconf0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628702" version="1" comment="libsmbconf0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628704" version="1" comment="libsmbldap2 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628705" version="1" comment="libsmbldap2-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628707" version="1" comment="libtevent-util0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628708" version="1" comment="libtevent-util0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628710" version="1" comment="libwbclient0 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628711" version="1" comment="libwbclient0-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628712" version="1" comment="samba is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628714" version="1" comment="samba-client is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694847" version="1" comment="samba-client-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628717" version="1" comment="samba-libs is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628718" version="1" comment="samba-libs-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628719" version="1" comment="samba-libs-python3 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628720" version="1" comment="samba-python3 is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628721" version="1" comment="samba-winbind is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628722" version="1" comment="samba-winbind-32bit is &lt;4.13.4+git.187.5ad4708741a-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487345" version="1" comment="libdjvulibre21 is &lt;3.5.27-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480524" version="1" comment="libdmx1 is &lt;1.1.3-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694848" version="1" comment="libebml5 is &lt;1.4.2-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628723" version="1" comment="libekmfweb1 is &lt;2.15.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628726" version="1" comment="s390-tools is &lt;2.15.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480525" version="1" comment="libevent-2_1-8 is &lt;2.1.8-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487347" version="1" comment="libexempi3 is &lt;2.4.5-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629201" version="1" comment="libexif12 is &lt;0.6.22-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487350" version="1" comment="libexiv2-26 is &lt;0.26-6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628729" version="1" comment="libfreebl3 is &lt;3.53.1-3.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629829" version="1" comment="libfreebl3-hmac is &lt;3.53.1-3.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628731" version="1" comment="libsoftokn3 is &lt;3.53.1-3.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629830" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-3.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628733" version="1" comment="mozilla-nss is &lt;3.53.1-3.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628735" version="1" comment="mozilla-nss-certs is &lt;3.53.1-3.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628448" version="1" comment="libfreetype6 is &lt;2.10.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628449" version="1" comment="libfreetype6-32bit is &lt;2.10.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694849" version="1" comment="libgadu3 is &lt;1.12.2-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480250" version="1" comment="libgc1 is &lt;7.6.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628610" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628611" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628616" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628621" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628623" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628625" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628626" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628629" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628630" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482233" version="1" comment="libgcrypt20 is &lt;1.8.2-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482234" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482237" version="1" comment="libgd3 is &lt;2.2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628463" version="1" comment="libgif7 is &lt;5.1.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487888" version="1" comment="libgit2-28 is &lt;0.28.4-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482785" version="1" comment="libgme0 is &lt;0.6.2-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629130" version="1" comment="libgnome-autoar-0-0 is &lt;0.2.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629131" version="1" comment="libgnome-autoar-gtk-0-0 is &lt;0.2.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480302" version="1" comment="libgraphite2-3 is &lt;1.3.11-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486678" version="1" comment="libgxps2 is &lt;0.3.0-4.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694850" version="1" comment="libhdf5-103 is &lt;1.10.7-bp153.3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628741" version="1" comment="libhogweed4 is &lt;3.4.1-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628742" version="1" comment="libhogweed4-32bit is &lt;3.4.1-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628744" version="1" comment="libnettle6 is &lt;3.4.1-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628745" version="1" comment="libnettle6-32bit is &lt;3.4.1-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628519" version="1" comment="libhunspell-1_6-0 is &lt;1.6.2-3.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684236" version="1" comment="libical-glib3 is &lt;3.0.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628746" version="1" comment="libical3 is &lt;3.0.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488530" version="1" comment="libicu60_2 is &lt;60.2-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488532" version="1" comment="libicu60_2-ledata is &lt;60.2-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482248" version="1" comment="libidn11 is &lt;1.34-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628747" version="1" comment="libidn2-0 is &lt;2.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628748" version="1" comment="libidn2-0-32bit is &lt;2.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694851" version="1" comment="libidn2-lang is &lt;2.2.0-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487355" version="1" comment="libimobiledevice6 is &lt;1.2.0+git20180427.26373b3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486510" version="1" comment="libusbmuxd4 is &lt;1.0.10-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694852" version="1" comment="libixml11 is &lt;1.14.0-bp153.1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694853" version="1" comment="libupnp17 is &lt;1.14.0-bp153.1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480580" version="1" comment="libjansson4 is &lt;2.9-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481404" version="1" comment="libjansson4-32bit is &lt;2.9-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628772" version="1" comment="libjasper4 is &lt;2.0.14-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628773" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628774" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628775" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629277" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629278" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628776" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480587" version="1" comment="libjbig2 is &lt;2.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628779" version="1" comment="libjpeg8 is &lt;8.1.2-5.15.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480594" version="1" comment="libjson-c3 is &lt;0.13-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480597" version="1" comment="libksba8 is &lt;1.3.5-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481415" version="1" comment="liblcms2-2 is &lt;2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694854" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694855" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694856" version="1" comment="libldap-data is &lt;2.4.46-9.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694857" version="1" comment="openldap2-client is &lt;2.4.46-9.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628548" version="1" comment="libldb2 is &lt;2.2.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628549" version="1" comment="libldb2-32bit is &lt;2.2.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628550" version="1" comment="python3-ldb is &lt;2.2.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487548" version="1" comment="liblouis-data is &lt;3.11.0-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487550" version="1" comment="liblouis19 is &lt;3.11.0-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487551" version="1" comment="python3-louis is &lt;3.11.0-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481427" version="1" comment="liblua5_3-5 is &lt;5.3.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481428" version="1" comment="liblua5_3-5-32bit is &lt;5.3.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481429" version="1" comment="lua53 is &lt;5.3.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628788" version="1" comment="liblz4-1 is &lt;1.9.2-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628789" version="1" comment="liblz4-1-32bit is &lt;1.9.2-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480611" version="1" comment="liblzo2-2 is &lt;2.10-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486459" version="1" comment="libmad0 is &lt;0.15.1b-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628792" version="1" comment="libmariadb3 is &lt;3.1.12-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482299" version="1" comment="libmarkdown2 is &lt;2.2.4-1.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694858" version="1" comment="libminiupnpc16 is &lt;2.0.20171102-bp153.1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628794" version="1" comment="libminizip1 is &lt;1.2.11-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628795" version="1" comment="libz1 is &lt;1.2.11-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628796" version="1" comment="libz1-32bit is &lt;1.2.11-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486462" version="1" comment="libmms0 is &lt;0.6.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482307" version="1" comment="libmp3lame0 is &lt;3.100-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628800" version="1" comment="libmpfr6 is &lt;4.0.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628802" version="1" comment="libmpg123-0 is &lt;1.26.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694859" version="1" comment="mpg123-openal is &lt;1.26.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629210" version="1" comment="mpg123-pulse is &lt;1.26.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482310" version="1" comment="libmspack0 is &lt;0.6-3.8.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630164" version="1" comment="libmwaw-0_3-3 is &lt;0.3.17-4.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694860" version="1" comment="libmysqld19 is &lt;10.2.37-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482311" version="1" comment="libncurses6 is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482314" version="1" comment="ncurses-utils is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482316" version="1" comment="terminfo is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482317" version="1" comment="terminfo-base is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482318" version="1" comment="terminfo-iterm is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482319" version="1" comment="terminfo-screen is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486474" version="1" comment="libndp0 is &lt;1.6-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628803" version="1" comment="libnetpbm11 is &lt;10.80.1-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628804" version="1" comment="netpbm is &lt;10.80.1-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480626" version="1" comment="libnewt0_52 is &lt;0.52.20-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628805" version="1" comment="libnghttp2-14 is &lt;1.40.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628806" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489228" version="1" comment="libntfs-3g87 is &lt;2016.2.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489229" version="1" comment="ntfs-3g is &lt;2016.2.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489230" version="1" comment="ntfsprogs is &lt;2016.2.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489231" version="1" comment="libopencv3_3 is &lt;3.3.1-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480638" version="1" comment="libopenjp2-7 is &lt;2.3.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486482" version="1" comment="libopenjpeg1 is &lt;1.5.2-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487555" version="1" comment="libopenmpt0 is &lt;0.3.19-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694861" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694862" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694863" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628819" version="1" comment="libopus0 is &lt;1.3.1-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482338" version="1" comment="libosinfo is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482339" version="1" comment="libosinfo-1_0-0 is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482340" version="1" comment="libosinfo-lang is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488542" version="1" comment="typelib-1_0-Libosinfo-1_0 is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482345" version="1" comment="libpango-1_0-0 is &lt;1.44.7+11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482347" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.44.7+11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694864" version="1" comment="libpano13-3 is &lt;2.9.19-bp153.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628825" version="1" comment="libpcap1 is &lt;1.9.1-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480657" version="1" comment="libpcre1 is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480658" version="1" comment="libpcre1-32bit is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480665" version="1" comment="libpcre2-16-0 is &lt;10.31-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480667" version="1" comment="libpcre2-8-0 is &lt;10.31-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481464" version="1" comment="libpcsclite1 is &lt;1.8.24-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481466" version="1" comment="pcsc-lite is &lt;1.8.24-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486489" version="1" comment="libplist3 is &lt;2.0.0-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482352" version="1" comment="libpng16-16 is &lt;1.6.34-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482353" version="1" comment="libpng16-16-32bit is &lt;1.6.34-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482356" version="1" comment="libpolkit0 is &lt;0.116-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482357" version="1" comment="polkit is &lt;0.116-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482359" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628826" version="1" comment="libpoppler-cpp0 is &lt;0.79.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628829" version="1" comment="libpoppler-glib8 is &lt;0.79.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630169" version="1" comment="libpoppler-qt5-1 is &lt;0.79.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628830" version="1" comment="libpoppler89 is &lt;0.79.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628831" version="1" comment="poppler-tools is &lt;0.79.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486490" version="1" comment="libpotrace0 is &lt;1.15-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628833" version="1" comment="libpq5 is &lt;13.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694865" version="1" comment="libprocps7 is &lt;3.3.15-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694866" version="1" comment="procps is &lt;3.3.15-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628839" version="1" comment="libproxy1 is &lt;0.4.15-12.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684239" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.15-12.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694867" version="1" comment="libproxy1-config-kde is &lt;0.4.15-12.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684240" version="1" comment="libproxy1-networkmanager is &lt;0.4.15-12.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694868" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.15-12.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488933" version="1" comment="libpskc0 is &lt;2.6.2-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489234" version="1" comment="libpurple is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489237" version="1" comment="libpurple-lang is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630146" version="1" comment="libpurple-tcl is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489239" version="1" comment="pidgin is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628840" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-7.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628841" version="1" comment="python is &lt;2.7.18-7.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628842" version="1" comment="python-base is &lt;2.7.18-7.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694869" version="1" comment="libpython3_6m1_0 is &lt;3.6.13-3.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694870" version="1" comment="python3 is &lt;3.6.13-3.81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694871" version="1" comment="python3-base is &lt;3.6.13-3.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694872" version="1" comment="python3-curses is &lt;3.6.13-3.81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694873" version="1" comment="python3-dbm is &lt;3.6.13-3.81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482383" version="1" comment="libqpdf26 is &lt;9.0.2-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694874" version="1" comment="libqt5-qtwebengine is &lt;5.15.3-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487566" version="1" comment="libquicktime0 is &lt;1.2.4+git20180804.fff99cd-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694875" version="1" comment="librados2 is &lt;15.2.11.83+g8a15f484c2-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694876" version="1" comment="librbd1 is &lt;15.2.11.83+g8a15f484c2-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629212" version="1" comment="libraptor2-0 is &lt;2.0.15-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694877" version="1" comment="libraw16 is &lt;0.18.9-bp153.2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630170" version="1" comment="libreoffice is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630171" version="1" comment="libreoffice-base is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630173" version="1" comment="libreoffice-branding-upstream is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630174" version="1" comment="libreoffice-calc is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630176" version="1" comment="libreoffice-draw is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630177" version="1" comment="libreoffice-filters-optional is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630180" version="1" comment="libreoffice-gnome is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630181" version="1" comment="libreoffice-gtk3 is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630182" version="1" comment="libreoffice-icon-themes is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630183" version="1" comment="libreoffice-impress is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630186" version="1" comment="libreoffice-l10n-ar is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630190" version="1" comment="libreoffice-l10n-bg is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630196" version="1" comment="libreoffice-l10n-bs is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630197" version="1" comment="libreoffice-l10n-ca is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630200" version="1" comment="libreoffice-l10n-cs is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630202" version="1" comment="libreoffice-l10n-da is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630203" version="1" comment="libreoffice-l10n-de is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630207" version="1" comment="libreoffice-l10n-el is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630208" version="1" comment="libreoffice-l10n-en is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630209" version="1" comment="libreoffice-l10n-en_GB is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630211" version="1" comment="libreoffice-l10n-eo is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630212" version="1" comment="libreoffice-l10n-es is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630213" version="1" comment="libreoffice-l10n-et is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630215" version="1" comment="libreoffice-l10n-fa is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630216" version="1" comment="libreoffice-l10n-fi is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630217" version="1" comment="libreoffice-l10n-fr is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630229" version="1" comment="libreoffice-l10n-hu is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630230" version="1" comment="libreoffice-l10n-id is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630232" version="1" comment="libreoffice-l10n-it is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630233" version="1" comment="libreoffice-l10n-ja is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630240" version="1" comment="libreoffice-l10n-ko is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630245" version="1" comment="libreoffice-l10n-lt is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630254" version="1" comment="libreoffice-l10n-nb is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630256" version="1" comment="libreoffice-l10n-nl is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630264" version="1" comment="libreoffice-l10n-pl is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630265" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630268" version="1" comment="libreoffice-l10n-ru is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630275" version="1" comment="libreoffice-l10n-sk is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630276" version="1" comment="libreoffice-l10n-sl is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630281" version="1" comment="libreoffice-l10n-sv is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630293" version="1" comment="libreoffice-l10n-uk is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630299" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630300" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630303" version="1" comment="libreoffice-mailmerge is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630304" version="1" comment="libreoffice-math is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630306" version="1" comment="libreoffice-pyuno is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630307" version="1" comment="libreoffice-qt5 is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630310" version="1" comment="libreoffice-writer is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630312" version="1" comment="libreofficekit is &lt;7.1.2.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694878" version="1" comment="libreoffice-gtk2 is &lt;6.2.7.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628862" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628863" version="1" comment="ruby2.5 is &lt;2.5.9-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628866" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482393" version="1" comment="libseccomp2 is &lt;2.4.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480712" version="1" comment="libserf-1-1 is &lt;1.3.9-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629864" version="1" comment="libslirp0 is &lt;4.3.1-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481481" version="1" comment="libsndfile1 is &lt;1.0.28-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630093" version="1" comment="libsndfile1-32bit is &lt;1.0.28-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481482" version="1" comment="libsnmp30 is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481483" version="1" comment="net-snmp is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481485" version="1" comment="perl-SNMP is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481486" version="1" comment="snmp-mibs is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694879" version="1" comment="libsolv-tools is &lt;0.7.19-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694880" version="1" comment="python3-solv is &lt;0.7.19-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694881" version="1" comment="ruby-solv is &lt;0.7.19-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482399" version="1" comment="libsoup-2_4-1 is &lt;2.68.3-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482400" version="1" comment="libsoup-lang is &lt;2.68.3-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487573" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.68.3-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628871" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.38-1.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628872" version="1" comment="libspice-client-glib-helper is &lt;0.38-1.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628873" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.38-1.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629986" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.38-1.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629987" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.38-1.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629866" version="1" comment="libspice-server1 is &lt;0.14.3-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482404" version="1" comment="libsqlite3-0 is &lt;3.28.0-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482406" version="1" comment="sqlite3 is &lt;3.28.0-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487574" version="1" comment="libsrt1 is &lt;1.3.4-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487575" version="1" comment="libsrtp2-1 is &lt;2.2.0-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628874" version="1" comment="libssh2-1 is &lt;1.9.0-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482409" version="1" comment="libssh4 is &lt;0.8.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482410" version="1" comment="libssh4-32bit is &lt;0.8.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630314" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.7-7.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628876" version="1" comment="libsystemd0 is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628877" version="1" comment="libsystemd0-32bit is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628879" version="1" comment="libudev1 is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628880" version="1" comment="libudev1-32bit is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628881" version="1" comment="systemd is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628882" version="1" comment="systemd-32bit is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628883" version="1" comment="systemd-container is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628886" version="1" comment="systemd-doc is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628888" version="1" comment="systemd-lang is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628889" version="1" comment="systemd-sysvinit is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628890" version="1" comment="udev is &lt;246.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628891" version="1" comment="libtag1 is &lt;1.11.1-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629217" version="1" comment="libtag_c0 is &lt;1.11.1-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482427" version="1" comment="libtasn1 is &lt;4.13-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482428" version="1" comment="libtasn1-6 is &lt;4.13-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482429" version="1" comment="libtasn1-6-32bit is &lt;4.13-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480757" version="1" comment="libthai-data is &lt;0.1.27-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480758" version="1" comment="libthai0 is &lt;0.1.27-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628893" version="1" comment="libtiff5 is &lt;4.0.9-5.30.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628895" version="1" comment="libtirpc-netconfig is &lt;1.2.6-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628896" version="1" comment="libtirpc3 is &lt;1.2.6-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628897" version="1" comment="libtirpc3-32bit is &lt;1.2.6-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629870" version="1" comment="libtpms0 is &lt;0.8.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628898" version="1" comment="libtss2-esys0 is &lt;2.4.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628900" version="1" comment="libtss2-mu0 is &lt;2.4.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628902" version="1" comment="libtss2-sys0 is &lt;2.4.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482438" version="1" comment="libudisks2-0 is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694882" version="1" comment="libudisks2-0_btrfs is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482441" version="1" comment="udisks2 is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482442" version="1" comment="udisks2-lang is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628911" version="1" comment="libunwind is &lt;1.5.0-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482443" version="1" comment="libupsclient1 is &lt;2.7.4-4.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488209" version="1" comment="nut is &lt;2.7.4-4.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694883" version="1" comment="nut-cgi is &lt;2.7.4-4.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486512" version="1" comment="libvdpau1 is &lt;1.1.1-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488549" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629873" version="1" comment="libvirt-bash-completion is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629874" version="1" comment="libvirt-client is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629875" version="1" comment="libvirt-daemon is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629876" version="1" comment="libvirt-daemon-config-network is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629878" version="1" comment="libvirt-daemon-driver-interface is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629881" version="1" comment="libvirt-daemon-driver-network is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629882" version="1" comment="libvirt-daemon-driver-nodedev is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629883" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629884" version="1" comment="libvirt-daemon-driver-qemu is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629885" version="1" comment="libvirt-daemon-driver-secret is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629886" version="1" comment="libvirt-daemon-driver-storage is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629887" version="1" comment="libvirt-daemon-driver-storage-core is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629888" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629889" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629890" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629891" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629892" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629893" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629894" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629897" version="1" comment="libvirt-daemon-qemu is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628913" version="1" comment="libvirt-libs is &lt;7.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694884" version="1" comment="libvlc5 is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694885" version="1" comment="libvlccore9 is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694886" version="1" comment="vlc is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694887" version="1" comment="vlc-codec-gstreamer is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694888" version="1" comment="vlc-lang is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694889" version="1" comment="vlc-noX is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694890" version="1" comment="vlc-qt is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694891" version="1" comment="vlc-vdpau is &lt;3.0.13-bp153.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628915" version="1" comment="libvmtools0 is &lt;11.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628916" version="1" comment="open-vm-tools is &lt;11.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629219" version="1" comment="open-vm-tools-desktop is &lt;11.2.5-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694892" version="1" comment="libvncclient0 is &lt;0.9.10-bp153.2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481533" version="1" comment="libvorbis0 is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630097" version="1" comment="libvorbis0-32bit is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481534" version="1" comment="libvorbisenc2 is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630098" version="1" comment="libvorbisenc2-32bit is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481535" version="1" comment="libvorbisfile3 is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482448" version="1" comment="libvpx4 is &lt;1.6.1-6.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628918" version="1" comment="libwavpack1 is &lt;5.4.0-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482450" version="1" comment="libwebp7 is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482451" version="1" comment="libwebpdemux2 is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487581" version="1" comment="libwebpmux3 is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694893" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-bp153.1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489168" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694894" version="1" comment="libxapian30 is &lt;1.4.17-bp153.1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628923" version="1" comment="libxerces-c-3_2 is &lt;3.2.3-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481578" version="1" comment="libxkbcommon-x11-0 is &lt;0.8.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481580" version="1" comment="libxkbcommon0 is &lt;0.8.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694895" version="1" comment="libxml2-2 is &lt;2.9.7-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694896" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694897" version="1" comment="libxml2-tools is &lt;2.9.7-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694898" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482466" version="1" comment="libxslt-tools is &lt;1.1.32-3.8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482467" version="1" comment="libxslt1 is &lt;1.1.32-3.8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480828" version="1" comment="libyaml-0-2 is &lt;0.1.7-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628930" version="1" comment="libyaml-cpp0_6 is &lt;0.6.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480831" version="1" comment="libzip5 is &lt;1.5.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628934" version="1" comment="libzstd1 is &lt;1.4.4-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628935" version="1" comment="libzstd1-32bit is &lt;1.4.4-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694899" version="1" comment="libzypp is &lt;17.25.10-3.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628939" version="1" comment="login_defs is &lt;4.8.1-2.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628940" version="1" comment="shadow is &lt;4.8.1-2.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481596" version="1" comment="logrotate is &lt;3.13.0-4.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480839" version="1" comment="mailx is &lt;12.5-1.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629835" version="1" comment="mariadb is &lt;10.5.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629836" version="1" comment="mariadb-client is &lt;10.5.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629837" version="1" comment="mariadb-errormessages is &lt;10.5.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694900" version="1" comment="messagelib is &lt;20.04.2-bp153.1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694901" version="1" comment="messagelib-lang is &lt;20.04.2-bp153.1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628941" version="1" comment="mozilla-nspr is &lt;4.25.1-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694902" version="1" comment="nfs-client is &lt;2.1.1-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694903" version="1" comment="nfs-kernel-server is &lt;2.1.1-10.12.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694904" version="1" comment="okular is &lt;20.04.2-bp153.1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694905" version="1" comment="okular-lang is &lt;20.04.2-bp153.1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630322" version="1" comment="openconnect is &lt;7.08-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630325" version="1" comment="openconnect-lang is &lt;7.08-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628951" version="1" comment="openslp is &lt;2.0.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628952" version="1" comment="openslp-32bit is &lt;2.0.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628954" version="1" comment="openssh is &lt;8.4p1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628955" version="1" comment="openssh-clients is &lt;8.4p1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628956" version="1" comment="openssh-common is &lt;8.4p1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628958" version="1" comment="openssh-server is &lt;8.4p1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482336" version="1" comment="openssl is &lt;1.1.1d-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694906" version="1" comment="openvpn is &lt;2.4.3-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629914" version="1" comment="ovmf is &lt;202008-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629916" version="1" comment="qemu-ovmf-x86_64 is &lt;202008-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629917" version="1" comment="qemu-uefi-aarch64 is &lt;202008-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694907" version="1" comment="p7zip is &lt;16.02-14.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694908" version="1" comment="p7zip-full is &lt;16.02-14.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628960" version="1" comment="pam is &lt;1.3.0-6.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628961" version="1" comment="pam-32bit is &lt;1.3.0-6.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628963" version="1" comment="pam-doc is &lt;1.3.0-6.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628966" version="1" comment="perl is &lt;5.26.1-15.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628967" version="1" comment="perl-base is &lt;5.26.1-15.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628968" version="1" comment="perl-base-32bit is &lt;5.26.1-15.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628969" version="1" comment="perl-core-DB_File is &lt;5.26.1-15.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481620" version="1" comment="perl-Archive-Zip is &lt;1.60-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480873" version="1" comment="perl-HTML-Parser is &lt;3.72-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480874" version="1" comment="perl-LWP-Protocol-https is &lt;6.06-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480875" version="1" comment="perl-XML-LibXML is &lt;2.0132-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628974" version="1" comment="perl-XML-Twig is &lt;3.52-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694909" version="1" comment="permissions is &lt;20181225-23.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694910" version="1" comment="plasma5-desktop is &lt;5.18.6-bp153.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694911" version="1" comment="plasma5-desktop-emojier is &lt;5.18.6-bp153.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694912" version="1" comment="plasma5-desktop-lang is &lt;5.18.6-bp153.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628978" version="1" comment="powerpc-utils is &lt;1.3.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628979" version="1" comment="ppc64-diag is &lt;2.7.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487583" version="1" comment="ppp is &lt;2.4.7-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480880" version="1" comment="procmail is &lt;3.22-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628987" version="1" comment="python3-cryptography is &lt;2.8-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486538" version="1" comment="python3-cupshelpers is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694913" version="1" comment="system-config-printer is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694914" version="1" comment="system-config-printer-applet is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486539" version="1" comment="system-config-printer-common is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486540" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486541" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486542" version="1" comment="udev-configure-printer is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628989" version="1" comment="python3-numpy is &lt;1.17.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628991" version="1" comment="python3-pip is &lt;20.0.2-6.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628993" version="1" comment="python3-requests is &lt;2.24.0-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629000" version="1" comment="python3-setuptools is &lt;40.5.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629005" version="1" comment="python3-urllib3 is &lt;1.25.10-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629929" version="1" comment="qemu is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629930" version="1" comment="qemu-arm is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629933" version="1" comment="qemu-audio-spice is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629934" version="1" comment="qemu-block-curl is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629936" version="1" comment="qemu-block-rbd is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629937" version="1" comment="qemu-block-ssh is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629939" version="1" comment="qemu-chardev-spice is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629940" version="1" comment="qemu-guest-agent is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629941" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629942" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629943" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629944" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629946" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694915" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629947" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629948" version="1" comment="qemu-ksm is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694916" version="1" comment="qemu-microvm is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629951" version="1" comment="qemu-ppc is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629953" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629954" version="1" comment="qemu-sgabios is &lt;8-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629007" version="1" comment="qemu-tools is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629956" version="1" comment="qemu-ui-curses is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629957" version="1" comment="qemu-ui-gtk is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629958" version="1" comment="qemu-ui-opengl is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629959" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629960" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629961" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629962" version="1" comment="qemu-x86 is &lt;5.2.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482535" version="1" comment="rpcbind is &lt;0.2.3-5.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629008" version="1" comment="rpm is &lt;4.14.1-29.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629009" version="1" comment="rpm-32bit is &lt;4.14.1-29.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482539" version="1" comment="rsync is &lt;3.1.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629011" version="1" comment="rsyslog is &lt;8.39.0-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486543" version="1" comment="rtkit is &lt;0.11+git.20130926-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629013" version="1" comment="ruby2.5-rubygem-nokogiri is &lt;1.8.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629222" version="1" comment="sane-backends is &lt;1.0.32-6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629223" version="1" comment="sane-backends-autoconfig is &lt;1.0.32-6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629014" version="1" comment="screen is &lt;4.6.2-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694917" version="1" comment="sddm is &lt;0.18.0-lp153.1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694918" version="1" comment="sddm-branding-openSUSE is &lt;0.18.0-lp153.1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480924" version="1" comment="sharutils is &lt;4.15.2-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480925" version="1" comment="sharutils-lang is &lt;4.15.2-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629015" version="1" comment="shim is &lt;15.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629225" version="1" comment="spice-vdagent is &lt;0.20.0-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629017" version="1" comment="squashfs is &lt;4.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629025" version="1" comment="sudo is &lt;1.9.5p2-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629027" version="1" comment="sudo-plugin-python is &lt;1.9.5p2-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629991" version="1" comment="swtpm is &lt;0.5.2-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629031" version="1" comment="tar is &lt;1.30-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629032" version="1" comment="tar-lang is &lt;1.30-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629033" version="1" comment="tar-rmt is &lt;1.30-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694919" version="1" comment="telepathy-idle is &lt;0.2.0-bp153.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486991" version="1" comment="texlive-lm-fonts is &lt;2017.137.2.004svn28119-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694920" version="1" comment="tmux is &lt;3.1c-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694921" version="1" comment="tnftp is &lt;20151004-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694922" version="1" comment="transmission-common is &lt;2.94-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694923" version="1" comment="transmission-gtk is &lt;2.94-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694924" version="1" comment="transmission-gtk-lang is &lt;2.94-bp153.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482434" version="1" comment="trousers is &lt;0.3.14-6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629037" version="1" comment="u-boot-rpiarm64 is &lt;2021.01-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629038" version="1" comment="u-boot-rpiarm64-doc is &lt;2021.01-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629040" version="1" comment="ucode-intel is &lt;20210216-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629042" version="1" comment="unixODBC is &lt;2.3.6-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481670" version="1" comment="unzip is &lt;6.00-4.8.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694925" version="1" comment="unzip-doc is &lt;6.00-4.8.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480953" version="1" comment="update-alternatives is &lt;1.19.0.4-2.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629044" version="1" comment="vim is &lt;8.0.1568-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629045" version="1" comment="vim-data is &lt;8.0.1568-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629046" version="1" comment="vim-data-common is &lt;8.0.1568-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629995" version="1" comment="virt-install is &lt;3.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629996" version="1" comment="virt-manager is &lt;3.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629997" version="1" comment="virt-manager-common is &lt;3.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694926" version="1" comment="virtualbox-guest-tools is &lt;6.1.20-lp153.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694927" version="1" comment="virtualbox-guest-x11 is &lt;6.1.20-lp153.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694928" version="1" comment="virtualbox-kmp-default is &lt;6.1.20_k5.3.18_57-lp153.1.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486554" version="1" comment="vorbis-tools is &lt;1.4.0-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486555" version="1" comment="vorbis-tools-lang is &lt;1.4.0-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629998" version="1" comment="vsftpd is &lt;3.0.3-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480957" version="1" comment="w3m is &lt;0.5.3+git20180125-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482565" version="1" comment="wget is &lt;1.20.3-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694929" version="1" comment="wget-lang is &lt;1.20.3-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629048" version="1" comment="wicked is &lt;0.6.65-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629049" version="1" comment="wicked-service is &lt;0.6.65-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629050" version="1" comment="wpa_supplicant is &lt;2.9-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482570" version="1" comment="xdg-utils is &lt;1.1.3+20190413-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629051" version="1" comment="xen-libs is &lt;4.14.1_16-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694930" version="1" comment="xinetd is &lt;2.3.15.4-bp153.1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480965" version="1" comment="xorg-x11-essentials is &lt;7.6_1-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481675" version="1" comment="xrdb is &lt;1.1.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629053" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629054" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684245" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629055" version="1" comment="xscreensaver is &lt;5.44-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629056" version="1" comment="xscreensaver-data is &lt;5.44-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629057" version="1" comment="xscreensaver-lang is &lt;5.44-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629060" version="1" comment="yast2-security is &lt;4.3.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629061" version="1" comment="yast2-users is &lt;4.3.10-1.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629062" version="1" comment="zypper is &lt;1.14.43-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629063" version="1" comment="zypper-log is &lt;1.14.43-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629064" version="1" comment="zypper-needs-restarting is &lt;1.14.43-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624294" version="1" comment="libBasicUsageEnvironment1 is &lt;2021.05.22-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624295" version="1" comment="libUsageEnvironment3 is &lt;2021.05.22-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624296" version="1" comment="libgroupsock30 is &lt;2021.05.22-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624297" version="1" comment="libliveMedia94 is &lt;2021.05.22-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624298" version="1" comment="live555 is &lt;2021.05.22-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624299" version="1" comment="live555-devel is &lt;2021.05.22-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624470" version="1" comment="gstreamer-plugins-bad is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624471" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624472" version="1" comment="gstreamer-plugins-bad-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624473" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624474" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624475" version="1" comment="gstreamer-plugins-bad-chromaprint-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624476" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624477" version="1" comment="gstreamer-plugins-bad-doc is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624478" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624479" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624480" version="1" comment="gstreamer-plugins-bad-fluidsynth-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624481" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.16.3-lp153.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624482" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624483" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624484" version="1" comment="libgstadaptivedemux-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624485" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624486" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624487" version="1" comment="libgstbadaudio-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624488" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624489" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624490" version="1" comment="libgstbasecamerabinsrc-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624491" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624492" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624493" version="1" comment="libgstcodecparsers-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624494" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624495" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624496" version="1" comment="libgstinsertbin-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624497" version="1" comment="libgstisoff-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624498" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624499" version="1" comment="libgstisoff-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624500" version="1" comment="libgstmpegts-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624501" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624502" version="1" comment="libgstmpegts-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624503" version="1" comment="libgstphotography-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624504" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624505" version="1" comment="libgstphotography-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624506" version="1" comment="libgstplayer-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624507" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624508" version="1" comment="libgstplayer-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624509" version="1" comment="libgstsctp-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624510" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624511" version="1" comment="libgstsctp-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624512" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624513" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624514" version="1" comment="libgsturidownloader-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624515" version="1" comment="libgstwayland-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624516" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624517" version="1" comment="libgstwayland-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624518" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624519" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.16.3-lp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624520" version="1" comment="libgstwebrtc-1_0-0-64bit is &lt;1.16.3-lp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624521" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624522" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624523" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624524" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.16.3-lp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624526" version="1" comment="solo-udev is &lt;4.1.2-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625222" version="1" comment="claws-mail is &lt;3.18.0-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625223" version="1" comment="claws-mail-devel is &lt;3.18.0-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625224" version="1" comment="claws-mail-lang is &lt;3.18.0-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625451" version="1" comment="fossil is &lt;2.16-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625709" version="1" comment="nextcloud is &lt;20.0.11-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625710" version="1" comment="nextcloud-apache is &lt;20.0.11-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625711" version="1" comment="icinga2 is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625712" version="1" comment="icinga2-bin is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625713" version="1" comment="icinga2-common is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625714" version="1" comment="icinga2-doc is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625715" version="1" comment="icinga2-ido-mysql is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625716" version="1" comment="icinga2-ido-pgsql is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625717" version="1" comment="nano-icinga2 is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625718" version="1" comment="vim-icinga2 is &lt;2.12.4-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626047" version="1" comment="chromedriver is &lt;91.0.4472.164-bp153.2.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626048" version="1" comment="chromium is &lt;91.0.4472.164-bp153.2.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626655" version="1" comment="icinga2 is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626656" version="1" comment="icinga2-bin is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626657" version="1" comment="icinga2-common is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626658" version="1" comment="icinga2-doc is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626659" version="1" comment="icinga2-ido-mysql is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626660" version="1" comment="icinga2-ido-pgsql is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626661" version="1" comment="nano-icinga2 is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626662" version="1" comment="vim-icinga2 is &lt;2.12.5-bp153.2.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627974" version="1" comment="python3-virtualbox is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627975" version="1" comment="virtualbox is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627976" version="1" comment="virtualbox-devel is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627977" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.24-lp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627978" version="1" comment="virtualbox-guest-source is &lt;6.1.24-lp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627979" version="1" comment="virtualbox-guest-tools is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627980" version="1" comment="virtualbox-guest-x11 is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627981" version="1" comment="virtualbox-host-source is &lt;6.1.24-lp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627982" version="1" comment="virtualbox-kmp-default is &lt;6.1.24_k5.3.18_59.16-lp153.2.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627983" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.24_k5.3.18_59.16-lp153.2.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627984" version="1" comment="virtualbox-qt is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627985" version="1" comment="virtualbox-vnc is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627986" version="1" comment="virtualbox-websrv is &lt;6.1.24-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628101" version="1" comment="balsa is &lt;2.6.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628102" version="1" comment="balsa-lang is &lt;2.6.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694931" version="1" comment="opera is &lt;77.0.4054.277-lp153.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630374" version="1" comment="aria2 is &lt;1.35.0-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630375" version="1" comment="aria2-devel is &lt;1.35.0-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630376" version="1" comment="aria2-lang is &lt;1.35.0-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630377" version="1" comment="libaria2-0 is &lt;1.35.0-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630378" version="1" comment="seamonkey is &lt;2.53.8.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630379" version="1" comment="seamonkey-dom-inspector is &lt;2.53.8.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630380" version="1" comment="seamonkey-irc is &lt;2.53.8.1-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630381" version="1" comment="chromedriver is &lt;92.0.4515.131-bp153.2.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630382" version="1" comment="chromium is &lt;92.0.4515.131-bp153.2.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631416" version="1" comment="prosody is &lt;0.11.10-bp153.2.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631525" version="1" comment="bgzip is &lt;1.10.2-bp153.2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631526" version="1" comment="htsfile is &lt;1.10.2-bp153.2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631527" version="1" comment="libhts-devel is &lt;1.10.2-bp153.2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631528" version="1" comment="libhts-devel-64bit is &lt;1.10.2-bp153.2.5.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631529" version="1" comment="libhts3 is &lt;1.10.2-bp153.2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631530" version="1" comment="libhts3-64bit is &lt;1.10.2-bp153.2.5.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631531" version="1" comment="tabix is &lt;1.10.2-bp153.2.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631573" version="1" comment="chromedriver is &lt;92.0.4515.159-bp153.2.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631574" version="1" comment="chromium is &lt;92.0.4515.159-bp153.2.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631817" version="1" comment="libspf2-2 is &lt;1.2.10-bp153.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631818" version="1" comment="libspf2-devel is &lt;1.2.10-bp153.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631819" version="1" comment="libspf2-tools is &lt;1.2.10-bp153.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631820" version="1" comment="cacti is &lt;1.2.18-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631821" version="1" comment="cacti-spine is &lt;1.2.18-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631822" version="1" comment="tor is &lt;0.4.6.7-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694932" version="1" comment="opera is &lt;78.0.4093.147-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694933" version="1" comment="opera is &lt;78.0.4093.184-lp153.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632726" version="1" comment="gifsicle is &lt;1.93-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632771" version="1" comment="nextcloud is &lt;20.0.12-bp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632772" version="1" comment="nextcloud-apache is &lt;20.0.12-bp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632951" version="1" comment="fail2ban is &lt;0.11.2-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632952" version="1" comment="monitoring-plugins-fail2ban is &lt;0.11.2-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632955" version="1" comment="haserl is &lt;0.9.36-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633662" version="1" comment="php-composer is &lt;1.10.22-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633663" version="1" comment="chromedriver is &lt;93.0.4577.82-bp153.2.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633664" version="1" comment="chromium is &lt;93.0.4577.82-bp153.2.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694934" version="1" comment="opera is &lt;79.0.4143.22-lp153.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634487" version="1" comment="transfig is &lt;3.2.8a-bp153.3.3.2 for aarch64,i586,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694935" version="1" comment="opera is &lt;79.0.4143.50-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651541" version="1" comment="chromedriver is &lt;94.0.4606.71-bp153.2.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651542" version="1" comment="chromium is &lt;94.0.4606.71-bp153.2.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651543" version="1" comment="mupdf is &lt;1.12.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651544" version="1" comment="mupdf-devel-static is &lt;1.12.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694936" version="1" comment="opera is &lt;80.0.4170.16-lp153.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652872" version="1" comment="libmbedcrypto3 is &lt;2.16.9-bp153.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652873" version="1" comment="libmbedcrypto3-32bit is &lt;2.16.9-bp153.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652874" version="1" comment="libmbedcrypto3-64bit is &lt;2.16.9-bp153.2.5.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652875" version="1" comment="libmbedtls12 is &lt;2.16.9-bp153.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652876" version="1" comment="libmbedtls12-32bit is &lt;2.16.9-bp153.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652877" version="1" comment="libmbedtls12-64bit is &lt;2.16.9-bp153.2.5.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652878" version="1" comment="libmbedx509-0 is &lt;2.16.9-bp153.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652879" version="1" comment="libmbedx509-0-32bit is &lt;2.16.9-bp153.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652880" version="1" comment="libmbedx509-0-64bit is &lt;2.16.9-bp153.2.5.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652881" version="1" comment="mbedtls-devel is &lt;2.16.9-bp153.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652882" version="1" comment="ssh-audit is &lt;2.5.0-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653341" version="1" comment="chromedriver is &lt;95.0.4638.54-bp153.2.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653342" version="1" comment="chromium is &lt;95.0.4638.54-bp153.2.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653361" version="1" comment="python3-virtualbox is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653362" version="1" comment="virtualbox is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653363" version="1" comment="virtualbox-devel is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653364" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.28-lp153.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653365" version="1" comment="virtualbox-guest-source is &lt;6.1.28-lp153.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653366" version="1" comment="virtualbox-guest-tools is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653367" version="1" comment="virtualbox-guest-x11 is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653368" version="1" comment="virtualbox-host-source is &lt;6.1.28-lp153.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653369" version="1" comment="virtualbox-kmp-default is &lt;6.1.28_k5.3.18_59.27-lp153.2.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653370" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.28_k5.3.18_59.27-lp153.2.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653371" version="1" comment="virtualbox-qt is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653372" version="1" comment="virtualbox-vnc is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653373" version="1" comment="virtualbox-websrv is &lt;6.1.28-lp153.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694937" version="1" comment="opera is &lt;80.0.4170.63-lp153.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654388" version="1" comment="chromedriver is &lt;95.0.4638.69-bp153.2.40.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654389" version="1" comment="chromium is &lt;95.0.4638.69-bp153.2.40.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656964" version="1" comment="transfig is &lt;3.2.8b-bp153.3.6.3 for aarch64,i586,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694938" version="1" comment="opera is &lt;81.0.4196.31-lp153.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657216" version="1" comment="hylafax+ is &lt;7.0.4-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657217" version="1" comment="hylafax+-client is &lt;7.0.4-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657218" version="1" comment="libfaxutil7_0_4 is &lt;7.0.4-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658612" version="1" comment="tor is &lt;0.4.6.8-bp153.2.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658912" version="1" comment="permissions is &lt;20200127-lp153.24.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658913" version="1" comment="permissions-zypp-plugin is &lt;20200127-lp153.24.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659015" version="1" comment="singularity is &lt;3.8.5-bp153.2.10.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659080" version="1" comment="hiredis is &lt;0.13.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659081" version="1" comment="hiredis-devel is &lt;0.13.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659082" version="1" comment="libhiredis0_13 is &lt;0.13.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659630" version="1" comment="chromedriver is &lt;96.0.4664.93-bp153.2.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659631" version="1" comment="chromium is &lt;96.0.4664.93-bp153.2.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660145" version="1" comment="seamonkey is &lt;2.53.10.1-bp153.10.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660146" version="1" comment="seamonkey-dom-inspector is &lt;2.53.10.1-bp153.10.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660147" version="1" comment="seamonkey-irc is &lt;2.53.10.1-bp153.10.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660233" version="1" comment="barrier is &lt;2.4.0-bp153.2.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660315" version="1" comment="chromedriver is &lt;96.0.4664.110-bp153.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660316" version="1" comment="chromium is &lt;96.0.4664.110-bp153.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660317" version="1" comment="nextcloud is &lt;20.0.14-bp153.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660318" version="1" comment="nextcloud-apache is &lt;20.0.14-bp153.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660319" version="1" comment="netdata is &lt;1.31.0-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661880" version="1" comment="kafka-kit is &lt;2.1.0-bp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661881" version="1" comment="kafka-source is &lt;2.1.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662148" version="1" comment="c-toxcore is &lt;0.2.13-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662149" version="1" comment="c-toxcore-daemon is &lt;0.2.13-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662150" version="1" comment="c-toxcore-devel is &lt;0.2.13-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662151" version="1" comment="libtoxcore2 is &lt;0.2.13-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662152" version="1" comment="postsrsd is &lt;1.11-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662153" version="1" comment="privoxy is &lt;3.0.33-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662154" version="1" comment="privoxy-doc is &lt;3.0.33-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511072" version="1" comment="upx is &lt;3.96-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694939" version="1" comment="opera is &lt;76.0.4017.154-lp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511074" version="1" comment="chromedriver is &lt;91.0.4472.77-bp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511075" version="1" comment="chromium is &lt;91.0.4472.77-bp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615935" version="1" comment="chromedriver is &lt;91.0.4472.114-bp153.2.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615936" version="1" comment="chromium is &lt;91.0.4472.114-bp153.2.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694940" version="1" comment="opera is &lt;77.0.4054.146-lp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624198" version="1" comment="python3-virtualbox is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624199" version="1" comment="virtualbox is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624200" version="1" comment="virtualbox-devel is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624201" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.22-lp153.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624202" version="1" comment="virtualbox-guest-source is &lt;6.1.22-lp153.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624203" version="1" comment="virtualbox-guest-tools is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624204" version="1" comment="virtualbox-guest-x11 is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624205" version="1" comment="virtualbox-host-source is &lt;6.1.22-lp153.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624206" version="1" comment="virtualbox-kmp-default is &lt;6.1.22_k5.3.18_59.5-lp153.2.3.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624207" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.22_k5.3.18_59.5-lp153.2.3.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624208" version="1" comment="virtualbox-qt is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624209" version="1" comment="virtualbox-vnc is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624210" version="1" comment="virtualbox-websrv is &lt;6.1.22-lp153.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624300" version="1" comment="inn is &lt;2.6.2-bp153.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624301" version="1" comment="inn-devel is &lt;2.6.2-bp153.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624302" version="1" comment="mininews is &lt;2.6.2-bp153.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624303" version="1" comment="singularity is &lt;3.7.4-bp153.2.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624304" version="1" comment="htmldoc is &lt;1.9.12-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624305" version="1" comment="tor is &lt;0.4.5.9-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624306" version="1" comment="prosody is &lt;0.11.9-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624307" version="1" comment="libxls-devel is &lt;1.6.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624308" version="1" comment="libxls-tools is &lt;1.6.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624309" version="1" comment="libxlsreader8 is &lt;1.6.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677850" version="1" comment="abcm2ps is &lt;8.14.13-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694941" version="1" comment="pcmanfm is &lt;1.3.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694942" version="1" comment="pcmanfm-devel is &lt;1.3.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694943" version="1" comment="pcmanfm-lang is &lt;1.3.2-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694944" version="1" comment="chromedriver is &lt;102.0.5005.115-bp153.2.101.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694945" version="1" comment="chromium is &lt;102.0.5005.115-bp153.2.101.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694946" version="1" comment="bazel-skylib1.0.3-source is &lt;1.0.3-bp153.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694947" version="1" comment="bazel3.7 is &lt;3.7.2-bp153.4.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694948" version="1" comment="libiomp5 is &lt;2.6.0-bp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694949" version="1" comment="libiomp5-gnu-hpc is &lt;2.6.0-bp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694950" version="1" comment="libiomp5-gnu-openmpi2-hpc is &lt;2.6.0-bp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694951" version="1" comment="libtensorflow2 is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694952" version="1" comment="libtensorflow2-gnu-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694953" version="1" comment="libtensorflow2-gnu-openmpi2-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694954" version="1" comment="libtensorflow_cc2 is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694955" version="1" comment="libtensorflow_cc2-gnu-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694956" version="1" comment="libtensorflow_cc2-gnu-openmpi2-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694957" version="1" comment="libtensorflow_framework2 is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694958" version="1" comment="libtensorflow_framework2-gnu-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694959" version="1" comment="libtensorflow_framework2-gnu-openmpi2-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694960" version="1" comment="tensorflow2 is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694961" version="1" comment="tensorflow2-devel is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694962" version="1" comment="tensorflow2-doc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694963" version="1" comment="tensorflow2-gnu-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694964" version="1" comment="tensorflow2-gnu-openmpi2-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694965" version="1" comment="tensorflow2-lite is &lt;2.6.0-bp153.2.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694966" version="1" comment="tensorflow2-lite-devel is &lt;2.6.0-bp153.2.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694967" version="1" comment="tensorflow2_2_6_0-gnu-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694968" version="1" comment="tensorflow2_2_6_0-gnu-hpc-devel is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694969" version="1" comment="tensorflow2_2_6_0-gnu-hpc-doc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694970" version="1" comment="tensorflow2_2_6_0-gnu-openmpi2-hpc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694971" version="1" comment="tensorflow2_2_6_0-gnu-openmpi2-hpc-devel is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694972" version="1" comment="tensorflow2_2_6_0-gnu-openmpi2-hpc-doc is &lt;2.6.0-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694973" version="1" comment="firejail is &lt;0.9.70-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694974" version="1" comment="atheme is &lt;7.2.12-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694975" version="1" comment="atheme-devel is &lt;7.2.12-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694976" version="1" comment="libathemecore1 is &lt;7.2.12-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698164" version="1" comment="tor is &lt;0.4.7.8-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694978" version="1" comment="chafa is &lt;1.4.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694979" version="1" comment="chafa-devel is &lt;1.4.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694980" version="1" comment="chafa-doc is &lt;1.4.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694981" version="1" comment="libchafa0 is &lt;1.4.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694982" version="1" comment="bbswitch is &lt;0.8-lp153.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694983" version="1" comment="bbswitch-kmp-default is &lt;0.8_k5.3.18_150300.59.76-lp153.3.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694984" version="1" comment="bbswitch-kmp-preempt is &lt;0.8_k5.3.18_150300.59.76-lp153.3.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694985" version="1" comment="mhvtl is &lt;1.62-lp153.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694986" version="1" comment="mhvtl-kmp-64kb is &lt;1.62_k5.3.18_150300.59.76-lp153.3.2.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694987" version="1" comment="mhvtl-kmp-default is &lt;1.62_k5.3.18_150300.59.76-lp153.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694988" version="1" comment="mhvtl-kmp-preempt is &lt;1.62_k5.3.18_150300.59.76-lp153.3.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694989" version="1" comment="openafs is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694990" version="1" comment="openafs-authlibs is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694991" version="1" comment="openafs-authlibs-devel is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694992" version="1" comment="openafs-client is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694993" version="1" comment="openafs-devel is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694994" version="1" comment="openafs-fuse_client is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694995" version="1" comment="openafs-kernel-source is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694996" version="1" comment="openafs-kmp-64kb is &lt;1.8.7_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694997" version="1" comment="openafs-kmp-default is &lt;1.8.7_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694998" version="1" comment="openafs-kmp-preempt is &lt;1.8.7_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009694999" version="1" comment="openafs-server is &lt;1.8.7-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695000" version="1" comment="pcfclock is &lt;0.44-lp153.2.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695001" version="1" comment="pcfclock-kmp-64kb is &lt;0.44_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695002" version="1" comment="pcfclock-kmp-default is &lt;0.44_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695003" version="1" comment="pcfclock-kmp-preempt is &lt;0.44_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695004" version="1" comment="rtl8812au is &lt;5.9.3.2+git20210427.6ef5d8f-lp153.2.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695005" version="1" comment="rtl8812au-kmp-64kb is &lt;5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695006" version="1" comment="rtl8812au-kmp-default is &lt;5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695007" version="1" comment="rtl8812au-kmp-preempt is &lt;5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695008" version="1" comment="rtw89-firmware is &lt;5.16~3.g38316db-lp153.4.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695009" version="1" comment="rtw89-kmp-64kb is &lt;5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695010" version="1" comment="rtw89-kmp-default is &lt;5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695011" version="1" comment="rtw89-kmp-preempt is &lt;5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695012" version="1" comment="rtw89-ueficert is &lt;5.16~3.g38316db-lp153.4.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695013" version="1" comment="v4l2loopback-autoload is &lt;0.12.5-lp153.2.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695014" version="1" comment="v4l2loopback-kmp-64kb is &lt;0.12.5_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695015" version="1" comment="v4l2loopback-kmp-default is &lt;0.12.5_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695016" version="1" comment="v4l2loopback-kmp-preempt is &lt;0.12.5_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695017" version="1" comment="v4l2loopback-utils is &lt;0.12.5-lp153.2.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695018" version="1" comment="vhba-kmp-64kb is &lt;20200106_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695019" version="1" comment="vhba-kmp-default is &lt;20200106_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695020" version="1" comment="vhba-kmp-preempt is &lt;20200106_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695021" version="1" comment="xtables-addons is &lt;3.18-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695022" version="1" comment="xtables-addons-kmp-64kb is &lt;3.18_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695023" version="1" comment="xtables-addons-kmp-default is &lt;3.18_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695024" version="1" comment="xtables-addons-kmp-preempt is &lt;3.18_k5.3.18_150300.59.76-lp153.2.2.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695025" version="1" comment="chromedriver is &lt;103.0.5060.53-bp153.2.104.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695026" version="1" comment="chromium is &lt;103.0.5060.53-bp153.2.104.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699762" version="1" comment="python3-ipython is &lt;7.13.0-bp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699763" version="1" comment="python3-ipython-iptest is &lt;7.13.0-bp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699764" version="1" comment="chafa is &lt;1.4.1-bp153.2.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699765" version="1" comment="chafa-devel is &lt;1.4.1-bp153.2.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699766" version="1" comment="chafa-doc is &lt;1.4.1-bp153.2.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699767" version="1" comment="libchafa0 is &lt;1.4.1-bp153.2.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700699" version="1" comment="chromedriver is &lt;103.0.5060.114-bp154.2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700700" version="1" comment="chromium is &lt;103.0.5060.114-bp154.2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699770" version="1" comment="opera is &lt;88.0.4412.74-lp154.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702113" version="1" comment="phpPgAdmin is &lt;7.13.0-bp154.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702114" version="1" comment="phpPgAdmin-apache is &lt;7.13.0-bp154.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703506" version="1" comment="chromedriver is &lt;103.0.5060.134-bp154.2.17.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703507" version="1" comment="chromium is &lt;103.0.5060.134-bp154.2.17.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704219" version="1" comment="seamonkey is &lt;2.53.13-lp153.17.11.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704220" version="1" comment="seamonkey-dom-inspector is &lt;2.53.13-lp153.17.11.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704221" version="1" comment="seamonkey-irc is &lt;2.53.13-lp153.17.11.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706665" version="1" comment="opera is &lt;89.0.4447.71-lp153.2.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706747" version="1" comment="canna is &lt;3.7p3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706748" version="1" comment="canna-devel is &lt;3.7p3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706749" version="1" comment="canna-libs is &lt;3.7p3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706750" version="1" comment="canna-libs-32bit is &lt;3.7p3-bp153.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706751" version="1" comment="canna-libs-64bit is &lt;3.7p3-bp153.2.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706752" version="1" comment="chromedriver is &lt;104.0.5112.79-bp153.2.113.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706753" version="1" comment="chromium is &lt;104.0.5112.79-bp153.2.113.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707427" version="1" comment="trivy is &lt;0.30.4-bp153.8.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707627" version="1" comment="nim is &lt;1.6.6-bp153.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707628" version="1" comment="freeciv is &lt;3.0.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707629" version="1" comment="freeciv-gtk3 is &lt;3.0.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707630" version="1" comment="freeciv-lang is &lt;3.0.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707631" version="1" comment="freeciv-qt is &lt;3.0.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707766" version="1" comment="python2-treq is &lt;20.3.0-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707767" version="1" comment="python3-treq is &lt;20.3.0-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707832" version="1" comment="chromedriver is &lt;104.0.5112.101-bp154.2.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707833" version="1" comment="chromium is &lt;104.0.5112.101-bp154.2.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708080" version="1" comment="opera is &lt;90.0.4480.54-lp153.2.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710587" version="1" comment="opera is &lt;90.0.4480.84-lp153.2.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710588" version="1" comment="chromedriver is &lt;105.0.5195.102-bp153.2.119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710589" version="1" comment="chromium is &lt;105.0.5195.102-bp153.2.119.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713866" version="1" comment="python3-virtualbox is &lt;6.1.36-lp153.2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713867" version="1" comment="virtualbox is &lt;6.1.36-lp153.2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713868" version="1" comment="virtualbox-devel is &lt;6.1.36-lp153.2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713869" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.36-lp153.2.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713870" version="1" comment="virtualbox-guest-source is &lt;6.1.36-lp153.2.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713871" version="1" comment="virtualbox-guest-tools is &lt;6.1.36-lp153.2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713872" version="1" comment="virtualbox-host-source is &lt;6.1.36-lp153.2.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713873" version="1" comment="virtualbox-kmp-default is &lt;6.1.36_k5.3.18_150300.59.90-lp153.2.33.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713874" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.36_k5.3.18_150300.59.90-lp153.2.33.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713875" version="1" comment="virtualbox-qt is &lt;6.1.36-lp153.2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713876" version="1" comment="virtualbox-vnc is &lt;6.1.36-lp153.2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713877" version="1" comment="virtualbox-websrv is &lt;6.1.36-lp153.2.33.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713919" version="1" comment="chromedriver is &lt;105.0.5195.127-bp154.2.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713920" version="1" comment="chromium is &lt;105.0.5195.127-bp154.2.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713978" version="1" comment="mupdf is &lt;1.12.0-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713979" version="1" comment="mupdf-devel-static is &lt;1.12.0-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714099" version="1" comment="permissions is &lt;20200127-lp153.24.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714100" version="1" comment="permissions-zypp-plugin is &lt;20200127-lp153.24.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714708" version="1" comment="python3-virtualbox is &lt;6.1.38-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714709" version="1" comment="virtualbox is &lt;6.1.38-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714710" version="1" comment="virtualbox-devel is &lt;6.1.38-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714711" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.38-lp153.2.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714712" version="1" comment="virtualbox-guest-source is &lt;6.1.38-lp153.2.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714713" version="1" comment="virtualbox-guest-tools is &lt;6.1.38-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714714" version="1" comment="virtualbox-host-source is &lt;6.1.38-lp153.2.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714715" version="1" comment="virtualbox-kmp-default is &lt;6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714716" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714717" version="1" comment="virtualbox-qt is &lt;6.1.38-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714718" version="1" comment="virtualbox-vnc is &lt;6.1.38-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714719" version="1" comment="virtualbox-websrv is &lt;6.1.38-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715790" version="1" comment="opera is &lt;91.0.4516.20-lp153.2.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716174" version="1" comment="lighttpd is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716175" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716176" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716177" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716178" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716179" version="1" comment="lighttpd-mod_magnet is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716180" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716181" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716182" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716183" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716184" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716185" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716186" version="1" comment="lighttpd-mod_webdav is &lt;1.4.66-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716300" version="1" comment="connman is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716301" version="1" comment="connman-client is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716302" version="1" comment="connman-devel is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716303" version="1" comment="connman-doc is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716304" version="1" comment="connman-nmcompat is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716305" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.41-bp153.2.6.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716306" version="1" comment="connman-plugin-iospm is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716307" version="1" comment="connman-plugin-l2tp is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716308" version="1" comment="connman-plugin-openvpn is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716309" version="1" comment="connman-plugin-polkit is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716310" version="1" comment="connman-plugin-pptp is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716311" version="1" comment="connman-plugin-tist is &lt;1.41-bp153.2.6.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716312" version="1" comment="connman-plugin-vpnc is &lt;1.41-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716313" version="1" comment="connman-plugin-wireguard is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716314" version="1" comment="connman-test is &lt;1.41-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717254" version="1" comment="chromedriver is &lt;106.0.5249.91-bp153.2.125.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717255" version="1" comment="chromium is &lt;106.0.5249.91-bp153.2.125.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717256" version="1" comment="lighttpd is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717257" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717258" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717259" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717260" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717261" version="1" comment="lighttpd-mod_magnet is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717262" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717263" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717264" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717265" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717266" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717267" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717268" version="1" comment="lighttpd-mod_webdav is &lt;1.4.67-bp154.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717269" version="1" comment="pngcheck is &lt;3.0.3-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717611" version="1" comment="gdcm is &lt;3.0.19-bp153.2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717612" version="1" comment="gdcm-applications is &lt;3.0.19-bp153.2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717613" version="1" comment="gdcm-devel is &lt;3.0.19-bp153.2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717614" version="1" comment="gdcm-examples is &lt;3.0.19-bp153.2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717615" version="1" comment="libgdcm3_0 is &lt;3.0.19-bp153.2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717616" version="1" comment="libsocketxx1_2 is &lt;3.0.19-bp153.2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717617" version="1" comment="orthanc is &lt;1.11.2-bp153.2.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717618" version="1" comment="orthanc-devel is &lt;1.11.2-bp153.2.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717619" version="1" comment="orthanc-doc is &lt;1.11.2-bp153.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717620" version="1" comment="orthanc-gdcm is &lt;1.5-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717621" version="1" comment="orthanc-source is &lt;1.11.2-bp153.2.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717622" version="1" comment="orthanc-webviewer is &lt;2.8-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717623" version="1" comment="python3-gdcm is &lt;3.0.19-bp153.2.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718205" version="1" comment="roundcubemail is &lt;1.5.3-bp154.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718209" version="1" comment="seamonkey is &lt;2.53.14-lp153.17.14.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718210" version="1" comment="seamonkey-dom-inspector is &lt;2.53.14-lp153.17.14.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718211" version="1" comment="seamonkey-irc is &lt;2.53.14-lp153.17.14.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718657" version="1" comment="chromedriver is &lt;106.0.5249.119-bp153.2.128.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718658" version="1" comment="chromium is &lt;106.0.5249.119-bp153.2.128.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719728" version="1" comment="v4l2loopback-autoload is &lt;0.12.5-lp153.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719729" version="1" comment="v4l2loopback-kmp-64kb is &lt;0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719730" version="1" comment="v4l2loopback-kmp-default is &lt;0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719731" version="1" comment="v4l2loopback-kmp-preempt is &lt;0.12.5_k5.3.18_150300.59.93-lp153.2.5.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719732" version="1" comment="v4l2loopback-utils is &lt;0.12.5-lp153.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722248" version="1" comment="cacti is &lt;1.2.22-bp154.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722249" version="1" comment="cacti-spine is &lt;1.2.22-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722304" version="1" comment="chromedriver is &lt;107.0.5304.87-bp153.2.133.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722305" version="1" comment="chromium is &lt;107.0.5304.87-bp153.2.133.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722306" version="1" comment="jhead is &lt;3.00-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722307" version="1" comment="opera is &lt;92.0.4561.21-lp153.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722726" version="1" comment="EternalTerminal is &lt;6.2.1-bp153.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724320" version="1" comment="deluge is &lt;2.1.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724321" version="1" comment="deluge-lang is &lt;2.1.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724455" version="1" comment="exim is &lt;4.94.2-bp153.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724456" version="1" comment="eximon is &lt;4.94.2-bp153.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724457" version="1" comment="eximstats-html is &lt;4.94.2-bp153.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725107" version="1" comment="autotrace is &lt;0.31.1-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725108" version="1" comment="autotrace-devel is &lt;0.31.1-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725109" version="1" comment="libautotrace3 is &lt;0.31.1-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725179" version="1" comment="chromedriver is &lt;107.0.5304.110-bp154.2.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725180" version="1" comment="chromium is &lt;107.0.5304.110-bp154.2.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725326" version="1" comment="jhead is &lt;3.00-bp153.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726160" version="1" comment="libtumbler-1-0 is &lt;4.16.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726161" version="1" comment="tumbler is &lt;4.16.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726162" version="1" comment="tumbler-devel is &lt;4.16.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726163" version="1" comment="tumbler-doc is &lt;4.16.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726164" version="1" comment="tumbler-folder-thumbnailer is &lt;4.16.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726165" version="1" comment="tumbler-lang is &lt;4.16.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726166" version="1" comment="tumbler-webp-thumbnailer is &lt;4.16.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726167" version="1" comment="libpano-devel is &lt;2.9.19-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726168" version="1" comment="libpano-utils is &lt;2.9.19-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726169" version="1" comment="libpano13-3 is &lt;2.9.19-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726159" version="1" comment="tor is &lt;0.4.7.11-bp154.2.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726740" version="1" comment="Botan is &lt;2.10.0-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726741" version="1" comment="Botan-doc is &lt;2.10.0-bp153.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726742" version="1" comment="libbotan-2-10 is &lt;2.10.0-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726743" version="1" comment="libbotan-2-10-32bit is &lt;2.10.0-bp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726744" version="1" comment="libbotan-2-10-64bit is &lt;2.10.0-bp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726745" version="1" comment="libbotan-devel is &lt;2.10.0-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726746" version="1" comment="libbotan-devel-32bit is &lt;2.10.0-bp153.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726747" version="1" comment="libbotan-devel-64bit is &lt;2.10.0-bp153.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726748" version="1" comment="python3-botan is &lt;2.10.0-bp153.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726749" version="1" comment="python3-joblib is &lt;0.16.0-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727168" version="1" comment="opera is &lt;93.0.4585.11-lp153.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727175" version="1" comment="chromedriver is &lt;107.0.5304.121-bp154.2.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727176" version="1" comment="chromium is &lt;107.0.5304.121-bp154.2.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727334" version="1" comment="rxvt-unicode is &lt;9.26-bp154.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727571" version="1" comment="chromedriver is &lt;108.0.5359.71-bp154.2.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727572" version="1" comment="chromium is &lt;108.0.5359.71-bp154.2.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727807" version="1" comment="chromedriver is &lt;108.0.5359.94-bp154.2.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727808" version="1" comment="chromium is &lt;108.0.5359.94-bp154.2.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728235" version="1" comment="python3-slixmpp is &lt;1.4.2-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729348" version="1" comment="chromedriver is &lt;108.0.5359.124-bp153.2.148.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729349" version="1" comment="chromium is &lt;108.0.5359.124-bp153.2.148.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730028" version="1" comment="libmbedcrypto3 is &lt;2.16.9-bp153.2.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730029" version="1" comment="libmbedcrypto3-32bit is &lt;2.16.9-bp153.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730030" version="1" comment="libmbedcrypto3-64bit is &lt;2.16.9-bp153.2.8.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730031" version="1" comment="libmbedtls12 is &lt;2.16.9-bp153.2.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730032" version="1" comment="libmbedtls12-32bit is &lt;2.16.9-bp153.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730033" version="1" comment="libmbedtls12-64bit is &lt;2.16.9-bp153.2.8.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730034" version="1" comment="libmbedx509-0 is &lt;2.16.9-bp153.2.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730035" version="1" comment="libmbedx509-0-32bit is &lt;2.16.9-bp153.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730036" version="1" comment="libmbedx509-0-64bit is &lt;2.16.9-bp153.2.8.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730037" version="1" comment="mbedtls-devel is &lt;2.16.9-bp153.2.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730671" version="1" comment="libvlc5 is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730672" version="1" comment="libvlccore9 is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730673" version="1" comment="vlc is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730674" version="1" comment="vlc-codec-gstreamer is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730675" version="1" comment="vlc-devel is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730676" version="1" comment="vlc-jack is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730677" version="1" comment="vlc-lang is &lt;3.0.18-bp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730678" version="1" comment="vlc-noX is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730679" version="1" comment="vlc-opencv is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730680" version="1" comment="vlc-qt is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730681" version="1" comment="vlc-vdpau is &lt;3.0.18-bp153.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695027" version="1" comment="opera is &lt;85.0.4341.28-lp153.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678926" version="1" comment="pdns is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678927" version="1" comment="pdns-backend-geoip is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678928" version="1" comment="pdns-backend-godbc is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678929" version="1" comment="pdns-backend-ldap is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678930" version="1" comment="pdns-backend-lua is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678931" version="1" comment="pdns-backend-mysql is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678932" version="1" comment="pdns-backend-postgresql is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678933" version="1" comment="pdns-backend-remote is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678934" version="1" comment="pdns-backend-sqlite3 is &lt;4.3.1-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678935" version="1" comment="pdns-recursor is &lt;4.3.5-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678936" version="1" comment="seamonkey is &lt;2.53.11.1-lp153.17.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678937" version="1" comment="seamonkey-dom-inspector is &lt;2.53.11.1-lp153.17.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678938" version="1" comment="seamonkey-irc is &lt;2.53.11.1-lp153.17.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663047" version="1" comment="jawn-ast is &lt;0.14.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663048" version="1" comment="jawn-json4s is &lt;0.14.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663049" version="1" comment="jawn-parser is &lt;0.14.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663050" version="1" comment="jawn-util is &lt;0.14.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679573" version="1" comment="chromedriver is &lt;100.0.4896.88-bp153.2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679574" version="1" comment="chromium is &lt;100.0.4896.88-bp153.2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679758" version="1" comment="htmldoc is &lt;1.9.12-bp153.2.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680129" version="1" comment="chromedriver is &lt;100.0.4896.127-bp153.2.85.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680130" version="1" comment="chromium is &lt;100.0.4896.127-bp153.2.85.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663526" version="1" comment="prosody is &lt;0.11.12-bp153.2.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695028" version="1" comment="opera is &lt;86.0.4363.23-lp153.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682741" version="1" comment="chromedriver is &lt;101.0.4951.54-bp153.2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682742" version="1" comment="chromium is &lt;101.0.4951.54-bp153.2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682743" version="1" comment="php-composer is &lt;1.10.26-bp153.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683850" version="1" comment="chromedriver is &lt;101.0.4951.64-bp153.2.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683851" version="1" comment="chromium is &lt;101.0.4951.64-bp153.2.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684113" version="1" comment="dxflib-devel is &lt;3.17.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684114" version="1" comment="libdxflib-3_17_0-1 is &lt;3.17.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684115" version="1" comment="python3-virtualbox is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684116" version="1" comment="virtualbox is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684117" version="1" comment="virtualbox-devel is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684118" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.34-lp153.2.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684119" version="1" comment="virtualbox-guest-source is &lt;6.1.34-lp153.2.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684120" version="1" comment="virtualbox-guest-tools is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684121" version="1" comment="virtualbox-guest-x11 is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684122" version="1" comment="virtualbox-host-source is &lt;6.1.34-lp153.2.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684123" version="1" comment="virtualbox-kmp-default is &lt;6.1.34_k5.3.18_150300.59.63-lp153.2.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684124" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.34_k5.3.18_150300.59.63-lp153.2.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684125" version="1" comment="virtualbox-qt is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684126" version="1" comment="virtualbox-vnc is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684127" version="1" comment="virtualbox-websrv is &lt;6.1.34-lp153.2.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684128" version="1" comment="civetweb is &lt;1.15-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684129" version="1" comment="civetweb-devel is &lt;1.15-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684130" version="1" comment="libcivetweb-cpp1_15_0 is &lt;1.15-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684131" version="1" comment="libcivetweb1_15_0 is &lt;1.15-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663788" version="1" comment="chromedriver is &lt;97.0.4692.71-bp153.2.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663789" version="1" comment="chromium is &lt;97.0.4692.71-bp153.2.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684132" version="1" comment="autotrace is &lt;0.31.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684133" version="1" comment="autotrace-devel is &lt;0.31.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684134" version="1" comment="libautotrace3 is &lt;0.31.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695029" version="1" comment="libxls-devel is &lt;1.6.2-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695030" version="1" comment="libxls-tools is &lt;1.6.2-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695031" version="1" comment="libxlsreader8 is &lt;1.6.2-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695032" version="1" comment="librecad is &lt;2.2.0~rc3-bp153.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695033" version="1" comment="librecad-parts is &lt;2.2.0~rc3-bp153.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695034" version="1" comment="cacti is &lt;1.2.20-bp153.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695035" version="1" comment="cacti-spine is &lt;1.2.20-bp153.2.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695036" version="1" comment="opera is &lt;87.0.4390.25-lp153.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695037" version="1" comment="libvarnishapi3 is &lt;7.1.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695038" version="1" comment="varnish is &lt;7.1.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695039" version="1" comment="varnish-devel is &lt;7.1.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695040" version="1" comment="libredwg-devel is &lt;0.12.5-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695041" version="1" comment="libredwg-tools is &lt;0.12.5-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695042" version="1" comment="libredwg0 is &lt;0.12.5-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695043" version="1" comment="seamonkey is &lt;2.53.12-lp153.17.8.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695044" version="1" comment="seamonkey-dom-inspector is &lt;2.53.12-lp153.17.8.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695045" version="1" comment="seamonkey-irc is &lt;2.53.12-lp153.17.8.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695046" version="1" comment="htmldoc is &lt;1.9.12-bp153.2.15.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663790" version="1" comment="python3-watchman is &lt;1.4.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663791" version="1" comment="watchman is &lt;4.9.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664354" version="1" comment="stb-devel is &lt;2.32.1549563867.59e9702-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664666" version="1" comment="chromedriver is &lt;97.0.4692.99-bp153.2.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664667" version="1" comment="chromium is &lt;97.0.4692.99-bp153.2.57.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664760" version="1" comment="python3-virtualbox is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664761" version="1" comment="virtualbox is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664762" version="1" comment="virtualbox-devel is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664763" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.1.32-lp153.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664764" version="1" comment="virtualbox-guest-source is &lt;6.1.32-lp153.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664765" version="1" comment="virtualbox-guest-tools is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664766" version="1" comment="virtualbox-guest-x11 is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664767" version="1" comment="virtualbox-host-source is &lt;6.1.32-lp153.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664768" version="1" comment="virtualbox-kmp-default is &lt;6.1.32_k5.3.18_59.40-lp153.2.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664769" version="1" comment="virtualbox-kmp-preempt is &lt;6.1.32_k5.3.18_59.40-lp153.2.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664770" version="1" comment="virtualbox-qt is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664771" version="1" comment="virtualbox-vnc is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664772" version="1" comment="virtualbox-websrv is &lt;6.1.32-lp153.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666873" version="1" comment="lighttpd is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666874" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666875" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666876" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666877" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666878" version="1" comment="lighttpd-mod_magnet is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666879" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666880" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666881" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666882" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666883" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666884" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666885" version="1" comment="lighttpd-mod_webdav is &lt;1.4.64-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667222" version="1" comment="chromedriver is &lt;98.0.4758.80-bp153.2.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667223" version="1" comment="chromium is &lt;98.0.4758.80-bp153.2.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668181" version="1" comment="zabbix-agent is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668182" version="1" comment="zabbix-java-gateway is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668183" version="1" comment="zabbix-phpfrontend is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668184" version="1" comment="zabbix-proxy is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668185" version="1" comment="zabbix-proxy-mysql is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668186" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668187" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668188" version="1" comment="zabbix-server is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668189" version="1" comment="zabbix-server-mysql is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668190" version="1" comment="zabbix-server-postgresql is &lt;4.0.37-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668008" version="1" comment="firejail is &lt;0.9.68-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668009" version="1" comment="kafka-kit is &lt;2.1.0-bp153.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668010" version="1" comment="kafka-source is &lt;2.1.0-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668218" version="1" comment="chromedriver is &lt;98.0.4758.102-bp153.2.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668219" version="1" comment="chromium is &lt;98.0.4758.102-bp153.2.63.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668220" version="1" comment="htmldoc is &lt;1.9.12-bp153.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695047" version="1" comment="opera is &lt;83.0.4254.27-lp153.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695048" version="1" comment="opera is &lt;84.0.4316.14-lp153.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670269" version="1" comment="libsphinxclient-0_0_1 is &lt;2.2.11-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670270" version="1" comment="libsphinxclient-devel is &lt;2.2.11-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670271" version="1" comment="sphinx is &lt;2.2.11-lp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670188" version="1" comment="connman is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670189" version="1" comment="connman-client is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670190" version="1" comment="connman-devel is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670191" version="1" comment="connman-doc is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670192" version="1" comment="connman-nmcompat is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670193" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.41-bp153.2.3.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670194" version="1" comment="connman-plugin-iospm is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670195" version="1" comment="connman-plugin-l2tp is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670196" version="1" comment="connman-plugin-openvpn is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670197" version="1" comment="connman-plugin-polkit is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670198" version="1" comment="connman-plugin-pptp is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670199" version="1" comment="connman-plugin-tist is &lt;1.41-bp153.2.3.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670200" version="1" comment="connman-plugin-vpnc is &lt;1.41-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670201" version="1" comment="connman-plugin-wireguard is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670202" version="1" comment="connman-test is &lt;1.41-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670203" version="1" comment="zabbix-agent is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670204" version="1" comment="zabbix-java-gateway is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670205" version="1" comment="zabbix-phpfrontend is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670206" version="1" comment="zabbix-proxy is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670207" version="1" comment="zabbix-proxy-mysql is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670208" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670209" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670210" version="1" comment="zabbix-server is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670211" version="1" comment="zabbix-server-mysql is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670212" version="1" comment="zabbix-server-postgresql is &lt;4.0.38-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670405" version="1" comment="mc is &lt;4.8.27-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670406" version="1" comment="mc-lang is &lt;4.8.27-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670407" version="1" comment="cobbler is &lt;3.1.2-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670408" version="1" comment="cobbler-tests is &lt;3.1.2-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670409" version="1" comment="cobbler-web is &lt;3.1.2-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670542" version="1" comment="envoy-proxy is &lt;1.14.6-bp153.3.4.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670543" version="1" comment="envoy-proxy-source is &lt;1.14.6-bp153.3.4.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670544" version="1" comment="libdxfrw-devel is &lt;1.0.1+git.20220109-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670545" version="1" comment="libdxfrw-tools is &lt;1.0.1+git.20220109-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670546" version="1" comment="libdxfrw1 is &lt;1.0.1+git.20220109-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670547" version="1" comment="librecad is &lt;2.2.0~rc3-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670548" version="1" comment="librecad-parts is &lt;2.2.0~rc3-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670549" version="1" comment="libshp-devel is &lt;1.5.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670550" version="1" comment="libshp2 is &lt;1.5.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670551" version="1" comment="shapelib is &lt;1.5.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670791" version="1" comment="nodejs-electron is &lt;16.0.9-bp153.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670792" version="1" comment="nodejs-electron-devel is &lt;16.0.9-bp153.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670793" version="1" comment="bitcoin-qt5 is &lt;0.21.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670794" version="1" comment="bitcoin-test is &lt;0.21.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670795" version="1" comment="bitcoin-utils is &lt;0.21.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670796" version="1" comment="bitcoind is &lt;0.21.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670797" version="1" comment="libbitcoinconsensus-devel is &lt;0.21.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670798" version="1" comment="libbitcoinconsensus0 is &lt;0.21.2-bp153.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671072" version="1" comment="perl-App-cpanminus is &lt;1.7045-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671271" version="1" comment="chromedriver is &lt;99.0.4844.51-bp153.2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671272" version="1" comment="chromium is &lt;99.0.4844.51-bp153.2.66.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695049" version="1" comment="opera is &lt;84.0.4316.21-lp153.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672558" version="1" comment="minidlna is &lt;1.3.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673312" version="1" comment="ansible is &lt;2.9.21-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673313" version="1" comment="ansible-doc is &lt;2.9.21-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673314" version="1" comment="ansible-test is &lt;2.9.21-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673716" version="1" comment="weechat is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673717" version="1" comment="weechat-devel is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673718" version="1" comment="weechat-lang is &lt;3.2.1-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673719" version="1" comment="weechat-lua is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673720" version="1" comment="weechat-perl is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673721" version="1" comment="weechat-python is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673722" version="1" comment="weechat-ruby is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673723" version="1" comment="weechat-spell is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673724" version="1" comment="weechat-tcl is &lt;3.2.1-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673868" version="1" comment="chromedriver is &lt;99.0.4844.74-bp153.2.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673869" version="1" comment="chromium is &lt;99.0.4844.74-bp153.2.69.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677063" version="1" comment="chromedriver is &lt;99.0.4844.84-bp153.2.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677064" version="1" comment="chromium is &lt;99.0.4844.84-bp153.2.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677851" version="1" comment="openSUSE-build-key is &lt;1.0-lp153.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677852" version="1" comment="fish3 is &lt;3.3.1-bp153.2.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677853" version="1" comment="fish3-devel is &lt;3.3.1-bp153.2.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677854" version="1" comment="icingacli is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677855" version="1" comment="icingaweb2 is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677856" version="1" comment="icingaweb2-common is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677857" version="1" comment="icingaweb2-vendor-HTMLPurifier is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677858" version="1" comment="icingaweb2-vendor-JShrink is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677859" version="1" comment="icingaweb2-vendor-Parsedown is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677860" version="1" comment="icingaweb2-vendor-dompdf is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677861" version="1" comment="icingaweb2-vendor-lessphp is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677862" version="1" comment="icingaweb2-vendor-zf1 is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677863" version="1" comment="php-Icinga is &lt;2.8.6-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677864" version="1" comment="nextcloud is &lt;21.0.9-bp153.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677865" version="1" comment="nextcloud-apache is &lt;21.0.9-bp153.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730894" version="1" comment="minetest is &lt;5.6.0-bp154.2.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730895" version="1" comment="minetest-data is &lt;5.6.0-bp154.2.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730896" version="1" comment="minetest-lang is &lt;5.6.0-bp154.2.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730897" version="1" comment="minetestserver is &lt;5.6.0-bp154.2.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732611" version="1" comment="libasn1-8 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732612" version="1" comment="libgssapi3 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732613" version="1" comment="libhcrypto4 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732614" version="1" comment="libhdb9 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732615" version="1" comment="libheimbase1 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732616" version="1" comment="libheimdal-devel is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732617" version="1" comment="libheimedit0 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732618" version="1" comment="libheimntlm0 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732619" version="1" comment="libhx509-5 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732620" version="1" comment="libkadm5clnt7 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732621" version="1" comment="libkadm5srv8 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732622" version="1" comment="libkafs0 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732623" version="1" comment="libkdc2 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732624" version="1" comment="libkrb5-26 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732625" version="1" comment="libotp0 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732626" version="1" comment="libroken18 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732627" version="1" comment="libsl0 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732628" version="1" comment="libwind0 is &lt;7.8.0-bp153.2.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732629" version="1" comment="tor is &lt;0.4.7.13-bp153.2.24.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730948" version="1" comment="multimon-ng is &lt;1.2.0-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738549" version="1" comment="libpkgconf-devel is &lt;1.5.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738550" version="1" comment="libpkgconf3 is &lt;1.5.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738551" version="1" comment="pkgconf is &lt;1.5.3-bp153.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730949" version="1" comment="python3-Django is &lt;2.2.28-bp153.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497897" version="1" comment="djvulibre is &lt;3.5.27-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620119" version="1" comment="djvulibre-doc is &lt;3.5.27-11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495781" version="1" comment="libdjvulibre-devel is &lt;3.5.27-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495782" version="1" comment="libdjvulibre21 is &lt;3.5.27-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493926" version="1" comment="graphviz is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493927" version="1" comment="graphviz-devel is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625252" version="1" comment="graphviz-doc is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501511" version="1" comment="graphviz-gd is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497898" version="1" comment="graphviz-gnome is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625253" version="1" comment="graphviz-guile is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625254" version="1" comment="graphviz-gvedit is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625255" version="1" comment="graphviz-java is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625256" version="1" comment="graphviz-lua is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496550" version="1" comment="graphviz-perl is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625257" version="1" comment="graphviz-php is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493928" version="1" comment="graphviz-plugins-core is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501512" version="1" comment="graphviz-python is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625258" version="1" comment="graphviz-ruby is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625259" version="1" comment="graphviz-smyrna is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499860" version="1" comment="graphviz-tcl is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493929" version="1" comment="libgraphviz6 is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493935" version="1" comment="fribidi is &lt;1.0.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493936" version="1" comment="fribidi-devel is &lt;1.0.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493937" version="1" comment="libfribidi0 is &lt;1.0.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495783" version="1" comment="libfribidi0-32bit is &lt;1.0.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495784" version="1" comment="libass-devel is &lt;0.14.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495785" version="1" comment="libass9 is &lt;0.14.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620163" version="1" comment="libass9-32bit is &lt;0.14.0-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620165" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.292-3.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620166" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.292-3.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620167" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.292-3.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620168" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.292-3.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620169" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.292-3.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620170" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.292-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620171" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.292-3.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493942" version="1" comment="libu2f-host-devel is &lt;1.1.10-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625260" version="1" comment="libu2f-host-doc is &lt;1.1.10-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493943" version="1" comment="libu2f-host0 is &lt;1.1.10-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493944" version="1" comment="u2f-host is &lt;1.1.10-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501513" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625261" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625262" version="1" comment="hivex is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493945" version="1" comment="hivex-devel is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620211" version="1" comment="hivex-lang is &lt;1.3.14-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493946" version="1" comment="libhivex0 is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496552" version="1" comment="ocaml-hivex is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496553" version="1" comment="ocaml-hivex-devel is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493947" version="1" comment="perl-Win-Hivex is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625263" version="1" comment="python-hivex is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493948" version="1" comment="curl is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625264" version="1" comment="curl-mini is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493949" version="1" comment="libcurl-devel is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620220" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625265" version="1" comment="libcurl-mini-devel is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493950" version="1" comment="libcurl4 is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493951" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625266" version="1" comment="libcurl4-mini is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493960" version="1" comment="postgresql13 is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499880" version="1" comment="postgresql13-contrib is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499881" version="1" comment="postgresql13-devel is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499882" version="1" comment="postgresql13-docs is &lt;13.3-5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625268" version="1" comment="postgresql13-llvmjit is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499883" version="1" comment="postgresql13-plperl is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499884" version="1" comment="postgresql13-plpython is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499885" version="1" comment="postgresql13-pltcl is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499886" version="1" comment="postgresql13-server is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499887" version="1" comment="postgresql13-server-devel is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497901" version="1" comment="postgresql13-test is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497902" version="1" comment="python2-httplib2 is &lt;0.19.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493961" version="1" comment="python3-httplib2 is &lt;0.19.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500096" version="1" comment="nginx is &lt;1.19.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500097" version="1" comment="nginx-source is &lt;1.19.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620366" version="1" comment="vim-plugin-nginx is &lt;1.19.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493962" version="1" comment="gstreamer is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497903" version="1" comment="gstreamer-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494282" version="1" comment="gstreamer-devel is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625269" version="1" comment="gstreamer-doc is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493963" version="1" comment="gstreamer-lang is &lt;1.16.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493964" version="1" comment="gstreamer-plugins-base is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620380" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494283" version="1" comment="gstreamer-plugins-base-devel is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620383" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625270" version="1" comment="gstreamer-plugins-base-doc is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493965" version="1" comment="gstreamer-plugins-base-lang is &lt;1.16.3-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493966" version="1" comment="gstreamer-plugins-good is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620387" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625271" version="1" comment="gstreamer-plugins-good-doc is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625272" version="1" comment="gstreamer-plugins-good-extra is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620391" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625273" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625274" version="1" comment="gstreamer-plugins-good-jack is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620395" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493967" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625275" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625276" version="1" comment="gstreamer-plugins-ugly is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620399" version="1" comment="gstreamer-plugins-ugly-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625277" version="1" comment="gstreamer-plugins-ugly-doc is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509390" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.16.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494284" version="1" comment="gstreamer-utils is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493968" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620407" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493969" version="1" comment="libgstapp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620410" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493970" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497904" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493971" version="1" comment="libgstfft-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620424" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493972" version="1" comment="libgstgl-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620427" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493973" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620439" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493975" version="1" comment="libgstreamer-1_0-0 is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497905" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493976" version="1" comment="libgstriff-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620450" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493977" version="1" comment="libgstrtp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620453" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493978" version="1" comment="libgstrtsp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620456" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493979" version="1" comment="libgstsdp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620462" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493980" version="1" comment="libgsttag-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497906" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493981" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497907" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493982" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494285" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494286" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494287" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494288" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494289" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494290" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494291" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494292" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494293" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494294" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494295" version="1" comment="liblz4-1 is &lt;1.9.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494296" version="1" comment="liblz4-1-32bit is &lt;1.9.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494297" version="1" comment="liblz4-devel is &lt;1.9.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494298" version="1" comment="lz4 is &lt;1.9.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500098" version="1" comment="bind is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500099" version="1" comment="bind-chrootenv is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494299" version="1" comment="bind-devel is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500100" version="1" comment="bind-doc is &lt;9.16.6-22.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494300" version="1" comment="bind-utils is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494301" version="1" comment="libbind9-1600 is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494302" version="1" comment="libdns1605 is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494303" version="1" comment="libirs-devel is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494304" version="1" comment="libirs1601 is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494305" version="1" comment="libisc1606 is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494306" version="1" comment="libisccc1600 is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494307" version="1" comment="libisccfg1600 is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494308" version="1" comment="libns1604 is &lt;9.16.6-22.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494309" version="1" comment="python3-bind is &lt;9.16.6-22.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620511" version="1" comment="ceph is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620512" version="1" comment="ceph-base is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493983" version="1" comment="ceph-common is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620513" version="1" comment="ceph-fuse is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620514" version="1" comment="ceph-grafana-dashboards is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620515" version="1" comment="ceph-immutable-object-cache is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620516" version="1" comment="ceph-mds is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620517" version="1" comment="ceph-mgr is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620518" version="1" comment="ceph-mgr-cephadm is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620519" version="1" comment="ceph-mgr-dashboard is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620520" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620521" version="1" comment="ceph-mgr-diskprediction-local is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620522" version="1" comment="ceph-mgr-k8sevents is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620523" version="1" comment="ceph-mgr-modules-core is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620524" version="1" comment="ceph-mgr-rook is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620525" version="1" comment="ceph-mon is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620526" version="1" comment="ceph-osd is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620527" version="1" comment="ceph-prometheus-alerts is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620528" version="1" comment="ceph-radosgw is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620529" version="1" comment="ceph-test is &lt;15.2.12.83+g528da226523-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601179" version="1" comment="cephadm is &lt;15.2.12.83+g528da226523-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620530" version="1" comment="cephfs-shell is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493984" version="1" comment="libcephfs-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493985" version="1" comment="libcephfs2 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493986" version="1" comment="librados-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493987" version="1" comment="librados2 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493988" version="1" comment="libradospp-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493989" version="1" comment="librbd-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493990" version="1" comment="librbd1 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493991" version="1" comment="librgw-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493992" version="1" comment="librgw2 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493993" version="1" comment="python3-ceph-argparse is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493994" version="1" comment="python3-ceph-common is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493995" version="1" comment="python3-cephfs is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493996" version="1" comment="python3-rados is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493997" version="1" comment="python3-rbd is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493998" version="1" comment="python3-rgw is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493999" version="1" comment="rados-objclass-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620531" version="1" comment="rbd-fuse is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620532" version="1" comment="rbd-mirror is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494000" version="1" comment="rbd-nbd is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496554" version="1" comment="xstream is &lt;1.4.16-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620562" version="1" comment="xstream-benchmark is &lt;1.4.16-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620563" version="1" comment="xstream-javadoc is &lt;1.4.16-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620564" version="1" comment="xstream-parent is &lt;1.4.16-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494008" version="1" comment="dhcp is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494009" version="1" comment="dhcp-client is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494010" version="1" comment="dhcp-devel is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625278" version="1" comment="dhcp-doc is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499890" version="1" comment="dhcp-relay is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499891" version="1" comment="dhcp-server is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494011" version="1" comment="libpolkit0 is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620572" version="1" comment="libpolkit0-32bit is &lt;0.116-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494012" version="1" comment="polkit is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494013" version="1" comment="polkit-devel is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620576" version="1" comment="polkit-doc is &lt;0.116-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494014" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625279" version="1" comment="python-avahi is &lt;0.6.32-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625280" version="1" comment="python-avahi-gtk is &lt;0.6.32-5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625281" version="1" comment="MozillaThunderbird is &lt;78.10.2-8.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625282" version="1" comment="MozillaThunderbird-translations-common is &lt;78.10.2-8.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625283" version="1" comment="MozillaThunderbird-translations-other is &lt;78.10.2-8.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498299" version="1" comment="python2-py is &lt;1.8.1-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494015" version="1" comment="python3-py is &lt;1.8.1-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504861" version="1" comment="libwebp6 is &lt;0.5.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497908" version="1" comment="libwebp6-32bit is &lt;0.5.0-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504862" version="1" comment="libwebpdecoder2 is &lt;0.5.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620676" version="1" comment="libwebpdecoder2-32bit is &lt;0.5.0-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504864" version="1" comment="libwebpextras0 is &lt;0.5.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620682" version="1" comment="libwebpextras0-32bit is &lt;0.5.0-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504865" version="1" comment="libwebpmux2 is &lt;0.5.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620685" version="1" comment="libwebpmux2-32bit is &lt;0.5.0-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494421" version="1" comment="umoci is &lt;0.4.7-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496555" version="1" comment="snakeyaml is &lt;1.28-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620688" version="1" comment="snakeyaml-javadoc is &lt;1.28-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495810" version="1" comment="MozillaFirefox is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625284" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625285" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.11.0-8.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495811" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495812" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495813" version="1" comment="MozillaFirefox-translations-other is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499918" version="1" comment="pam_radius is &lt;1.4.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620767" version="1" comment="pam_radius-32bit is &lt;1.4.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494024" version="1" comment="libX11-6 is &lt;1.6.5-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494025" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494026" version="1" comment="libX11-data is &lt;1.6.5-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494027" version="1" comment="libX11-devel is &lt;1.6.5-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620772" version="1" comment="libX11-devel-32bit is &lt;1.6.5-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494028" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494029" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495814" version="1" comment="libmodplug-devel is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495815" version="1" comment="libmodplug1 is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620863" version="1" comment="libmodplug1-32bit is &lt;0.3.28-2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495816" version="1" comment="libopenmpt-devel is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495817" version="1" comment="libopenmpt0 is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620867" version="1" comment="libopenmpt0-32bit is &lt;0.3.28-2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495818" version="1" comment="libopenmpt_modplug1 is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620870" version="1" comment="libopenmpt_modplug1-32bit is &lt;0.3.28-2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625286" version="1" comment="openmpt123 is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494030" version="1" comment="libxml2-2 is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494031" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494032" version="1" comment="libxml2-devel is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620889" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620891" version="1" comment="libxml2-doc is &lt;2.9.7-3.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494033" version="1" comment="libxml2-tools is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498300" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494034" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494035" version="1" comment="ucode-intel is &lt;20210525-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500101" version="1" comment="qemu is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625287" version="1" comment="qemu-arm is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625288" version="1" comment="qemu-audio-alsa is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625289" version="1" comment="qemu-audio-pa is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625290" version="1" comment="qemu-audio-spice is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500106" version="1" comment="qemu-block-curl is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625291" version="1" comment="qemu-block-dmg is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625292" version="1" comment="qemu-block-gluster is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500107" version="1" comment="qemu-block-iscsi is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625293" version="1" comment="qemu-block-nfs is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500108" version="1" comment="qemu-block-rbd is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500109" version="1" comment="qemu-block-ssh is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500110" version="1" comment="qemu-chardev-baum is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625294" version="1" comment="qemu-chardev-spice is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625295" version="1" comment="qemu-extra is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500112" version="1" comment="qemu-guest-agent is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625296" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625297" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625298" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625299" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625300" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625301" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625302" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500119" version="1" comment="qemu-ipxe is &lt;1.0.0+-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625303" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500120" version="1" comment="qemu-ksm is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500121" version="1" comment="qemu-kvm is &lt;5.2.0-17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500122" version="1" comment="qemu-lang is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620964" version="1" comment="qemu-microvm is &lt;5.2.0-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625304" version="1" comment="qemu-ppc is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625305" version="1" comment="qemu-s390x is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500125" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500126" version="1" comment="qemu-sgabios is &lt;8-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500127" version="1" comment="qemu-skiboot is &lt;5.2.0-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494310" version="1" comment="qemu-tools is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500128" version="1" comment="qemu-ui-curses is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625306" version="1" comment="qemu-ui-gtk is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625307" version="1" comment="qemu-ui-opengl is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625308" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625309" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500133" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625310" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625311" version="1" comment="qemu-x86 is &lt;5.2.0-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497909" version="1" comment="djvulibre is &lt;3.5.27-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621028" version="1" comment="djvulibre-doc is &lt;3.5.27-11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495819" version="1" comment="libdjvulibre-devel is &lt;3.5.27-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495820" version="1" comment="libdjvulibre21 is &lt;3.5.27-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494312" version="1" comment="python3-salt is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494313" version="1" comment="salt is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500135" version="1" comment="salt-api is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494314" version="1" comment="salt-bash-completion is &lt;3002.2-8.41.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500136" version="1" comment="salt-cloud is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494315" version="1" comment="salt-doc is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500137" version="1" comment="salt-fish-completion is &lt;3002.2-8.41.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500138" version="1" comment="salt-master is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494316" version="1" comment="salt-minion is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500139" version="1" comment="salt-proxy is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500140" version="1" comment="salt-ssh is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500141" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500142" version="1" comment="salt-syndic is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500182" version="1" comment="salt-transactional-update is &lt;3002.2-8.41.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494317" version="1" comment="salt-zsh-completion is &lt;3002.2-8.41.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494422" version="1" comment="containerd is &lt;1.4.4-5.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625312" version="1" comment="containerd-ctr is &lt;1.4.4-5.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494423" version="1" comment="docker is &lt;20.10.6_ce-6.49.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494424" version="1" comment="docker-bash-completion is &lt;20.10.6_ce-6.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494432" version="1" comment="docker-fish-completion is &lt;20.10.6_ce-6.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621052" version="1" comment="docker-zsh-completion is &lt;20.10.6_ce-6.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494425" version="1" comment="runc is &lt;1.0.0~rc93-1.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497910" version="1" comment="libjpeg-turbo is &lt;1.5.3-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494039" version="1" comment="libjpeg62 is &lt;62.2.0-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621058" version="1" comment="libjpeg62-32bit is &lt;62.2.0-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494040" version="1" comment="libjpeg62-devel is &lt;62.2.0-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621061" version="1" comment="libjpeg62-devel-32bit is &lt;62.2.0-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625313" version="1" comment="libjpeg62-turbo is &lt;1.5.3-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494041" version="1" comment="libjpeg8 is &lt;8.1.2-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495821" version="1" comment="libjpeg8-32bit is &lt;8.1.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494042" version="1" comment="libjpeg8-devel is &lt;8.1.2-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621067" version="1" comment="libjpeg8-devel-32bit is &lt;8.1.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494043" version="1" comment="libturbojpeg0 is &lt;8.1.2-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621070" version="1" comment="libturbojpeg0-32bit is &lt;8.1.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499923" version="1" comment="squid is &lt;4.15-5.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494046" version="1" comment="postgresql10 is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497146" version="1" comment="postgresql10-contrib is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497147" version="1" comment="postgresql10-devel is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499924" version="1" comment="postgresql10-docs is &lt;10.17-8.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497148" version="1" comment="postgresql10-plperl is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497149" version="1" comment="postgresql10-plpython is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497150" version="1" comment="postgresql10-pltcl is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497151" version="1" comment="postgresql10-server is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625314" version="1" comment="postgresql10-test is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621082" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621083" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621084" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498194" version="1" comment="kernel-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498195" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621085" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621086" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621087" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498196" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498197" version="1" comment="kernel-source-azure is &lt;5.3.18-38.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498198" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621088" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621089" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621090" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621091" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501742" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621092" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621093" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501743" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621094" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621095" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501744" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621096" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494318" version="1" comment="kernel-64kb is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494319" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621097" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621098" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621099" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621100" version="1" comment="kernel-debug is &lt;5.3.18-59.5.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621101" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.5.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621102" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.5.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494320" version="1" comment="kernel-default is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494321" version="1" comment="kernel-default-base is &lt;5.3.18-59.5.2.18.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621103" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.5.2.18.2.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494322" version="1" comment="kernel-default-devel is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621104" version="1" comment="kernel-default-extra is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621105" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621106" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621107" version="1" comment="kernel-default-optional is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494323" version="1" comment="kernel-devel is &lt;5.3.18-59.5.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496652" version="1" comment="kernel-docs is &lt;5.3.18-59.5.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621108" version="1" comment="kernel-docs-html is &lt;5.3.18-59.5.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621109" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.5.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621110" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.5.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621111" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.5.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494324" version="1" comment="kernel-macros is &lt;5.3.18-59.5.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496653" version="1" comment="kernel-obs-build is &lt;5.3.18-59.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621113" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494325" version="1" comment="kernel-preempt is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496654" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621114" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621115" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621116" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496655" version="1" comment="kernel-source is &lt;5.3.18-59.5.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621117" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.5.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496656" version="1" comment="kernel-syms is &lt;5.3.18-59.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494326" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.5.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621118" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621119" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621120" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621121" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501745" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621122" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621123" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.5.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497152" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.5.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621124" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.5.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497125" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625315" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497126" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497127" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497128" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621130" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.292-3.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625316" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494047" version="1" comment="postgresql12 is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497153" version="1" comment="postgresql12-contrib is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497154" version="1" comment="postgresql12-devel is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497155" version="1" comment="postgresql12-docs is &lt;12.7-8.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625317" version="1" comment="postgresql12-llvmjit is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497156" version="1" comment="postgresql12-plperl is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497157" version="1" comment="postgresql12-plpython is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497158" version="1" comment="postgresql12-pltcl is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497159" version="1" comment="postgresql12-server is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497160" version="1" comment="postgresql12-server-devel is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625318" version="1" comment="postgresql12-test is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496563" version="1" comment="xstream is &lt;1.4.17-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621142" version="1" comment="xstream-benchmark is &lt;1.4.17-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621143" version="1" comment="xstream-javadoc is &lt;1.4.17-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621144" version="1" comment="xstream-parent is &lt;1.4.17-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494327" version="1" comment="tpm2.0-tools is &lt;4.3.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625319" version="1" comment="MozillaThunderbird is &lt;78.11.0-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625320" version="1" comment="MozillaThunderbird-translations-common is &lt;78.11.0-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625321" version="1" comment="MozillaThunderbird-translations-other is &lt;78.11.0-8.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621158" version="1" comment="jetty-annotations is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621159" version="1" comment="jetty-client is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621160" version="1" comment="jetty-continuation is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496564" version="1" comment="jetty-http is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496565" version="1" comment="jetty-io is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621161" version="1" comment="jetty-jaas is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621162" version="1" comment="jetty-javax-websocket-client-impl is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621163" version="1" comment="jetty-javax-websocket-server-impl is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621164" version="1" comment="jetty-jmx is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621165" version="1" comment="jetty-jndi is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621166" version="1" comment="jetty-jsp is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621167" version="1" comment="jetty-minimal-javadoc is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621168" version="1" comment="jetty-openid is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621169" version="1" comment="jetty-plus is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621170" version="1" comment="jetty-proxy is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496566" version="1" comment="jetty-security is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496567" version="1" comment="jetty-server is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496568" version="1" comment="jetty-servlet is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496569" version="1" comment="jetty-util is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496570" version="1" comment="jetty-util-ajax is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621171" version="1" comment="jetty-webapp is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621172" version="1" comment="jetty-websocket-api is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621173" version="1" comment="jetty-websocket-client is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621174" version="1" comment="jetty-websocket-common is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621175" version="1" comment="jetty-websocket-javadoc is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621176" version="1" comment="jetty-websocket-server is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621177" version="1" comment="jetty-websocket-servlet is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621178" version="1" comment="jetty-xml is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497911" version="1" comment="python2-rsa is &lt;3.4.2-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494053" version="1" comment="python3-rsa is &lt;3.4.2-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494054" version="1" comment="xterm is &lt;330-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494055" version="1" comment="xterm-bin is &lt;330-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494329" version="1" comment="python3-urllib3 is &lt;1.25.10-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498301" version="1" comment="python2-distro is &lt;1.5.0-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494057" version="1" comment="python3-distro is &lt;1.5.0-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500177" version="1" comment="ovmf is &lt;202008-10.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500178" version="1" comment="ovmf-tools is &lt;202008-10.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621227" version="1" comment="qemu-ovmf-ia32 is &lt;202008-10.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500179" version="1" comment="qemu-ovmf-x86_64 is &lt;202008-10.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621228" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202008-10.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621229" version="1" comment="qemu-uefi-aarch32 is &lt;202008-10.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500180" version="1" comment="qemu-uefi-aarch64 is &lt;202008-10.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499955" version="1" comment="dovecot23 is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499956" version="1" comment="dovecot23-backend-mysql is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499957" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499958" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499959" version="1" comment="dovecot23-devel is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499960" version="1" comment="dovecot23-fts is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499961" version="1" comment="dovecot23-fts-lucene is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499962" version="1" comment="dovecot23-fts-solr is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499963" version="1" comment="dovecot23-fts-squat is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494064" version="1" comment="libsbc1 is &lt;1.3-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621265" version="1" comment="libsbc1-32bit is &lt;1.3-3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494065" version="1" comment="libwireshark14 is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494066" version="1" comment="libwiretap11 is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494067" version="1" comment="libwsutil12 is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625322" version="1" comment="sbc is &lt;1.3-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495822" version="1" comment="sbc-devel is &lt;1.3-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494068" version="1" comment="wireshark is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495823" version="1" comment="wireshark-devel is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495824" version="1" comment="wireshark-ui-qt is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494069" version="1" comment="apache2 is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499964" version="1" comment="apache2-devel is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499965" version="1" comment="apache2-doc is &lt;2.4.43-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497924" version="1" comment="apache2-event is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625323" version="1" comment="apache2-example-pages is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494070" version="1" comment="apache2-prefork is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494071" version="1" comment="apache2-utils is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499966" version="1" comment="apache2-worker is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494072" version="1" comment="cryptctl is &lt;2.4-4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494073" version="1" comment="libhogweed4 is &lt;3.4.1-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494074" version="1" comment="libhogweed4-32bit is &lt;3.4.1-4.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494075" version="1" comment="libnettle-devel is &lt;3.4.1-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621316" version="1" comment="libnettle-devel-32bit is &lt;3.4.1-4.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494076" version="1" comment="libnettle6 is &lt;3.4.1-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494077" version="1" comment="libnettle6-32bit is &lt;3.4.1-4.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625324" version="1" comment="nettle is &lt;3.4.1-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499967" version="1" comment="freeradius-server is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499968" version="1" comment="freeradius-server-devel is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625325" version="1" comment="freeradius-server-doc is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499969" version="1" comment="freeradius-server-krb5 is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499970" version="1" comment="freeradius-server-ldap is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499971" version="1" comment="freeradius-server-libs is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499972" version="1" comment="freeradius-server-mysql is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499973" version="1" comment="freeradius-server-perl is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499974" version="1" comment="freeradius-server-postgresql is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499975" version="1" comment="freeradius-server-python3 is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499976" version="1" comment="freeradius-server-sqlite is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499977" version="1" comment="freeradius-server-utils is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495825" version="1" comment="libgupnp-1_2-0 is &lt;1.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621338" version="1" comment="libgupnp-1_2-0-32bit is &lt;1.2.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497912" version="1" comment="libgupnp-devel is &lt;1.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497913" version="1" comment="typelib-1_0-GUPnP-1_0 is &lt;1.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625326" version="1" comment="libgcrypt-cavs is &lt;1.8.2-8.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494078" version="1" comment="libgcrypt-devel is &lt;1.8.2-8.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621352" version="1" comment="libgcrypt-devel-32bit is &lt;1.8.2-8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494079" version="1" comment="libgcrypt20 is &lt;1.8.2-8.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494080" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494081" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-8.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494082" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495826" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621359" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495827" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621362" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625327" version="1" comment="openexr is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495828" version="1" comment="openexr-devel is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625328" version="1" comment="openexr-doc is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496561" version="1" comment="bouncycastle is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621371" version="1" comment="bouncycastle-javadoc is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621372" version="1" comment="bouncycastle-mail is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496562" version="1" comment="bouncycastle-pg is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621373" version="1" comment="bouncycastle-pkix is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621374" version="1" comment="bouncycastle-tls is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615873" version="1" comment="arpwatch is &lt;2.1a15-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625329" version="1" comment="arpwatch-ethercodes-build is &lt;2.1a15-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621377" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615914" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621378" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621379" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615915" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621380" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621381" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615916" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621382" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615876" version="1" comment="kernel-64kb is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615877" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621383" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621384" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621385" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621386" version="1" comment="kernel-debug is &lt;5.3.18-59.10.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621387" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.10.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621388" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.10.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615878" version="1" comment="kernel-default is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615879" version="1" comment="kernel-default-base is &lt;5.3.18-59.10.1.18.4.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621389" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.10.1.18.4.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615880" version="1" comment="kernel-default-devel is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621390" version="1" comment="kernel-default-extra is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621391" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621392" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621393" version="1" comment="kernel-default-optional is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615881" version="1" comment="kernel-devel is &lt;5.3.18-59.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615897" version="1" comment="kernel-docs is &lt;5.3.18-59.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621394" version="1" comment="kernel-docs-html is &lt;5.3.18-59.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621395" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.10.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621396" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.10.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621397" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.10.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615882" version="1" comment="kernel-macros is &lt;5.3.18-59.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615898" version="1" comment="kernel-obs-build is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621399" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615883" version="1" comment="kernel-preempt is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615899" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621400" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621401" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621402" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615900" version="1" comment="kernel-source is &lt;5.3.18-59.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621403" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615901" version="1" comment="kernel-syms is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615884" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.10.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621404" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621405" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621406" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621407" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615917" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621408" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621409" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615902" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621410" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615799" version="1" comment="go1.16 is &lt;1.16.5-1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615800" version="1" comment="go1.16-doc is &lt;1.16.5-1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615801" version="1" comment="go1.16-race is &lt;1.16.5-1.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494048" version="1" comment="liblua5_3-5 is &lt;5.3.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494049" version="1" comment="liblua5_3-5-32bit is &lt;5.3.6-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494050" version="1" comment="lua53 is &lt;5.3.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494051" version="1" comment="lua53-devel is &lt;5.3.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621417" version="1" comment="lua53-doc is &lt;5.3.6-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621419" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621420" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621421" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615909" version="1" comment="kernel-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615910" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621422" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621423" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621424" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615911" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615912" version="1" comment="kernel-source-azure is &lt;5.3.18-38.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615913" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621425" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621426" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621427" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500143" version="1" comment="qemu is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625330" version="1" comment="qemu-arm is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625331" version="1" comment="qemu-audio-alsa is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625332" version="1" comment="qemu-audio-pa is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625333" version="1" comment="qemu-audio-spice is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500148" version="1" comment="qemu-block-curl is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625334" version="1" comment="qemu-block-dmg is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625335" version="1" comment="qemu-block-gluster is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500149" version="1" comment="qemu-block-iscsi is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625336" version="1" comment="qemu-block-nfs is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500150" version="1" comment="qemu-block-rbd is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500151" version="1" comment="qemu-block-ssh is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500152" version="1" comment="qemu-chardev-baum is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625337" version="1" comment="qemu-chardev-spice is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625338" version="1" comment="qemu-extra is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500154" version="1" comment="qemu-guest-agent is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625339" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625340" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625341" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625342" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625343" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625344" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625345" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500161" version="1" comment="qemu-ipxe is &lt;1.0.0+-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625346" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500162" version="1" comment="qemu-ksm is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500163" version="1" comment="qemu-kvm is &lt;5.2.0-20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500164" version="1" comment="qemu-lang is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009621498" version="1" comment="qemu-microvm is &lt;5.2.0-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625347" version="1" comment="qemu-ppc is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625348" version="1" comment="qemu-s390x is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500167" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500168" version="1" comment="qemu-sgabios is &lt;8-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500169" version="1" comment="qemu-skiboot is &lt;5.2.0-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494328" version="1" comment="qemu-tools is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500170" version="1" comment="qemu-ui-curses is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625349" version="1" comment="qemu-ui-gtk is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625350" version="1" comment="qemu-ui-opengl is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625351" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625352" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500175" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625353" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625354" version="1" comment="qemu-x86 is &lt;5.2.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615796" version="1" comment="go1.15 is &lt;1.15.13-1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615797" version="1" comment="go1.15-doc is &lt;1.15.13-1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615798" version="1" comment="go1.15-race is &lt;1.15.13-1.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494433" version="1" comment="kubevirt-container-disk is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624273" version="1" comment="kubevirt-manifests is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624337" version="1" comment="kubevirt-tests is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494434" version="1" comment="kubevirt-virt-api is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494435" version="1" comment="kubevirt-virt-controller is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494436" version="1" comment="kubevirt-virt-handler is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494437" version="1" comment="kubevirt-virt-launcher is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494438" version="1" comment="kubevirt-virt-operator is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494426" version="1" comment="kubevirt-virtctl is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615874" version="1" comment="bluez is &lt;5.55-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624651" version="1" comment="bluez-auto-enable-devices is &lt;5.55-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625355" version="1" comment="bluez-cups is &lt;5.55-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625356" version="1" comment="bluez-deprecated is &lt;5.55-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615895" version="1" comment="bluez-devel is &lt;5.55-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624655" version="1" comment="bluez-devel-32bit is &lt;5.55-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625357" version="1" comment="bluez-test is &lt;5.55-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615875" version="1" comment="libbluetooth3 is &lt;5.55-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624659" version="1" comment="libbluetooth3-32bit is &lt;5.55-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615791" version="1" comment="dbus-1 is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615792" version="1" comment="dbus-1-devel is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624663" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624665" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615793" version="1" comment="dbus-1-x11 is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615794" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615795" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615896" version="1" comment="jdom2 is &lt;2.0.6-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624669" version="1" comment="jdom2-javadoc is &lt;2.0.6-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624065" version="1" comment="redis is &lt;6.0.14-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624878" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624879" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624880" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624535" version="1" comment="kernel-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624536" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624881" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624882" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624883" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624537" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624538" version="1" comment="kernel-source-azure is &lt;5.3.18-38.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624539" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624884" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624885" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624886" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624163" version="1" comment="libsqlite3-0 is &lt;3.36.0-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624164" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624165" version="1" comment="sqlite3 is &lt;3.36.0-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624166" version="1" comment="sqlite3-devel is &lt;3.36.0-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625114" version="1" comment="sqlite3-doc is &lt;3.36.0-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615906" version="1" comment="ffmpeg is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625358" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625359" version="1" comment="libavcodec-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615885" version="1" comment="libavcodec57 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625119" version="1" comment="libavcodec57-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625360" version="1" comment="libavdevice-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615907" version="1" comment="libavdevice57 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625123" version="1" comment="libavdevice57-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625361" version="1" comment="libavfilter-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615908" version="1" comment="libavfilter6 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625127" version="1" comment="libavfilter6-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625362" version="1" comment="libavformat-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615886" version="1" comment="libavformat57 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625131" version="1" comment="libavformat57-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625363" version="1" comment="libavresample-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625364" version="1" comment="libavresample3 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625135" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615887" version="1" comment="libavutil-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615888" version="1" comment="libavutil55 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625139" version="1" comment="libavutil55-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615889" version="1" comment="libpostproc-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615890" version="1" comment="libpostproc54 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625143" version="1" comment="libpostproc54-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615891" version="1" comment="libswresample-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615892" version="1" comment="libswresample2 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625147" version="1" comment="libswresample2-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615893" version="1" comment="libswscale-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615894" version="1" comment="libswscale4 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625151" version="1" comment="libswscale4-32bit is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624229" version="1" comment="nodejs12 is &lt;12.22.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624230" version="1" comment="nodejs12-devel is &lt;12.22.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624231" version="1" comment="nodejs12-docs is &lt;12.22.2-4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624232" version="1" comment="npm12 is &lt;12.22.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625365" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624233" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625366" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625367" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624234" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625368" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625369" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624235" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625370" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624211" version="1" comment="kernel-64kb is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624212" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625371" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625372" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625373" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625374" version="1" comment="kernel-debug is &lt;5.3.18-59.13.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625375" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.13.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625376" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.13.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624213" version="1" comment="kernel-default is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624214" version="1" comment="kernel-default-base is &lt;5.3.18-59.13.1.18.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625377" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.13.1.18.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624215" version="1" comment="kernel-default-devel is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625378" version="1" comment="kernel-default-extra is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625379" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625380" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625381" version="1" comment="kernel-default-optional is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624216" version="1" comment="kernel-devel is &lt;5.3.18-59.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624220" version="1" comment="kernel-docs is &lt;5.3.18-59.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625382" version="1" comment="kernel-docs-html is &lt;5.3.18-59.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625383" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.13.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625384" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.13.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625385" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.13.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624217" version="1" comment="kernel-macros is &lt;5.3.18-59.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624221" version="1" comment="kernel-obs-build is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625386" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624218" version="1" comment="kernel-preempt is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624222" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625387" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625388" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625389" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624223" version="1" comment="kernel-source is &lt;5.3.18-59.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625390" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624224" version="1" comment="kernel-syms is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624219" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.13.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625391" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625392" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625393" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625394" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624236" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625395" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625396" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624225" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625397" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624544" version="1" comment="nodejs10 is &lt;10.24.1-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624545" version="1" comment="nodejs10-devel is &lt;10.24.1-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624546" version="1" comment="nodejs10-docs is &lt;10.24.1-1.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624547" version="1" comment="npm10 is &lt;10.24.1-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624540" version="1" comment="nodejs14 is &lt;14.17.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624541" version="1" comment="nodejs14-devel is &lt;14.17.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624542" version="1" comment="nodejs14-docs is &lt;14.17.2-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624543" version="1" comment="npm14 is &lt;14.17.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624708" version="1" comment="go1.16 is &lt;1.16.6-1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624709" version="1" comment="go1.16-doc is &lt;1.16.6-1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624710" version="1" comment="go1.16-race is &lt;1.16.6-1.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625193" version="1" comment="MozillaFirefox is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625541" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625542" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.12.0-8.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625194" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625195" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625196" version="1" comment="MozillaFirefox-translations-other is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624711" version="1" comment="go1.15 is &lt;1.15.14-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624712" version="1" comment="go1.15-doc is &lt;1.15.14-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624713" version="1" comment="go1.15-race is &lt;1.15.14-1.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625556" version="1" comment="systemd-bash-completion is &lt;234-24.90.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625919" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625920" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625921" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625630" version="1" comment="kernel-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625631" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625922" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625923" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625924" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625632" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625633" version="1" comment="kernel-source-azure is &lt;5.3.18-38.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625634" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625925" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625926" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625927" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625566" version="1" comment="libsystemd0 is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625567" version="1" comment="libsystemd0-32bit is &lt;246.13-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625568" version="1" comment="libudev-devel is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625928" version="1" comment="libudev-devel-32bit is &lt;246.13-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625569" version="1" comment="libudev1 is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625570" version="1" comment="libudev1-32bit is &lt;246.13-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625929" version="1" comment="nss-myhostname is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625930" version="1" comment="nss-myhostname-32bit is &lt;246.13-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625931" version="1" comment="nss-mymachines is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625932" version="1" comment="nss-mymachines-32bit is &lt;246.13-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625933" version="1" comment="nss-resolve is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625934" version="1" comment="nss-systemd is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625571" version="1" comment="systemd is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625572" version="1" comment="systemd-32bit is &lt;246.13-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625573" version="1" comment="systemd-container is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625574" version="1" comment="systemd-coredump is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625575" version="1" comment="systemd-devel is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625576" version="1" comment="systemd-doc is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625577" version="1" comment="systemd-journal-remote is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625578" version="1" comment="systemd-lang is &lt;246.13-7.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625935" version="1" comment="systemd-logger is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625936" version="1" comment="systemd-network is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625579" version="1" comment="systemd-sysvinit is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625580" version="1" comment="udev is &lt;246.13-7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625590" version="1" comment="containerd is &lt;1.4.4-5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625937" version="1" comment="containerd-ctr is &lt;1.4.4-5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624118" version="1" comment="caribou is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624119" version="1" comment="caribou-common is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624120" version="1" comment="caribou-devel is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624121" version="1" comment="caribou-gtk-module-common is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624122" version="1" comment="caribou-gtk2-module is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624123" version="1" comment="caribou-gtk3-module is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624124" version="1" comment="caribou-lang is &lt;0.4.21-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624125" version="1" comment="libcaribou0 is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624126" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625938" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625647" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625939" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625940" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625648" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625941" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625942" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625649" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625943" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625581" version="1" comment="kernel-64kb is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625582" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625944" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625945" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625946" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625947" version="1" comment="kernel-debug is &lt;5.3.18-59.16.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625948" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.16.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625949" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.16.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625583" version="1" comment="kernel-default is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625584" version="1" comment="kernel-default-base is &lt;5.3.18-59.16.1.18.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625950" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.16.1.18.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625585" version="1" comment="kernel-default-devel is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625951" version="1" comment="kernel-default-extra is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625952" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625953" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625954" version="1" comment="kernel-default-optional is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625586" version="1" comment="kernel-devel is &lt;5.3.18-59.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625607" version="1" comment="kernel-docs is &lt;5.3.18-59.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625955" version="1" comment="kernel-docs-html is &lt;5.3.18-59.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625956" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.16.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625957" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.16.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625958" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.16.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625587" version="1" comment="kernel-macros is &lt;5.3.18-59.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625608" version="1" comment="kernel-obs-build is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625959" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625588" version="1" comment="kernel-preempt is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625609" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625960" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625961" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625962" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625610" version="1" comment="kernel-source is &lt;5.3.18-59.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625963" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625611" version="1" comment="kernel-syms is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625589" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.16.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625964" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625965" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625966" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625967" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625650" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625968" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625969" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625613" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.16.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625970" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625875" version="1" comment="kernel-debug-base is &lt;4.12.14-197.99.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625696" version="1" comment="kernel-default-man is &lt;4.12.14-197.99.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625876" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625877" version="1" comment="kernel-vanilla is &lt;4.12.14-197.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625878" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625879" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625880" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625881" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.99.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624130" version="1" comment="crmsh is &lt;4.3.1+20210702.4e0ee8fb-5.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624131" version="1" comment="crmsh-scripts is &lt;4.3.1+20210702.4e0ee8fb-5.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625871" version="1" comment="crmsh-test is &lt;4.3.1+20210702.4e0ee8fb-5.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625982" version="1" comment="curl is &lt;7.66.0-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625983" version="1" comment="libcurl-devel is &lt;7.66.0-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626208" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625984" version="1" comment="libcurl4 is &lt;7.66.0-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625985" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624748" version="1" comment="qemu is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625882" version="1" comment="qemu-arm is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625883" version="1" comment="qemu-audio-alsa is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625884" version="1" comment="qemu-audio-pa is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625885" version="1" comment="qemu-audio-spice is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624753" version="1" comment="qemu-block-curl is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625886" version="1" comment="qemu-block-dmg is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625887" version="1" comment="qemu-block-gluster is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624754" version="1" comment="qemu-block-iscsi is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625888" version="1" comment="qemu-block-nfs is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624755" version="1" comment="qemu-block-rbd is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624756" version="1" comment="qemu-block-ssh is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624757" version="1" comment="qemu-chardev-baum is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625889" version="1" comment="qemu-chardev-spice is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625890" version="1" comment="qemu-extra is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624759" version="1" comment="qemu-guest-agent is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625891" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625892" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625893" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625894" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625895" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625896" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625897" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624766" version="1" comment="qemu-ipxe is &lt;1.0.0+-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625898" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624767" version="1" comment="qemu-ksm is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624768" version="1" comment="qemu-kvm is &lt;5.2.0-23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624769" version="1" comment="qemu-lang is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625899" version="1" comment="qemu-microvm is &lt;5.2.0-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625900" version="1" comment="qemu-ppc is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625901" version="1" comment="qemu-s390x is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624772" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624773" version="1" comment="qemu-sgabios is &lt;8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624774" version="1" comment="qemu-skiboot is &lt;5.2.0-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624705" version="1" comment="qemu-tools is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624775" version="1" comment="qemu-ui-curses is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625902" version="1" comment="qemu-ui-gtk is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625903" version="1" comment="qemu-ui-opengl is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625904" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625905" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624780" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625906" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625907" version="1" comment="qemu-x86 is &lt;5.2.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625872" version="1" comment="transfig is &lt;3.2.8a-4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624701" version="1" comment="libwireshark14 is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624702" version="1" comment="libwiretap11 is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624703" version="1" comment="libwsutil12 is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624704" version="1" comment="wireshark is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624706" version="1" comment="wireshark-devel is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624707" version="1" comment="wireshark-ui-qt is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625910" version="1" comment="MozillaThunderbird is &lt;78.12.0-8.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625911" version="1" comment="MozillaThunderbird-translations-common is &lt;78.12.0-8.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625912" version="1" comment="MozillaThunderbird-translations-other is &lt;78.12.0-8.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625564" version="1" comment="bluez is &lt;5.55-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625913" version="1" comment="bluez-auto-enable-devices is &lt;5.55-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625914" version="1" comment="bluez-cups is &lt;5.55-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625915" version="1" comment="bluez-deprecated is &lt;5.55-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625591" version="1" comment="bluez-devel is &lt;5.55-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625916" version="1" comment="bluez-devel-32bit is &lt;5.55-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625917" version="1" comment="bluez-test is &lt;5.55-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625565" version="1" comment="libbluetooth3 is &lt;5.55-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625918" version="1" comment="libbluetooth3-32bit is &lt;5.55-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626347" version="1" comment="qemu-s390 is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625597" version="1" comment="git is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625598" version="1" comment="git-arch is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625562" version="1" comment="git-core is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625868" version="1" comment="git-credential-gnome-keyring is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625869" version="1" comment="git-credential-libsecret is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625599" version="1" comment="git-cvs is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625600" version="1" comment="git-daemon is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625601" version="1" comment="git-doc is &lt;2.31.1-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625602" version="1" comment="git-email is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625603" version="1" comment="git-gui is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625870" version="1" comment="git-p4 is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625604" version="1" comment="git-svn is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625605" version="1" comment="git-web is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625606" version="1" comment="gitk is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625563" version="1" comment="perl-Git is &lt;2.31.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626940" version="1" comment="fastjar is &lt;0.98-3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627137" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-4.76.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627138" version="1" comment="php7-wddx is &lt;7.2.5-4.76.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625401" version="1" comment="qemu-audio-oss is &lt;3.1.1.1-9.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626880" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626941" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626881" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626942" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.3-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626882" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626884" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626885" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626886" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626943" version="1" comment="webkit-jsc-4 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626883" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626887" version="1" comment="webkit2gtk3-devel is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626944" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626432" version="1" comment="libmariadbd-devel is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626433" version="1" comment="libmariadbd19 is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626434" version="1" comment="mariadb is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626652" version="1" comment="mariadb-bench is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626435" version="1" comment="mariadb-client is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626436" version="1" comment="mariadb-errormessages is &lt;10.5.11-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626653" version="1" comment="mariadb-rpm-macros is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626654" version="1" comment="mariadb-test is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626437" version="1" comment="mariadb-tools is &lt;10.5.11-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625986" version="1" comment="apache-commons-compress is &lt;1.21-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626206" version="1" comment="apache-commons-compress-javadoc is &lt;1.21-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626231" version="1" comment="spice-vdagent is &lt;0.21.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626651" version="1" comment="mariadb-galera is &lt;10.4.20-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626456" version="1" comment="libmysqld-devel is &lt;10.2.39-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626457" version="1" comment="libmysqld19 is &lt;10.2.39-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626297" version="1" comment="nodejs8 is &lt;8.17.0-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626298" version="1" comment="nodejs8-devel is &lt;8.17.0-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626299" version="1" comment="nodejs8-docs is &lt;8.17.0-10.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626300" version="1" comment="npm8 is &lt;8.17.0-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627353" version="1" comment="djvulibre is &lt;3.5.27-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627844" version="1" comment="djvulibre-doc is &lt;3.5.27-11.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627351" version="1" comment="libdjvulibre-devel is &lt;3.5.27-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627352" version="1" comment="libdjvulibre21 is &lt;3.5.27-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627141" version="1" comment="mysql-connector-java is &lt;5.1.47-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627355" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627356" version="1" comment="php7 is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627357" version="1" comment="php7-bcmath is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627358" version="1" comment="php7-bz2 is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627359" version="1" comment="php7-calendar is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627360" version="1" comment="php7-ctype is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627361" version="1" comment="php7-curl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627362" version="1" comment="php7-dba is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627363" version="1" comment="php7-devel is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627364" version="1" comment="php7-dom is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627354" version="1" comment="php7-embed is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627365" version="1" comment="php7-enchant is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627366" version="1" comment="php7-exif is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627367" version="1" comment="php7-fastcgi is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627368" version="1" comment="php7-fileinfo is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627845" version="1" comment="php7-firebird is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627369" version="1" comment="php7-fpm is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627370" version="1" comment="php7-ftp is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627371" version="1" comment="php7-gd is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627372" version="1" comment="php7-gettext is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627373" version="1" comment="php7-gmp is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627374" version="1" comment="php7-iconv is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627375" version="1" comment="php7-intl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627376" version="1" comment="php7-json is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627377" version="1" comment="php7-ldap is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627378" version="1" comment="php7-mbstring is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627379" version="1" comment="php7-mysql is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627380" version="1" comment="php7-odbc is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627381" version="1" comment="php7-opcache is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627382" version="1" comment="php7-openssl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627383" version="1" comment="php7-pcntl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627384" version="1" comment="php7-pdo is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627385" version="1" comment="php7-pgsql is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627386" version="1" comment="php7-phar is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627387" version="1" comment="php7-posix is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627388" version="1" comment="php7-readline is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627389" version="1" comment="php7-shmop is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627390" version="1" comment="php7-snmp is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627391" version="1" comment="php7-soap is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627392" version="1" comment="php7-sockets is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627393" version="1" comment="php7-sodium is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627394" version="1" comment="php7-sqlite is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627395" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627396" version="1" comment="php7-sysvsem is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627397" version="1" comment="php7-sysvshm is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627398" version="1" comment="php7-tidy is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627399" version="1" comment="php7-tokenizer is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627400" version="1" comment="php7-xmlreader is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627401" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627402" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627403" version="1" comment="php7-xsl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627404" version="1" comment="php7-zip is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627405" version="1" comment="php7-zlib is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628197" version="1" comment="python2-reportlab is &lt;3.4.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628198" version="1" comment="python3-reportlab is &lt;3.4.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628028" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628029" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628030" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627891" version="1" comment="kernel-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627892" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628031" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628032" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628033" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627893" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627894" version="1" comment="kernel-source-azure is &lt;5.3.18-38.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627895" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628034" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628035" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628036" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625874" version="1" comment="grafana is &lt;7.5.7-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626765" version="1" comment="golang-github-prometheus-prometheus is &lt;2.27.1-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626766" version="1" comment="ansible is &lt;2.9.21-1.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626767" version="1" comment="ansible-doc is &lt;2.9.21-1.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626768" version="1" comment="ansible-test is &lt;2.9.21-1.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627140" version="1" comment="dracut-saltboot is &lt;0.1.1627546504.96a0b3e-1.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626769" version="1" comment="mgr-cfg is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626770" version="1" comment="mgr-cfg-actions is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626771" version="1" comment="mgr-cfg-client is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626772" version="1" comment="mgr-cfg-management is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626773" version="1" comment="mgr-custom-info is &lt;4.2.2-1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626774" version="1" comment="mgr-osa-dispatcher is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626775" version="1" comment="mgr-osad is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626776" version="1" comment="mgr-push is &lt;4.2.3-1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626777" version="1" comment="mgr-virtualization-host is &lt;4.2.2-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626778" version="1" comment="python2-mgr-cfg is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626779" version="1" comment="python2-mgr-cfg-actions is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626780" version="1" comment="python2-mgr-cfg-client is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626781" version="1" comment="python2-mgr-cfg-management is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626782" version="1" comment="python2-mgr-osa-common is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626783" version="1" comment="python2-mgr-osa-dispatcher is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626784" version="1" comment="python2-mgr-osad is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626785" version="1" comment="python2-mgr-push is &lt;4.2.3-1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626786" version="1" comment="python2-mgr-virtualization-common is &lt;4.2.2-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626787" version="1" comment="python2-mgr-virtualization-host is &lt;4.2.2-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626788" version="1" comment="python2-rhnlib is &lt;4.2.4-3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626789" version="1" comment="python2-spacewalk-check is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626790" version="1" comment="python2-spacewalk-client-setup is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626791" version="1" comment="python2-spacewalk-client-tools is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626792" version="1" comment="python2-spacewalk-koan is &lt;4.2.4-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626793" version="1" comment="python2-spacewalk-oscap is &lt;4.2.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626794" version="1" comment="python2-suseRegisterInfo is &lt;4.2.4-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626795" version="1" comment="python2-uyuni-common-libs is &lt;4.2.5-1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626796" version="1" comment="python3-mgr-cfg is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626797" version="1" comment="python3-mgr-cfg-actions is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626798" version="1" comment="python3-mgr-cfg-client is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626799" version="1" comment="python3-mgr-cfg-management is &lt;4.2.3-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626800" version="1" comment="python3-mgr-osa-common is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626801" version="1" comment="python3-mgr-osa-dispatcher is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626802" version="1" comment="python3-mgr-osad is &lt;4.2.6-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626803" version="1" comment="python3-mgr-push is &lt;4.2.3-1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626804" version="1" comment="python3-mgr-virtualization-common is &lt;4.2.2-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626805" version="1" comment="python3-mgr-virtualization-host is &lt;4.2.2-1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626806" version="1" comment="python3-rhnlib is &lt;4.2.4-3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626807" version="1" comment="python3-spacewalk-check is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626808" version="1" comment="python3-spacewalk-client-setup is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626809" version="1" comment="python3-spacewalk-client-tools is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626810" version="1" comment="python3-spacewalk-koan is &lt;4.2.4-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626811" version="1" comment="python3-spacewalk-oscap is &lt;4.2.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626812" version="1" comment="python3-suseRegisterInfo is &lt;4.2.4-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626813" version="1" comment="python3-uyuni-common-libs is &lt;4.2.5-1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626814" version="1" comment="spacecmd is &lt;4.2.11-3.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626815" version="1" comment="spacewalk-check is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626816" version="1" comment="spacewalk-client-setup is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626817" version="1" comment="spacewalk-client-tools is &lt;4.2.12-3.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626818" version="1" comment="spacewalk-koan is &lt;4.2.4-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626819" version="1" comment="spacewalk-oscap is &lt;4.2.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626820" version="1" comment="suseRegisterInfo is &lt;4.2.4-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498315" version="1" comment="python2-rpm is &lt;4.14.3-37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494330" version="1" comment="python3-rpm is &lt;4.14.3-37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494331" version="1" comment="rpm is &lt;4.14.3-37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494332" version="1" comment="rpm-32bit is &lt;4.14.3-37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496657" version="1" comment="rpm-build is &lt;4.14.3-37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494333" version="1" comment="rpm-devel is &lt;4.14.3-37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498199" version="1" comment="rpm-ndb is &lt;4.14.3-37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631125" version="1" comment="rpm-ndb-32bit is &lt;4.14.3-37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630905" version="1" comment="hawkey-man is &lt;0.62.0-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630906" version="1" comment="libdnf-devel is &lt;0.62.0-5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630907" version="1" comment="libdnf-repo-config-zypp is &lt;0.62.0-5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630908" version="1" comment="libdnf2 is &lt;0.62.0-5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630909" version="1" comment="python3-hawkey is &lt;0.62.0-5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630910" version="1" comment="python3-libdnf is &lt;0.62.0-5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627991" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627900" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627992" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627993" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627901" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627994" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629548" version="1" comment="dtb-al is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629549" version="1" comment="dtb-allwinner is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629550" version="1" comment="dtb-altera is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629551" version="1" comment="dtb-amd is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629552" version="1" comment="dtb-amlogic is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629553" version="1" comment="dtb-apm is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629554" version="1" comment="dtb-arm is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629555" version="1" comment="dtb-broadcom is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629556" version="1" comment="dtb-cavium is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629557" version="1" comment="dtb-exynos is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629558" version="1" comment="dtb-freescale is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629559" version="1" comment="dtb-hisilicon is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629560" version="1" comment="dtb-lg is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629561" version="1" comment="dtb-marvell is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629562" version="1" comment="dtb-mediatek is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629563" version="1" comment="dtb-nvidia is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629564" version="1" comment="dtb-qcom is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629565" version="1" comment="dtb-renesas is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629566" version="1" comment="dtb-rockchip is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629567" version="1" comment="dtb-socionext is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629568" version="1" comment="dtb-sprd is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629569" version="1" comment="dtb-xilinx is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629570" version="1" comment="dtb-zte is &lt;5.3.18-59.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627995" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627902" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627996" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627856" version="1" comment="kernel-64kb is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627857" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627997" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627998" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627999" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628000" version="1" comment="kernel-debug is &lt;5.3.18-59.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628001" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628002" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627858" version="1" comment="kernel-default is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627859" version="1" comment="kernel-default-base is &lt;5.3.18-59.19.1.18.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628003" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.19.1.18.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627860" version="1" comment="kernel-default-devel is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628004" version="1" comment="kernel-default-extra is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628005" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628006" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628007" version="1" comment="kernel-default-optional is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627861" version="1" comment="kernel-devel is &lt;5.3.18-59.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627873" version="1" comment="kernel-docs is &lt;5.3.18-59.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628008" version="1" comment="kernel-docs-html is &lt;5.3.18-59.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628009" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628010" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628011" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627862" version="1" comment="kernel-macros is &lt;5.3.18-59.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627874" version="1" comment="kernel-obs-build is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628012" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627863" version="1" comment="kernel-preempt is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627875" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628013" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628014" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628015" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627876" version="1" comment="kernel-source is &lt;5.3.18-59.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628016" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627877" version="1" comment="kernel-syms is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627864" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.19.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628017" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628018" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628019" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628020" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627903" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628021" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628022" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627879" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628023" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.19.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630341" version="1" comment="c-ares-devel is &lt;1.17.1+20200724-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630554" version="1" comment="c-ares-utils is &lt;1.17.1+20200724-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630342" version="1" comment="libcares2 is &lt;1.17.1+20200724-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630555" version="1" comment="libcares2-32bit is &lt;1.17.1+20200724-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626824" version="1" comment="libsndfile-devel is &lt;1.0.28-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626879" version="1" comment="libsndfile-progs is &lt;1.0.28-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626825" version="1" comment="libsndfile1 is &lt;1.0.28-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626848" version="1" comment="libsndfile1-32bit is &lt;1.0.28-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630857" version="1" comment="haproxy is &lt;2.0.14-11.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630560" version="1" comment="MozillaFirefox is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630651" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630652" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.13.0-8.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630561" version="1" comment="MozillaFirefox-devel is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630562" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630563" version="1" comment="MozillaFirefox-translations-other is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630565" version="1" comment="go1.15 is &lt;1.15.15-1.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630566" version="1" comment="go1.15-doc is &lt;1.15.15-1.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630567" version="1" comment="go1.15-race is &lt;1.15.15-1.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630568" version="1" comment="go1.16 is &lt;1.16.7-1.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630569" version="1" comment="go1.16-doc is &lt;1.16.7-1.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630570" version="1" comment="go1.16-race is &lt;1.16.7-1.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630556" version="1" comment="qemu-s390 is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628201" version="1" comment="fetchmail is &lt;6.3.26-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628202" version="1" comment="fetchmailconf is &lt;6.3.26-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628040" version="1" comment="libass-devel is &lt;0.14.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628041" version="1" comment="libass9 is &lt;0.14.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628196" version="1" comment="libass9-32bit is &lt;0.14.0-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627865" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628024" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627866" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628025" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628026" version="1" comment="openexr is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627867" version="1" comment="openexr-devel is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628027" version="1" comment="openexr-doc is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627846" version="1" comment="aspell is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627847" version="1" comment="aspell-devel is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627987" version="1" comment="aspell-ispell is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627988" version="1" comment="aspell-spell is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627848" version="1" comment="libaspell15 is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627989" version="1" comment="libaspell15-32bit is &lt;0.60.8-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627849" version="1" comment="libpspell15 is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627990" version="1" comment="libpspell15-32bit is &lt;0.60.8-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627508" version="1" comment="php7-wddx is &lt;7.2.5-4.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627144" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627231" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627145" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627146" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627147" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627232" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.302-3.55.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627233" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626699" version="1" comment="krb5 is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626700" version="1" comment="krb5-32bit is &lt;1.16.3-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626701" version="1" comment="krb5-client is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626702" version="1" comment="krb5-devel is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626821" version="1" comment="krb5-devel-32bit is &lt;1.16.3-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626822" version="1" comment="krb5-mini is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626823" version="1" comment="krb5-mini-devel is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626716" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626703" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626704" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626717" version="1" comment="krb5-server is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625995" version="1" comment="389-ds is &lt;1.4.4.16~git16.c1926dfc6-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625996" version="1" comment="389-ds-devel is &lt;1.4.4.16~git16.c1926dfc6-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626207" version="1" comment="389-ds-snmp is &lt;1.4.4.16~git16.c1926dfc6-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625997" version="1" comment="lib389 is &lt;1.4.4.16~git16.c1926dfc6-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625998" version="1" comment="libsvrcore0 is &lt;1.4.4.16~git16.c1926dfc6-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625976" version="1" comment="libmspack-devel is &lt;0.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625977" version="1" comment="libmspack0 is &lt;0.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626204" version="1" comment="libmspack0-32bit is &lt;0.6-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626205" version="1" comment="mspack-tools is &lt;0.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626216" version="1" comment="libsystemd0 is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626217" version="1" comment="libsystemd0-32bit is &lt;246.15-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626218" version="1" comment="libudev-devel is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626371" version="1" comment="libudev-devel-32bit is &lt;246.15-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626219" version="1" comment="libudev1 is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626220" version="1" comment="libudev1-32bit is &lt;246.15-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626372" version="1" comment="nss-myhostname is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626373" version="1" comment="nss-myhostname-32bit is &lt;246.15-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626374" version="1" comment="nss-mymachines is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626375" version="1" comment="nss-mymachines-32bit is &lt;246.15-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626376" version="1" comment="nss-resolve is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626377" version="1" comment="nss-systemd is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626221" version="1" comment="systemd is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626222" version="1" comment="systemd-32bit is &lt;246.15-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626223" version="1" comment="systemd-container is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626224" version="1" comment="systemd-coredump is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626225" version="1" comment="systemd-devel is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626226" version="1" comment="systemd-doc is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626227" version="1" comment="systemd-journal-remote is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626228" version="1" comment="systemd-lang is &lt;246.15-7.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626378" version="1" comment="systemd-logger is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626379" version="1" comment="systemd-network is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626229" version="1" comment="systemd-sysvinit is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626230" version="1" comment="udev is &lt;246.15-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626210" version="1" comment="dbus-1 is &lt;1.12.2-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626211" version="1" comment="dbus-1-devel is &lt;1.12.2-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626348" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-8.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626349" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-8.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626212" version="1" comment="dbus-1-x11 is &lt;1.12.2-8.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626213" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626214" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-8.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628053" version="1" comment="libvirt is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628054" version="1" comment="libvirt-admin is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628055" version="1" comment="libvirt-bash-completion is &lt;7.1.0-6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628056" version="1" comment="libvirt-client is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628057" version="1" comment="libvirt-daemon is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628058" version="1" comment="libvirt-daemon-config-network is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628059" version="1" comment="libvirt-daemon-config-nwfilter is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628060" version="1" comment="libvirt-daemon-driver-interface is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628061" version="1" comment="libvirt-daemon-driver-libxl is &lt;7.1.0-6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628062" version="1" comment="libvirt-daemon-driver-lxc is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628063" version="1" comment="libvirt-daemon-driver-network is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628064" version="1" comment="libvirt-daemon-driver-nodedev is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628065" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628066" version="1" comment="libvirt-daemon-driver-qemu is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628067" version="1" comment="libvirt-daemon-driver-secret is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628068" version="1" comment="libvirt-daemon-driver-storage is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628069" version="1" comment="libvirt-daemon-driver-storage-core is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628070" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628185" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628071" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628072" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628073" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628074" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628075" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;7.1.0-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628076" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628077" version="1" comment="libvirt-daemon-hooks is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628078" version="1" comment="libvirt-daemon-lxc is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628079" version="1" comment="libvirt-daemon-qemu is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628080" version="1" comment="libvirt-daemon-xen is &lt;7.1.0-6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628081" version="1" comment="libvirt-devel is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628186" version="1" comment="libvirt-devel-32bit is &lt;7.1.0-6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628082" version="1" comment="libvirt-doc is &lt;7.1.0-6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628039" version="1" comment="libvirt-libs is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628083" version="1" comment="libvirt-lock-sanlock is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628084" version="1" comment="libvirt-nss is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628187" version="1" comment="wireshark-plugin-libvirt is &lt;7.1.0-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626957" version="1" comment="aws-cli is &lt;1.19.9-26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626960" version="1" comment="python2-asn1crypto is &lt;0.24.0-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626954" version="1" comment="python2-boto3 is &lt;1.17.9-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626955" version="1" comment="python2-botocore is &lt;1.20.9-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626961" version="1" comment="python2-cffi is &lt;1.13.2-3.2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626962" version="1" comment="python2-cryptography is &lt;2.8-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626964" version="1" comment="python2-pyasn1 is &lt;0.4.2-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626965" version="1" comment="python2-pycparser is &lt;2.17-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626966" version="1" comment="python2-urllib3 is &lt;1.25.10-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626945" version="1" comment="python3-asn1crypto is &lt;0.24.0-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626946" version="1" comment="python3-boto3 is &lt;1.17.9-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626947" version="1" comment="python3-botocore is &lt;1.20.9-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626948" version="1" comment="python3-cffi is &lt;1.13.2-3.2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626949" version="1" comment="python3-cryptography is &lt;2.8-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626951" version="1" comment="python3-pyasn1 is &lt;0.4.2-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626952" version="1" comment="python3-pycparser is &lt;2.17-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631628" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631800" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631631" version="1" comment="libopenssl10 is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631629" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631801" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631802" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631803" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631804" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631805" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631630" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631806" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631807" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-3.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631622" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631808" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631623" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631624" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631625" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631626" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631627" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631809" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-11.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631000" version="1" comment="libmysqld-devel is &lt;10.2.40-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631001" version="1" comment="libmysqld19 is &lt;10.2.40-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630898" version="1" comment="mariadb-galera is &lt;10.4.21-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626350" version="1" comment="jetty-annotations is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626351" version="1" comment="jetty-client is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626352" version="1" comment="jetty-continuation is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626232" version="1" comment="jetty-http is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626233" version="1" comment="jetty-io is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626353" version="1" comment="jetty-jaas is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626354" version="1" comment="jetty-javax-websocket-client-impl is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626355" version="1" comment="jetty-javax-websocket-server-impl is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626356" version="1" comment="jetty-jmx is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626357" version="1" comment="jetty-jndi is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626358" version="1" comment="jetty-jsp is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626359" version="1" comment="jetty-minimal-javadoc is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626360" version="1" comment="jetty-openid is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626361" version="1" comment="jetty-plus is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626362" version="1" comment="jetty-proxy is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626234" version="1" comment="jetty-security is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626235" version="1" comment="jetty-server is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626236" version="1" comment="jetty-servlet is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626237" version="1" comment="jetty-util is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626238" version="1" comment="jetty-util-ajax is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626363" version="1" comment="jetty-webapp is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626364" version="1" comment="jetty-websocket-api is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626365" version="1" comment="jetty-websocket-client is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626366" version="1" comment="jetty-websocket-common is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626367" version="1" comment="jetty-websocket-javadoc is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626368" version="1" comment="jetty-websocket-server is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626369" version="1" comment="jetty-websocket-servlet is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626370" version="1" comment="jetty-xml is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630694" version="1" comment="qemu is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630760" version="1" comment="qemu-arm is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630761" version="1" comment="qemu-audio-alsa is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630762" version="1" comment="qemu-audio-pa is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630763" version="1" comment="qemu-audio-spice is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630699" version="1" comment="qemu-block-curl is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630764" version="1" comment="qemu-block-dmg is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630765" version="1" comment="qemu-block-gluster is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630700" version="1" comment="qemu-block-iscsi is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630766" version="1" comment="qemu-block-nfs is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630701" version="1" comment="qemu-block-rbd is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630702" version="1" comment="qemu-block-ssh is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630703" version="1" comment="qemu-chardev-baum is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630767" version="1" comment="qemu-chardev-spice is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630768" version="1" comment="qemu-extra is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630705" version="1" comment="qemu-guest-agent is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630769" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630770" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630771" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630772" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630773" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630774" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630775" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630712" version="1" comment="qemu-ipxe is &lt;1.0.0+-103.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630776" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630713" version="1" comment="qemu-ksm is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630714" version="1" comment="qemu-kvm is &lt;5.2.0-103.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630715" version="1" comment="qemu-lang is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630777" version="1" comment="qemu-microvm is &lt;5.2.0-103.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630778" version="1" comment="qemu-ppc is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630779" version="1" comment="qemu-s390x is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630718" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-103.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630719" version="1" comment="qemu-sgabios is &lt;8-103.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630720" version="1" comment="qemu-skiboot is &lt;5.2.0-103.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630653" version="1" comment="qemu-tools is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630721" version="1" comment="qemu-ui-curses is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630780" version="1" comment="qemu-ui-gtk is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630781" version="1" comment="qemu-ui-opengl is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630782" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630783" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630726" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-103.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630784" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630785" version="1" comment="qemu-x86 is &lt;5.2.0-103.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631131" version="1" comment="spectre-meltdown-checker is &lt;0.44-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632140" version="1" comment="php7-wddx is &lt;7.2.5-4.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630899" version="1" comment="MozillaThunderbird is &lt;78.13.0-8.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630900" version="1" comment="MozillaThunderbird-translations-common is &lt;78.13.0-8.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630901" version="1" comment="MozillaThunderbird-translations-other is &lt;78.13.0-8.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630851" version="1" comment="nodejs12 is &lt;12.22.5-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630852" version="1" comment="nodejs12-devel is &lt;12.22.5-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630853" version="1" comment="nodejs12-docs is &lt;12.22.5-4.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630854" version="1" comment="npm12 is &lt;12.22.5-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632141" version="1" comment="dovecot23 is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632142" version="1" comment="dovecot23-backend-mysql is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632143" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632144" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632145" version="1" comment="dovecot23-devel is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632146" version="1" comment="dovecot23-fts is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632147" version="1" comment="dovecot23-fts-lucene is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632148" version="1" comment="dovecot23-fts-solr is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632149" version="1" comment="dovecot23-fts-squat is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628037" version="1" comment="gstreamer-plugins-good is &lt;1.16.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628188" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.16.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628189" version="1" comment="gstreamer-plugins-good-doc is &lt;1.16.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628190" version="1" comment="gstreamer-plugins-good-extra is &lt;1.16.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628191" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.16.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628192" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.16.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628193" version="1" comment="gstreamer-plugins-good-jack is &lt;1.16.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628194" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.16.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628038" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.3-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628195" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.16.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631148" version="1" comment="ffmpeg is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631287" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631288" version="1" comment="libavcodec-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631132" version="1" comment="libavcodec57 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631289" version="1" comment="libavcodec57-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631290" version="1" comment="libavdevice-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631149" version="1" comment="libavdevice57 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631291" version="1" comment="libavdevice57-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631292" version="1" comment="libavfilter-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631150" version="1" comment="libavfilter6 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631293" version="1" comment="libavfilter6-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631294" version="1" comment="libavformat-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631133" version="1" comment="libavformat57 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631295" version="1" comment="libavformat57-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631145" version="1" comment="libavresample-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631146" version="1" comment="libavresample3 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631136" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631137" version="1" comment="libavutil-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631138" version="1" comment="libavutil55 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631296" version="1" comment="libavutil55-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631139" version="1" comment="libpostproc-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631140" version="1" comment="libpostproc54 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631297" version="1" comment="libpostproc54-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631141" version="1" comment="libswresample-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631142" version="1" comment="libswresample2 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631298" version="1" comment="libswresample2-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631143" version="1" comment="libswscale-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631144" version="1" comment="libswscale4 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631299" version="1" comment="libswscale4-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632337" version="1" comment="xen is &lt;4.14.2_04-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632338" version="1" comment="xen-devel is &lt;4.14.2_04-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632339" version="1" comment="xen-doc-html is &lt;4.14.2_04-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632340" version="1" comment="xen-libs is &lt;4.14.2_04-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632341" version="1" comment="xen-libs-32bit is &lt;4.14.2_04-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632342" version="1" comment="xen-tools is &lt;4.14.2_04-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632343" version="1" comment="xen-tools-domU is &lt;4.14.2_04-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632254" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.2_04-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629426" version="1" comment="libesmtp is &lt;1.0.6-150.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629427" version="1" comment="libesmtp-devel is &lt;1.0.6-150.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630845" version="1" comment="libmariadbd-devel is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630846" version="1" comment="libmariadbd19 is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630847" version="1" comment="mariadb is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630902" version="1" comment="mariadb-bench is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630848" version="1" comment="mariadb-client is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630849" version="1" comment="mariadb-errormessages is &lt;10.5.12-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630903" version="1" comment="mariadb-rpm-macros is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630904" version="1" comment="mariadb-test is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630850" version="1" comment="mariadb-tools is &lt;10.5.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631875" version="1" comment="libipa_hbac-devel is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631876" version="1" comment="libipa_hbac0 is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631962" version="1" comment="libnfsidmap-sss is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631877" version="1" comment="libsss_certmap-devel is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631878" version="1" comment="libsss_certmap0 is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631879" version="1" comment="libsss_idmap-devel is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631880" version="1" comment="libsss_idmap0 is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631881" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631882" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631883" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631884" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631963" version="1" comment="python3-ipa_hbac is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631964" version="1" comment="python3-sss-murmur is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631965" version="1" comment="python3-sss_nss_idmap is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631885" version="1" comment="python3-sssd-config is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631886" version="1" comment="sssd is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631887" version="1" comment="sssd-ad is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631888" version="1" comment="sssd-common is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631889" version="1" comment="sssd-dbus is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631890" version="1" comment="sssd-ipa is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631891" version="1" comment="sssd-krb5 is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631892" version="1" comment="sssd-krb5-common is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631893" version="1" comment="sssd-ldap is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631894" version="1" comment="sssd-proxy is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631895" version="1" comment="sssd-tools is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631966" version="1" comment="sssd-wbclient is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631967" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631896" version="1" comment="sssd-winbind-idmap is &lt;1.16.1-23.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626380" version="1" comment="java-11-openjdk is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626649" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626381" version="1" comment="java-11-openjdk-demo is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626382" version="1" comment="java-11-openjdk-devel is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626383" version="1" comment="java-11-openjdk-headless is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626424" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.12.0-3.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626425" version="1" comment="java-11-openjdk-jmods is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626650" version="1" comment="java-11-openjdk-src is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631155" version="1" comment="nodejs10 is &lt;10.24.1-1.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631156" version="1" comment="nodejs10-devel is &lt;10.24.1-1.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631157" version="1" comment="nodejs10-docs is &lt;10.24.1-1.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631158" version="1" comment="npm10 is &lt;10.24.1-1.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631128" version="1" comment="apache2 is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631152" version="1" comment="apache2-devel is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631153" version="1" comment="apache2-doc is &lt;2.4.43-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631151" version="1" comment="apache2-event is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631300" version="1" comment="apache2-example-pages is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631129" version="1" comment="apache2-prefork is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631130" version="1" comment="apache2-utils is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631154" version="1" comment="apache2-worker is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631810" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631870" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.4-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632506" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632512" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-11.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632507" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632508" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632509" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632510" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632511" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632513" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632558" version="1" comment="libntfs-3g-devel is &lt;2021.8.22-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632559" version="1" comment="libntfs-3g87 is &lt;2021.8.22-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632560" version="1" comment="ntfs-3g is &lt;2021.8.22-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632561" version="1" comment="ntfsprogs is &lt;2021.8.22-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632562" version="1" comment="ntfsprogs-extra is &lt;2021.8.22-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632571" version="1" comment="haproxy is &lt;2.0.14-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632344" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632489" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632347" version="1" comment="libopenssl10 is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632345" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632490" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632491" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632492" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632493" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632494" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632346" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632495" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632496" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632569" version="1" comment="libtpms-devel is &lt;0.8.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632570" version="1" comment="libtpms0 is &lt;0.8.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632554" version="1" comment="aom-tools is &lt;1.0.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632555" version="1" comment="libaom-devel is &lt;1.0.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632556" version="1" comment="libaom-devel-doc is &lt;1.0.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632524" version="1" comment="libaom0 is &lt;1.0.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632557" version="1" comment="libaom0-32bit is &lt;1.0.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632014" version="1" comment="libwireshark14 is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632015" version="1" comment="libwiretap11 is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632016" version="1" comment="libwsutil12 is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632017" version="1" comment="wireshark is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632018" version="1" comment="wireshark-devel is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632019" version="1" comment="wireshark-ui-qt is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632020" version="1" comment="php7-pear is &lt;1.10.21-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632021" version="1" comment="php7-pecl is &lt;1.10.21-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626967" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632741" version="1" comment="ghostscript is &lt;9.52-155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632742" version="1" comment="ghostscript-devel is &lt;9.52-155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632743" version="1" comment="ghostscript-x11 is &lt;9.52-155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632744" version="1" comment="libspectre-devel is &lt;0.2.8-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632745" version="1" comment="libspectre1 is &lt;0.2.8-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631871" version="1" comment="libcroco is &lt;0.6.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631872" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631873" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.13-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631874" version="1" comment="libcroco-devel is &lt;0.6.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633453" version="1" comment="xen is &lt;4.14.2_06-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633454" version="1" comment="xen-devel is &lt;4.14.2_06-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633455" version="1" comment="xen-doc-html is &lt;4.14.2_06-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633456" version="1" comment="xen-libs is &lt;4.14.2_06-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633457" version="1" comment="xen-libs-32bit is &lt;4.14.2_06-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633458" version="1" comment="xen-tools is &lt;4.14.2_06-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633459" version="1" comment="xen-tools-domU is &lt;4.14.2_06-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633439" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.2_06-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633661" version="1" comment="grafana-piechart-panel is &lt;1.6.1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633191" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633192" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633193" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632940" version="1" comment="kernel-azure is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632941" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633194" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633195" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633196" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632942" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632943" version="1" comment="kernel-source-azure is &lt;5.3.18-38.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632944" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633197" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633198" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633199" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.22.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633335" version="1" comment="ctdb is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633402" version="1" comment="ctdb-pcp-pmda is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633403" version="1" comment="ctdb-tests is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633207" version="1" comment="libdcerpc-binding0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633208" version="1" comment="libdcerpc-binding0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633209" version="1" comment="libdcerpc-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633210" version="1" comment="libdcerpc-samr-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633211" version="1" comment="libdcerpc-samr0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633404" version="1" comment="libdcerpc-samr0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633212" version="1" comment="libdcerpc0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633213" version="1" comment="libdcerpc0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633214" version="1" comment="libndr-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633215" version="1" comment="libndr-krb5pac-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633216" version="1" comment="libndr-krb5pac0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633217" version="1" comment="libndr-krb5pac0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633218" version="1" comment="libndr-nbt-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633219" version="1" comment="libndr-nbt0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633220" version="1" comment="libndr-nbt0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633221" version="1" comment="libndr-standard-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633222" version="1" comment="libndr-standard0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633223" version="1" comment="libndr-standard0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633224" version="1" comment="libndr1 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633225" version="1" comment="libndr1-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633226" version="1" comment="libnetapi-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633405" version="1" comment="libnetapi-devel-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633227" version="1" comment="libnetapi0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633228" version="1" comment="libnetapi0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633229" version="1" comment="libsamba-credentials-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633230" version="1" comment="libsamba-credentials0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633231" version="1" comment="libsamba-credentials0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633232" version="1" comment="libsamba-errors-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633233" version="1" comment="libsamba-errors0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633234" version="1" comment="libsamba-errors0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633235" version="1" comment="libsamba-hostconfig-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633236" version="1" comment="libsamba-hostconfig0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633237" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633238" version="1" comment="libsamba-passdb-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633239" version="1" comment="libsamba-passdb0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633240" version="1" comment="libsamba-passdb0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633241" version="1" comment="libsamba-policy-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633242" version="1" comment="libsamba-policy-python3-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633243" version="1" comment="libsamba-policy0-python3 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633406" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633244" version="1" comment="libsamba-util-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633245" version="1" comment="libsamba-util0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633246" version="1" comment="libsamba-util0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633247" version="1" comment="libsamdb-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633248" version="1" comment="libsamdb0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633249" version="1" comment="libsamdb0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633250" version="1" comment="libsmbclient-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633251" version="1" comment="libsmbclient0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633407" version="1" comment="libsmbclient0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633252" version="1" comment="libsmbconf-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633253" version="1" comment="libsmbconf0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633254" version="1" comment="libsmbconf0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633255" version="1" comment="libsmbldap-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633256" version="1" comment="libsmbldap2 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633257" version="1" comment="libsmbldap2-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633258" version="1" comment="libtevent-util-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633259" version="1" comment="libtevent-util0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633260" version="1" comment="libtevent-util0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633261" version="1" comment="libwbclient-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633262" version="1" comment="libwbclient0 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633263" version="1" comment="libwbclient0-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633264" version="1" comment="samba is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633315" version="1" comment="samba-ad-dc is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633408" version="1" comment="samba-ad-dc-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633265" version="1" comment="samba-ceph is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633266" version="1" comment="samba-client is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633409" version="1" comment="samba-client-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633267" version="1" comment="samba-core-devel is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633410" version="1" comment="samba-doc is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633268" version="1" comment="samba-dsdb-modules is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633269" version="1" comment="samba-libs is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633270" version="1" comment="samba-libs-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633271" version="1" comment="samba-libs-python3 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633411" version="1" comment="samba-libs-python3-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633272" version="1" comment="samba-python3 is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633412" version="1" comment="samba-test is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633273" version="1" comment="samba-winbind is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633274" version="1" comment="samba-winbind-32bit is &lt;4.13.6+git.211.555d60b24ba-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633307" version="1" comment="ffmpeg is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633415" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633416" version="1" comment="libavcodec-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633282" version="1" comment="libavcodec57 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633417" version="1" comment="libavcodec57-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633418" version="1" comment="libavdevice-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633308" version="1" comment="libavdevice57 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633419" version="1" comment="libavdevice57-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633420" version="1" comment="libavfilter-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633309" version="1" comment="libavfilter6 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633421" version="1" comment="libavfilter6-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633422" version="1" comment="libavformat-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633283" version="1" comment="libavformat57 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633423" version="1" comment="libavformat57-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633295" version="1" comment="libavresample-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633296" version="1" comment="libavresample3 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633286" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633287" version="1" comment="libavutil-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633288" version="1" comment="libavutil55 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633424" version="1" comment="libavutil55-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633289" version="1" comment="libpostproc-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633290" version="1" comment="libpostproc54 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633425" version="1" comment="libpostproc54-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633291" version="1" comment="libswresample-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633292" version="1" comment="libswresample2 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633426" version="1" comment="libswresample2-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633293" version="1" comment="libswscale-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633294" version="1" comment="libswscale4 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633427" version="1" comment="libswscale4-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633275" version="1" comment="grilo-devel is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633361" version="1" comment="grilo-lang is &lt;0.3.12-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633414" version="1" comment="grilo-tools is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633276" version="1" comment="libgrilo-0_3-0 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633277" version="1" comment="libgrlnet-0_3-0 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633278" version="1" comment="libgrlpls-0_3-0 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633279" version="1" comment="typelib-1_0-Grl-0_3 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633280" version="1" comment="typelib-1_0-GrlNet-0_3 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633281" version="1" comment="typelib-1_0-GrlPls-0_3 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632621" version="1" comment="hivex is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632563" version="1" comment="hivex-devel is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632622" version="1" comment="hivex-lang is &lt;1.3.14-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632564" version="1" comment="libhivex0 is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632566" version="1" comment="ocaml-hivex is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632567" version="1" comment="ocaml-hivex-devel is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632565" version="1" comment="perl-Win-Hivex is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632623" version="1" comment="python-hivex is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632568" version="1" comment="linuxptp is &lt;3.1.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633135" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632945" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633136" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633137" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632946" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633138" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633139" version="1" comment="dtb-al is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633140" version="1" comment="dtb-allwinner is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633141" version="1" comment="dtb-altera is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633142" version="1" comment="dtb-amd is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633143" version="1" comment="dtb-amlogic is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633144" version="1" comment="dtb-apm is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633145" version="1" comment="dtb-arm is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633146" version="1" comment="dtb-broadcom is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633147" version="1" comment="dtb-cavium is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633148" version="1" comment="dtb-exynos is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633149" version="1" comment="dtb-freescale is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633150" version="1" comment="dtb-hisilicon is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633151" version="1" comment="dtb-lg is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633152" version="1" comment="dtb-marvell is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633153" version="1" comment="dtb-mediatek is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633154" version="1" comment="dtb-nvidia is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633155" version="1" comment="dtb-qcom is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633156" version="1" comment="dtb-renesas is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633157" version="1" comment="dtb-rockchip is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633158" version="1" comment="dtb-socionext is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633159" version="1" comment="dtb-sprd is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633160" version="1" comment="dtb-xilinx is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633161" version="1" comment="dtb-zte is &lt;5.3.18-59.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633162" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632947" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633163" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632922" version="1" comment="kernel-64kb is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632923" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633164" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633165" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633166" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633167" version="1" comment="kernel-debug is &lt;5.3.18-59.24.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633168" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.24.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633169" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.24.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632924" version="1" comment="kernel-default is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632925" version="1" comment="kernel-default-base is &lt;5.3.18-59.24.1.18.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633170" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.24.1.18.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632926" version="1" comment="kernel-default-devel is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633171" version="1" comment="kernel-default-extra is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633172" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633173" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633174" version="1" comment="kernel-default-optional is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632927" version="1" comment="kernel-devel is &lt;5.3.18-59.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632931" version="1" comment="kernel-docs is &lt;5.3.18-59.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633175" version="1" comment="kernel-docs-html is &lt;5.3.18-59.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633176" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.24.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633177" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.24.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633178" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.24.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632928" version="1" comment="kernel-macros is &lt;5.3.18-59.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632932" version="1" comment="kernel-obs-build is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633179" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632929" version="1" comment="kernel-preempt is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632933" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633180" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633181" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633182" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632934" version="1" comment="kernel-source is &lt;5.3.18-59.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633183" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632935" version="1" comment="kernel-syms is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632930" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633184" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633185" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633186" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633187" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632948" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633188" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633189" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.24.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632936" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633190" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633327" version="1" comment="nodejs14 is &lt;14.17.5-5.15.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633328" version="1" comment="nodejs14-devel is &lt;14.17.5-5.15.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633329" version="1" comment="nodejs14-docs is &lt;14.17.5-5.15.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633330" version="1" comment="npm14 is &lt;14.17.5-5.15.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633466" version="1" comment="gd is &lt;2.2.5-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633464" version="1" comment="gd-devel is &lt;2.2.5-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633463" version="1" comment="libgd3 is &lt;2.2.5-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633477" version="1" comment="libgd3-32bit is &lt;2.2.5-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626293" version="1" comment="libshibsp-lite8 is &lt;3.1.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626294" version="1" comment="libshibsp9 is &lt;3.1.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626295" version="1" comment="shibboleth-sp is &lt;3.1.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626296" version="1" comment="shibboleth-sp-devel is &lt;3.1.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632667" version="1" comment="libecpg6 is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632713" version="1" comment="libecpg6-32bit is &lt;13.4-5.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632654" version="1" comment="libpq5 is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632655" version="1" comment="libpq5-32bit is &lt;13.4-5.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632656" version="1" comment="postgresql13 is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632668" version="1" comment="postgresql13-contrib is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632669" version="1" comment="postgresql13-devel is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632670" version="1" comment="postgresql13-docs is &lt;13.4-5.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632714" version="1" comment="postgresql13-llvmjit is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632671" version="1" comment="postgresql13-plperl is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632672" version="1" comment="postgresql13-plpython is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632673" version="1" comment="postgresql13-pltcl is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632674" version="1" comment="postgresql13-server is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632675" version="1" comment="postgresql13-server-devel is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632666" version="1" comment="postgresql13-test is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632657" version="1" comment="postgresql12 is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632658" version="1" comment="postgresql12-contrib is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632659" version="1" comment="postgresql12-devel is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632660" version="1" comment="postgresql12-docs is &lt;12.8-8.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632715" version="1" comment="postgresql12-llvmjit is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632661" version="1" comment="postgresql12-plperl is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632662" version="1" comment="postgresql12-plpython is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632663" version="1" comment="postgresql12-pltcl is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632664" version="1" comment="postgresql12-server is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632665" version="1" comment="postgresql12-server-devel is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632716" version="1" comment="postgresql12-test is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634556" version="1" comment="glibc is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634557" version="1" comment="glibc-32bit is &lt;2.31-9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634558" version="1" comment="glibc-devel is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634573" version="1" comment="glibc-devel-32bit is &lt;2.31-9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634574" version="1" comment="glibc-devel-static is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634821" version="1" comment="glibc-devel-static-32bit is &lt;2.31-9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634559" version="1" comment="glibc-extra is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634822" version="1" comment="glibc-html is &lt;2.31-9.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634560" version="1" comment="glibc-i18ndata is &lt;2.31-9.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634561" version="1" comment="glibc-info is &lt;2.31-9.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634562" version="1" comment="glibc-lang is &lt;2.31-9.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634563" version="1" comment="glibc-locale is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634564" version="1" comment="glibc-locale-base is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634565" version="1" comment="glibc-locale-base-32bit is &lt;2.31-9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634566" version="1" comment="glibc-profile is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634823" version="1" comment="glibc-profile-32bit is &lt;2.31-9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634575" version="1" comment="glibc-utils is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634824" version="1" comment="glibc-utils-32bit is &lt;2.31-9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634567" version="1" comment="nscd is &lt;2.31-9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634431" version="1" comment="go1.16 is &lt;1.16.8-1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634432" version="1" comment="go1.16-doc is &lt;1.16.8-1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634433" version="1" comment="go1.16-race is &lt;1.16.8-1.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634434" version="1" comment="ffmpeg is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634529" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634530" version="1" comment="libavcodec-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634415" version="1" comment="libavcodec57 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634531" version="1" comment="libavcodec57-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634532" version="1" comment="libavdevice-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634435" version="1" comment="libavdevice57 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634533" version="1" comment="libavdevice57-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634534" version="1" comment="libavfilter-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634436" version="1" comment="libavfilter6 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634535" version="1" comment="libavfilter6-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634536" version="1" comment="libavformat-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634416" version="1" comment="libavformat57 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634537" version="1" comment="libavformat57-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634428" version="1" comment="libavresample-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634429" version="1" comment="libavresample3 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634419" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634420" version="1" comment="libavutil-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634421" version="1" comment="libavutil55 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634538" version="1" comment="libavutil55-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634422" version="1" comment="libpostproc-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634423" version="1" comment="libpostproc54 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634539" version="1" comment="libpostproc54-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634424" version="1" comment="libswresample-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634425" version="1" comment="libswresample2 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634540" version="1" comment="libswresample2-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634426" version="1" comment="libswscale-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634427" version="1" comment="libswscale4 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634541" version="1" comment="libswscale4-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634437" version="1" comment="nodejs8 is &lt;8.17.0-10.15.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634438" version="1" comment="nodejs8-devel is &lt;8.17.0-10.15.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634439" version="1" comment="nodejs8-docs is &lt;8.17.0-10.15.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634440" version="1" comment="npm8 is &lt;8.17.0-10.15.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633973" version="1" comment="curl is &lt;7.66.0-4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633974" version="1" comment="libcurl-devel is &lt;7.66.0-4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634041" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-4.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633975" version="1" comment="libcurl4 is &lt;7.66.0-4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633976" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633461" version="1" comment="libcryptopp-devel is &lt;5.6.5-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633462" version="1" comment="libcryptopp5_6_5 is &lt;5.6.5-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633656" version="1" comment="libcryptopp5_6_5-32bit is &lt;5.6.5-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632237" version="1" comment="erlang-rabbitmq-client is &lt;3.8.11-3.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632238" version="1" comment="rabbitmq-server is &lt;3.8.11-3.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632239" version="1" comment="rabbitmq-server-plugins is &lt;3.8.11-3.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633413" version="1" comment="rust-cbindgen is &lt;0.19.0-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651954" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651955" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651956" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651675" version="1" comment="kernel-azure is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651676" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651957" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651958" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651959" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651677" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.25.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651678" version="1" comment="kernel-source-azure is &lt;5.3.18-38.25.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651679" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651960" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651961" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651962" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.25.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634050" version="1" comment="systemd-bash-completion is &lt;234-24.93.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633657" version="1" comment="aom-tools is &lt;1.0.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633658" version="1" comment="libaom-devel is &lt;1.0.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633659" version="1" comment="libaom-devel-doc is &lt;1.0.0-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633465" version="1" comment="libaom0 is &lt;1.0.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633660" version="1" comment="libaom0-32bit is &lt;1.0.0-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634056" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634411" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.4-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634057" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634412" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.4-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634058" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634060" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634061" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634062" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634413" version="1" comment="webkit-jsc-4 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634059" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634063" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634414" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634554" version="1" comment="libQt5Svg5 is &lt;5.12.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634829" version="1" comment="libQt5Svg5-32bit is &lt;5.12.7-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634555" version="1" comment="libqt5-qtsvg-devel is &lt;5.12.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634830" version="1" comment="libqt5-qtsvg-devel-32bit is &lt;5.12.7-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634831" version="1" comment="libqt5-qtsvg-examples is &lt;5.12.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634568" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.12.7-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651963" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651715" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651964" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651965" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651716" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651966" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651967" version="1" comment="dtb-al is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651968" version="1" comment="dtb-allwinner is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651969" version="1" comment="dtb-altera is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651970" version="1" comment="dtb-amd is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651971" version="1" comment="dtb-amlogic is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651972" version="1" comment="dtb-apm is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651973" version="1" comment="dtb-arm is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651974" version="1" comment="dtb-broadcom is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651975" version="1" comment="dtb-cavium is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651976" version="1" comment="dtb-exynos is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651977" version="1" comment="dtb-freescale is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651978" version="1" comment="dtb-hisilicon is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651979" version="1" comment="dtb-lg is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651980" version="1" comment="dtb-marvell is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651981" version="1" comment="dtb-mediatek is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651982" version="1" comment="dtb-nvidia is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651983" version="1" comment="dtb-qcom is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651984" version="1" comment="dtb-renesas is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651985" version="1" comment="dtb-rockchip is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651986" version="1" comment="dtb-socionext is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651987" version="1" comment="dtb-sprd is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651988" version="1" comment="dtb-xilinx is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651989" version="1" comment="dtb-zte is &lt;5.3.18-59.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651990" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651717" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651991" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651628" version="1" comment="kernel-64kb is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651629" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651992" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651993" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651994" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651995" version="1" comment="kernel-debug is &lt;5.3.18-59.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651996" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651997" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651630" version="1" comment="kernel-default is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651631" version="1" comment="kernel-default-base is &lt;5.3.18-59.27.1.18.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651998" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.27.1.18.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651632" version="1" comment="kernel-default-devel is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651999" version="1" comment="kernel-default-extra is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652000" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652001" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652002" version="1" comment="kernel-default-optional is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651633" version="1" comment="kernel-devel is &lt;5.3.18-59.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651660" version="1" comment="kernel-docs is &lt;5.3.18-59.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652003" version="1" comment="kernel-docs-html is &lt;5.3.18-59.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652004" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652005" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652006" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.27.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651634" version="1" comment="kernel-macros is &lt;5.3.18-59.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651661" version="1" comment="kernel-obs-build is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652007" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651635" version="1" comment="kernel-preempt is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651662" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652008" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652009" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652010" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651663" version="1" comment="kernel-source is &lt;5.3.18-59.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652011" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651664" version="1" comment="kernel-syms is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651636" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.27.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652012" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652013" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652014" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652015" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651718" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652016" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652017" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651665" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652018" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651684" version="1" comment="python2-rpm is &lt;4.14.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651624" version="1" comment="python3-rpm is &lt;4.14.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651625" version="1" comment="rpm is &lt;4.14.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651626" version="1" comment="rpm-32bit is &lt;4.14.3-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651659" version="1" comment="rpm-build is &lt;4.14.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651627" version="1" comment="rpm-devel is &lt;4.14.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651674" version="1" comment="rpm-ndb is &lt;4.14.3-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651953" version="1" comment="rpm-ndb-32bit is &lt;4.14.3-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652107" version="1" comment="kmod-compat is &lt;25-6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651642" version="1" comment="MozillaFirefox is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651643" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-9.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651938" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651644" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651645" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651646" version="1" comment="MozillaFirefox-translations-other is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632226" version="1" comment="krb5 is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632227" version="1" comment="krb5-32bit is &lt;1.16.3-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632228" version="1" comment="krb5-client is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632229" version="1" comment="krb5-devel is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632240" version="1" comment="krb5-devel-32bit is &lt;1.16.3-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632232" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632230" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632231" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632233" version="1" comment="krb5-server is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652739" version="1" comment="strongswan is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652740" version="1" comment="strongswan-doc is &lt;5.8.2-11.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652741" version="1" comment="strongswan-hmac is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652742" version="1" comment="strongswan-ipsec is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652743" version="1" comment="strongswan-libs0 is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652862" version="1" comment="strongswan-mysql is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652763" version="1" comment="strongswan-nm is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652863" version="1" comment="strongswan-sqlite is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651649" version="1" comment="flatpak is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651650" version="1" comment="flatpak-devel is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651651" version="1" comment="flatpak-zsh-completion is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651652" version="1" comment="libflatpak0 is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651653" version="1" comment="system-user-flatpak is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651654" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651400" version="1" comment="libblkid-devel is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651463" version="1" comment="libblkid-devel-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651401" version="1" comment="libblkid-devel-static is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651402" version="1" comment="libblkid1 is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651403" version="1" comment="libblkid1-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651404" version="1" comment="libfdisk-devel is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651464" version="1" comment="libfdisk-devel-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651465" version="1" comment="libfdisk-devel-static is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651405" version="1" comment="libfdisk1 is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651466" version="1" comment="libfdisk1-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651406" version="1" comment="libmount-devel is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651467" version="1" comment="libmount-devel-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651468" version="1" comment="libmount-devel-static is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651407" version="1" comment="libmount1 is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651408" version="1" comment="libmount1-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651409" version="1" comment="libsmartcols-devel is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651469" version="1" comment="libsmartcols-devel-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651470" version="1" comment="libsmartcols-devel-static is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651410" version="1" comment="libsmartcols1 is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651471" version="1" comment="libsmartcols1-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651411" version="1" comment="libuuid-devel is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651472" version="1" comment="libuuid-devel-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651412" version="1" comment="libuuid-devel-static is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651413" version="1" comment="libuuid1 is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651414" version="1" comment="libuuid1-32bit is &lt;2.36.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651473" version="1" comment="python3-libmount is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651415" version="1" comment="util-linux is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651416" version="1" comment="util-linux-lang is &lt;2.36.2-4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651417" version="1" comment="util-linux-systemd is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651420" version="1" comment="uuidd is &lt;2.36.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634572" version="1" comment="xstream is &lt;1.4.18-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634826" version="1" comment="xstream-benchmark is &lt;1.4.18-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634827" version="1" comment="xstream-javadoc is &lt;1.4.18-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634828" version="1" comment="xstream-parent is &lt;1.4.18-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651418" version="1" comment="squid is &lt;4.17-5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651656" version="1" comment="go1.16 is &lt;1.16.9-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651657" version="1" comment="go1.16-doc is &lt;1.16.9-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651658" version="1" comment="go1.16-race is &lt;1.16.9-1.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652189" version="1" comment="go1.17 is &lt;1.17.2-1.6.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652190" version="1" comment="go1.17-doc is &lt;1.17.2-1.6.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652130" version="1" comment="go1.17-race is &lt;1.17.2-1.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651614" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651939" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651615" version="1" comment="python is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651940" version="1" comment="python-32bit is &lt;2.7.18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651616" version="1" comment="python-base is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651941" version="1" comment="python-base-32bit is &lt;2.7.18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651680" version="1" comment="python-curses is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651942" version="1" comment="python-demo is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651681" version="1" comment="python-devel is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651943" version="1" comment="python-doc is &lt;2.7.18-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651944" version="1" comment="python-doc-pdf is &lt;2.7.18-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651682" version="1" comment="python-gdbm is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651945" version="1" comment="python-idle is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651647" version="1" comment="python-tk is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651683" version="1" comment="python-xml is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652201" version="1" comment="libncurses5 is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652202" version="1" comment="libncurses5-32bit is &lt;6.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652191" version="1" comment="libncurses6 is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652192" version="1" comment="libncurses6-32bit is &lt;6.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652193" version="1" comment="ncurses-devel is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652200" version="1" comment="ncurses-devel-32bit is &lt;6.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652194" version="1" comment="ncurses-utils is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652203" version="1" comment="ncurses5-devel is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652303" version="1" comment="ncurses5-devel-32bit is &lt;6.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652195" version="1" comment="tack is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652196" version="1" comment="terminfo is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652197" version="1" comment="terminfo-base is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652198" version="1" comment="terminfo-iterm is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652199" version="1" comment="terminfo-screen is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651617" version="1" comment="fetchmail is &lt;6.3.26-20.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651648" version="1" comment="fetchmailconf is &lt;6.3.26-20.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651637" version="1" comment="containerd is &lt;1.4.11-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651946" version="1" comment="containerd-ctr is &lt;1.4.11-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651638" version="1" comment="docker is &lt;20.10.9_ce-156.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651639" version="1" comment="docker-bash-completion is &lt;20.10.9_ce-156.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651641" version="1" comment="docker-fish-completion is &lt;20.10.9_ce-156.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651947" version="1" comment="docker-kubic is &lt;20.10.9_ce-156.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651948" version="1" comment="docker-kubic-bash-completion is &lt;20.10.9_ce-156.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651949" version="1" comment="docker-kubic-fish-completion is &lt;20.10.9_ce-156.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651950" version="1" comment="docker-kubic-kubeadm-criconfig is &lt;20.10.9_ce-156.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651951" version="1" comment="docker-kubic-zsh-completion is &lt;20.10.9_ce-156.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651952" version="1" comment="docker-zsh-completion is &lt;20.10.9_ce-156.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651640" version="1" comment="runc is &lt;1.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652760" version="1" comment="ffmpeg is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652849" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652850" version="1" comment="libavcodec-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652744" version="1" comment="libavcodec57 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652851" version="1" comment="libavcodec57-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652852" version="1" comment="libavdevice-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652761" version="1" comment="libavdevice57 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652853" version="1" comment="libavdevice57-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652854" version="1" comment="libavfilter-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652762" version="1" comment="libavfilter6 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652855" version="1" comment="libavfilter6-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652856" version="1" comment="libavformat-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652745" version="1" comment="libavformat57 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652857" version="1" comment="libavformat57-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652757" version="1" comment="libavresample-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652758" version="1" comment="libavresample3 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652748" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652749" version="1" comment="libavutil-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652750" version="1" comment="libavutil55 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652858" version="1" comment="libavutil55-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652751" version="1" comment="libpostproc-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652752" version="1" comment="libpostproc54 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652859" version="1" comment="libpostproc54-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652753" version="1" comment="libswresample-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652754" version="1" comment="libswresample2 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652860" version="1" comment="libswresample2-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652755" version="1" comment="libswscale-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652756" version="1" comment="libswscale4 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652861" version="1" comment="libswscale4-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652736" version="1" comment="apache2 is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652765" version="1" comment="apache2-devel is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652766" version="1" comment="apache2-doc is &lt;2.4.43-3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652764" version="1" comment="apache2-event is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652848" version="1" comment="apache2-example-pages is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652737" version="1" comment="apache2-prefork is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652738" version="1" comment="apache2-utils is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652767" version="1" comment="apache2-worker is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652624" version="1" comment="wireguard-tools is &lt;1.0.20200827-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652864" version="1" comment="libpcre1 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652865" version="1" comment="libpcre1-32bit is &lt;8.45-20.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652866" version="1" comment="libpcre16-0 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652913" version="1" comment="libpcre16-0-32bit is &lt;8.45-20.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652867" version="1" comment="libpcrecpp0 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652868" version="1" comment="libpcrecpp0-32bit is &lt;8.45-20.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652869" version="1" comment="libpcreposix0 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652914" version="1" comment="libpcreposix0-32bit is &lt;8.45-20.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652870" version="1" comment="pcre-devel is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652915" version="1" comment="pcre-devel-static is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652916" version="1" comment="pcre-doc is &lt;8.45-20.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652871" version="1" comment="pcre-tools is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653308" version="1" comment="dnsmasq is &lt;2.86-7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653374" version="1" comment="dnsmasq-utils is &lt;2.86-7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652734" version="1" comment="busybox is &lt;1.26.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652735" version="1" comment="busybox-static is &lt;1.26.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651618" version="1" comment="python3-salt is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651619" version="1" comment="salt is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651706" version="1" comment="salt-api is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651620" version="1" comment="salt-bash-completion is &lt;3002.2-50.1.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651707" version="1" comment="salt-cloud is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651621" version="1" comment="salt-doc is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651708" version="1" comment="salt-fish-completion is &lt;3002.2-50.1.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651709" version="1" comment="salt-master is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651622" version="1" comment="salt-minion is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651710" version="1" comment="salt-proxy is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651711" version="1" comment="salt-ssh is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651712" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651713" version="1" comment="salt-syndic is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651714" version="1" comment="salt-transactional-update is &lt;3002.2-50.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651623" version="1" comment="salt-zsh-completion is &lt;3002.2-50.1.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653583" version="1" comment="transfig is &lt;3.2.8b-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653649" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653708" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.32.4-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653650" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653709" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.32.4-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653651" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653653" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653654" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653655" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653710" version="1" comment="webkit-jsc-4 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653652" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653656" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653711" version="1" comment="webkit2gtk3-minibrowser is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653096" version="1" comment="qemu-s390 is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652954" version="1" comment="qemu is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653068" version="1" comment="qemu-arm is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653069" version="1" comment="qemu-audio-alsa is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653070" version="1" comment="qemu-audio-pa is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653071" version="1" comment="qemu-audio-spice is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652959" version="1" comment="qemu-block-curl is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653072" version="1" comment="qemu-block-dmg is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653073" version="1" comment="qemu-block-gluster is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652960" version="1" comment="qemu-block-iscsi is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653074" version="1" comment="qemu-block-nfs is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652961" version="1" comment="qemu-block-rbd is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652962" version="1" comment="qemu-block-ssh is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652963" version="1" comment="qemu-chardev-baum is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653075" version="1" comment="qemu-chardev-spice is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653076" version="1" comment="qemu-extra is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652965" version="1" comment="qemu-guest-agent is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653077" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653078" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653079" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653080" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653081" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653082" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653083" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652972" version="1" comment="qemu-ipxe is &lt;1.0.0+-106.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653084" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652973" version="1" comment="qemu-ksm is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652974" version="1" comment="qemu-kvm is &lt;5.2.0-106.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652975" version="1" comment="qemu-lang is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653085" version="1" comment="qemu-linux-user is &lt;5.2.0-106.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653086" version="1" comment="qemu-microvm is &lt;5.2.0-106.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653087" version="1" comment="qemu-ppc is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653088" version="1" comment="qemu-s390x is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652978" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-106.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652979" version="1" comment="qemu-sgabios is &lt;8-106.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652980" version="1" comment="qemu-skiboot is &lt;5.2.0-106.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653089" version="1" comment="qemu-testsuite is &lt;5.2.0-106.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652931" version="1" comment="qemu-tools is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652981" version="1" comment="qemu-ui-curses is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653090" version="1" comment="qemu-ui-gtk is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653091" version="1" comment="qemu-ui-opengl is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653092" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653093" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652986" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-106.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653094" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653095" version="1" comment="qemu-x86 is &lt;5.2.0-106.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653986" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.312-3.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653987" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.312-3.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653988" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.312-3.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653989" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.312-3.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653990" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.312-3.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653991" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.312-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653992" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.312-3.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653451" version="1" comment="binutils is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653452" version="1" comment="binutils-devel is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653455" version="1" comment="binutils-devel-32bit is &lt;2.37-7.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653458" version="1" comment="binutils-gold is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653456" version="1" comment="bpftrace is &lt;0.11.4-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653457" version="1" comment="bpftrace-tools is &lt;0.11.4-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653562" version="1" comment="cross-aarch64-binutils is &lt;2.37-7.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653563" version="1" comment="cross-arm-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653564" version="1" comment="cross-avr-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653565" version="1" comment="cross-epiphany-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653566" version="1" comment="cross-hppa-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653567" version="1" comment="cross-hppa64-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653568" version="1" comment="cross-i386-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653569" version="1" comment="cross-ia64-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653570" version="1" comment="cross-m68k-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653571" version="1" comment="cross-mips-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653572" version="1" comment="cross-ppc-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653573" version="1" comment="cross-ppc64-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653574" version="1" comment="cross-ppc64le-binutils is &lt;2.37-7.21.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653575" version="1" comment="cross-riscv64-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653576" version="1" comment="cross-rx-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653577" version="1" comment="cross-s390-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653578" version="1" comment="cross-s390x-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653579" version="1" comment="cross-sparc-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653580" version="1" comment="cross-sparc64-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653581" version="1" comment="cross-spu-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653582" version="1" comment="cross-x86_64-binutils is &lt;2.37-7.21.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653453" version="1" comment="libctf-nobfd0 is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653454" version="1" comment="libctf0 is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653586" version="1" comment="libvirt is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653587" version="1" comment="libvirt-admin is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653588" version="1" comment="libvirt-bash-completion is &lt;7.1.0-6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653589" version="1" comment="libvirt-client is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653590" version="1" comment="libvirt-daemon is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653591" version="1" comment="libvirt-daemon-config-network is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653592" version="1" comment="libvirt-daemon-config-nwfilter is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653593" version="1" comment="libvirt-daemon-driver-interface is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653594" version="1" comment="libvirt-daemon-driver-libxl is &lt;7.1.0-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653595" version="1" comment="libvirt-daemon-driver-lxc is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653596" version="1" comment="libvirt-daemon-driver-network is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653597" version="1" comment="libvirt-daemon-driver-nodedev is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653598" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653599" version="1" comment="libvirt-daemon-driver-qemu is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653600" version="1" comment="libvirt-daemon-driver-secret is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653601" version="1" comment="libvirt-daemon-driver-storage is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653602" version="1" comment="libvirt-daemon-driver-storage-core is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653603" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653642" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653604" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653605" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653606" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653607" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653608" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;7.1.0-6.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653609" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653610" version="1" comment="libvirt-daemon-hooks is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653611" version="1" comment="libvirt-daemon-lxc is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653612" version="1" comment="libvirt-daemon-qemu is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653613" version="1" comment="libvirt-daemon-xen is &lt;7.1.0-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653614" version="1" comment="libvirt-devel is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653643" version="1" comment="libvirt-devel-32bit is &lt;7.1.0-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653615" version="1" comment="libvirt-doc is &lt;7.1.0-6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653585" version="1" comment="libvirt-libs is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653616" version="1" comment="libvirt-lock-sanlock is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653617" version="1" comment="libvirt-nss is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653644" version="1" comment="wireshark-plugin-libvirt is &lt;7.1.0-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652336" version="1" comment="ruby2.5-rubygem-activerecord-5_1 is &lt;5.1.4-5.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654658" version="1" comment="libtinyxml0 is &lt;2.6.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654659" version="1" comment="tinyxml-devel is &lt;2.6.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654660" version="1" comment="tinyxml-docs is &lt;2.6.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654534" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654535" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654536" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654340" version="1" comment="kernel-azure is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654341" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654537" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654538" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654539" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654342" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.28.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654343" version="1" comment="kernel-source-azure is &lt;5.3.18-38.28.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654344" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654540" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654541" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654542" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654299" version="1" comment="binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654300" version="1" comment="binutils-devel is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654320" version="1" comment="binutils-devel-32bit is &lt;2.37-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654334" version="1" comment="binutils-gold is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654543" version="1" comment="cross-aarch64-binutils is &lt;2.37-7.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654544" version="1" comment="cross-arm-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654545" version="1" comment="cross-avr-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654546" version="1" comment="cross-epiphany-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654547" version="1" comment="cross-hppa-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654548" version="1" comment="cross-hppa64-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654549" version="1" comment="cross-i386-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654550" version="1" comment="cross-ia64-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654551" version="1" comment="cross-m68k-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654552" version="1" comment="cross-mips-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654553" version="1" comment="cross-ppc-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654554" version="1" comment="cross-ppc64-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654555" version="1" comment="cross-ppc64le-binutils is &lt;2.37-7.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654556" version="1" comment="cross-riscv64-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654557" version="1" comment="cross-rx-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654558" version="1" comment="cross-s390-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654559" version="1" comment="cross-s390x-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654560" version="1" comment="cross-sparc-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654561" version="1" comment="cross-sparc64-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654562" version="1" comment="cross-spu-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654563" version="1" comment="cross-x86_64-binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654301" version="1" comment="libctf-nobfd0 is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654302" version="1" comment="libctf0 is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654904" version="1" comment="ctdb is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655346" version="1" comment="ctdb-pcp-pmda is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655347" version="1" comment="ctdb-tests is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654738" version="1" comment="ldb-tools is &lt;2.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654739" version="1" comment="libdcerpc-binding0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654740" version="1" comment="libdcerpc-binding0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655348" version="1" comment="libdcerpc-binding0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654741" version="1" comment="libdcerpc-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654742" version="1" comment="libdcerpc-samr-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654743" version="1" comment="libdcerpc-samr0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655349" version="1" comment="libdcerpc-samr0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655350" version="1" comment="libdcerpc-samr0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654744" version="1" comment="libdcerpc0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654745" version="1" comment="libdcerpc0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655351" version="1" comment="libdcerpc0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654746" version="1" comment="libldb-devel is &lt;2.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654747" version="1" comment="libldb2 is &lt;2.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654748" version="1" comment="libldb2-32bit is &lt;2.2.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654749" version="1" comment="libndr-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654750" version="1" comment="libndr-krb5pac-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654751" version="1" comment="libndr-krb5pac0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654752" version="1" comment="libndr-krb5pac0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655352" version="1" comment="libndr-krb5pac0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654753" version="1" comment="libndr-nbt-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654754" version="1" comment="libndr-nbt0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654755" version="1" comment="libndr-nbt0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655353" version="1" comment="libndr-nbt0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654756" version="1" comment="libndr-standard-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654757" version="1" comment="libndr-standard0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654758" version="1" comment="libndr-standard0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655354" version="1" comment="libndr-standard0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654759" version="1" comment="libndr1 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654760" version="1" comment="libndr1-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655355" version="1" comment="libndr1-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654761" version="1" comment="libnetapi-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655356" version="1" comment="libnetapi-devel-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655357" version="1" comment="libnetapi-devel-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654762" version="1" comment="libnetapi0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654763" version="1" comment="libnetapi0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655358" version="1" comment="libnetapi0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654764" version="1" comment="libsamba-credentials-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654765" version="1" comment="libsamba-credentials0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654766" version="1" comment="libsamba-credentials0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655359" version="1" comment="libsamba-credentials0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654767" version="1" comment="libsamba-errors-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654768" version="1" comment="libsamba-errors0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654769" version="1" comment="libsamba-errors0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655360" version="1" comment="libsamba-errors0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654770" version="1" comment="libsamba-hostconfig-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654771" version="1" comment="libsamba-hostconfig0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654772" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655361" version="1" comment="libsamba-hostconfig0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654773" version="1" comment="libsamba-passdb-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654774" version="1" comment="libsamba-passdb0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654775" version="1" comment="libsamba-passdb0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655362" version="1" comment="libsamba-passdb0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654776" version="1" comment="libsamba-policy-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654777" version="1" comment="libsamba-policy-python3-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654778" version="1" comment="libsamba-policy0-python3 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655363" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655364" version="1" comment="libsamba-policy0-python3-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654779" version="1" comment="libsamba-util-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654780" version="1" comment="libsamba-util0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654781" version="1" comment="libsamba-util0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655365" version="1" comment="libsamba-util0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654782" version="1" comment="libsamdb-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654783" version="1" comment="libsamdb0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654784" version="1" comment="libsamdb0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655366" version="1" comment="libsamdb0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654785" version="1" comment="libsmbclient-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654786" version="1" comment="libsmbclient0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655367" version="1" comment="libsmbclient0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655368" version="1" comment="libsmbclient0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654787" version="1" comment="libsmbconf-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654788" version="1" comment="libsmbconf0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654789" version="1" comment="libsmbconf0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655369" version="1" comment="libsmbconf0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654790" version="1" comment="libsmbldap-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654791" version="1" comment="libsmbldap2 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654792" version="1" comment="libsmbldap2-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655370" version="1" comment="libsmbldap2-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654793" version="1" comment="libtevent-util-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654794" version="1" comment="libtevent-util0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654795" version="1" comment="libtevent-util0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655371" version="1" comment="libtevent-util0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654796" version="1" comment="libwbclient-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654797" version="1" comment="libwbclient0 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654798" version="1" comment="libwbclient0-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655372" version="1" comment="libwbclient0-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654799" version="1" comment="python3-ldb is &lt;2.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655373" version="1" comment="python3-ldb-32bit is &lt;2.2.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654800" version="1" comment="python3-ldb-devel is &lt;2.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654801" version="1" comment="samba is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654815" version="1" comment="samba-ad-dc is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655374" version="1" comment="samba-ad-dc-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655375" version="1" comment="samba-ad-dc-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654802" version="1" comment="samba-ceph is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654803" version="1" comment="samba-client is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655376" version="1" comment="samba-client-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655377" version="1" comment="samba-client-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654804" version="1" comment="samba-core-devel is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655378" version="1" comment="samba-doc is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654805" version="1" comment="samba-dsdb-modules is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654806" version="1" comment="samba-gpupdate is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654807" version="1" comment="samba-ldb-ldap is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654808" version="1" comment="samba-libs is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654809" version="1" comment="samba-libs-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655379" version="1" comment="samba-libs-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654810" version="1" comment="samba-libs-python3 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655380" version="1" comment="samba-libs-python3-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655381" version="1" comment="samba-libs-python3-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654811" version="1" comment="samba-python3 is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655382" version="1" comment="samba-test is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654812" version="1" comment="samba-winbind is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654813" version="1" comment="samba-winbind-32bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655383" version="1" comment="samba-winbind-64bit is &lt;4.13.13+git.528.140935f8d6a-3.12.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654687" version="1" comment="libndr0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654688" version="1" comment="libndr0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655923" version="1" comment="ctdb is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656159" version="1" comment="ctdb-pcp-pmda is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656160" version="1" comment="ctdb-tests is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655815" version="1" comment="libdcerpc-binding0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655816" version="1" comment="libdcerpc-binding0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656161" version="1" comment="libdcerpc-binding0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655817" version="1" comment="libdcerpc-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655818" version="1" comment="libdcerpc-samr-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655819" version="1" comment="libdcerpc-samr0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656162" version="1" comment="libdcerpc-samr0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656163" version="1" comment="libdcerpc-samr0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655820" version="1" comment="libdcerpc0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655821" version="1" comment="libdcerpc0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656164" version="1" comment="libdcerpc0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655822" version="1" comment="libndr-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655823" version="1" comment="libndr-krb5pac-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655824" version="1" comment="libndr-krb5pac0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655825" version="1" comment="libndr-krb5pac0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656165" version="1" comment="libndr-krb5pac0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655826" version="1" comment="libndr-nbt-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655827" version="1" comment="libndr-nbt0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655828" version="1" comment="libndr-nbt0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656166" version="1" comment="libndr-nbt0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655829" version="1" comment="libndr-standard-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655830" version="1" comment="libndr-standard0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655831" version="1" comment="libndr-standard0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656167" version="1" comment="libndr-standard0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655832" version="1" comment="libndr1 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655833" version="1" comment="libndr1-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656168" version="1" comment="libndr1-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655834" version="1" comment="libnetapi-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656169" version="1" comment="libnetapi-devel-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656170" version="1" comment="libnetapi-devel-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655835" version="1" comment="libnetapi0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655836" version="1" comment="libnetapi0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656171" version="1" comment="libnetapi0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655837" version="1" comment="libsamba-credentials-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655838" version="1" comment="libsamba-credentials0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655839" version="1" comment="libsamba-credentials0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656172" version="1" comment="libsamba-credentials0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655840" version="1" comment="libsamba-errors-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655841" version="1" comment="libsamba-errors0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655842" version="1" comment="libsamba-errors0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656173" version="1" comment="libsamba-errors0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655843" version="1" comment="libsamba-hostconfig-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655844" version="1" comment="libsamba-hostconfig0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655845" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656174" version="1" comment="libsamba-hostconfig0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655846" version="1" comment="libsamba-passdb-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655847" version="1" comment="libsamba-passdb0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655848" version="1" comment="libsamba-passdb0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656175" version="1" comment="libsamba-passdb0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655849" version="1" comment="libsamba-policy-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655850" version="1" comment="libsamba-policy-python3-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655851" version="1" comment="libsamba-policy0-python3 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656176" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656177" version="1" comment="libsamba-policy0-python3-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655852" version="1" comment="libsamba-util-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655853" version="1" comment="libsamba-util0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655854" version="1" comment="libsamba-util0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656178" version="1" comment="libsamba-util0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655855" version="1" comment="libsamdb-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655856" version="1" comment="libsamdb0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655857" version="1" comment="libsamdb0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656179" version="1" comment="libsamdb0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655858" version="1" comment="libsmbclient-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655859" version="1" comment="libsmbclient0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656180" version="1" comment="libsmbclient0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656181" version="1" comment="libsmbclient0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655860" version="1" comment="libsmbconf-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655861" version="1" comment="libsmbconf0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655862" version="1" comment="libsmbconf0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656182" version="1" comment="libsmbconf0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655863" version="1" comment="libsmbldap-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655864" version="1" comment="libsmbldap2 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655865" version="1" comment="libsmbldap2-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656183" version="1" comment="libsmbldap2-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655866" version="1" comment="libtevent-util-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655867" version="1" comment="libtevent-util0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655868" version="1" comment="libtevent-util0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656184" version="1" comment="libtevent-util0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655869" version="1" comment="libwbclient-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655870" version="1" comment="libwbclient0 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655871" version="1" comment="libwbclient0-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656185" version="1" comment="libwbclient0-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655872" version="1" comment="samba is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655897" version="1" comment="samba-ad-dc is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656186" version="1" comment="samba-ad-dc-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656187" version="1" comment="samba-ad-dc-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655873" version="1" comment="samba-ceph is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655874" version="1" comment="samba-client is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656188" version="1" comment="samba-client-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656189" version="1" comment="samba-client-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655875" version="1" comment="samba-core-devel is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656190" version="1" comment="samba-doc is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655876" version="1" comment="samba-dsdb-modules is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655877" version="1" comment="samba-gpupdate is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655878" version="1" comment="samba-ldb-ldap is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655879" version="1" comment="samba-libs is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655880" version="1" comment="samba-libs-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656191" version="1" comment="samba-libs-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655881" version="1" comment="samba-libs-python3 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656192" version="1" comment="samba-libs-python3-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656193" version="1" comment="samba-libs-python3-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655882" version="1" comment="samba-python3 is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656194" version="1" comment="samba-test is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655883" version="1" comment="samba-winbind is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655884" version="1" comment="samba-winbind-32bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656195" version="1" comment="samba-winbind-64bit is &lt;4.13.13+git.531.903f5c0ccdc-3.17.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653315" version="1" comment="drbd-utils is &lt;9.18.0-4.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653309" version="1" comment="java-11-openjdk is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653375" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653310" version="1" comment="java-11-openjdk-demo is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653311" version="1" comment="java-11-openjdk-devel is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653312" version="1" comment="java-11-openjdk-headless is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653313" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.13.0-3.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653314" version="1" comment="java-11-openjdk-jmods is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653376" version="1" comment="java-11-openjdk-src is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653657" version="1" comment="tomcat is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653658" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653712" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653659" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653713" version="1" comment="tomcat-embed is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653714" version="1" comment="tomcat-javadoc is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653660" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653715" version="1" comment="tomcat-jsvc is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653661" version="1" comment="tomcat-lib is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653662" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653663" version="1" comment="tomcat-webapps is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655340" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.471.5edbe3dcae7-3.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655341" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.471.5edbe3dcae7-3.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655342" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.471.5edbe3dcae7-3.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655343" version="1" comment="samba-libs-python is &lt;4.9.5+git.471.5edbe3dcae7-3.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655344" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.471.5edbe3dcae7-3.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655345" version="1" comment="samba-python is &lt;4.9.5+git.471.5edbe3dcae7-3.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655744" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655425" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655745" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655746" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655426" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655747" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655748" version="1" comment="dtb-al is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655749" version="1" comment="dtb-allwinner is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655750" version="1" comment="dtb-altera is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655751" version="1" comment="dtb-amd is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655752" version="1" comment="dtb-amlogic is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655753" version="1" comment="dtb-apm is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655754" version="1" comment="dtb-arm is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655755" version="1" comment="dtb-broadcom is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655756" version="1" comment="dtb-cavium is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655757" version="1" comment="dtb-exynos is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655758" version="1" comment="dtb-freescale is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655759" version="1" comment="dtb-hisilicon is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655760" version="1" comment="dtb-lg is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655761" version="1" comment="dtb-marvell is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655762" version="1" comment="dtb-mediatek is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655763" version="1" comment="dtb-nvidia is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655764" version="1" comment="dtb-qcom is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655765" version="1" comment="dtb-renesas is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655766" version="1" comment="dtb-rockchip is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655767" version="1" comment="dtb-socionext is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655768" version="1" comment="dtb-sprd is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655769" version="1" comment="dtb-xilinx is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655770" version="1" comment="dtb-zte is &lt;5.3.18-59.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655771" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655427" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655772" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655406" version="1" comment="kernel-64kb is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655407" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655773" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655774" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655775" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655776" version="1" comment="kernel-debug is &lt;5.3.18-59.34.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655777" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.34.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655778" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.34.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655408" version="1" comment="kernel-default is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655409" version="1" comment="kernel-default-base is &lt;5.3.18-59.34.1.18.21.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655779" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.34.1.18.21.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655410" version="1" comment="kernel-default-devel is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655780" version="1" comment="kernel-default-extra is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655781" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655782" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655783" version="1" comment="kernel-default-optional is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655411" version="1" comment="kernel-devel is &lt;5.3.18-59.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655415" version="1" comment="kernel-docs is &lt;5.3.18-59.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655784" version="1" comment="kernel-docs-html is &lt;5.3.18-59.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655785" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.34.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655786" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.34.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655787" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.34.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655412" version="1" comment="kernel-macros is &lt;5.3.18-59.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655416" version="1" comment="kernel-obs-build is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655788" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655413" version="1" comment="kernel-preempt is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655417" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655789" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655790" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655791" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655418" version="1" comment="kernel-source is &lt;5.3.18-59.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655792" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655419" version="1" comment="kernel-syms is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655414" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.34.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655793" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655794" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655795" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655796" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655428" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655797" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655798" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.34.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655420" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655799" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654090" version="1" comment="MozillaFirefox is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654257" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654091" version="1" comment="MozillaFirefox-devel is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654092" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654093" version="1" comment="MozillaFirefox-translations-other is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656735" version="1" comment="postgresql12 is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656740" version="1" comment="postgresql12-contrib is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656741" version="1" comment="postgresql12-devel is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656742" version="1" comment="postgresql12-docs is &lt;12.9-8.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656750" version="1" comment="postgresql12-llvmjit is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656743" version="1" comment="postgresql12-plperl is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656744" version="1" comment="postgresql12-plpython is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656745" version="1" comment="postgresql12-pltcl is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656746" version="1" comment="postgresql12-server is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656747" version="1" comment="postgresql12-server-devel is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656751" version="1" comment="postgresql12-test is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656466" version="1" comment="libecpg6 is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656729" version="1" comment="libecpg6-32bit is &lt;14.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656417" version="1" comment="libpq5 is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656418" version="1" comment="libpq5-32bit is &lt;14.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656419" version="1" comment="postgresql14 is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656467" version="1" comment="postgresql14-contrib is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656468" version="1" comment="postgresql14-devel is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656730" version="1" comment="postgresql14-devel-mini is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656469" version="1" comment="postgresql14-docs is &lt;14.1-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656462" version="1" comment="postgresql14-llvmjit is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656470" version="1" comment="postgresql14-plperl is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656471" version="1" comment="postgresql14-plpython is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656472" version="1" comment="postgresql14-pltcl is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656473" version="1" comment="postgresql14-server is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656474" version="1" comment="postgresql14-server-devel is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656463" version="1" comment="postgresql14-test is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655814" version="1" comment="postgresql13 is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655905" version="1" comment="postgresql13-contrib is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655906" version="1" comment="postgresql13-devel is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655907" version="1" comment="postgresql13-docs is &lt;13.5-5.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655895" version="1" comment="postgresql13-llvmjit is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655908" version="1" comment="postgresql13-plperl is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655909" version="1" comment="postgresql13-plpython is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655910" version="1" comment="postgresql13-pltcl is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655911" version="1" comment="postgresql13-server is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655912" version="1" comment="postgresql13-server-devel is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655896" version="1" comment="postgresql13-test is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656976" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657152" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656977" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656978" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656979" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657153" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.312-3.58.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657154" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655898" version="1" comment="redis is &lt;6.0.14-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654258" version="1" comment="bind-devel-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654259" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654260" version="1" comment="libdns1605-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654261" version="1" comment="libirs1601-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654262" version="1" comment="libisc1606-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654263" version="1" comment="libisccc1600-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654264" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654265" version="1" comment="libns1604-32bit is &lt;9.16.6-12.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658012" version="1" comment="libnetcdf13 is &lt;4.6.1-5.7.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658013" version="1" comment="libnetcdf13-32bit is &lt;4.6.1-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658014" version="1" comment="libnetcdf13-openmpi is &lt;4.6.1-5.7.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658015" version="1" comment="libnetcdf13-openmpi-32bit is &lt;4.6.1-5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658016" version="1" comment="netcdf-openmpi is &lt;4.6.1-5.7.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658017" version="1" comment="netcdf-openmpi-devel is &lt;4.6.1-5.7.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658018" version="1" comment="netcdf-openmpi-devel-data is &lt;4.6.1-5.7.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658019" version="1" comment="netcdf-openmpi-devel-static is &lt;4.6.1-5.7.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657621" version="1" comment="libnetcdf_4_7_3-gnu-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657622" version="1" comment="libnetcdf_4_7_3-gnu-mpich-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657623" version="1" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657624" version="1" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657625" version="1" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657626" version="1" comment="netcdf_4_7_3-gnu-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657627" version="1" comment="netcdf_4_7_3-gnu-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657628" version="1" comment="netcdf_4_7_3-gnu-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657629" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657630" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657631" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657632" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657633" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657634" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657635" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657636" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657637" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657638" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657639" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657640" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657647" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657648" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657649" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657494" version="1" comment="kernel-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657495" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657650" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657651" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657652" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657496" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657497" version="1" comment="kernel-source-azure is &lt;5.3.18-38.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657498" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657653" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657654" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657655" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657988" version="1" comment="libnetcdf-gnu-openmpi1-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657989" version="1" comment="libnetcdf_4_6_1-gnu-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657990" version="1" comment="libnetcdf_4_6_1-gnu-mpich-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657991" version="1" comment="libnetcdf_4_6_1-gnu-mvapich2-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657992" version="1" comment="libnetcdf_4_6_1-gnu-openmpi1-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657993" version="1" comment="libnetcdf_4_6_1-gnu-openmpi2-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657994" version="1" comment="netcdf-gnu-openmpi1-hpc is &lt;4.6.1-10.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657995" version="1" comment="netcdf-gnu-openmpi1-hpc-devel is &lt;4.6.1-10.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657996" version="1" comment="netcdf_4_6_1-gnu-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657997" version="1" comment="netcdf_4_6_1-gnu-hpc-devel is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657998" version="1" comment="netcdf_4_6_1-gnu-hpc-devel-data is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657999" version="1" comment="netcdf_4_6_1-gnu-hpc-devel-static is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658000" version="1" comment="netcdf_4_6_1-gnu-mpich-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658001" version="1" comment="netcdf_4_6_1-gnu-mpich-hpc-devel is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658002" version="1" comment="netcdf_4_6_1-gnu-mpich-hpc-devel-static is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658003" version="1" comment="netcdf_4_6_1-gnu-mvapich2-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658004" version="1" comment="netcdf_4_6_1-gnu-mvapich2-hpc-devel is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658005" version="1" comment="netcdf_4_6_1-gnu-mvapich2-hpc-devel-static is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658006" version="1" comment="netcdf_4_6_1-gnu-openmpi1-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658007" version="1" comment="netcdf_4_6_1-gnu-openmpi1-hpc-devel is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658008" version="1" comment="netcdf_4_6_1-gnu-openmpi1-hpc-devel-static is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658009" version="1" comment="netcdf_4_6_1-gnu-openmpi2-hpc is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658010" version="1" comment="netcdf_4_6_1-gnu-openmpi2-hpc-devel is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658011" version="1" comment="netcdf_4_6_1-gnu-openmpi2-hpc-devel-static is &lt;4.6.1-10.7.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654656" version="1" comment="go1.17 is &lt;1.17.3-1.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654657" version="1" comment="go1.17-doc is &lt;1.17.3-1.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654578" version="1" comment="go1.17-race is &lt;1.17.3-1.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654573" version="1" comment="go1.16 is &lt;1.16.10-1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654574" version="1" comment="go1.16-doc is &lt;1.16.10-1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654575" version="1" comment="go1.16-race is &lt;1.16.10-1.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655913" version="1" comment="libmariadbd-devel is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655914" version="1" comment="libmariadbd19 is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655915" version="1" comment="mariadb is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656156" version="1" comment="mariadb-bench is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655916" version="1" comment="mariadb-client is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655917" version="1" comment="mariadb-errormessages is &lt;10.5.13-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656157" version="1" comment="mariadb-rpm-macros is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656158" version="1" comment="mariadb-test is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655918" version="1" comment="mariadb-tools is &lt;10.5.13-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657430" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657431" version="1" comment="ruby2.5 is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657432" version="1" comment="ruby2.5-devel is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657433" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657641" version="1" comment="ruby2.5-doc is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657642" version="1" comment="ruby2.5-doc-ri is &lt;2.5.9-4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657434" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657682" version="1" comment="python3-Pygments is &lt;2.6.1-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658099" version="1" comment="python2-Pygments is &lt;2.2.0-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656737" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656889" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-3.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656738" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656890" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-3.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656891" version="1" comment="openexr is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656739" version="1" comment="openexr-devel is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656892" version="1" comment="openexr-doc is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658129" version="1" comment="libpoppler73 is &lt;0.62.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658240" version="1" comment="libpoppler73-32bit is &lt;0.62.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656736" version="1" comment="python3-sqlparse is &lt;0.4.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656414" version="1" comment="libspeex1 is &lt;1.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656461" version="1" comment="libspeex1-32bit is &lt;1.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656727" version="1" comment="speex is &lt;1.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656415" version="1" comment="speex-devel is &lt;1.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657935" version="1" comment="libnetcdf-gnu-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657936" version="1" comment="libnetcdf-gnu-mpich-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657937" version="1" comment="libnetcdf-gnu-mvapich2-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657938" version="1" comment="libnetcdf-gnu-openmpi2-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657939" version="1" comment="libnetcdf-gnu-openmpi3-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657940" version="1" comment="libnetcdf-gnu-openmpi4-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657941" version="1" comment="libnetcdf18 is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657942" version="1" comment="libnetcdf18-32bit is &lt;4.7.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657943" version="1" comment="libnetcdf18-openmpi2 is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657944" version="1" comment="libnetcdf18-openmpi2-32bit is &lt;4.7.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657945" version="1" comment="libnetcdf18-openmpi3 is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657946" version="1" comment="libnetcdf18-openmpi3-32bit is &lt;4.7.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657947" version="1" comment="libnetcdf18-openmpi4 is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657948" version="1" comment="libnetcdf18-openmpi4-32bit is &lt;4.7.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657949" version="1" comment="libnetcdf_4_7_4-gnu-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657950" version="1" comment="libnetcdf_4_7_4-gnu-mpich-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657951" version="1" comment="libnetcdf_4_7_4-gnu-mvapich2-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657952" version="1" comment="libnetcdf_4_7_4-gnu-openmpi2-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657953" version="1" comment="libnetcdf_4_7_4-gnu-openmpi3-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657954" version="1" comment="libnetcdf_4_7_4-gnu-openmpi4-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657955" version="1" comment="netcdf is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657956" version="1" comment="netcdf-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657957" version="1" comment="netcdf-devel-data is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657958" version="1" comment="netcdf-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657698" version="1" comment="netcdf-gnu-hpc is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657699" version="1" comment="netcdf-gnu-hpc-devel is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657700" version="1" comment="netcdf-gnu-mpich-hpc is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657701" version="1" comment="netcdf-gnu-mpich-hpc-devel is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657702" version="1" comment="netcdf-gnu-mvapich2-hpc is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657703" version="1" comment="netcdf-gnu-mvapich2-hpc-devel is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657959" version="1" comment="netcdf-gnu-openmpi2-hpc is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657960" version="1" comment="netcdf-gnu-openmpi2-hpc-devel is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657704" version="1" comment="netcdf-gnu-openmpi3-hpc is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657705" version="1" comment="netcdf-gnu-openmpi3-hpc-devel is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657706" version="1" comment="netcdf-gnu-openmpi4-hpc is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657707" version="1" comment="netcdf-gnu-openmpi4-hpc-devel is &lt;4.7.4-4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657961" version="1" comment="netcdf-openmpi2 is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657962" version="1" comment="netcdf-openmpi2-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657963" version="1" comment="netcdf-openmpi2-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657964" version="1" comment="netcdf-openmpi3 is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657965" version="1" comment="netcdf-openmpi3-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657966" version="1" comment="netcdf-openmpi3-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657967" version="1" comment="netcdf-openmpi4 is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657968" version="1" comment="netcdf-openmpi4-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657969" version="1" comment="netcdf-openmpi4-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657970" version="1" comment="netcdf_4_7_4-gnu-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657971" version="1" comment="netcdf_4_7_4-gnu-hpc-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657972" version="1" comment="netcdf_4_7_4-gnu-hpc-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657973" version="1" comment="netcdf_4_7_4-gnu-mpich-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657974" version="1" comment="netcdf_4_7_4-gnu-mpich-hpc-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657975" version="1" comment="netcdf_4_7_4-gnu-mpich-hpc-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657976" version="1" comment="netcdf_4_7_4-gnu-mvapich2-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657977" version="1" comment="netcdf_4_7_4-gnu-mvapich2-hpc-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657978" version="1" comment="netcdf_4_7_4-gnu-mvapich2-hpc-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657979" version="1" comment="netcdf_4_7_4-gnu-openmpi2-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657980" version="1" comment="netcdf_4_7_4-gnu-openmpi2-hpc-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657981" version="1" comment="netcdf_4_7_4-gnu-openmpi2-hpc-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657982" version="1" comment="netcdf_4_7_4-gnu-openmpi3-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657983" version="1" comment="netcdf_4_7_4-gnu-openmpi3-hpc-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657984" version="1" comment="netcdf_4_7_4-gnu-openmpi3-hpc-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657985" version="1" comment="netcdf_4_7_4-gnu-openmpi4-hpc is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657986" version="1" comment="netcdf_4_7_4-gnu-openmpi4-hpc-devel is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657987" version="1" comment="netcdf_4_7_4-gnu-openmpi4-hpc-devel-static is &lt;4.7.4-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657441" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657643" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.34.1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657442" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657644" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.34.1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657443" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.1-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657446" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657447" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657448" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657645" version="1" comment="webkit-jsc-4 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657444" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657449" version="1" comment="webkit2gtk3-devel is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657646" version="1" comment="webkit2gtk3-minibrowser is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658245" version="1" comment="kernel-debug-base is &lt;4.12.14-197.102.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658155" version="1" comment="kernel-default-man is &lt;4.12.14-197.102.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658246" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.102.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658247" version="1" comment="kernel-vanilla is &lt;4.12.14-197.102.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658248" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.102.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658249" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.102.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658250" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.102.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658251" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.102.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658779" version="1" comment="aaa_base is &lt;84.87+git20180409.04c9dae-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658780" version="1" comment="aaa_base-extras is &lt;84.87+git20180409.04c9dae-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658789" version="1" comment="aaa_base-malloccheck is &lt;84.87+git20180409.04c9dae-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658863" version="1" comment="aaa_base-wsl is &lt;84.87+git20180409.04c9dae-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659026" version="1" comment="libfreebl3 is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659027" version="1" comment="libfreebl3-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659028" version="1" comment="libfreebl3-hmac is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659029" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659030" version="1" comment="libsoftokn3 is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659031" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659032" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659033" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659034" version="1" comment="mozilla-nss is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659035" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659036" version="1" comment="mozilla-nss-certs is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659037" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659038" version="1" comment="mozilla-nss-devel is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659039" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659231" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659040" version="1" comment="mozilla-nss-tools is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658079" version="1" comment="libwireshark14 is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658080" version="1" comment="libwiretap11 is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658081" version="1" comment="libwsutil12 is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658082" version="1" comment="wireshark is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658091" version="1" comment="wireshark-devel is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658092" version="1" comment="wireshark-ui-qt is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658598" version="1" comment="nodejs12 is &lt;12.22.7-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658599" version="1" comment="nodejs12-devel is &lt;12.22.7-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658600" version="1" comment="nodejs12-docs is &lt;12.22.7-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658601" version="1" comment="npm12 is &lt;12.22.7-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658020" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657757" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658021" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658022" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657758" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658023" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658024" version="1" comment="dtb-al is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658025" version="1" comment="dtb-allwinner is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658026" version="1" comment="dtb-altera is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658027" version="1" comment="dtb-amd is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658028" version="1" comment="dtb-amlogic is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658029" version="1" comment="dtb-apm is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658030" version="1" comment="dtb-arm is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658031" version="1" comment="dtb-broadcom is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658032" version="1" comment="dtb-cavium is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658033" version="1" comment="dtb-exynos is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658034" version="1" comment="dtb-freescale is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658035" version="1" comment="dtb-hisilicon is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658036" version="1" comment="dtb-lg is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658037" version="1" comment="dtb-marvell is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658038" version="1" comment="dtb-mediatek is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658039" version="1" comment="dtb-nvidia is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658040" version="1" comment="dtb-qcom is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658041" version="1" comment="dtb-renesas is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658042" version="1" comment="dtb-rockchip is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658043" version="1" comment="dtb-socionext is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658044" version="1" comment="dtb-sprd is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658045" version="1" comment="dtb-xilinx is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658046" version="1" comment="dtb-zte is &lt;5.3.18-59.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658047" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657759" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658048" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657673" version="1" comment="kernel-64kb is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657674" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658049" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658050" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658051" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658052" version="1" comment="kernel-debug is &lt;5.3.18-59.37.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658053" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.37.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658054" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.37.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657675" version="1" comment="kernel-default is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657676" version="1" comment="kernel-default-base is &lt;5.3.18-59.37.2.18.23.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658055" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.37.2.18.23.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657677" version="1" comment="kernel-default-devel is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658056" version="1" comment="kernel-default-extra is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658057" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658058" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658059" version="1" comment="kernel-default-optional is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657678" version="1" comment="kernel-devel is &lt;5.3.18-59.37.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657683" version="1" comment="kernel-docs is &lt;5.3.18-59.37.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658060" version="1" comment="kernel-docs-html is &lt;5.3.18-59.37.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658061" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.37.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658062" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.37.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658063" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.37.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657679" version="1" comment="kernel-macros is &lt;5.3.18-59.37.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657684" version="1" comment="kernel-obs-build is &lt;5.3.18-59.37.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658064" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657680" version="1" comment="kernel-preempt is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657685" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658065" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658066" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658067" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657686" version="1" comment="kernel-source is &lt;5.3.18-59.37.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658068" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.37.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657687" version="1" comment="kernel-syms is &lt;5.3.18-59.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657681" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.37.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658069" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658070" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658071" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658072" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657760" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658073" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658074" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.37.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657723" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.37.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658075" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.37.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658749" version="1" comment="brotli is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658531" version="1" comment="libbrotli-devel is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658532" version="1" comment="libbrotlicommon1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658750" version="1" comment="libbrotlicommon1-32bit is &lt;1.0.7-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658533" version="1" comment="libbrotlidec1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658751" version="1" comment="libbrotlidec1-32bit is &lt;1.0.7-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658534" version="1" comment="libbrotlienc1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658752" version="1" comment="libbrotlienc1-32bit is &lt;1.0.7-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658547" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658548" version="1" comment="php7 is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658549" version="1" comment="php7-bcmath is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658550" version="1" comment="php7-bz2 is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658551" version="1" comment="php7-calendar is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658552" version="1" comment="php7-ctype is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658553" version="1" comment="php7-curl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658554" version="1" comment="php7-dba is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658555" version="1" comment="php7-devel is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658556" version="1" comment="php7-dom is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658537" version="1" comment="php7-embed is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658557" version="1" comment="php7-enchant is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658558" version="1" comment="php7-exif is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658559" version="1" comment="php7-fastcgi is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658560" version="1" comment="php7-fileinfo is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658738" version="1" comment="php7-firebird is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658561" version="1" comment="php7-fpm is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658562" version="1" comment="php7-ftp is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658563" version="1" comment="php7-gd is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658564" version="1" comment="php7-gettext is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658565" version="1" comment="php7-gmp is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658566" version="1" comment="php7-iconv is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658567" version="1" comment="php7-intl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658568" version="1" comment="php7-json is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658569" version="1" comment="php7-ldap is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658570" version="1" comment="php7-mbstring is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658571" version="1" comment="php7-mysql is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658572" version="1" comment="php7-odbc is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658573" version="1" comment="php7-opcache is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658574" version="1" comment="php7-openssl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658575" version="1" comment="php7-pcntl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658576" version="1" comment="php7-pdo is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658577" version="1" comment="php7-pgsql is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658578" version="1" comment="php7-phar is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658579" version="1" comment="php7-posix is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658580" version="1" comment="php7-readline is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658581" version="1" comment="php7-shmop is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658582" version="1" comment="php7-snmp is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658583" version="1" comment="php7-soap is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658584" version="1" comment="php7-sockets is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658585" version="1" comment="php7-sodium is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658586" version="1" comment="php7-sqlite is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658587" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658588" version="1" comment="php7-sysvsem is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658589" version="1" comment="php7-sysvshm is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658739" version="1" comment="php7-test is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658590" version="1" comment="php7-tidy is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658591" version="1" comment="php7-tokenizer is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658592" version="1" comment="php7-xmlreader is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658593" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658594" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658595" version="1" comment="php7-xsl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658596" version="1" comment="php7-zip is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658597" version="1" comment="php7-zlib is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658878" version="1" comment="glib-networking is &lt;2.62.4-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658914" version="1" comment="glib-networking-32bit is &lt;2.62.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658879" version="1" comment="glib-networking-lang is &lt;2.62.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658747" version="1" comment="python-Babel-doc is &lt;2.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658538" version="1" comment="python2-Babel is &lt;2.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658530" version="1" comment="python3-Babel is &lt;2.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658748" version="1" comment="python3-Babel-doc is &lt;2.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656938" version="1" comment="gmp-devel is &lt;6.1.2-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656942" version="1" comment="gmp-devel-32bit is &lt;6.1.2-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656939" version="1" comment="libgmp10 is &lt;6.1.2-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656940" version="1" comment="libgmp10-32bit is &lt;6.1.2-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656941" version="1" comment="libgmpxx4 is &lt;6.1.2-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656943" version="1" comment="libgmpxx4-32bit is &lt;6.1.2-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656934" version="1" comment="clamav is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656935" version="1" comment="clamav-devel is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656936" version="1" comment="libclamav9 is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656937" version="1" comment="libfreshclam2 is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658283" version="1" comment="openssh is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658289" version="1" comment="openssh-askpass-gnome is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658458" version="1" comment="openssh-cavs is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658284" version="1" comment="openssh-clients is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658285" version="1" comment="openssh-common is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658286" version="1" comment="openssh-fips is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658287" version="1" comment="openssh-helpers is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658288" version="1" comment="openssh-server is &lt;8.4p1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658791" version="1" comment="nodejs14 is &lt;14.18.1-15.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658792" version="1" comment="nodejs14-devel is &lt;14.18.1-15.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658793" version="1" comment="nodejs14-docs is &lt;14.18.1-15.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658794" version="1" comment="npm14 is &lt;14.18.1-15.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658740" version="1" comment="xen is &lt;4.14.3_04-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658741" version="1" comment="xen-devel is &lt;4.14.3_04-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658742" version="1" comment="xen-doc-html is &lt;4.14.3_04-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658743" version="1" comment="xen-libs is &lt;4.14.3_04-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658744" version="1" comment="xen-libs-32bit is &lt;4.14.3_04-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658745" version="1" comment="xen-tools is &lt;4.14.3_04-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658746" version="1" comment="xen-tools-domU is &lt;4.14.3_04-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658546" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.3_04-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659329" version="1" comment="MozillaFirefox is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659372" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659330" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659331" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659332" version="1" comment="MozillaFirefox-translations-other is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659295" version="1" comment="ImageMagick is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659296" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659297" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659298" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659317" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659318" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-10.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659319" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659299" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659320" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659300" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659321" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659301" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659322" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659302" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659323" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659304" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659581" version="1" comment="log4j is &lt;2.13.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659582" version="1" comment="log4j-javadoc is &lt;2.13.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659583" version="1" comment="log4j-jcl is &lt;2.13.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659584" version="1" comment="log4j-slf4j is &lt;2.13.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659041" version="1" comment="python2-pip is &lt;20.0.2-6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659025" version="1" comment="python3-pip is &lt;20.0.2-6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659272" version="1" comment="python2-pip-wheel is &lt;10.0.1-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659246" version="1" comment="python3-pip-wheel is &lt;10.0.1-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657429" version="1" comment="fetchmail is &lt;6.4.22-20.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657445" version="1" comment="fetchmailconf is &lt;6.4.22-20.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656416" version="1" comment="postgresql10 is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656420" version="1" comment="postgresql10-contrib is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656465" version="1" comment="postgresql10-docs is &lt;10.19-8.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656422" version="1" comment="postgresql10-plperl is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656423" version="1" comment="postgresql10-plpython is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656424" version="1" comment="postgresql10-pltcl is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656425" version="1" comment="postgresql10-server is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656728" version="1" comment="postgresql10-test is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659289" version="1" comment="icu.691 is &lt;69.1-7.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659290" version="1" comment="icu.691-devel is &lt;69.1-7.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659291" version="1" comment="icu.691-doc is &lt;69.1-7.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659292" version="1" comment="libicu69 is &lt;69.1-7.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659293" version="1" comment="libicu69-bedata is &lt;69.1-7.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659294" version="1" comment="libicu69-ledata is &lt;69.1-7.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659799" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659800" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659807" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659947" version="1" comment="xorg-x11-server-source is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659948" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659949" version="1" comment="log4j is &lt;2.13.0-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659950" version="1" comment="log4j-javadoc is &lt;2.13.0-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659951" version="1" comment="log4j-jcl is &lt;2.13.0-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659952" version="1" comment="log4j-slf4j is &lt;2.13.0-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658781" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658864" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658782" version="1" comment="python3 is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658783" version="1" comment="python3-base is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658784" version="1" comment="python3-curses is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658785" version="1" comment="python3-dbm is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658786" version="1" comment="python3-devel is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658865" version="1" comment="python3-doc is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658866" version="1" comment="python3-doc-devhelp is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658787" version="1" comment="python3-idle is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658867" version="1" comment="python3-testsuite is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658788" version="1" comment="python3-tk is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658790" version="1" comment="python3-tools is &lt;3.6.15-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660163" version="1" comment="disruptor is &lt;3.4.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660164" version="1" comment="disruptor-javadoc is &lt;3.4.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660165" version="1" comment="jakarta-servlet is &lt;5.0.0-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660166" version="1" comment="jakarta-servlet-javadoc is &lt;5.0.0-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660167" version="1" comment="log4j is &lt;2.16.0-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660168" version="1" comment="log4j-javadoc is &lt;2.16.0-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660169" version="1" comment="log4j-jcl is &lt;2.16.0-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660170" version="1" comment="log4j-slf4j is &lt;2.16.0-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660219" version="1" comment="logback is &lt;1.2.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660220" version="1" comment="logback-access is &lt;1.2.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660221" version="1" comment="logback-examples is &lt;1.2.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660222" version="1" comment="logback-javadoc is &lt;1.2.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660101" version="1" comment="log4j-manual is &lt;1.2.17-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660087" version="1" comment="log4j12 is &lt;1.2.17-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660089" version="1" comment="log4j12-javadoc is &lt;1.2.17-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660090" version="1" comment="log4j12-manual is &lt;1.2.17-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660997" version="1" comment="log4j is &lt;2.17.0-4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660998" version="1" comment="log4j-javadoc is &lt;2.17.0-4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660999" version="1" comment="log4j-jcl is &lt;2.17.0-4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661000" version="1" comment="log4j-slf4j is &lt;2.17.0-4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660281" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660282" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660283" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660995" version="1" comment="xorg-x11-server-source is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660996" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660160" version="1" comment="MozillaThunderbird is &lt;91.4.0-8.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660161" version="1" comment="MozillaThunderbird-translations-common is &lt;91.4.0-8.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660162" version="1" comment="MozillaThunderbird-translations-other is &lt;91.4.0-8.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659374" version="1" comment="openssh is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659380" version="1" comment="openssh-askpass-gnome is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659580" version="1" comment="openssh-cavs is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659375" version="1" comment="openssh-clients is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659376" version="1" comment="openssh-common is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659377" version="1" comment="openssh-fips is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659378" version="1" comment="openssh-helpers is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659379" version="1" comment="openssh-server is &lt;8.4p1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659793" version="1" comment="libp11-kit0 is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659794" version="1" comment="libp11-kit0-32bit is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659795" version="1" comment="p11-kit is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659808" version="1" comment="p11-kit-32bit is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659796" version="1" comment="p11-kit-devel is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659797" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659944" version="1" comment="p11-kit-nss-trust-32bit is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659798" version="1" comment="p11-kit-tools is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659804" version="1" comment="go1.16 is &lt;1.16.12-1.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659805" version="1" comment="go1.16-doc is &lt;1.16.12-1.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659806" version="1" comment="go1.16-race is &lt;1.16.12-1.37.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659324" version="1" comment="aom-tools is &lt;1.0.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659325" version="1" comment="libaom-devel is &lt;1.0.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659326" version="1" comment="libaom-devel-doc is &lt;1.0.0-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659303" version="1" comment="libaom0 is &lt;1.0.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659327" version="1" comment="libaom0-32bit is &lt;1.0.0-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659247" version="1" comment="runc is &lt;1.0.3-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659945" version="1" comment="go1.17 is &lt;1.17.5-1.14.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659946" version="1" comment="go1.17-doc is &lt;1.17.5-1.14.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659803" version="1" comment="go1.17-race is &lt;1.17.5-1.14.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661025" version="1" comment="permissions is &lt;20181225-23.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661026" version="1" comment="permissions-zypp-plugin is &lt;20181225-23.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662427" version="1" comment="log4j is &lt;2.17.0-4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662428" version="1" comment="log4j-javadoc is &lt;2.17.0-4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662429" version="1" comment="log4j-jcl is &lt;2.17.0-4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662430" version="1" comment="log4j-slf4j is &lt;2.17.0-4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661886" version="1" comment="gegl is &lt;0.4.16-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661887" version="1" comment="gegl-0_4 is &lt;0.4.16-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661861" version="1" comment="gegl-0_4-lang is &lt;0.4.16-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661888" version="1" comment="gegl-devel is &lt;0.4.16-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661889" version="1" comment="gegl-doc is &lt;0.4.16-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661890" version="1" comment="libgegl-0_4-0 is &lt;0.4.16-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661891" version="1" comment="libgegl-0_4-0-32bit is &lt;0.4.16-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661892" version="1" comment="typelib-1_0-Gegl-0_4 is &lt;0.4.16-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661882" version="1" comment="gegl-0_3 is &lt;0.3.34-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661883" version="1" comment="gegl-0_3-lang is &lt;0.3.34-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661884" version="1" comment="libgegl-0_3-0 is &lt;0.3.34-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661885" version="1" comment="typelib-1_0-Gegl-0_3 is &lt;0.3.34-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673897" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674190" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr7.5-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673898" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.5-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674191" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673899" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674192" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr7.5-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673900" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.5-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674193" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676844" version="1" comment="openvpn is &lt;2.4.3-150000.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676845" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-150000.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676846" version="1" comment="openvpn-devel is &lt;2.4.3-150000.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676902" version="1" comment="openvpn-down-root-plugin is &lt;2.4.3-150000.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673667" version="1" comment="apache2 is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673674" version="1" comment="apache2-devel is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673675" version="1" comment="apache2-doc is &lt;2.4.51-150200.3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673673" version="1" comment="apache2-event is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674181" version="1" comment="apache2-example-pages is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673668" version="1" comment="apache2-prefork is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673669" version="1" comment="apache2-utils is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673676" version="1" comment="apache2-worker is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674172" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674173" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674174" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673538" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673539" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674175" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674176" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674177" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673540" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673541" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673542" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674178" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674179" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674180" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676747" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676730" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676748" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676749" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676731" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676750" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676751" version="1" comment="dtb-al is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676752" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676753" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676754" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676755" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676756" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676757" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676758" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676759" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676760" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676761" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676762" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676763" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676764" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676765" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676766" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676767" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676768" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676769" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676770" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676771" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676772" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676773" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.60.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676774" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676732" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676775" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676702" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676703" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676776" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676777" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676778" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676779" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.60.4 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676780" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.60.4 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676781" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.60.4 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676704" version="1" comment="kernel-default is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676705" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.60.4.150300.18.37.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676782" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.60.4.150300.18.37.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676706" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676783" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676784" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676785" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676786" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676707" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.60.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676713" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.60.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676787" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.60.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676788" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.60.4 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676789" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.60.4 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676790" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.60.4 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676708" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.60.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676714" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676791" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676709" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676715" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676792" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676793" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676794" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676716" version="1" comment="kernel-source is &lt;5.3.18-150300.59.60.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676795" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.60.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676717" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676710" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.60.4 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676796" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676797" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676798" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676799" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676733" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676800" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676801" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.60.4 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676722" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.60.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676802" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.60.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663285" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663287" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.8-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663286" version="1" comment="libSDL2-devel is &lt;2.0.8-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663449" version="1" comment="libSDL2-devel-32bit is &lt;2.0.8-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672746" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674131" version="1" comment="libprotobuf-lite20-32bit is &lt;3.9.2-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672747" version="1" comment="libprotobuf20 is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674132" version="1" comment="libprotobuf20-32bit is &lt;3.9.2-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672748" version="1" comment="libprotoc20 is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674133" version="1" comment="libprotoc20-32bit is &lt;3.9.2-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672749" version="1" comment="protobuf-devel is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672818" version="1" comment="protobuf-java is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674134" version="1" comment="protobuf-source is &lt;3.9.2-4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672750" version="1" comment="python2-protobuf is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672751" version="1" comment="python3-protobuf is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677211" version="1" comment="python3-salt is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677212" version="1" comment="salt is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677253" version="1" comment="salt-api is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677213" version="1" comment="salt-bash-completion is &lt;3002.2-150300.53.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677254" version="1" comment="salt-cloud is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677214" version="1" comment="salt-doc is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677255" version="1" comment="salt-fish-completion is &lt;3002.2-150300.53.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677256" version="1" comment="salt-master is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677215" version="1" comment="salt-minion is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677257" version="1" comment="salt-proxy is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677258" version="1" comment="salt-ssh is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677259" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677260" version="1" comment="salt-syndic is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677265" version="1" comment="salt-transactional-update is &lt;3002.2-150300.53.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677216" version="1" comment="salt-zsh-completion is &lt;3002.2-150300.53.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664020" version="1" comment="jawn-ast is &lt;0.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664021" version="1" comment="jawn-json4s is &lt;0.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664022" version="1" comment="jawn-parser is &lt;0.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664023" version="1" comment="jawn-util is &lt;0.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676990" version="1" comment="libminizip1 is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677065" version="1" comment="libminizip1-32bit is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676991" version="1" comment="libz1 is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676992" version="1" comment="libz1-32bit is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676993" version="1" comment="minizip-devel is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676994" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676996" version="1" comment="zlib-devel-32bit is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676995" version="1" comment="zlib-devel-static is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677066" version="1" comment="zlib-devel-static-32bit is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677251" version="1" comment="python2-numpy is &lt;1.16.5-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677252" version="1" comment="python2-numpy-devel is &lt;1.16.5-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677866" version="1" comment="python2-numpy-gnu-hpc is &lt;1.16.5-150200.3.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677867" version="1" comment="python2-numpy-gnu-hpc-devel is &lt;1.16.5-150200.3.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677868" version="1" comment="python2-numpy_1_16_5-gnu-hpc is &lt;1.16.5-150200.3.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677869" version="1" comment="python2-numpy_1_16_5-gnu-hpc-devel is &lt;1.16.5-150200.3.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671003" version="1" comment="kernel-firmware is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671024" version="1" comment="kernel-firmware-all is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671025" version="1" comment="kernel-firmware-amdgpu is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671026" version="1" comment="kernel-firmware-ath10k is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671027" version="1" comment="kernel-firmware-ath11k is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671028" version="1" comment="kernel-firmware-atheros is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671029" version="1" comment="kernel-firmware-bluetooth is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671030" version="1" comment="kernel-firmware-bnx2 is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671004" version="1" comment="kernel-firmware-brcm is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671031" version="1" comment="kernel-firmware-chelsio is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671032" version="1" comment="kernel-firmware-dpaa2 is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671033" version="1" comment="kernel-firmware-i915 is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671034" version="1" comment="kernel-firmware-intel is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671035" version="1" comment="kernel-firmware-iwlwifi is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671036" version="1" comment="kernel-firmware-liquidio is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671037" version="1" comment="kernel-firmware-marvell is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671038" version="1" comment="kernel-firmware-media is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671039" version="1" comment="kernel-firmware-mediatek is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671040" version="1" comment="kernel-firmware-mellanox is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671041" version="1" comment="kernel-firmware-mwifiex is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671042" version="1" comment="kernel-firmware-network is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671043" version="1" comment="kernel-firmware-nfp is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671044" version="1" comment="kernel-firmware-nvidia is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671045" version="1" comment="kernel-firmware-platform is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671046" version="1" comment="kernel-firmware-prestera is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671047" version="1" comment="kernel-firmware-qlogic is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671048" version="1" comment="kernel-firmware-radeon is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671049" version="1" comment="kernel-firmware-realtek is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671050" version="1" comment="kernel-firmware-serial is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671051" version="1" comment="kernel-firmware-sound is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671052" version="1" comment="kernel-firmware-ti is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671053" version="1" comment="kernel-firmware-ueagle is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671054" version="1" comment="kernel-firmware-usb-network is &lt;20210208-150300.4.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671005" version="1" comment="ucode-amd is &lt;20210208-150300.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671370" version="1" comment="libyaml-cpp0_6 is &lt;0.6.1-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671380" version="1" comment="yaml-cpp-devel is &lt;0.6.1-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662459" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662537" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662460" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662538" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662461" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662539" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662462" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662540" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677073" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677192" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677074" version="1" comment="python is &lt;2.7.18-150000.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677193" version="1" comment="python-32bit is &lt;2.7.18-150000.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677075" version="1" comment="python-base is &lt;2.7.18-150000.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677194" version="1" comment="python-base-32bit is &lt;2.7.18-150000.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677087" version="1" comment="python-curses is &lt;2.7.18-150000.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677195" version="1" comment="python-demo is &lt;2.7.18-150000.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677088" version="1" comment="python-devel is &lt;2.7.18-150000.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677196" version="1" comment="python-doc is &lt;2.7.18-150000.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677197" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677089" version="1" comment="python-gdbm is &lt;2.7.18-150000.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677198" version="1" comment="python-idle is &lt;2.7.18-150000.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677084" version="1" comment="python-tk is &lt;2.7.18-150000.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677090" version="1" comment="python-xml is &lt;2.7.18-150000.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677261" version="1" comment="389-ds is &lt;1.4.4.19~git28.b12c72226-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677262" version="1" comment="389-ds-devel is &lt;1.4.4.19~git28.b12c72226-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678440" version="1" comment="389-ds-snmp is &lt;1.4.4.19~git28.b12c72226-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677263" version="1" comment="lib389 is &lt;1.4.4.19~git28.b12c72226-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677264" version="1" comment="libsvrcore0 is &lt;1.4.4.19~git28.b12c72226-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663734" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663735" version="1" comment="virglrenderer-devel is &lt;0.6.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663832" version="1" comment="virglrenderer-test-server is &lt;0.6.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663486" version="1" comment="nodejs14 is &lt;14.18.3-15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663487" version="1" comment="nodejs14-devel is &lt;14.18.3-15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663488" version="1" comment="nodejs14-docs is &lt;14.18.3-15.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663489" version="1" comment="npm14 is &lt;14.18.3-15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678631" version="1" comment="MozillaFirefox is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678939" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678688" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678633" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678634" version="1" comment="MozillaFirefox-translations-other is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663482" version="1" comment="nodejs12 is &lt;12.22.9-4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663483" version="1" comment="nodejs12-devel is &lt;12.22.9-4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663484" version="1" comment="nodejs12-docs is &lt;12.22.9-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663485" version="1" comment="npm12 is &lt;12.22.9-4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677226" version="1" comment="libexif-devel is &lt;0.6.22-150000.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678951" version="1" comment="libexif-devel-32bit is &lt;0.6.22-150000.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677227" version="1" comment="libexif12 is &lt;0.6.22-150000.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678642" version="1" comment="libexif12-32bit is &lt;0.6.22-150000.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678029" version="1" comment="libfreebl3 is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678030" version="1" comment="libfreebl3-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678031" version="1" comment="libfreebl3-hmac is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678032" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678033" version="1" comment="libsoftokn3 is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678034" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678035" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678036" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678037" version="1" comment="mozilla-nss is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678038" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678039" version="1" comment="mozilla-nss-certs is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678040" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678041" version="1" comment="mozilla-nss-devel is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678042" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678956" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678043" version="1" comment="mozilla-nss-tools is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677072" version="1" comment="opensc is &lt;0.19.0-150100.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677191" version="1" comment="opensc-32bit is &lt;0.19.0-150100.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678940" version="1" comment="libsolv-demo is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677217" version="1" comment="libsolv-devel is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677218" version="1" comment="libsolv-tools is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677219" version="1" comment="libzypp is &lt;17.30.0-150200.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677220" version="1" comment="libzypp-devel is &lt;17.30.0-150200.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678941" version="1" comment="libzypp-devel-doc is &lt;17.30.0-150200.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677229" version="1" comment="perl-solv is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678942" version="1" comment="python-solv is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677221" version="1" comment="python3-solv is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677222" version="1" comment="ruby-solv is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677223" version="1" comment="zypper is &lt;1.14.52-150200.30.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678943" version="1" comment="zypper-aptitude is &lt;1.14.52-150200.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677224" version="1" comment="zypper-log is &lt;1.14.52-150200.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677225" version="1" comment="zypper-needs-restarting is &lt;1.14.52-150200.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679123" version="1" comment="liblzma5 is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679124" version="1" comment="liblzma5-32bit is &lt;5.2.3-150000.4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679125" version="1" comment="xz is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679126" version="1" comment="xz-devel is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679373" version="1" comment="xz-devel-32bit is &lt;5.2.3-150000.4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679127" version="1" comment="xz-lang is &lt;5.2.3-150000.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679128" version="1" comment="xz-static-devel is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679374" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679375" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679129" version="1" comment="subversion is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679140" version="1" comment="subversion-bash-completion is &lt;1.10.6-150300.10.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679130" version="1" comment="subversion-devel is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679141" version="1" comment="subversion-perl is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679142" version="1" comment="subversion-python is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679376" version="1" comment="subversion-python-ctypes is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679377" version="1" comment="subversion-ruby is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679172" version="1" comment="subversion-server is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679143" version="1" comment="subversion-tools is &lt;1.10.6-150300.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679378" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679379" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679380" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679157" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679158" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679381" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679382" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679383" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679159" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679160" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679161" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679384" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679385" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679386" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678459" version="1" comment="go1.16 is &lt;1.16.15-150000.1.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678460" version="1" comment="go1.16-doc is &lt;1.16.15-150000.1.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678461" version="1" comment="go1.16-race is &lt;1.16.15-150000.1.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678957" version="1" comment="go1.17 is &lt;1.17.8-150000.1.25.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678958" version="1" comment="go1.17-doc is &lt;1.17.8-150000.1.25.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678639" version="1" comment="go1.17-race is &lt;1.17.8-150000.1.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679120" version="1" comment="MozillaThunderbird is &lt;91.8.0-150200.8.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679121" version="1" comment="MozillaThunderbird-translations-common is &lt;91.8.0-150200.8.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679122" version="1" comment="MozillaThunderbird-translations-other is &lt;91.8.0-150200.8.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679387" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679177" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679388" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679389" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679178" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679390" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679391" version="1" comment="dtb-al is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679392" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679393" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679394" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679395" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679396" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679397" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679398" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679399" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679400" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679401" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679402" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679403" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679404" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679405" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679406" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679407" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679408" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679409" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679410" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679411" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679412" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679413" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.63.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679414" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679179" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679415" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679131" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679132" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679416" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679417" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679418" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679419" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.63.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679420" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.63.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679421" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.63.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679133" version="1" comment="kernel-default is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679134" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.63.1.150300.18.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679422" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.63.1.150300.18.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679135" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679423" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679424" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679425" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679426" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679136" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679144" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679427" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679428" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.63.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679429" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.63.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679430" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.63.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679137" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679145" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679431" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679138" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679146" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679432" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679433" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679434" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679147" version="1" comment="kernel-source is &lt;5.3.18-150300.59.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679435" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679148" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679139" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.63.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679436" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679437" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679438" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679439" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679180" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679440" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679441" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.63.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679150" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.63.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679442" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678635" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678646" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.8-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678636" version="1" comment="libSDL2-devel is &lt;2.0.8-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678965" version="1" comment="libSDL2-devel-32bit is &lt;2.0.8-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677917" version="1" comment="libopenjp2-7 is &lt;2.3.0-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678643" version="1" comment="libopenjp2-7-32bit is &lt;2.3.0-150000.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677918" version="1" comment="openjpeg2 is &lt;2.3.0-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677919" version="1" comment="openjpeg2-devel is &lt;2.3.0-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680131" version="1" comment="kernel-debug-base is &lt;4.12.14-150100.197.111.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679919" version="1" comment="kernel-default-man is &lt;4.12.14-150100.197.111.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680132" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-150100.197.111.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680133" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.111.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680134" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.111.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680135" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.111.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680136" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.111.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680137" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-150100.197.111.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678962" version="1" comment="icedtea-web is &lt;1.7.2-150100.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678645" version="1" comment="icedtea-web-javadoc is &lt;1.7.2-150100.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678640" version="1" comment="jsoup is &lt;1.14.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678963" version="1" comment="jsoup-javadoc is &lt;1.14.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678641" version="1" comment="jsr-305 is &lt;3.0.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678964" version="1" comment="jsr-305-javadoc is &lt;3.0.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679577" version="1" comment="netty is &lt;4.1.75-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679578" version="1" comment="netty-javadoc is &lt;4.1.75-150200.4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679579" version="1" comment="netty-poms is &lt;4.1.75-150200.4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679467" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-150000.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679575" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-150000.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679468" version="1" comment="libSDL-devel is &lt;1.2.15-150000.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679576" version="1" comment="libSDL-devel-32bit is &lt;1.2.15-150000.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679590" version="1" comment="GraphicsMagick is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679591" version="1" comment="GraphicsMagick-devel is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679592" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679593" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679594" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679595" version="1" comment="libGraphicsMagick3-config is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679596" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679597" version="1" comment="perl-GraphicsMagick is &lt;1.3.35-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679599" version="1" comment="nbd is &lt;3.24-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679588" version="1" comment="dcraw is &lt;9.28.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679589" version="1" comment="dcraw-lang is &lt;9.28.0-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679714" version="1" comment="libopenjpeg1 is &lt;1.5.2-150000.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679751" version="1" comment="libopenjpeg1-32bit is &lt;1.5.2-150000.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679752" version="1" comment="openjpeg is &lt;1.5.2-150000.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679715" version="1" comment="openjpeg-devel is &lt;1.5.2-150000.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679753" version="1" comment="openjpeg-devel-32bit is &lt;1.5.2-150000.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669983" version="1" comment="swtpm is &lt;0.5.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669984" version="1" comment="swtpm-devel is &lt;0.5.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679716" version="1" comment="tomcat is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679717" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679747" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679718" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679748" version="1" comment="tomcat-embed is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679749" version="1" comment="tomcat-javadoc is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679719" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679750" version="1" comment="tomcat-jsvc is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679720" version="1" comment="tomcat-lib is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679721" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679722" version="1" comment="tomcat-webapps is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680157" version="1" comment="libinput-devel is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680158" version="1" comment="libinput-tools is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680159" version="1" comment="libinput-udev is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680160" version="1" comment="libinput10 is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680688" version="1" comment="libinput10-32bit is &lt;1.10.5-150000.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679466" version="1" comment="dnsmasq is &lt;2.86-150100.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679598" version="1" comment="dnsmasq-utils is &lt;2.86-150100.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663141" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662956" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663142" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663143" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662957" version="1" comment="dlm-kmp-default is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663144" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663145" version="1" comment="dtb-al is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663146" version="1" comment="dtb-allwinner is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663147" version="1" comment="dtb-altera is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663148" version="1" comment="dtb-amd is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663149" version="1" comment="dtb-amlogic is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663150" version="1" comment="dtb-apm is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663151" version="1" comment="dtb-arm is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663152" version="1" comment="dtb-broadcom is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663153" version="1" comment="dtb-cavium is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663154" version="1" comment="dtb-exynos is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663155" version="1" comment="dtb-freescale is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663156" version="1" comment="dtb-hisilicon is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663157" version="1" comment="dtb-lg is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663158" version="1" comment="dtb-marvell is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663159" version="1" comment="dtb-mediatek is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663160" version="1" comment="dtb-nvidia is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663161" version="1" comment="dtb-qcom is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663162" version="1" comment="dtb-renesas is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663163" version="1" comment="dtb-rockchip is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663164" version="1" comment="dtb-socionext is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663165" version="1" comment="dtb-sprd is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663166" version="1" comment="dtb-xilinx is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663167" version="1" comment="dtb-zte is &lt;5.3.18-59.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663168" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662958" version="1" comment="gfs2-kmp-default is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663169" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662903" version="1" comment="kernel-64kb is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662904" version="1" comment="kernel-64kb-devel is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663170" version="1" comment="kernel-64kb-extra is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663171" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663172" version="1" comment="kernel-64kb-optional is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663173" version="1" comment="kernel-debug is &lt;5.3.18-59.40.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663174" version="1" comment="kernel-debug-devel is &lt;5.3.18-59.40.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663175" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-59.40.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662905" version="1" comment="kernel-default is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662906" version="1" comment="kernel-default-base is &lt;5.3.18-59.40.1.18.25.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663176" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-59.40.1.18.25.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662907" version="1" comment="kernel-default-devel is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663177" version="1" comment="kernel-default-extra is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663178" version="1" comment="kernel-default-livepatch is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663179" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663180" version="1" comment="kernel-default-optional is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662908" version="1" comment="kernel-devel is &lt;5.3.18-59.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662928" version="1" comment="kernel-docs is &lt;5.3.18-59.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663181" version="1" comment="kernel-docs-html is &lt;5.3.18-59.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663182" version="1" comment="kernel-kvmsmall is &lt;5.3.18-59.40.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663183" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-59.40.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663184" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-59.40.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662909" version="1" comment="kernel-macros is &lt;5.3.18-59.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662929" version="1" comment="kernel-obs-build is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663185" version="1" comment="kernel-obs-qa is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662910" version="1" comment="kernel-preempt is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662930" version="1" comment="kernel-preempt-devel is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663186" version="1" comment="kernel-preempt-extra is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663187" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663188" version="1" comment="kernel-preempt-optional is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662931" version="1" comment="kernel-source is &lt;5.3.18-59.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663189" version="1" comment="kernel-source-vanilla is &lt;5.3.18-59.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662932" version="1" comment="kernel-syms is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662911" version="1" comment="kernel-zfcpdump is &lt;5.3.18-59.40.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663190" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663191" version="1" comment="kselftests-kmp-default is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663192" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663193" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662959" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663194" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663195" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-59.40.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662933" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-59.40.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663196" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-59.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680689" version="1" comment="netty is &lt;4.1.75-150200.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680690" version="1" comment="netty-javadoc is &lt;4.1.75-150200.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680691" version="1" comment="netty-poms is &lt;4.1.75-150200.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680692" version="1" comment="libpodofo-devel is &lt;0.9.6-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680693" version="1" comment="libpodofo0_9_6 is &lt;0.9.6-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680694" version="1" comment="podofo is &lt;0.9.6-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663843" version="1" comment="python3-numpy is &lt;1.17.3-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663844" version="1" comment="python3-numpy-devel is &lt;1.17.3-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664027" version="1" comment="python3-numpy-gnu-hpc is &lt;1.17.3-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664028" version="1" comment="python3-numpy-gnu-hpc-devel is &lt;1.17.3-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664029" version="1" comment="python3-numpy_1_17_3-gnu-hpc is &lt;1.17.3-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664030" version="1" comment="python3-numpy_1_17_3-gnu-hpc-devel is &lt;1.17.3-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663720" version="1" comment="busybox is &lt;1.34.1-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663721" version="1" comment="busybox-static is &lt;1.34.1-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663724" version="1" comment="MozillaFirefox is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663826" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663827" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663726" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663727" version="1" comment="MozillaFirefox-translations-other is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679816" version="1" comment="mutt is &lt;1.10.1-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679817" version="1" comment="mutt-doc is &lt;1.10.1-150000.3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679818" version="1" comment="mutt-lang is &lt;1.10.1-150000.3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678959" version="1" comment="prometheus-postgres_exporter is &lt;0.10.0-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678960" version="1" comment="python3-rhnlib is &lt;4.2.6-150000.3.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678961" version="1" comment="spacecmd is &lt;4.2.16-150000.3.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663197" version="1" comment="grafana is &lt;7.5.12-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663722" version="1" comment="permissions is &lt;20181225-23.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663723" version="1" comment="permissions-zypp-plugin is &lt;20181225-23.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679823" version="1" comment="go1.18 is &lt;1.18.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679824" version="1" comment="go1.18-doc is &lt;1.18.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679825" version="1" comment="go1.18-race is &lt;1.18.1-150000.1.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679690" version="1" comment="go1.17 is &lt;1.17.9-150000.1.28.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679691" version="1" comment="go1.17-doc is &lt;1.17.9-150000.1.28.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679636" version="1" comment="go1.17-race is &lt;1.17.9-150000.1.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677230" version="1" comment="ant is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677231" version="1" comment="ant-antlr is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677232" version="1" comment="ant-apache-bcel is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677233" version="1" comment="ant-apache-bsf is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677234" version="1" comment="ant-apache-log4j is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677235" version="1" comment="ant-apache-oro is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677236" version="1" comment="ant-apache-regexp is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677237" version="1" comment="ant-apache-resolver is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678944" version="1" comment="ant-apache-xalan2 is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677238" version="1" comment="ant-commons-logging is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678945" version="1" comment="ant-commons-net is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678946" version="1" comment="ant-imageio is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677239" version="1" comment="ant-javamail is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677240" version="1" comment="ant-jdepend is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677241" version="1" comment="ant-jmf is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678947" version="1" comment="ant-jsch is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677242" version="1" comment="ant-junit is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678948" version="1" comment="ant-junit5 is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677243" version="1" comment="ant-manual is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677244" version="1" comment="ant-scripts is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677245" version="1" comment="ant-swing is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678949" version="1" comment="ant-testutil is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678950" version="1" comment="ant-xz is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681162" version="1" comment="cifs-utils is &lt;6.9-150100.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681163" version="1" comment="cifs-utils-devel is &lt;6.9-150100.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681284" version="1" comment="pam_cifscreds is &lt;6.9-150100.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680164" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680708" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680165" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680709" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680166" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.0-150200.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680186" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680187" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680188" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680710" version="1" comment="webkit-jsc-4 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680167" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680189" version="1" comment="webkit2gtk3-devel is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680711" version="1" comment="webkit2gtk3-minibrowser is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680191" version="1" comment="firewall-applet is &lt;0.9.3-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680192" version="1" comment="firewall-config is &lt;0.9.3-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680182" version="1" comment="firewall-macros is &lt;0.9.3-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680183" version="1" comment="firewalld is &lt;0.9.3-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680184" version="1" comment="firewalld-lang is &lt;0.9.3-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680676" version="1" comment="golang-github-prometheus-prometheus is &lt;2.32.1-150100.4.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680185" version="1" comment="python3-firewall is &lt;0.9.3-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678952" version="1" comment="aom-tools is &lt;1.0.0-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678953" version="1" comment="libaom-devel is &lt;1.0.0-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678954" version="1" comment="libaom-devel-doc is &lt;1.0.0-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677228" version="1" comment="libaom0 is &lt;1.0.0-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678955" version="1" comment="libaom0-32bit is &lt;1.0.0-150200.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678050" version="1" comment="buildah is &lt;1.25.1-150300.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664141" version="1" comment="cryptsetup is &lt;2.3.7-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664142" version="1" comment="cryptsetup-lang is &lt;2.3.7-150300.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664143" version="1" comment="libcryptsetup-devel is &lt;2.3.7-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664144" version="1" comment="libcryptsetup12 is &lt;2.3.7-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664145" version="1" comment="libcryptsetup12-32bit is &lt;2.3.7-150300.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664146" version="1" comment="libcryptsetup12-hmac is &lt;2.3.7-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664147" version="1" comment="libcryptsetup12-hmac-32bit is &lt;2.3.7-150300.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680721" version="1" comment="python-paramiko-doc is &lt;2.4.2-150100.6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680248" version="1" comment="python2-paramiko is &lt;2.4.2-150100.6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680181" version="1" comment="python3-paramiko is &lt;2.4.2-150100.6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680247" version="1" comment="python2-pip is &lt;20.0.2-150100.6.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680168" version="1" comment="python3-pip is &lt;20.0.2-150100.6.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680138" version="1" comment="gio-branding-upstream is &lt;2.62.6-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679804" version="1" comment="glib2-devel is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680139" version="1" comment="glib2-devel-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680140" version="1" comment="glib2-devel-static is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679805" version="1" comment="glib2-lang is &lt;2.62.6-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680141" version="1" comment="glib2-tests is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679806" version="1" comment="glib2-tools is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680142" version="1" comment="glib2-tools-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679807" version="1" comment="libgio-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679808" version="1" comment="libgio-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680143" version="1" comment="libgio-fam is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680144" version="1" comment="libgio-fam-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679809" version="1" comment="libglib-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679810" version="1" comment="libglib-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679811" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679812" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679813" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679814" version="1" comment="libgobject-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679815" version="1" comment="libgthread-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680145" version="1" comment="libgthread-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681172" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681173" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681174" version="1" comment="nodejs12-docs is &lt;12.22.12-150200.4.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681175" version="1" comment="npm12 is &lt;12.22.12-150200.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681168" version="1" comment="nodejs14 is &lt;14.19.1-150200.15.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681169" version="1" comment="nodejs14-devel is &lt;14.19.1-150200.15.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681170" version="1" comment="nodejs14-docs is &lt;14.19.1-150200.15.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681171" version="1" comment="npm14 is &lt;14.19.1-150200.15.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680813" version="1" comment="libslirp-devel is &lt;4.3.1-150300.2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680814" version="1" comment="libslirp0 is &lt;4.3.1-150300.2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681285" version="1" comment="caca-utils is &lt;0.99.beta19.git20171003-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681164" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681286" version="1" comment="libcaca-ruby is &lt;0.99.beta19.git20171003-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681165" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681287" version="1" comment="libcaca0-32bit is &lt;0.99.beta19.git20171003-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681166" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681288" version="1" comment="libcaca0-plugins-32bit is &lt;0.99.beta19.git20171003-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681289" version="1" comment="python3-caca is &lt;0.99.beta19.git20171003-150200.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681004" version="1" comment="python-Twisted-doc is &lt;19.10.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681005" version="1" comment="python2-Twisted is &lt;19.10.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680812" version="1" comment="python3-Twisted is &lt;19.10.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680719" version="1" comment="jasper is &lt;2.0.14-150000.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680190" version="1" comment="libjasper-devel is &lt;2.0.14-150000.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680180" version="1" comment="libjasper4 is &lt;2.0.14-150000.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680720" version="1" comment="libjasper4-32bit is &lt;2.0.14-150000.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680194" version="1" comment="git is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680195" version="1" comment="git-arch is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680169" version="1" comment="git-core is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680712" version="1" comment="git-credential-gnome-keyring is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680713" version="1" comment="git-credential-libsecret is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680196" version="1" comment="git-cvs is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680197" version="1" comment="git-daemon is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680198" version="1" comment="git-doc is &lt;2.35.3-150300.10.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680199" version="1" comment="git-email is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680200" version="1" comment="git-gui is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680714" version="1" comment="git-p4 is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680201" version="1" comment="git-svn is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680202" version="1" comment="git-web is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680203" version="1" comment="gitk is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680170" version="1" comment="perl-Git is &lt;2.35.3-150300.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677076" version="1" comment="libpython3_9-1_0 is &lt;3.9.10-150300.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677199" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.10-150300.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677077" version="1" comment="python39 is &lt;3.9.10-150300.4.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677200" version="1" comment="python39-32bit is &lt;3.9.10-150300.4.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677078" version="1" comment="python39-base is &lt;3.9.10-150300.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677201" version="1" comment="python39-base-32bit is &lt;3.9.10-150300.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677079" version="1" comment="python39-curses is &lt;3.9.10-150300.4.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677080" version="1" comment="python39-dbm is &lt;3.9.10-150300.4.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677081" version="1" comment="python39-devel is &lt;3.9.10-150300.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677202" version="1" comment="python39-doc is &lt;3.9.10-150300.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677203" version="1" comment="python39-doc-devhelp is &lt;3.9.10-150300.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677082" version="1" comment="python39-idle is &lt;3.9.10-150300.4.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677204" version="1" comment="python39-testsuite is &lt;3.9.10-150300.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677083" version="1" comment="python39-tk is &lt;3.9.10-150300.4.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677085" version="1" comment="python39-tools is &lt;3.9.10-150300.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664300" version="1" comment="cargo1.56 is &lt;1.56.1-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664301" version="1" comment="rust1.56 is &lt;1.56.1-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664151" version="1" comment="aide is &lt;0.16-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664260" version="1" comment="aide-test is &lt;0.16-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680695" version="1" comment="xen is &lt;4.14.4_04-150300.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680696" version="1" comment="xen-devel is &lt;4.14.4_04-150300.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680697" version="1" comment="xen-doc-html is &lt;4.14.4_04-150300.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680698" version="1" comment="xen-libs is &lt;4.14.4_04-150300.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680699" version="1" comment="xen-libs-32bit is &lt;4.14.4_04-150300.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680700" version="1" comment="xen-tools is &lt;4.14.4_04-150300.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680701" version="1" comment="xen-tools-domU is &lt;4.14.4_04-150300.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680252" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.4_04-150300.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681147" version="1" comment="pcp-pmda-kvm is &lt;3.11.9-150000.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681148" version="1" comment="pcp-pmda-postgresql is &lt;3.11.9-150000.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681149" version="1" comment="python-pcp is &lt;3.11.9-150000.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663929" version="1" comment="bind is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663930" version="1" comment="bind-chrootenv is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663846" version="1" comment="bind-devel is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663931" version="1" comment="bind-doc is &lt;9.16.6-150300.22.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663847" version="1" comment="bind-utils is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663848" version="1" comment="libbind9-1600 is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663849" version="1" comment="libdns1605 is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663850" version="1" comment="libirs-devel is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663851" version="1" comment="libirs1601 is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663852" version="1" comment="libisc1606 is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663853" version="1" comment="libisccc1600 is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663854" version="1" comment="libisccfg1600 is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663855" version="1" comment="libns1604 is &lt;9.16.6-150300.22.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663856" version="1" comment="python3-bind is &lt;9.16.6-150300.22.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681167" version="1" comment="amazon-ssm-agent is &lt;3.1.1260.0-150000.5.9.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680171" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680172" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680173" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680174" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680715" version="1" comment="ruby2.5-doc is &lt;2.5.9-150000.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680716" version="1" comment="ruby2.5-doc-ri is &lt;2.5.9-150000.4.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680175" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680176" version="1" comment="java-11-openjdk is &lt;11.0.15.0-150000.3.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680717" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.15.0-150000.3.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680177" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0-150000.3.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680178" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0-150000.3.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680179" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0-150000.3.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680245" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.15.0-150000.3.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680246" version="1" comment="java-11-openjdk-jmods is &lt;11.0.15.0-150000.3.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680718" version="1" comment="java-11-openjdk-src is &lt;11.0.15.0-150000.3.80.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680815" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.11-150000.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681003" version="1" comment="ruby2.5-rubygem-puma-doc is &lt;4.3.11-150000.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679693" version="1" comment="libwmf-0_2-7 is &lt;0.2.12-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679694" version="1" comment="libwmf-0_2-7-32bit is &lt;0.2.12-150000.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679695" version="1" comment="libwmf-devel is &lt;0.2.12-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679696" version="1" comment="libwmf-gnome is &lt;0.2.12-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679697" version="1" comment="libwmf-gnome-32bit is &lt;0.2.12-150000.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679698" version="1" comment="libwmf-tools is &lt;0.2.12-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678571" version="1" comment="apache2-mod_auth_mellon is &lt;0.17.0-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678572" version="1" comment="apache2-mod_auth_mellon-diagnostics is &lt;0.17.0-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678573" version="1" comment="apache2-mod_auth_mellon-doc is &lt;0.17.0-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679638" version="1" comment="pgadmin4 is &lt;4.30-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679639" version="1" comment="pgadmin4-doc is &lt;4.30-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679640" version="1" comment="pgadmin4-web is &lt;4.30-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679692" version="1" comment="pgadmin4-web-uwsgi is &lt;4.30-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679457" version="1" comment="tar is &lt;1.34-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679584" version="1" comment="tar-backup-scripts is &lt;1.34-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679585" version="1" comment="tar-doc is &lt;1.34-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679458" version="1" comment="tar-lang is &lt;1.34-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679459" version="1" comment="tar-rmt is &lt;1.34-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679586" version="1" comment="tar-tests is &lt;1.34-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680253" version="1" comment="libvirt is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680254" version="1" comment="libvirt-admin is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680255" version="1" comment="libvirt-bash-completion is &lt;7.1.0-150300.6.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680256" version="1" comment="libvirt-client is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680257" version="1" comment="libvirt-daemon is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680258" version="1" comment="libvirt-daemon-config-network is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680259" version="1" comment="libvirt-daemon-config-nwfilter is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680260" version="1" comment="libvirt-daemon-driver-interface is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680261" version="1" comment="libvirt-daemon-driver-libxl is &lt;7.1.0-150300.6.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680262" version="1" comment="libvirt-daemon-driver-lxc is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680263" version="1" comment="libvirt-daemon-driver-network is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680264" version="1" comment="libvirt-daemon-driver-nodedev is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680265" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680266" version="1" comment="libvirt-daemon-driver-qemu is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680267" version="1" comment="libvirt-daemon-driver-secret is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680268" version="1" comment="libvirt-daemon-driver-storage is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680269" version="1" comment="libvirt-daemon-driver-storage-core is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680270" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680702" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680271" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680272" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680273" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680274" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680275" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;7.1.0-150300.6.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680276" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680277" version="1" comment="libvirt-daemon-hooks is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680278" version="1" comment="libvirt-daemon-lxc is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680279" version="1" comment="libvirt-daemon-qemu is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680280" version="1" comment="libvirt-daemon-xen is &lt;7.1.0-150300.6.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680281" version="1" comment="libvirt-devel is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680703" version="1" comment="libvirt-devel-32bit is &lt;7.1.0-150300.6.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680282" version="1" comment="libvirt-doc is &lt;7.1.0-150300.6.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680163" version="1" comment="libvirt-libs is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680283" version="1" comment="libvirt-lock-sanlock is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680284" version="1" comment="libvirt-nss is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680704" version="1" comment="wireshark-plugin-libvirt is &lt;7.1.0-150300.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679712" version="1" comment="giflib-devel is &lt;5.2.1-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679754" version="1" comment="giflib-devel-32bit is &lt;5.2.1-150000.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679755" version="1" comment="giflib-progs is &lt;5.2.1-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679713" version="1" comment="libgif7 is &lt;5.2.1-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679756" version="1" comment="libgif7-32bit is &lt;5.2.1-150000.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664155" version="1" comment="libZXing1 is &lt;1.2.0-9.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664156" version="1" comment="zxing-cpp-devel is &lt;1.2.0-9.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679460" version="1" comment="ldb-tools is &lt;2.4.2-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679461" version="1" comment="libldb-devel is &lt;2.4.2-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679462" version="1" comment="libldb2 is &lt;2.4.2-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679463" version="1" comment="libldb2-32bit is &lt;2.4.2-150300.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679464" version="1" comment="python3-ldb is &lt;2.4.2-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679587" version="1" comment="python3-ldb-32bit is &lt;2.4.2-150300.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679465" version="1" comment="python3-ldb-devel is &lt;2.4.2-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682352" version="1" comment="rsyslog is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682744" version="1" comment="rsyslog-diag-tools is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682745" version="1" comment="rsyslog-doc is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682746" version="1" comment="rsyslog-module-dbi is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682747" version="1" comment="rsyslog-module-elasticsearch is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682748" version="1" comment="rsyslog-module-gcrypt is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682411" version="1" comment="rsyslog-module-gssapi is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682412" version="1" comment="rsyslog-module-gtls is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682413" version="1" comment="rsyslog-module-mmnormalize is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682414" version="1" comment="rsyslog-module-mysql is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682749" version="1" comment="rsyslog-module-omamqp1 is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682750" version="1" comment="rsyslog-module-omhttpfs is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682751" version="1" comment="rsyslog-module-omtcl is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682752" version="1" comment="rsyslog-module-ossl is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682415" version="1" comment="rsyslog-module-pgsql is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682416" version="1" comment="rsyslog-module-relp is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682417" version="1" comment="rsyslog-module-snmp is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682418" version="1" comment="rsyslog-module-udpspoof is &lt;8.2106.0-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682353" version="1" comment="gzip is &lt;1.10-150200.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682360" version="1" comment="clamav is &lt;0.103.6-150000.3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682361" version="1" comment="clamav-devel is &lt;0.103.6-150000.3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682362" version="1" comment="libclamav9 is &lt;0.103.6-150000.3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682363" version="1" comment="libfreshclam2 is &lt;0.103.6-150000.3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683441" version="1" comment="curl is &lt;7.66.0-150200.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683442" version="1" comment="libcurl-devel is &lt;7.66.0-150200.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683852" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-150200.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683443" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683444" version="1" comment="libcurl4-32bit is &lt;7.66.0-150200.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683362" version="1" comment="finch is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683363" version="1" comment="finch-devel is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683364" version="1" comment="libpurple is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682921" version="1" comment="libpurple-branding-upstream is &lt;2.13.0-150200.12.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683365" version="1" comment="libpurple-devel is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682923" version="1" comment="libpurple-lang is &lt;2.13.0-150200.12.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683366" version="1" comment="libpurple-plugin-sametime is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683367" version="1" comment="libpurple-tcl is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683368" version="1" comment="pidgin is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683369" version="1" comment="pidgin-devel is &lt;2.13.0-150200.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683372" version="1" comment="libnss_slurm2 is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683373" version="1" comment="libpmi0 is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683374" version="1" comment="libslurm36 is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683375" version="1" comment="perl-slurm is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683376" version="1" comment="slurm is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683377" version="1" comment="slurm-auth-none is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683378" version="1" comment="slurm-config is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683379" version="1" comment="slurm-config-man is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683380" version="1" comment="slurm-cray is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683381" version="1" comment="slurm-devel is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683382" version="1" comment="slurm-doc is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683383" version="1" comment="slurm-hdf5 is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683384" version="1" comment="slurm-lua is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683385" version="1" comment="slurm-munge is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683386" version="1" comment="slurm-node is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683387" version="1" comment="slurm-openlava is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683388" version="1" comment="slurm-pam_slurm is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683389" version="1" comment="slurm-plugins is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683390" version="1" comment="slurm-rest is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683391" version="1" comment="slurm-seff is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683392" version="1" comment="slurm-sjstat is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683393" version="1" comment="slurm-slurmdbd is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683394" version="1" comment="slurm-sql is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683395" version="1" comment="slurm-sview is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683396" version="1" comment="slurm-torque is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683397" version="1" comment="slurm-webdoc is &lt;20.11.9-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682354" version="1" comment="libldap-2_4-2 is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682355" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-150200.14.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682356" version="1" comment="libldap-data is &lt;2.4.46-150200.14.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682366" version="1" comment="openldap2 is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682367" version="1" comment="openldap2-back-meta is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682368" version="1" comment="openldap2-back-perl is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682758" version="1" comment="openldap2-back-sock is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682759" version="1" comment="openldap2-back-sql is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682357" version="1" comment="openldap2-client is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682369" version="1" comment="openldap2-contrib is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682358" version="1" comment="openldap2-devel is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682365" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-150200.14.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682359" version="1" comment="openldap2-devel-static is &lt;2.4.46-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682760" version="1" comment="openldap2-doc is &lt;2.4.46-150200.14.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682370" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-150200.14.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683297" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683298" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683299" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682940" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682941" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683300" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683301" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683302" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682942" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682943" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682944" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683303" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683304" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683305" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679451" version="1" comment="jackson-annotations is &lt;2.13.0-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679452" version="1" comment="jackson-annotations-javadoc is &lt;2.13.0-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679580" version="1" comment="jackson-bom is &lt;2.13.0-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679453" version="1" comment="jackson-core is &lt;2.13.0-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679454" version="1" comment="jackson-core-javadoc is &lt;2.13.0-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679455" version="1" comment="jackson-databind is &lt;2.13.0-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679456" version="1" comment="jackson-databind-javadoc is &lt;2.13.0-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680193" version="1" comment="jackson-dataformat-cbor is &lt;2.13.0-150200.3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680705" version="1" comment="jackson-dataformat-smile is &lt;2.13.0-150200.3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680706" version="1" comment="jackson-dataformats-binary is &lt;2.13.0-150200.3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680707" version="1" comment="jackson-dataformats-binary-javadoc is &lt;2.13.0-150200.3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683306" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683007" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683307" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683308" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683008" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683309" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683310" version="1" comment="dtb-al is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683311" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683312" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683313" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683314" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683315" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683316" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683317" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683318" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683319" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683320" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683321" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683322" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683323" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683324" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683325" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683326" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683327" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683328" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683329" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683330" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683331" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683332" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683333" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683009" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683334" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682878" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682879" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683335" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683336" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683337" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683338" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683339" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683340" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682880" version="1" comment="kernel-default is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682881" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.68.1.150300.18.41.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683341" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.68.1.150300.18.41.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682882" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683342" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683343" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683344" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683345" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682883" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682888" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683346" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683347" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683348" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683349" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682884" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682889" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683350" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682885" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682890" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683351" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683352" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683353" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682891" version="1" comment="kernel-source is &lt;5.3.18-150300.59.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683354" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682892" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682886" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.68.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683355" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683356" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683357" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683358" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683010" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683359" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683360" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682914" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683361" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.68.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682213" version="1" comment="e2fsprogs is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682214" version="1" comment="e2fsprogs-devel is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682215" version="1" comment="libcom_err-devel is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682340" version="1" comment="libcom_err-devel-32bit is &lt;1.43.8-150000.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682216" version="1" comment="libcom_err-devel-static is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682217" version="1" comment="libcom_err2 is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682218" version="1" comment="libcom_err2-32bit is &lt;1.43.8-150000.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682219" version="1" comment="libext2fs-devel is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682341" version="1" comment="libext2fs-devel-32bit is &lt;1.43.8-150000.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682220" version="1" comment="libext2fs-devel-static is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682221" version="1" comment="libext2fs2 is &lt;1.43.8-150000.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682342" version="1" comment="libext2fs2-32bit is &lt;1.43.8-150000.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679819" version="1" comment="containerd is &lt;1.5.11-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679831" version="1" comment="containerd-ctr is &lt;1.5.11-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681369" version="1" comment="docker is &lt;20.10.14_ce-150000.163.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681370" version="1" comment="docker-bash-completion is &lt;20.10.14_ce-150000.163.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681371" version="1" comment="docker-fish-completion is &lt;20.10.14_ce-150000.163.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682171" version="1" comment="docker-kubic is &lt;20.10.14_ce-150000.163.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682172" version="1" comment="docker-kubic-bash-completion is &lt;20.10.14_ce-150000.163.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682173" version="1" comment="docker-kubic-fish-completion is &lt;20.10.14_ce-150000.163.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682174" version="1" comment="docker-kubic-kubeadm-criconfig is &lt;20.10.14_ce-150000.163.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682175" version="1" comment="docker-kubic-zsh-completion is &lt;20.10.14_ce-150000.163.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682176" version="1" comment="docker-zsh-completion is &lt;20.10.14_ce-150000.163.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664773" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664774" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664775" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664521" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664522" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664776" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664777" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664778" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664523" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664524" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664525" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664779" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664780" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664781" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682754" version="1" comment="nodejs8 is &lt;8.17.0-150200.10.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682755" version="1" comment="nodejs8-devel is &lt;8.17.0-150200.10.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682756" version="1" comment="nodejs8-docs is &lt;8.17.0-150200.10.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682757" version="1" comment="npm8 is &lt;8.17.0-150200.10.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664302" version="1" comment="cargo1.55 is &lt;1.55.0-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664303" version="1" comment="rust1.55 is &lt;1.55.0-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683568" version="1" comment="nodejs10 is &lt;10.24.1-150000.1.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683569" version="1" comment="nodejs10-devel is &lt;10.24.1-150000.1.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683551" version="1" comment="nodejs10-docs is &lt;10.24.1-150000.1.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683570" version="1" comment="npm10 is &lt;10.24.1-150000.1.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683866" version="1" comment="MozillaThunderbird is &lt;91.9.0-150200.8.68.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683867" version="1" comment="MozillaThunderbird-translations-common is &lt;91.9.0-150200.8.68.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683868" version="1" comment="MozillaThunderbird-translations-other is &lt;91.9.0-150200.8.68.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683476" version="1" comment="ucode-intel is &lt;20220510-150200.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683545" version="1" comment="libslirp-devel is &lt;4.3.1-150300.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683546" version="1" comment="libslirp0 is &lt;4.3.1-150300.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684013" version="1" comment="MozillaFirefox is &lt;91.9.0-150200.152.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684142" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.9.0-150200.152.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684143" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-150200.152.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684015" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-150200.152.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684016" version="1" comment="MozillaFirefox-translations-other is &lt;91.9.0-150200.152.37.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664304" version="1" comment="cargo1.57 is &lt;1.57.0-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664305" version="1" comment="rust1.57 is &lt;1.57.0-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683445" version="1" comment="libxml2-2 is &lt;2.9.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683446" version="1" comment="libxml2-2-32bit is &lt;2.9.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683447" version="1" comment="libxml2-devel is &lt;2.9.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683853" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683854" version="1" comment="libxml2-doc is &lt;2.9.7-150000.3.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683448" version="1" comment="libxml2-tools is &lt;2.9.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683542" version="1" comment="python2-libxml2-python is &lt;2.9.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683449" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664287" version="1" comment="libunbound2 is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664373" version="1" comment="unbound is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664288" version="1" comment="unbound-anchor is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664289" version="1" comment="unbound-devel is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664374" version="1" comment="unbound-munin is &lt;1.6.8-10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664375" version="1" comment="unbound-python is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684005" version="1" comment="ImageMagick is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684006" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684007" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684008" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684135" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-150200.10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684136" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-150200.10.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684137" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684009" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684138" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-150200.10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684010" version="1" comment="libMagick++-devel is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684139" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-150200.10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684011" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684140" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684012" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684141" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684017" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-150200.10.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682956" version="1" comment="apache2-mod_php7 is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682957" version="1" comment="php7 is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682958" version="1" comment="php7-bcmath is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682959" version="1" comment="php7-bz2 is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682960" version="1" comment="php7-calendar is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682961" version="1" comment="php7-ctype is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682962" version="1" comment="php7-curl is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682963" version="1" comment="php7-dba is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682964" version="1" comment="php7-devel is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682965" version="1" comment="php7-dom is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682928" version="1" comment="php7-embed is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682966" version="1" comment="php7-enchant is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682967" version="1" comment="php7-exif is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682968" version="1" comment="php7-fastcgi is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682969" version="1" comment="php7-fileinfo is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683370" version="1" comment="php7-firebird is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682970" version="1" comment="php7-fpm is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682971" version="1" comment="php7-ftp is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682972" version="1" comment="php7-gd is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682973" version="1" comment="php7-gettext is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682974" version="1" comment="php7-gmp is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682975" version="1" comment="php7-iconv is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682976" version="1" comment="php7-intl is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682977" version="1" comment="php7-json is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682978" version="1" comment="php7-ldap is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682979" version="1" comment="php7-mbstring is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682980" version="1" comment="php7-mysql is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682981" version="1" comment="php7-odbc is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682982" version="1" comment="php7-opcache is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682983" version="1" comment="php7-openssl is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682984" version="1" comment="php7-pcntl is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682985" version="1" comment="php7-pdo is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682986" version="1" comment="php7-pgsql is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682987" version="1" comment="php7-phar is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682988" version="1" comment="php7-posix is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682989" version="1" comment="php7-readline is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682990" version="1" comment="php7-shmop is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682991" version="1" comment="php7-snmp is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682992" version="1" comment="php7-soap is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682993" version="1" comment="php7-sockets is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682994" version="1" comment="php7-sodium is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682995" version="1" comment="php7-sqlite is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682996" version="1" comment="php7-sysvmsg is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682997" version="1" comment="php7-sysvsem is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682998" version="1" comment="php7-sysvshm is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683371" version="1" comment="php7-test is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682999" version="1" comment="php7-tidy is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683000" version="1" comment="php7-tokenizer is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683001" version="1" comment="php7-xmlreader is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683002" version="1" comment="php7-xmlrpc is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683003" version="1" comment="php7-xmlwriter is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683004" version="1" comment="php7-xsl is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683005" version="1" comment="php7-zip is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683006" version="1" comment="php7-zlib is &lt;7.4.6-150200.3.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663895" version="1" comment="qemu is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664031" version="1" comment="qemu-arm is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664032" version="1" comment="qemu-audio-alsa is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664033" version="1" comment="qemu-audio-pa is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664034" version="1" comment="qemu-audio-spice is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663900" version="1" comment="qemu-block-curl is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664035" version="1" comment="qemu-block-dmg is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664036" version="1" comment="qemu-block-gluster is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663901" version="1" comment="qemu-block-iscsi is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664037" version="1" comment="qemu-block-nfs is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663902" version="1" comment="qemu-block-rbd is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663903" version="1" comment="qemu-block-ssh is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663904" version="1" comment="qemu-chardev-baum is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664038" version="1" comment="qemu-chardev-spice is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664039" version="1" comment="qemu-extra is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663906" version="1" comment="qemu-guest-agent is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664040" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664041" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664042" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664043" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664044" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664045" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664046" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663913" version="1" comment="qemu-ipxe is &lt;1.0.0+-150300.109.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664047" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663914" version="1" comment="qemu-ksm is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663915" version="1" comment="qemu-kvm is &lt;5.2.0-150300.109.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663916" version="1" comment="qemu-lang is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664048" version="1" comment="qemu-linux-user is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664049" version="1" comment="qemu-microvm is &lt;5.2.0-150300.109.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664050" version="1" comment="qemu-ppc is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664051" version="1" comment="qemu-s390x is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663919" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-150300.109.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663920" version="1" comment="qemu-sgabios is &lt;8-150300.109.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663921" version="1" comment="qemu-skiboot is &lt;5.2.0-150300.109.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664052" version="1" comment="qemu-testsuite is &lt;5.2.0-150300.109.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663845" version="1" comment="qemu-tools is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663922" version="1" comment="qemu-ui-curses is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664053" version="1" comment="qemu-ui-gtk is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664054" version="1" comment="qemu-ui-opengl is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664055" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664056" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663927" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-150300.109.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664057" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664058" version="1" comment="qemu-x86 is &lt;5.2.0-150300.109.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664152" version="1" comment="expat is &lt;2.2.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664153" version="1" comment="libexpat-devel is &lt;2.2.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664264" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664154" version="1" comment="libexpat1 is &lt;2.2.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664063" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683483" version="1" comment="bsdtar is &lt;3.4.2-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683474" version="1" comment="libarchive-devel is &lt;3.4.2-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683475" version="1" comment="libarchive13 is &lt;3.4.2-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683865" version="1" comment="libarchive13-32bit is &lt;3.4.2-150200.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664283" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664369" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664284" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664370" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664285" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.3-23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664296" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664297" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664298" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664371" version="1" comment="webkit-jsc-4 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664286" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664299" version="1" comment="webkit2gtk3-devel is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664372" version="1" comment="webkit2gtk3-minibrowser is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684415" version="1" comment="go1.18 is &lt;1.18.2-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684416" version="1" comment="go1.18-doc is &lt;1.18.2-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684417" version="1" comment="go1.18-race is &lt;1.18.2-150000.1.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684375" version="1" comment="MozillaFirefox is &lt;91.9.1-150200.152.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695050" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.9.1-150200.152.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693677" version="1" comment="MozillaFirefox-devel is &lt;91.9.1-150200.152.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684377" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.1-150200.152.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684378" version="1" comment="MozillaFirefox-translations-other is &lt;91.9.1-150200.152.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683398" version="1" comment="libnss_slurm2_20_11 is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683399" version="1" comment="libpmi0_20_11 is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683400" version="1" comment="perl-slurm_20_11 is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683401" version="1" comment="slurm_20_11 is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683402" version="1" comment="slurm_20_11-auth-none is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683403" version="1" comment="slurm_20_11-config is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683404" version="1" comment="slurm_20_11-config-man is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683405" version="1" comment="slurm_20_11-cray is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683406" version="1" comment="slurm_20_11-devel is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683407" version="1" comment="slurm_20_11-doc is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683408" version="1" comment="slurm_20_11-hdf5 is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683409" version="1" comment="slurm_20_11-lua is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683410" version="1" comment="slurm_20_11-munge is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683411" version="1" comment="slurm_20_11-node is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683412" version="1" comment="slurm_20_11-openlava is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683413" version="1" comment="slurm_20_11-pam_slurm is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683414" version="1" comment="slurm_20_11-plugins is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683415" version="1" comment="slurm_20_11-rest is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683416" version="1" comment="slurm_20_11-seff is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683417" version="1" comment="slurm_20_11-sjstat is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683418" version="1" comment="slurm_20_11-slurmdbd is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683419" version="1" comment="slurm_20_11-sql is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683420" version="1" comment="slurm_20_11-sview is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683421" version="1" comment="slurm_20_11-torque is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683422" version="1" comment="slurm_20_11-webdoc is &lt;20.11.9-150200.6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664148" version="1" comment="libjson-c-devel is &lt;0.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664259" version="1" comment="libjson-c-doc is &lt;0.13-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664149" version="1" comment="libjson-c3 is &lt;0.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664150" version="1" comment="libjson-c3-32bit is &lt;0.13-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684002" version="1" comment="kernel-firmware is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684144" version="1" comment="kernel-firmware-all is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684145" version="1" comment="kernel-firmware-amdgpu is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684146" version="1" comment="kernel-firmware-ath10k is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684147" version="1" comment="kernel-firmware-ath11k is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684148" version="1" comment="kernel-firmware-atheros is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684149" version="1" comment="kernel-firmware-bluetooth is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684150" version="1" comment="kernel-firmware-bnx2 is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684003" version="1" comment="kernel-firmware-brcm is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684151" version="1" comment="kernel-firmware-chelsio is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684152" version="1" comment="kernel-firmware-dpaa2 is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684153" version="1" comment="kernel-firmware-i915 is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684154" version="1" comment="kernel-firmware-intel is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684155" version="1" comment="kernel-firmware-iwlwifi is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684156" version="1" comment="kernel-firmware-liquidio is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684157" version="1" comment="kernel-firmware-marvell is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684158" version="1" comment="kernel-firmware-media is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684159" version="1" comment="kernel-firmware-mediatek is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684160" version="1" comment="kernel-firmware-mellanox is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684161" version="1" comment="kernel-firmware-mwifiex is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684162" version="1" comment="kernel-firmware-network is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684163" version="1" comment="kernel-firmware-nfp is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684164" version="1" comment="kernel-firmware-nvidia is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684165" version="1" comment="kernel-firmware-platform is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684166" version="1" comment="kernel-firmware-prestera is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684167" version="1" comment="kernel-firmware-qlogic is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684168" version="1" comment="kernel-firmware-radeon is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684169" version="1" comment="kernel-firmware-realtek is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684170" version="1" comment="kernel-firmware-serial is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684171" version="1" comment="kernel-firmware-sound is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684172" version="1" comment="kernel-firmware-ti is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684173" version="1" comment="kernel-firmware-ueagle is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684174" version="1" comment="kernel-firmware-usb-network is &lt;20210208-150300.4.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684004" version="1" comment="ucode-amd is &lt;20210208-150300.4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683544" version="1" comment="redis is &lt;6.0.14-150200.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684246" version="1" comment="fribidi is &lt;1.0.5-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684247" version="1" comment="fribidi-devel is &lt;1.0.5-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684248" version="1" comment="libfribidi0 is &lt;1.0.5-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684379" version="1" comment="libfribidi0-32bit is &lt;1.0.5-150200.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684249" version="1" comment="cups is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684250" version="1" comment="cups-client is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684251" version="1" comment="cups-config is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684418" version="1" comment="cups-ddk is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684252" version="1" comment="cups-devel is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695051" version="1" comment="cups-devel-32bit is &lt;2.2.7-150000.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684253" version="1" comment="libcups2 is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684254" version="1" comment="libcups2-32bit is &lt;2.2.7-150000.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684255" version="1" comment="libcupscgi1 is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695052" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-150000.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684256" version="1" comment="libcupsimage2 is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695053" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-150000.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684257" version="1" comment="libcupsmime1 is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695054" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-150000.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684258" version="1" comment="libcupsppdc1 is &lt;2.2.7-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695055" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-150000.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695056" version="1" comment="go1.17 is &lt;1.17.10-150000.1.34.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695057" version="1" comment="go1.17-doc is &lt;1.17.10-150000.1.34.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684421" version="1" comment="go1.17-race is &lt;1.17.10-150000.1.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684259" version="1" comment="curl is &lt;7.66.0-150200.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684260" version="1" comment="libcurl-devel is &lt;7.66.0-150200.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695058" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-150200.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684261" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684262" version="1" comment="libcurl4-32bit is &lt;7.66.0-150200.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684263" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695059" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684264" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684380" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684616" version="1" comment="tiff is &lt;4.0.9-150000.45.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684265" version="1" comment="libpcre2-16-0 is &lt;10.31-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695060" version="1" comment="libpcre2-16-0-32bit is &lt;10.31-150000.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684266" version="1" comment="libpcre2-32-0 is &lt;10.31-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695061" version="1" comment="libpcre2-32-0-32bit is &lt;10.31-150000.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684267" version="1" comment="libpcre2-8-0 is &lt;10.31-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695062" version="1" comment="libpcre2-8-0-32bit is &lt;10.31-150000.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684268" version="1" comment="libpcre2-posix2 is &lt;10.31-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695063" version="1" comment="libpcre2-posix2-32bit is &lt;10.31-150000.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684269" version="1" comment="pcre2-devel is &lt;10.31-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695064" version="1" comment="pcre2-devel-static is &lt;10.31-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695065" version="1" comment="pcre2-doc is &lt;10.31-150000.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695066" version="1" comment="pcre2-tools is &lt;10.31-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681372" version="1" comment="helm-mirror is &lt;0.3.1-150000.1.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684535" version="1" comment="postgresql10 is &lt;10.21-150100.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684536" version="1" comment="postgresql10-contrib is &lt;10.21-150100.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009692663" version="1" comment="postgresql10-docs is &lt;10.21-150100.8.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684538" version="1" comment="postgresql10-plperl is &lt;10.21-150100.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684539" version="1" comment="postgresql10-plpython is &lt;10.21-150100.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684540" version="1" comment="postgresql10-pltcl is &lt;10.21-150100.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684541" version="1" comment="postgresql10-server is &lt;10.21-150100.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695067" version="1" comment="postgresql10-test is &lt;10.21-150100.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684743" version="1" comment="dpdk is &lt;19.11.4-150300.11.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684744" version="1" comment="dpdk-devel is &lt;19.11.4-150300.11.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695068" version="1" comment="dpdk-doc is &lt;19.11.4-150300.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695069" version="1" comment="dpdk-examples is &lt;19.11.4-150300.11.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684745" version="1" comment="dpdk-kmp-default is &lt;19.11.4_k5.3.18_150300.59.63-150300.11.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695070" version="1" comment="dpdk-kmp-preempt is &lt;19.11.4_k5.3.18_150300.59.63-150300.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684746" version="1" comment="dpdk-thunderx is &lt;19.11.4-150300.11.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684747" version="1" comment="dpdk-thunderx-devel is &lt;19.11.4-150300.11.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695071" version="1" comment="dpdk-thunderx-doc is &lt;19.11.4-150300.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695072" version="1" comment="dpdk-thunderx-examples is &lt;19.11.4-150300.11.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684748" version="1" comment="dpdk-thunderx-kmp-default is &lt;19.11.4_k5.3.18_150300.59.63-150300.11.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695073" version="1" comment="dpdk-thunderx-kmp-preempt is &lt;19.11.4_k5.3.18_150300.59.63-150300.11.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695074" version="1" comment="dpdk-thunderx-tools is &lt;19.11.4-150300.11.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684749" version="1" comment="dpdk-tools is &lt;19.11.4-150300.11.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684750" version="1" comment="libdpdk-20_0 is &lt;19.11.4-150300.11.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684542" version="1" comment="postgresql12 is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684543" version="1" comment="postgresql12-contrib is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684544" version="1" comment="postgresql12-devel is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684545" version="1" comment="postgresql12-docs is &lt;12.11-150200.8.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684617" version="1" comment="postgresql12-llvmjit is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684546" version="1" comment="postgresql12-plperl is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684547" version="1" comment="postgresql12-plpython is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684548" version="1" comment="postgresql12-pltcl is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684549" version="1" comment="postgresql12-server is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684550" version="1" comment="postgresql12-server-devel is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684618" version="1" comment="postgresql12-test is &lt;12.11-150200.8.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684270" version="1" comment="postgresql13 is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684751" version="1" comment="postgresql13-contrib is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684752" version="1" comment="postgresql13-devel is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684753" version="1" comment="postgresql13-docs is &lt;13.7-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684619" version="1" comment="postgresql13-llvmjit is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684754" version="1" comment="postgresql13-plperl is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684755" version="1" comment="postgresql13-plpython is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684756" version="1" comment="postgresql13-pltcl is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684757" version="1" comment="postgresql13-server is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684758" version="1" comment="postgresql13-server-devel is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684620" version="1" comment="postgresql13-test is &lt;13.7-150200.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664492" version="1" comment="libpolkit0 is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664782" version="1" comment="libpolkit0-32bit is &lt;0.116-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664493" version="1" comment="polkit is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664494" version="1" comment="polkit-devel is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664783" version="1" comment="polkit-doc is &lt;0.116-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664495" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684759" version="1" comment="libecpg6 is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695075" version="1" comment="libecpg6-32bit is &lt;14.3-150200.5.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684271" version="1" comment="libpq5 is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009692835" version="1" comment="libpq5-32bit is &lt;14.3-150200.5.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684272" version="1" comment="postgresql14 is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684760" version="1" comment="postgresql14-contrib is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684761" version="1" comment="postgresql14-devel is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695076" version="1" comment="postgresql14-devel-mini is &lt;14.3-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684762" version="1" comment="postgresql14-docs is &lt;14.3-150200.5.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684621" version="1" comment="postgresql14-llvmjit is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684763" version="1" comment="postgresql14-plperl is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684764" version="1" comment="postgresql14-plpython is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684765" version="1" comment="postgresql14-pltcl is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684766" version="1" comment="postgresql14-server is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684767" version="1" comment="postgresql14-server-devel is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695077" version="1" comment="postgresql14-test is &lt;14.3-150200.5.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684443" version="1" comment="hdf5-gnu-hpc is &lt;1.10.8-150300.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684444" version="1" comment="hdf5-gnu-hpc-devel is &lt;1.10.8-150300.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684445" version="1" comment="hdf5-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684446" version="1" comment="hdf5-gnu-mpich-hpc-devel is &lt;1.10.8-150300.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684447" version="1" comment="hdf5-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684448" version="1" comment="hdf5-gnu-mvapich2-hpc-devel is &lt;1.10.8-150300.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684449" version="1" comment="hdf5-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684450" version="1" comment="hdf5-gnu-openmpi3-hpc-devel is &lt;1.10.8-150300.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684451" version="1" comment="hdf5-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684452" version="1" comment="hdf5-gnu-openmpi4-hpc-devel is &lt;1.10.8-150300.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684453" version="1" comment="hdf5-hpc-examples is &lt;1.10.8-150300.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695078" version="1" comment="hdf5_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695079" version="1" comment="hdf5_1_10_8-gnu-hpc-devel is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695080" version="1" comment="hdf5_1_10_8-gnu-hpc-devel-static is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695081" version="1" comment="hdf5_1_10_8-gnu-hpc-module is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695082" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695083" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc-devel is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695084" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc-devel-static is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695085" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc-module is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695086" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695087" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695088" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel-static is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695089" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc-module is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695090" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695091" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695092" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel-static is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695093" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc-module is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695094" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695095" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695096" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel-static is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695097" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc-module is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695098" version="1" comment="hdf5_1_10_8-hpc-examples is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695099" version="1" comment="libhdf5-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695100" version="1" comment="libhdf5-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695101" version="1" comment="libhdf5-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695102" version="1" comment="libhdf5-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695103" version="1" comment="libhdf5-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695104" version="1" comment="libhdf5_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695105" version="1" comment="libhdf5_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695106" version="1" comment="libhdf5_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695107" version="1" comment="libhdf5_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695108" version="1" comment="libhdf5_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695109" version="1" comment="libhdf5_cpp-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695110" version="1" comment="libhdf5_cpp-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695111" version="1" comment="libhdf5_cpp-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695112" version="1" comment="libhdf5_cpp-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695113" version="1" comment="libhdf5_cpp-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695114" version="1" comment="libhdf5_cpp_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695115" version="1" comment="libhdf5_cpp_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695116" version="1" comment="libhdf5_cpp_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695117" version="1" comment="libhdf5_cpp_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695118" version="1" comment="libhdf5_cpp_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695119" version="1" comment="libhdf5_fortran-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695120" version="1" comment="libhdf5_fortran-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695121" version="1" comment="libhdf5_fortran-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695122" version="1" comment="libhdf5_fortran-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695123" version="1" comment="libhdf5_fortran-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695124" version="1" comment="libhdf5_fortran_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695125" version="1" comment="libhdf5_fortran_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695126" version="1" comment="libhdf5_fortran_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695127" version="1" comment="libhdf5_fortran_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695128" version="1" comment="libhdf5_fortran_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695129" version="1" comment="libhdf5_hl-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695130" version="1" comment="libhdf5_hl-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695131" version="1" comment="libhdf5_hl-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695132" version="1" comment="libhdf5_hl-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695133" version="1" comment="libhdf5_hl-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695134" version="1" comment="libhdf5_hl_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695135" version="1" comment="libhdf5_hl_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695136" version="1" comment="libhdf5_hl_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695137" version="1" comment="libhdf5_hl_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695138" version="1" comment="libhdf5_hl_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695139" version="1" comment="libhdf5_hl_cpp-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695140" version="1" comment="libhdf5_hl_cpp-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695141" version="1" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695142" version="1" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695143" version="1" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695144" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695145" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695146" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695147" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695148" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695149" version="1" comment="libhdf5_hl_fortran-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695150" version="1" comment="libhdf5_hl_fortran-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695151" version="1" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695152" version="1" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695153" version="1" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695154" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695155" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695156" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695157" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695158" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684381" version="1" comment="MozillaFirefox is &lt;91.10.0-150200.152.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695159" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.10.0-150200.152.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693678" version="1" comment="MozillaFirefox-devel is &lt;91.10.0-150200.152.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684383" version="1" comment="MozillaFirefox-translations-common is &lt;91.10.0-150200.152.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684384" version="1" comment="MozillaFirefox-translations-other is &lt;91.10.0-150200.152.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684273" version="1" comment="patch is &lt;2.7.6-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664784" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664531" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664785" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664786" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664532" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664787" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664788" version="1" comment="dtb-al is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664789" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664790" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664791" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664792" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664793" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664794" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664795" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664796" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664797" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664798" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664799" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664800" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664801" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664802" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664803" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664804" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664805" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664806" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664807" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664808" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664809" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664810" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.43.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664811" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664533" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664812" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664500" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664501" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664813" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664814" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664815" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664816" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.43.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664817" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.43.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664818" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.43.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664502" version="1" comment="kernel-default is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664503" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.43.1.150300.18.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664819" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.43.1.150300.18.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664504" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664820" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664821" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664822" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664823" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664505" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.43.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664509" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.43.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664824" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.43.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664825" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.43.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664826" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.43.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664827" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.43.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664506" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.43.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664510" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664828" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664507" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664511" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664829" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664830" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664831" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664512" version="1" comment="kernel-source is &lt;5.3.18-150300.59.43.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664832" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.43.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664513" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664508" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.43.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664833" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664834" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664835" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664836" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664534" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664837" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664838" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.43.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664514" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.43.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664839" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.43.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664261" version="1" comment="MozillaThunderbird is &lt;91.5.0-8.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664262" version="1" comment="MozillaThunderbird-translations-common is &lt;91.5.0-8.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664263" version="1" comment="MozillaThunderbird-translations-other is &lt;91.5.0-8.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684768" version="1" comment="libmariadbd-devel is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684769" version="1" comment="libmariadbd19 is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684770" version="1" comment="mariadb is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695160" version="1" comment="mariadb-bench is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684771" version="1" comment="mariadb-client is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684772" version="1" comment="mariadb-errormessages is &lt;10.5.16-150300.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695161" version="1" comment="mariadb-rpm-macros is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695162" version="1" comment="mariadb-test is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684773" version="1" comment="mariadb-tools is &lt;10.5.16-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695163" version="1" comment="go1.17 is &lt;1.17.11-150000.1.37.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695164" version="1" comment="go1.17-doc is &lt;1.17.11-150000.1.37.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684424" version="1" comment="go1.17-race is &lt;1.17.11-150000.1.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684425" version="1" comment="go1.18 is &lt;1.18.3-150000.1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684426" version="1" comment="go1.18-doc is &lt;1.18.3-150000.1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684427" version="1" comment="go1.18-race is &lt;1.18.3-150000.1.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683482" version="1" comment="google-gson is &lt;2.8.9-150200.3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683855" version="1" comment="google-gson-javadoc is &lt;2.8.9-150200.3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682364" version="1" comment="netty3 is &lt;3.10.6-150200.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682753" version="1" comment="netty3-javadoc is &lt;3.10.6-150200.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695165" version="1" comment="u-boot-avnetultra96rev1 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695166" version="1" comment="u-boot-avnetultra96rev1-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695167" version="1" comment="u-boot-bananapim64 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695168" version="1" comment="u-boot-bananapim64-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695169" version="1" comment="u-boot-dragonboard410c is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695170" version="1" comment="u-boot-dragonboard410c-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695171" version="1" comment="u-boot-dragonboard820c is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695172" version="1" comment="u-boot-dragonboard820c-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695173" version="1" comment="u-boot-evb-rk3399 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695174" version="1" comment="u-boot-evb-rk3399-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695175" version="1" comment="u-boot-firefly-rk3399 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695176" version="1" comment="u-boot-firefly-rk3399-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695177" version="1" comment="u-boot-geekbox is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695178" version="1" comment="u-boot-geekbox-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695179" version="1" comment="u-boot-hikey is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695180" version="1" comment="u-boot-hikey-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695181" version="1" comment="u-boot-khadas-vim is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695182" version="1" comment="u-boot-khadas-vim-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695183" version="1" comment="u-boot-khadas-vim2 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695184" version="1" comment="u-boot-khadas-vim2-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695185" version="1" comment="u-boot-libretech-ac is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695186" version="1" comment="u-boot-libretech-ac-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695187" version="1" comment="u-boot-libretech-cc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695188" version="1" comment="u-boot-libretech-cc-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695189" version="1" comment="u-boot-ls1012afrdmqspi is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695190" version="1" comment="u-boot-ls1012afrdmqspi-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695191" version="1" comment="u-boot-mvebudb-88f3720 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695192" version="1" comment="u-boot-mvebudb-88f3720-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695193" version="1" comment="u-boot-mvebudbarmada8k is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695194" version="1" comment="u-boot-mvebudbarmada8k-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695195" version="1" comment="u-boot-mvebuespressobin-88f3720 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695196" version="1" comment="u-boot-mvebuespressobin-88f3720-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695197" version="1" comment="u-boot-mvebumcbin-88f8040 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695198" version="1" comment="u-boot-mvebumcbin-88f8040-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695199" version="1" comment="u-boot-nanopia64 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695200" version="1" comment="u-boot-nanopia64-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695201" version="1" comment="u-boot-odroid-c2 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695202" version="1" comment="u-boot-odroid-c2-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695203" version="1" comment="u-boot-odroid-c4 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695204" version="1" comment="u-boot-odroid-c4-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695205" version="1" comment="u-boot-odroid-n2 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695206" version="1" comment="u-boot-odroid-n2-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695207" version="1" comment="u-boot-orangepipc2 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695208" version="1" comment="u-boot-orangepipc2-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695209" version="1" comment="u-boot-p2371-2180 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695210" version="1" comment="u-boot-p2371-2180-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695211" version="1" comment="u-boot-p2771-0000-500 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695212" version="1" comment="u-boot-p2771-0000-500-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695213" version="1" comment="u-boot-p3450-0000 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695214" version="1" comment="u-boot-p3450-0000-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695215" version="1" comment="u-boot-pine64plus is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695216" version="1" comment="u-boot-pine64plus-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695217" version="1" comment="u-boot-pinebook is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695218" version="1" comment="u-boot-pinebook-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695219" version="1" comment="u-boot-pinebook-pro-rk3399 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695220" version="1" comment="u-boot-pinebook-pro-rk3399-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695221" version="1" comment="u-boot-pineh64 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695222" version="1" comment="u-boot-pineh64-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695223" version="1" comment="u-boot-pinephone is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695224" version="1" comment="u-boot-pinephone-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695225" version="1" comment="u-boot-poplar is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695226" version="1" comment="u-boot-poplar-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695227" version="1" comment="u-boot-rock-pi-4-rk3399 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695228" version="1" comment="u-boot-rock-pi-4-rk3399-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695229" version="1" comment="u-boot-rock64-rk3328 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695230" version="1" comment="u-boot-rock64-rk3328-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695231" version="1" comment="u-boot-rock960-rk3399 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695232" version="1" comment="u-boot-rock960-rk3399-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695233" version="1" comment="u-boot-rockpro64-rk3399 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695234" version="1" comment="u-boot-rockpro64-rk3399-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695235" version="1" comment="u-boot-rpi3 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695236" version="1" comment="u-boot-rpi3-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695237" version="1" comment="u-boot-rpi4 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695238" version="1" comment="u-boot-rpi4-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684274" version="1" comment="u-boot-rpiarm64 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684275" version="1" comment="u-boot-rpiarm64-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684276" version="1" comment="u-boot-tools is &lt;2021.01-150300.7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695239" version="1" comment="u-boot-xilinxzynqmpvirt is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695240" version="1" comment="u-boot-xilinxzynqmpvirt-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695241" version="1" comment="u-boot-xilinxzynqmpzcu102rev10 is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695242" version="1" comment="u-boot-xilinxzynqmpzcu102rev10-doc is &lt;2021.01-150300.7.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695243" version="1" comment="u-boot-xilinxzynqmpgeneric is &lt;2020.01-150200.10.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695244" version="1" comment="u-boot-xilinxzynqmpgeneric-doc is &lt;2020.01-150200.10.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695245" version="1" comment="MozillaThunderbird is &lt;91.10.0-150200.8.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695246" version="1" comment="MozillaThunderbird-translations-common is &lt;91.10.0-150200.8.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695247" version="1" comment="MozillaThunderbird-translations-other is &lt;91.10.0-150200.8.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695248" version="1" comment="gimp is &lt;2.10.12-150300.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695249" version="1" comment="gimp-devel is &lt;2.10.12-150300.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684710" version="1" comment="gimp-lang is &lt;2.10.12-150300.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695250" version="1" comment="gimp-plugin-aa is &lt;2.10.12-150300.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695251" version="1" comment="libgimp-2_0-0 is &lt;2.10.12-150300.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695252" version="1" comment="libgimp-2_0-0-32bit is &lt;2.10.12-150300.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695253" version="1" comment="libgimpui-2_0-0 is &lt;2.10.12-150300.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695254" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.10.12-150300.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684277" version="1" comment="grub2 is &lt;2.04-150300.22.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684278" version="1" comment="grub2-arm64-efi is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695255" version="1" comment="grub2-arm64-efi-debug is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695256" version="1" comment="grub2-branding-upstream is &lt;2.04-150300.22.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684279" version="1" comment="grub2-i386-pc is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695257" version="1" comment="grub2-i386-pc-debug is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684280" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695258" version="1" comment="grub2-powerpc-ieee1275-debug is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684281" version="1" comment="grub2-s390x-emu is &lt;2.04-150300.22.20.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695259" version="1" comment="grub2-s390x-emu-debug is &lt;2.04-150300.22.20.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684282" version="1" comment="grub2-snapper-plugin is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684283" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684284" version="1" comment="grub2-x86_64-efi is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695260" version="1" comment="grub2-x86_64-efi-debug is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684774" version="1" comment="grub2-x86_64-xen is &lt;2.04-150300.22.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695261" version="1" comment="xen is &lt;4.14.5_02-150300.3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695262" version="1" comment="xen-devel is &lt;4.14.5_02-150300.3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695263" version="1" comment="xen-doc-html is &lt;4.14.5_02-150300.3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695264" version="1" comment="xen-libs is &lt;4.14.5_02-150300.3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695265" version="1" comment="xen-libs-32bit is &lt;4.14.5_02-150300.3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695266" version="1" comment="xen-tools is &lt;4.14.5_02-150300.3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695267" version="1" comment="xen-tools-domU is &lt;4.14.5_02-150300.3.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684778" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.5_02-150300.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695268" version="1" comment="python-Twisted-doc is &lt;19.10.0-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695269" version="1" comment="python2-Twisted is &lt;19.10.0-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684714" version="1" comment="python3-Twisted is &lt;19.10.0-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684287" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695270" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.36.3-150200.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684288" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695271" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.36.3-150200.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684289" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.3-150200.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684385" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684386" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684387" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695272" version="1" comment="webkit-jsc-4 is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684290" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684388" version="1" comment="webkit2gtk3-devel is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695273" version="1" comment="webkit2gtk3-minibrowser is &lt;2.36.3-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695274" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684890" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695275" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695276" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684891" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695277" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695278" version="1" comment="dtb-al is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695279" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695280" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695281" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695282" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695283" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695284" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695285" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695286" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695287" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695288" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695289" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695290" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695291" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695292" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695293" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695294" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695295" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695296" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695297" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695298" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695299" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695300" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.71.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695301" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684892" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695302" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684291" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684292" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695303" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695304" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695305" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695306" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.71.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695307" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.71.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695308" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.71.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684293" version="1" comment="kernel-default is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684294" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.71.2.150300.18.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695309" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.71.2.150300.18.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684295" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695310" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695311" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695312" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695313" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684296" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.71.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684428" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.71.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695314" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.71.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695315" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.71.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695316" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.71.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695317" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.71.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684297" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.71.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684429" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695318" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.71.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684298" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684430" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695319" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695320" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695321" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684431" version="1" comment="kernel-source is &lt;5.3.18-150300.59.71.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695322" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.71.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684432" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.71.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684299" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.71.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695323" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695324" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695325" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695326" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684893" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695327" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695328" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.71.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684551" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.71.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695329" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.71.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695330" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695331" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695332" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684718" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684719" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695333" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695334" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695335" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684720" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684721" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684722" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695336" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695337" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695338" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684779" version="1" comment="389-ds is &lt;1.4.4.19~git38.9951c1101-150300.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684780" version="1" comment="389-ds-devel is &lt;1.4.4.19~git38.9951c1101-150300.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695339" version="1" comment="389-ds-snmp is &lt;1.4.4.19~git38.9951c1101-150300.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684781" version="1" comment="lib389 is &lt;1.4.4.19~git38.9951c1101-150300.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684782" version="1" comment="libsvrcore0 is &lt;1.4.4.19~git38.9951c1101-150300.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661942" version="1" comment="libvirt is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661943" version="1" comment="libvirt-admin is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661944" version="1" comment="libvirt-bash-completion is &lt;7.1.0-6.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661945" version="1" comment="libvirt-client is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661946" version="1" comment="libvirt-daemon is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661947" version="1" comment="libvirt-daemon-config-network is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661948" version="1" comment="libvirt-daemon-config-nwfilter is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661949" version="1" comment="libvirt-daemon-driver-interface is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661950" version="1" comment="libvirt-daemon-driver-libxl is &lt;7.1.0-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661951" version="1" comment="libvirt-daemon-driver-lxc is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661952" version="1" comment="libvirt-daemon-driver-network is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661953" version="1" comment="libvirt-daemon-driver-nodedev is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661954" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661955" version="1" comment="libvirt-daemon-driver-qemu is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661956" version="1" comment="libvirt-daemon-driver-secret is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661957" version="1" comment="libvirt-daemon-driver-storage is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661958" version="1" comment="libvirt-daemon-driver-storage-core is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661959" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662424" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661960" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661961" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661962" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661963" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661964" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;7.1.0-6.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661965" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661966" version="1" comment="libvirt-daemon-hooks is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661967" version="1" comment="libvirt-daemon-lxc is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661968" version="1" comment="libvirt-daemon-qemu is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661969" version="1" comment="libvirt-daemon-xen is &lt;7.1.0-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661970" version="1" comment="libvirt-devel is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662425" version="1" comment="libvirt-devel-32bit is &lt;7.1.0-6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661971" version="1" comment="libvirt-doc is &lt;7.1.0-6.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661941" version="1" comment="libvirt-libs is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661972" version="1" comment="libvirt-lock-sanlock is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661973" version="1" comment="libvirt-nss is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662426" version="1" comment="wireshark-plugin-libvirt is &lt;7.1.0-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664059" version="1" comment="qemu-s390 is &lt;4.2.1-11.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684389" version="1" comment="gvim is &lt;8.2.5038-150000.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684300" version="1" comment="vim is &lt;8.2.5038-150000.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684301" version="1" comment="vim-data is &lt;8.2.5038-150000.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684302" version="1" comment="vim-data-common is &lt;8.2.5038-150000.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684303" version="1" comment="vim-small is &lt;8.2.5038-150000.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684894" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695340" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684895" version="1" comment="ruby2.5-rubygem-activesupport-5_1 is &lt;5.1.4-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695341" version="1" comment="ruby2.5-rubygem-activesupport-doc-5_1 is &lt;5.1.4-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695342" version="1" comment="kernel-debug-base is &lt;4.12.14-150100.197.114.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693407" version="1" comment="kernel-default-man is &lt;4.12.14-150100.197.114.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695343" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-150100.197.114.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695344" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.114.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695345" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.114.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695346" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.114.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695347" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.114.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695348" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-150100.197.114.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683275" version="1" comment="golang-github-prometheus-alertmanager is &lt;0.23.0-150100.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664553" version="1" comment="log4j-manual is &lt;1.2.17-5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682887" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.3.0-150100.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684896" version="1" comment="drbd is &lt;9.0.29~0+git.9a7bc817-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695349" version="1" comment="drbd-kmp-64kb is &lt;9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684897" version="1" comment="drbd-kmp-default is &lt;9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695350" version="1" comment="drbd-kmp-preempt is &lt;9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695351" version="1" comment="drbd-kmp-rt is &lt;9.0.29~0+git.9a7bc817_k5.3.18_8.13-150300.3.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695352" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695353" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695354" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684723" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684724" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695355" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695356" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695357" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684725" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684726" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.62.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684727" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695358" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695359" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695360" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695361" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684898" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695362" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695363" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684899" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695364" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695365" version="1" comment="dtb-al is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695366" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695367" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695368" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695369" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695370" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695371" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695372" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695373" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695374" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695375" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695376" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695377" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695378" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695379" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695380" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695381" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695382" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695383" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695384" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695385" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695386" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695387" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.76.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695388" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684900" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695389" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684304" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684305" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695390" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695391" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695392" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695393" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.76.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695394" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.76.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695395" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.76.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684306" version="1" comment="kernel-default is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684307" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.76.1.150300.18.45.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695396" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.76.1.150300.18.45.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684308" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695397" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695398" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695399" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695400" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684309" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684433" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695401" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695402" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.76.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695403" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.76.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695404" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.76.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684310" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684434" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695405" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684311" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684435" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695406" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695407" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695408" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684436" version="1" comment="kernel-source is &lt;5.3.18-150300.59.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695409" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684437" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684312" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.76.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695410" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695411" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695412" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695413" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684901" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695414" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695415" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.76.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684552" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.76.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695416" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684313" version="1" comment="libpython3_9-1_0 is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695417" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.13-150300.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684314" version="1" comment="python39 is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695418" version="1" comment="python39-32bit is &lt;3.9.13-150300.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684315" version="1" comment="python39-base is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695419" version="1" comment="python39-base-32bit is &lt;3.9.13-150300.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684316" version="1" comment="python39-curses is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684317" version="1" comment="python39-dbm is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684318" version="1" comment="python39-devel is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695420" version="1" comment="python39-doc is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695421" version="1" comment="python39-doc-devhelp is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684319" version="1" comment="python39-idle is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695422" version="1" comment="python39-testsuite is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684320" version="1" comment="python39-tk is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684438" version="1" comment="python39-tools is &lt;3.9.13-150300.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684321" version="1" comment="python3-salt is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684322" version="1" comment="salt is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684783" version="1" comment="salt-api is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684323" version="1" comment="salt-bash-completion is &lt;3004-150300.53.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684784" version="1" comment="salt-cloud is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684324" version="1" comment="salt-doc is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684785" version="1" comment="salt-fish-completion is &lt;3004-150300.53.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684786" version="1" comment="salt-master is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684325" version="1" comment="salt-minion is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684787" version="1" comment="salt-proxy is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684788" version="1" comment="salt-ssh is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684789" version="1" comment="salt-standalone-formulas-configuration is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684790" version="1" comment="salt-syndic is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684838" version="1" comment="salt-transactional-update is &lt;3004-150300.53.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684326" version="1" comment="salt-zsh-completion is &lt;3004-150300.53.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684390" version="1" comment="liblouis-data is &lt;3.11.0-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684391" version="1" comment="liblouis-devel is &lt;3.11.0-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695423" version="1" comment="liblouis-doc is &lt;3.11.0-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695424" version="1" comment="liblouis-tools is &lt;3.11.0-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684392" version="1" comment="liblouis19 is &lt;3.11.0-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684393" version="1" comment="python3-louis is &lt;3.11.0-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684839" version="1" comment="apache2-mod_php7 is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684840" version="1" comment="php7 is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684841" version="1" comment="php7-bcmath is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684842" version="1" comment="php7-bz2 is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684843" version="1" comment="php7-calendar is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684844" version="1" comment="php7-ctype is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684845" version="1" comment="php7-curl is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684846" version="1" comment="php7-dba is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684847" version="1" comment="php7-devel is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684848" version="1" comment="php7-dom is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684715" version="1" comment="php7-embed is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684849" version="1" comment="php7-enchant is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684850" version="1" comment="php7-exif is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684851" version="1" comment="php7-fastcgi is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684852" version="1" comment="php7-fileinfo is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695425" version="1" comment="php7-firebird is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684853" version="1" comment="php7-fpm is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684854" version="1" comment="php7-ftp is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684855" version="1" comment="php7-gd is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684856" version="1" comment="php7-gettext is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684857" version="1" comment="php7-gmp is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684858" version="1" comment="php7-iconv is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684859" version="1" comment="php7-intl is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684860" version="1" comment="php7-json is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684861" version="1" comment="php7-ldap is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684862" version="1" comment="php7-mbstring is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684863" version="1" comment="php7-mysql is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684864" version="1" comment="php7-odbc is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684865" version="1" comment="php7-opcache is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684866" version="1" comment="php7-openssl is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684867" version="1" comment="php7-pcntl is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684868" version="1" comment="php7-pdo is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684869" version="1" comment="php7-pgsql is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684870" version="1" comment="php7-phar is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684871" version="1" comment="php7-posix is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684872" version="1" comment="php7-readline is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684873" version="1" comment="php7-shmop is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684874" version="1" comment="php7-snmp is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684875" version="1" comment="php7-soap is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684876" version="1" comment="php7-sockets is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684877" version="1" comment="php7-sodium is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684878" version="1" comment="php7-sqlite is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684879" version="1" comment="php7-sysvmsg is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684880" version="1" comment="php7-sysvsem is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684881" version="1" comment="php7-sysvshm is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695426" version="1" comment="php7-test is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684882" version="1" comment="php7-tidy is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684883" version="1" comment="php7-tokenizer is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684884" version="1" comment="php7-xmlreader is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684885" version="1" comment="php7-xmlrpc is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684886" version="1" comment="php7-xmlwriter is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684887" version="1" comment="php7-xsl is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684888" version="1" comment="php7-zip is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684889" version="1" comment="php7-zlib is &lt;7.4.6-150200.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684902" version="1" comment="ruby2.5-rubygem-rack is &lt;2.0.8-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695427" version="1" comment="ruby2.5-rubygem-rack-doc is &lt;2.0.8-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695428" version="1" comment="ruby2.5-rubygem-rack-testsuite is &lt;2.0.8-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684329" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-150200.11.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695446" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-150200.11.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684330" version="1" comment="libopenssl1_1 is &lt;1.1.1d-150200.11.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684331" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-150200.11.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684332" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-150200.11.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684333" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-150200.11.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684334" version="1" comment="openssl-1_1 is &lt;1.1.1d-150200.11.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695447" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-150200.11.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009693136" version="1" comment="liblouis14 is &lt;3.3.0-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684791" version="1" comment="qemu is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684792" version="1" comment="qemu-SLOF is &lt;5.2.0-150300.115.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695459" version="1" comment="qemu-arm is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695460" version="1" comment="qemu-audio-alsa is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695461" version="1" comment="qemu-audio-pa is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695462" version="1" comment="qemu-audio-spice is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684797" version="1" comment="qemu-block-curl is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695463" version="1" comment="qemu-block-dmg is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695464" version="1" comment="qemu-block-gluster is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684798" version="1" comment="qemu-block-iscsi is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695465" version="1" comment="qemu-block-nfs is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684799" version="1" comment="qemu-block-rbd is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684800" version="1" comment="qemu-block-ssh is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684801" version="1" comment="qemu-chardev-baum is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695466" version="1" comment="qemu-chardev-spice is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695467" version="1" comment="qemu-extra is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684803" version="1" comment="qemu-guest-agent is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695468" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695469" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695470" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695471" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695472" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695473" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695474" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684810" version="1" comment="qemu-ipxe is &lt;1.0.0+-150300.115.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695475" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684811" version="1" comment="qemu-ksm is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684812" version="1" comment="qemu-kvm is &lt;5.2.0-150300.115.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684813" version="1" comment="qemu-lang is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695476" version="1" comment="qemu-linux-user is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695477" version="1" comment="qemu-microvm is &lt;5.2.0-150300.115.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695478" version="1" comment="qemu-ppc is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695479" version="1" comment="qemu-s390x is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684816" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-150300.115.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684817" version="1" comment="qemu-sgabios is &lt;8-150300.115.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684818" version="1" comment="qemu-skiboot is &lt;5.2.0-150300.115.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695480" version="1" comment="qemu-testsuite is &lt;5.2.0-150300.115.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684346" version="1" comment="qemu-tools is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684819" version="1" comment="qemu-ui-curses is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695481" version="1" comment="qemu-ui-gtk is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695482" version="1" comment="qemu-ui-opengl is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695483" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695484" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684824" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-150300.115.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695485" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695486" version="1" comment="qemu-x86 is &lt;5.2.0-150300.115.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684403" version="1" comment="ImageMagick is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684404" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684405" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684406" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695488" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-150200.10.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695489" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-150200.10.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695490" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684407" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695491" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-150200.10.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684408" version="1" comment="libMagick++-devel is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695492" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-150200.10.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684409" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695493" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684410" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695494" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684442" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-150200.10.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664290" version="1" comment="log4j12 is &lt;1.2.17-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664306" version="1" comment="log4j12-javadoc is &lt;1.2.17-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664307" version="1" comment="log4j12-manual is &lt;1.2.17-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684829" version="1" comment="dpdk is &lt;19.11.4-150300.13.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684830" version="1" comment="dpdk-devel is &lt;19.11.4-150300.13.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695497" version="1" comment="dpdk-doc is &lt;19.11.4-150300.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695498" version="1" comment="dpdk-examples is &lt;19.11.4-150300.13.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684831" version="1" comment="dpdk-kmp-default is &lt;19.11.4_k5.3.18_150300.59.76-150300.13.3 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695499" version="1" comment="dpdk-kmp-preempt is &lt;19.11.4_k5.3.18_150300.59.76-150300.13.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684832" version="1" comment="dpdk-thunderx is &lt;19.11.4-150300.13.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684833" version="1" comment="dpdk-thunderx-devel is &lt;19.11.4-150300.13.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695500" version="1" comment="dpdk-thunderx-doc is &lt;19.11.4-150300.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695501" version="1" comment="dpdk-thunderx-examples is &lt;19.11.4-150300.13.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684834" version="1" comment="dpdk-thunderx-kmp-default is &lt;19.11.4_k5.3.18_150300.59.76-150300.13.3 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695502" version="1" comment="dpdk-thunderx-kmp-preempt is &lt;19.11.4_k5.3.18_150300.59.76-150300.13.3 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695503" version="1" comment="dpdk-thunderx-tools is &lt;19.11.4-150300.13.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684835" version="1" comment="dpdk-tools is &lt;19.11.4-150300.13.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684836" version="1" comment="libdpdk-20_0 is &lt;19.11.4-150300.13.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695496" version="1" comment="libdpdk-18_11 is &lt;18.11.9-150100.4.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669747" version="1" comment="conmon is &lt;2.0.30-150300.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669744" version="1" comment="libcontainers-common is &lt;20210626-150300.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669745" version="1" comment="libseccomp-devel is &lt;2.5.3-150300.10.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669860" version="1" comment="libseccomp-tools is &lt;2.5.3-150300.10.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669746" version="1" comment="libseccomp2 is &lt;2.5.3-150300.10.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669861" version="1" comment="libseccomp2-32bit is &lt;2.5.3-150300.10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669748" version="1" comment="podman is &lt;3.4.4-150300.9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669749" version="1" comment="podman-cni-config is &lt;3.4.4-150300.9.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684347" version="1" comment="libekmfweb1 is &lt;2.15.1-150300.8.24.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684348" version="1" comment="libekmfweb1-devel is &lt;2.15.1-150300.8.24.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684349" version="1" comment="osasnmpd is &lt;2.15.1-150300.8.24.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684350" version="1" comment="s390-tools is &lt;2.15.1-150300.8.24.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684351" version="1" comment="s390-tools-hmcdrvfs is &lt;2.15.1-150300.8.24.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684352" version="1" comment="s390-tools-zdsfs is &lt;2.15.1-150300.8.24.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698553" version="1" comment="MozillaFirefox is &lt;91.11.0-150200.152.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699771" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.11.0-150200.152.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699436" version="1" comment="MozillaFirefox-devel is &lt;91.11.0-150200.152.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698555" version="1" comment="MozillaFirefox-translations-common is &lt;91.11.0-150200.152.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698556" version="1" comment="MozillaFirefox-translations-other is &lt;91.11.0-150200.152.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699772" version="1" comment="MozillaThunderbird is &lt;91.11.0-150200.8.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699773" version="1" comment="MozillaThunderbird-translations-common is &lt;91.11.0-150200.8.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699774" version="1" comment="MozillaThunderbird-translations-other is &lt;91.11.0-150200.8.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684553" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695431" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684554" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684555" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695432" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695433" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695434" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695435" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695436" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684556" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695437" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695438" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695487" version="1" comment="dfu-tool is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684395" version="1" comment="fwupd is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684396" version="1" comment="fwupd-devel is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684397" version="1" comment="fwupd-lang is &lt;1.5.8-150300.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684398" version="1" comment="fwupdtpmevlog is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684399" version="1" comment="libfwupd2 is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684400" version="1" comment="libfwupdplugin1 is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684401" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684402" version="1" comment="typelib-1_0-FwupdPlugin-1_0 is &lt;1.5.8-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698671" version="1" comment="ldirectord is &lt;4.8.0+git30.d0077df0-150300.8.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698672" version="1" comment="monitoring-plugins-metadata is &lt;4.8.0+git30.d0077df0-150300.8.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698673" version="1" comment="resource-agents is &lt;4.8.0+git30.d0077df0-150300.8.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698460" version="1" comment="curl is &lt;7.66.0-150200.4.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698461" version="1" comment="libcurl-devel is &lt;7.66.0-150200.4.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699775" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-150200.4.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698462" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698463" version="1" comment="libcurl4-32bit is &lt;7.66.0-150200.4.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698464" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-150200.11.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699776" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-150200.11.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698465" version="1" comment="libopenssl1_1 is &lt;1.1.1d-150200.11.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698466" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-150200.11.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698467" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-150200.11.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698468" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-150200.11.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698469" version="1" comment="openssl-1_1 is &lt;1.1.1d-150200.11.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699777" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-150200.11.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684356" version="1" comment="fwupdate is &lt;12-150100.11.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684357" version="1" comment="fwupdate-devel is &lt;12-150100.11.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684358" version="1" comment="fwupdate-efi is &lt;12-150100.11.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684359" version="1" comment="libfwup1 is &lt;12-150100.11.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684369" version="1" comment="containerd is &lt;1.6.6-150000.73.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684370" version="1" comment="containerd-ctr is &lt;1.6.6-150000.73.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684371" version="1" comment="docker is &lt;20.10.17_ce-150000.166.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684372" version="1" comment="docker-bash-completion is &lt;20.10.17_ce-150000.166.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684373" version="1" comment="docker-fish-completion is &lt;20.10.17_ce-150000.166.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695439" version="1" comment="docker-kubic is &lt;20.10.17_ce-150000.166.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695440" version="1" comment="docker-kubic-bash-completion is &lt;20.10.17_ce-150000.166.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695441" version="1" comment="docker-kubic-fish-completion is &lt;20.10.17_ce-150000.166.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695442" version="1" comment="docker-kubic-kubeadm-criconfig is &lt;20.10.17_ce-150000.166.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695443" version="1" comment="docker-kubic-zsh-completion is &lt;20.10.17_ce-150000.166.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695444" version="1" comment="docker-zsh-completion is &lt;20.10.17_ce-150000.166.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684374" version="1" comment="runc is &lt;1.1.3-150000.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684353" version="1" comment="apache2 is &lt;2.4.51-150200.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684826" version="1" comment="apache2-devel is &lt;2.4.51-150200.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684827" version="1" comment="apache2-doc is &lt;2.4.51-150200.3.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684716" version="1" comment="apache2-event is &lt;2.4.51-150200.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695495" version="1" comment="apache2-example-pages is &lt;2.4.51-150200.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684354" version="1" comment="apache2-prefork is &lt;2.4.51-150200.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684355" version="1" comment="apache2-utils is &lt;2.4.51-150200.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684828" version="1" comment="apache2-worker is &lt;2.4.51-150200.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684335" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695448" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684336" version="1" comment="python is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695449" version="1" comment="python-32bit is &lt;2.7.18-150000.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684337" version="1" comment="python-base is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695450" version="1" comment="python-base-32bit is &lt;2.7.18-150000.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684728" version="1" comment="python-curses is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695451" version="1" comment="python-demo is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684729" version="1" comment="python-devel is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695452" version="1" comment="python-doc is &lt;2.7.18-150000.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695453" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684730" version="1" comment="python-gdbm is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695454" version="1" comment="python-idle is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684394" version="1" comment="python-tk is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684731" version="1" comment="python-xml is &lt;2.7.18-150000.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670273" version="1" comment="libnbd is &lt;1.9.3-150300.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670274" version="1" comment="libnbd-bash-completion is &lt;1.9.3-150300.8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670275" version="1" comment="libnbd-devel is &lt;1.9.3-150300.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670276" version="1" comment="libnbd0 is &lt;1.9.3-150300.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670277" version="1" comment="nbdfuse is &lt;1.9.3-150300.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698562" version="1" comment="crash is &lt;7.2.9-150300.23.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698563" version="1" comment="crash-devel is &lt;7.2.9-150300.23.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699778" version="1" comment="crash-doc is &lt;7.2.9-150300.23.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699779" version="1" comment="crash-eppic is &lt;7.2.9-150300.23.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699780" version="1" comment="crash-gcore is &lt;7.2.9-150300.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698564" version="1" comment="crash-kmp-64kb is &lt;7.2.9_k5.3.18_150300.59.76-150300.23.10.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698565" version="1" comment="crash-kmp-default is &lt;7.2.9_k5.3.18_150300.59.76-150300.23.10.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699781" version="1" comment="crash-kmp-preempt is &lt;7.2.9_k5.3.18_150300.59.76-150300.23.10.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699782" version="1" comment="freerdp is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699783" version="1" comment="freerdp-devel is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699784" version="1" comment="freerdp-proxy is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699785" version="1" comment="freerdp-server is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699786" version="1" comment="freerdp-wayland is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699787" version="1" comment="libfreerdp2 is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699788" version="1" comment="libuwac0-0 is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699789" version="1" comment="libwinpr2 is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699790" version="1" comment="uwac0-0-devel is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699791" version="1" comment="winpr2-devel is &lt;2.1.2-150200.15.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698470" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699792" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698471" version="1" comment="python3 is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698472" version="1" comment="python3-base is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698473" version="1" comment="python3-curses is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698474" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698475" version="1" comment="python3-devel is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699793" version="1" comment="python3-doc is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699794" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698476" version="1" comment="python3-idle is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699795" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698477" version="1" comment="python3-tk is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698566" version="1" comment="python3-tools is &lt;3.6.15-150300.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684361" version="1" comment="libpcre1 is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684362" version="1" comment="libpcre1-32bit is &lt;8.45-150000.20.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684363" version="1" comment="libpcre16-0 is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695507" version="1" comment="libpcre16-0-32bit is &lt;8.45-150000.20.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684364" version="1" comment="libpcrecpp0 is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684365" version="1" comment="libpcrecpp0-32bit is &lt;8.45-150000.20.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684366" version="1" comment="libpcreposix0 is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695508" version="1" comment="libpcreposix0-32bit is &lt;8.45-150000.20.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684367" version="1" comment="pcre-devel is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695509" version="1" comment="pcre-devel-static is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695510" version="1" comment="pcre-doc is &lt;8.45-150000.20.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684368" version="1" comment="pcre-tools is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698478" version="1" comment="xorg-x11-server is &lt;1.20.3-150200.22.5.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698479" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-150200.22.5.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698567" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-150200.22.5.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699796" version="1" comment="xorg-x11-server-source is &lt;1.20.3-150200.22.5.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699797" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-150200.22.5.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699798" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699799" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699800" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698628" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698629" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699801" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699802" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699803" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698630" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698631" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698632" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699804" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699805" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699806" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695504" version="1" comment="oracleasm-kmp-64kb is &lt;2.0.8_k5.3.18_150300.59.76-150300.19.5.3 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684837" version="1" comment="oracleasm-kmp-default is &lt;2.0.8_k5.3.18_150300.59.76-150300.19.5.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695505" version="1" comment="oracleasm-kmp-preempt is &lt;2.0.8_k5.3.18_150300.59.76-150300.19.5.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695506" version="1" comment="oracleasm-kmp-rt is &lt;2.0.8_k5.3.18_8.13-150300.19.5.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684717" version="1" comment="python2-PyJWT is &lt;1.7.1-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684360" version="1" comment="python3-PyJWT is &lt;1.7.1-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698480" version="1" comment="libp11-kit0 is &lt;0.23.2-150000.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698481" version="1" comment="libp11-kit0-32bit is &lt;0.23.2-150000.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698482" version="1" comment="p11-kit is &lt;0.23.2-150000.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698624" version="1" comment="p11-kit-32bit is &lt;0.23.2-150000.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698483" version="1" comment="p11-kit-devel is &lt;0.23.2-150000.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698484" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-150000.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699807" version="1" comment="p11-kit-nss-trust-32bit is &lt;0.23.2-150000.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698485" version="1" comment="p11-kit-tools is &lt;0.23.2-150000.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699808" version="1" comment="kernel-debug-base is &lt;4.12.14-150100.197.117.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699324" version="1" comment="kernel-default-man is &lt;4.12.14-150100.197.117.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699809" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-150100.197.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699810" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.117.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699811" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.117.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699812" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.117.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699813" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.117.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699814" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-150100.197.117.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698663" version="1" comment="nodejs14 is &lt;14.20.0-150200.15.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698664" version="1" comment="nodejs14-devel is &lt;14.20.0-150200.15.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698665" version="1" comment="nodejs14-docs is &lt;14.20.0-150200.15.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698666" version="1" comment="npm14 is &lt;14.20.0-150200.15.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698667" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698668" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698669" version="1" comment="nodejs12-docs is &lt;12.22.12-150200.4.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698670" version="1" comment="npm12 is &lt;12.22.12-150200.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698650" version="1" comment="dovecot23 is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698651" version="1" comment="dovecot23-backend-mysql is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698652" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698653" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698654" version="1" comment="dovecot23-devel is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698655" version="1" comment="dovecot23-fts is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698656" version="1" comment="dovecot23-fts-lucene is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698657" version="1" comment="dovecot23-fts-solr is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698658" version="1" comment="dovecot23-fts-squat is &lt;2.3.15-150200.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698524" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699883" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.36.4-150200.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698525" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699884" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.36.4-150200.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698526" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.4-150200.38.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698558" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698559" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698560" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699885" version="1" comment="webkit-jsc-4 is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698527" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698561" version="1" comment="webkit2gtk3-devel is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699886" version="1" comment="webkit2gtk3-minibrowser is &lt;2.36.4-150200.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698590" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.332-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699821" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.332-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698591" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.332-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698592" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.332-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698593" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.332-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699822" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.332-150000.3.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699823" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.332-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698489" version="1" comment="libfreebl3 is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698490" version="1" comment="libfreebl3-32bit is &lt;3.79-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698491" version="1" comment="libfreebl3-hmac is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698492" version="1" comment="libfreebl3-hmac-32bit is &lt;3.79-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698493" version="1" comment="libsoftokn3 is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698494" version="1" comment="libsoftokn3-32bit is &lt;3.79-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698495" version="1" comment="libsoftokn3-hmac is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698496" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.79-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698497" version="1" comment="mozilla-nspr is &lt;4.34-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698498" version="1" comment="mozilla-nspr-32bit is &lt;4.34-150000.3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698499" version="1" comment="mozilla-nspr-devel is &lt;4.34-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698500" version="1" comment="mozilla-nss is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698501" version="1" comment="mozilla-nss-32bit is &lt;3.79-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698502" version="1" comment="mozilla-nss-certs is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698503" version="1" comment="mozilla-nss-certs-32bit is &lt;3.79-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698504" version="1" comment="mozilla-nss-devel is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698505" version="1" comment="mozilla-nss-sysinit is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699820" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.79-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698506" version="1" comment="mozilla-nss-tools is &lt;3.79-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700996" version="1" comment="dirmngr is &lt;2.2.27-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700997" version="1" comment="gpg2 is &lt;2.2.27-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700998" version="1" comment="gpg2-lang is &lt;2.2.27-150300.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698528" version="1" comment="logrotate is &lt;3.13.0-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701899" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701852" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701900" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701901" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701853" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701902" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701903" version="1" comment="dtb-al is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701904" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701905" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701906" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701907" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701908" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701909" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701910" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701911" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701912" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701913" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701914" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701915" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701916" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701917" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701918" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701919" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701920" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701921" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701922" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701923" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701924" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701925" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.87.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701926" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701854" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701927" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701828" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701829" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701928" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701929" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701930" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701931" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.87.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701932" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.87.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701933" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.87.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701830" version="1" comment="kernel-default is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701831" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.87.1.150300.18.50.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701934" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.87.1.150300.18.50.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701832" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701935" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701936" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701937" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701938" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701833" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701841" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701939" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701940" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.87.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701941" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.87.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701942" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.87.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701834" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701842" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701943" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701835" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701843" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701944" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701945" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701946" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701844" version="1" comment="kernel-source is &lt;5.3.18-150300.59.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701947" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701845" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701836" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.87.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701948" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701949" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701950" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701951" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701855" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701952" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701953" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.87.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701846" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.87.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701954" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.87.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698580" version="1" comment="git is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698581" version="1" comment="git-arch is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698530" version="1" comment="git-core is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699890" version="1" comment="git-credential-gnome-keyring is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699891" version="1" comment="git-credential-libsecret is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698582" version="1" comment="git-cvs is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698583" version="1" comment="git-daemon is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698584" version="1" comment="git-doc is &lt;2.35.3-150300.10.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698585" version="1" comment="git-email is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698586" version="1" comment="git-gui is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699892" version="1" comment="git-p4 is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698587" version="1" comment="git-svn is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698588" version="1" comment="git-web is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698589" version="1" comment="gitk is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698531" version="1" comment="perl-Git is &lt;2.35.3-150300.10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698659" version="1" comment="nodejs16 is &lt;16.16.0-150300.7.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698660" version="1" comment="nodejs16-devel is &lt;16.16.0-150300.7.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698661" version="1" comment="nodejs16-docs is &lt;16.16.0-150300.7.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698662" version="1" comment="npm16 is &lt;16.16.0-150300.7.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698649" version="1" comment="squid is &lt;4.17-150000.5.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699889" version="1" comment="python-M2Crypto-doc is &lt;0.35.2-150000.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698637" version="1" comment="python2-M2Crypto is &lt;0.35.2-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698529" version="1" comment="python3-M2Crypto is &lt;0.35.2-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701140" version="1" comment="aws-iam-authenticator is &lt;0.5.3-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703378" version="1" comment="ctdb is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703462" version="1" comment="ctdb-pcp-pmda is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703347" version="1" comment="ldb-tools is &lt;2.4.3-150300.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703348" version="1" comment="libldb-devel is &lt;2.4.3-150300.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703349" version="1" comment="libldb2 is &lt;2.4.3-150300.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703350" version="1" comment="libldb2-32bit is &lt;2.4.3-150300.3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703351" version="1" comment="libsamba-policy-devel is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703352" version="1" comment="libsamba-policy-python3-devel is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703353" version="1" comment="libsamba-policy0-python3 is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703463" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703464" version="1" comment="libsamba-policy0-python3-64bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703354" version="1" comment="python3-ldb is &lt;2.4.3-150300.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703465" version="1" comment="python3-ldb-32bit is &lt;2.4.3-150300.3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703355" version="1" comment="python3-ldb-devel is &lt;2.4.3-150300.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703356" version="1" comment="samba is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703377" version="1" comment="samba-ad-dc is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703357" version="1" comment="samba-ad-dc-libs is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703358" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703359" version="1" comment="samba-ceph is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703360" version="1" comment="samba-client is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703361" version="1" comment="samba-client-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703466" version="1" comment="samba-client-64bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703362" version="1" comment="samba-client-libs is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703363" version="1" comment="samba-client-libs-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703364" version="1" comment="samba-devel is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703365" version="1" comment="samba-devel-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703467" version="1" comment="samba-doc is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703366" version="1" comment="samba-dsdb-modules is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703367" version="1" comment="samba-gpupdate is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703368" version="1" comment="samba-ldb-ldap is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703369" version="1" comment="samba-libs is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703370" version="1" comment="samba-libs-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703468" version="1" comment="samba-libs-64bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703371" version="1" comment="samba-libs-python3 is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703469" version="1" comment="samba-libs-python3-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703470" version="1" comment="samba-libs-python3-64bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703372" version="1" comment="samba-python3 is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703471" version="1" comment="samba-test is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703373" version="1" comment="samba-tool is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703374" version="1" comment="samba-winbind is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703375" version="1" comment="samba-winbind-libs is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703376" version="1" comment="samba-winbind-libs-32bit is &lt;4.15.8+git.500.d5910280cc7-150300.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702144" version="1" comment="ruby2.5-rubygem-tzinfo is &lt;1.2.4-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702281" version="1" comment="ruby2.5-rubygem-tzinfo-doc is &lt;1.2.4-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702282" version="1" comment="ruby2.5-rubygem-tzinfo-testsuite is &lt;1.2.4-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702559" version="1" comment="xen is &lt;4.14.5_04-150300.3.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702560" version="1" comment="xen-devel is &lt;4.14.5_04-150300.3.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702561" version="1" comment="xen-doc-html is &lt;4.14.5_04-150300.3.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702562" version="1" comment="xen-libs is &lt;4.14.5_04-150300.3.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702563" version="1" comment="xen-libs-32bit is &lt;4.14.5_04-150300.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702564" version="1" comment="xen-tools is &lt;4.14.5_04-150300.3.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702565" version="1" comment="xen-tools-domU is &lt;4.14.5_04-150300.3.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702482" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.5_04-150300.3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702704" version="1" comment="booth is &lt;1.0-150300.18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703346" version="1" comment="booth-test is &lt;1.0-150300.18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702473" version="1" comment="MozillaFirefox is &lt;91.12.0-150200.152.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702566" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.12.0-150200.152.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702567" version="1" comment="MozillaFirefox-devel is &lt;91.12.0-150200.152.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702475" version="1" comment="MozillaFirefox-translations-common is &lt;91.12.0-150200.152.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702476" version="1" comment="MozillaFirefox-translations-other is &lt;91.12.0-150200.152.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698532" version="1" comment="dwarves is &lt;1.22-150300.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698533" version="1" comment="elfutils is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698534" version="1" comment="elfutils-lang is &lt;0.177-150300.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698535" version="1" comment="libasm-devel is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698536" version="1" comment="libasm1 is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699893" version="1" comment="libasm1-32bit is &lt;0.177-150300.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698537" version="1" comment="libdw-devel is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698538" version="1" comment="libdw1 is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698539" version="1" comment="libdw1-32bit is &lt;0.177-150300.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698540" version="1" comment="libdwarves-devel is &lt;1.22-150300.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698541" version="1" comment="libdwarves-devel-32bit is &lt;1.22-150300.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698542" version="1" comment="libdwarves1 is &lt;1.22-150300.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698543" version="1" comment="libdwarves1-32bit is &lt;1.22-150300.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698544" version="1" comment="libebl-devel is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698545" version="1" comment="libebl-plugins is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698546" version="1" comment="libebl-plugins-32bit is &lt;0.177-150300.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698547" version="1" comment="libelf-devel is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699894" version="1" comment="libelf-devel-32bit is &lt;0.177-150300.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698548" version="1" comment="libelf1 is &lt;0.177-150300.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698549" version="1" comment="libelf1-32bit is &lt;0.177-150300.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695429" version="1" comment="gimp-plugins-python is &lt;2.10.12-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695445" version="1" comment="mokutil is &lt;0.4.0-150200.4.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698508" version="1" comment="xscreensaver is &lt;5.44-150000.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698509" version="1" comment="xscreensaver-data is &lt;5.44-150000.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699824" version="1" comment="xscreensaver-data-extra is &lt;5.44-150000.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698510" version="1" comment="xscreensaver-lang is &lt;5.44-150000.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698522" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699882" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698523" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698557" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698627" version="1" comment="tiff is &lt;4.0.9-150000.45.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701251" version="1" comment="libpcre2-16-0 is &lt;10.31-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701335" version="1" comment="libpcre2-16-0-32bit is &lt;10.31-150000.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701252" version="1" comment="libpcre2-32-0 is &lt;10.31-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701336" version="1" comment="libpcre2-32-0-32bit is &lt;10.31-150000.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701253" version="1" comment="libpcre2-8-0 is &lt;10.31-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701337" version="1" comment="libpcre2-8-0-32bit is &lt;10.31-150000.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701254" version="1" comment="libpcre2-posix2 is &lt;10.31-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701338" version="1" comment="libpcre2-posix2-32bit is &lt;10.31-150000.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701255" version="1" comment="pcre2-devel is &lt;10.31-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701339" version="1" comment="pcre2-devel-static is &lt;10.31-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701340" version="1" comment="pcre2-doc is &lt;10.31-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701341" version="1" comment="pcre2-tools is &lt;10.31-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701256" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.10-150000.3.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701342" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr7.10-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701257" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.10-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701343" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr7.10-150000.3.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701258" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.10-150000.3.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701344" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr7.10-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701259" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.10-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701345" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr7.10-150000.3.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702201" version="1" comment="u-boot-avnetultra96rev1 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702202" version="1" comment="u-boot-avnetultra96rev1-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702203" version="1" comment="u-boot-bananapim64 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702204" version="1" comment="u-boot-bananapim64-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702205" version="1" comment="u-boot-dragonboard410c is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702206" version="1" comment="u-boot-dragonboard410c-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702207" version="1" comment="u-boot-dragonboard820c is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702208" version="1" comment="u-boot-dragonboard820c-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702209" version="1" comment="u-boot-evb-rk3399 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702210" version="1" comment="u-boot-evb-rk3399-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702211" version="1" comment="u-boot-firefly-rk3399 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702212" version="1" comment="u-boot-firefly-rk3399-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702213" version="1" comment="u-boot-geekbox is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702214" version="1" comment="u-boot-geekbox-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702215" version="1" comment="u-boot-hikey is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702216" version="1" comment="u-boot-hikey-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702217" version="1" comment="u-boot-khadas-vim is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702218" version="1" comment="u-boot-khadas-vim-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702219" version="1" comment="u-boot-khadas-vim2 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702220" version="1" comment="u-boot-khadas-vim2-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702221" version="1" comment="u-boot-libretech-ac is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702222" version="1" comment="u-boot-libretech-ac-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702223" version="1" comment="u-boot-libretech-cc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702224" version="1" comment="u-boot-libretech-cc-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702225" version="1" comment="u-boot-ls1012afrdmqspi is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702226" version="1" comment="u-boot-ls1012afrdmqspi-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702227" version="1" comment="u-boot-mvebudb-88f3720 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702228" version="1" comment="u-boot-mvebudb-88f3720-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702229" version="1" comment="u-boot-mvebudbarmada8k is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702230" version="1" comment="u-boot-mvebudbarmada8k-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702231" version="1" comment="u-boot-mvebuespressobin-88f3720 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702232" version="1" comment="u-boot-mvebuespressobin-88f3720-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702233" version="1" comment="u-boot-mvebumcbin-88f8040 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702234" version="1" comment="u-boot-mvebumcbin-88f8040-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702235" version="1" comment="u-boot-nanopia64 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702236" version="1" comment="u-boot-nanopia64-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702237" version="1" comment="u-boot-odroid-c2 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702238" version="1" comment="u-boot-odroid-c2-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702239" version="1" comment="u-boot-odroid-c4 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702240" version="1" comment="u-boot-odroid-c4-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702241" version="1" comment="u-boot-odroid-n2 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702242" version="1" comment="u-boot-odroid-n2-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702243" version="1" comment="u-boot-orangepipc2 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702244" version="1" comment="u-boot-orangepipc2-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702245" version="1" comment="u-boot-p2371-2180 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702246" version="1" comment="u-boot-p2371-2180-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702247" version="1" comment="u-boot-p2771-0000-500 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702248" version="1" comment="u-boot-p2771-0000-500-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702249" version="1" comment="u-boot-p3450-0000 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702250" version="1" comment="u-boot-p3450-0000-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702251" version="1" comment="u-boot-pine64plus is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702252" version="1" comment="u-boot-pine64plus-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702253" version="1" comment="u-boot-pinebook is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702254" version="1" comment="u-boot-pinebook-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702255" version="1" comment="u-boot-pinebook-pro-rk3399 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702256" version="1" comment="u-boot-pinebook-pro-rk3399-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702257" version="1" comment="u-boot-pineh64 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702258" version="1" comment="u-boot-pineh64-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702259" version="1" comment="u-boot-pinephone is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702260" version="1" comment="u-boot-pinephone-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702261" version="1" comment="u-boot-poplar is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702262" version="1" comment="u-boot-poplar-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702263" version="1" comment="u-boot-rock-pi-4-rk3399 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702264" version="1" comment="u-boot-rock-pi-4-rk3399-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702265" version="1" comment="u-boot-rock64-rk3328 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702266" version="1" comment="u-boot-rock64-rk3328-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702267" version="1" comment="u-boot-rock960-rk3399 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702268" version="1" comment="u-boot-rock960-rk3399-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702269" version="1" comment="u-boot-rockpro64-rk3399 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702270" version="1" comment="u-boot-rockpro64-rk3399-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702271" version="1" comment="u-boot-rpi3 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702272" version="1" comment="u-boot-rpi3-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702273" version="1" comment="u-boot-rpi4 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702274" version="1" comment="u-boot-rpi4-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702141" version="1" comment="u-boot-rpiarm64 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702142" version="1" comment="u-boot-rpiarm64-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702143" version="1" comment="u-boot-tools is &lt;2021.01-150300.7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702275" version="1" comment="u-boot-xilinxzynqmpvirt is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702276" version="1" comment="u-boot-xilinxzynqmpvirt-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702277" version="1" comment="u-boot-xilinxzynqmpzcu102rev10 is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702278" version="1" comment="u-boot-xilinxzynqmpzcu102rev10-doc is &lt;2021.01-150300.7.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702279" version="1" comment="u-boot-xilinxzynqmpgeneric is &lt;2020.01-150200.10.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702280" version="1" comment="u-boot-xilinxzynqmpgeneric-doc is &lt;2020.01-150200.10.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702134" version="1" comment="harfbuzz-devel is &lt;2.6.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702197" version="1" comment="harfbuzz-tools is &lt;2.6.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702135" version="1" comment="libharfbuzz-gobject0 is &lt;2.6.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702198" version="1" comment="libharfbuzz-gobject0-32bit is &lt;2.6.4-150200.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702136" version="1" comment="libharfbuzz-icu0 is &lt;2.6.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702199" version="1" comment="libharfbuzz-icu0-32bit is &lt;2.6.4-150200.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702137" version="1" comment="libharfbuzz-subset0 is &lt;2.6.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702200" version="1" comment="libharfbuzz-subset0-32bit is &lt;2.6.4-150200.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702138" version="1" comment="libharfbuzz0 is &lt;2.6.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702139" version="1" comment="libharfbuzz0-32bit is &lt;2.6.4-150200.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702140" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;2.6.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702972" version="1" comment="libqpdf21 is &lt;8.0.2-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703646" version="1" comment="go1.17 is &lt;1.17.13-150000.1.42.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703647" version="1" comment="go1.17-doc is &lt;1.17.13-150000.1.42.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703527" version="1" comment="go1.17-race is &lt;1.17.13-150000.1.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703528" version="1" comment="go1.18 is &lt;1.18.5-150000.1.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703529" version="1" comment="go1.18-doc is &lt;1.18.5-150000.1.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703530" version="1" comment="go1.18-race is &lt;1.18.5-150000.1.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702703" version="1" comment="python2-ujson is &lt;1.35-150100.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702702" version="1" comment="python3-ujson is &lt;1.35-150100.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701400" version="1" comment="libwavpack1 is &lt;5.4.0-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701475" version="1" comment="libwavpack1-32bit is &lt;5.4.0-150000.4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701401" version="1" comment="wavpack is &lt;5.4.0-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701402" version="1" comment="wavpack-devel is &lt;5.4.0-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701837" version="1" comment="java-11-openjdk is &lt;11.0.16.0-150000.3.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701955" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.16.0-150000.3.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701838" version="1" comment="java-11-openjdk-demo is &lt;11.0.16.0-150000.3.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701839" version="1" comment="java-11-openjdk-devel is &lt;11.0.16.0-150000.3.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701840" version="1" comment="java-11-openjdk-headless is &lt;11.0.16.0-150000.3.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701850" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.16.0-150000.3.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701851" version="1" comment="java-11-openjdk-jmods is &lt;11.0.16.0-150000.3.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701956" version="1" comment="java-11-openjdk-src is &lt;11.0.16.0-150000.3.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701010" version="1" comment="libncurses5 is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701011" version="1" comment="libncurses5-32bit is &lt;6.1-150000.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701000" version="1" comment="libncurses6 is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701001" version="1" comment="libncurses6-32bit is &lt;6.1-150000.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701002" version="1" comment="ncurses-devel is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701009" version="1" comment="ncurses-devel-32bit is &lt;6.1-150000.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701003" version="1" comment="ncurses-utils is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701012" version="1" comment="ncurses5-devel is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701107" version="1" comment="ncurses5-devel-32bit is &lt;6.1-150000.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701004" version="1" comment="tack is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701005" version="1" comment="terminfo is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701006" version="1" comment="terminfo-base is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701007" version="1" comment="terminfo-iterm is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701008" version="1" comment="terminfo-screen is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705805" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705806" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705807" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705633" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705634" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705808" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705809" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705810" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705635" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705636" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705637" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705811" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705812" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705813" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703652" version="1" comment="MozillaThunderbird is &lt;91.12.0-150200.8.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703653" version="1" comment="MozillaThunderbird-translations-common is &lt;91.12.0-150200.8.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703654" version="1" comment="MozillaThunderbird-translations-other is &lt;91.12.0-150200.8.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699895" version="1" comment="python2-codecov is &lt;2.0.15-150100.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699896" version="1" comment="python3-codecov is &lt;2.0.15-150100.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701957" version="1" comment="libnbd is &lt;1.12.4-150300.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701958" version="1" comment="libnbd-bash-completion is &lt;1.12.4-150300.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701959" version="1" comment="libnbd-devel is &lt;1.12.4-150300.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701960" version="1" comment="libnbd0 is &lt;1.12.4-150300.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701961" version="1" comment="nbdfuse is &lt;1.12.4-150300.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664857" version="1" comment="update-test-security is &lt;5.1-33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698511" version="1" comment="cifs-utils is &lt;6.9-150100.5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698512" version="1" comment="cifs-utils-devel is &lt;6.9-150100.5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699825" version="1" comment="pam_cifscreds is &lt;6.9-150100.5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703517" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703648" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.36.5-150200.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703518" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703649" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.36.5-150200.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703519" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.5-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703521" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703522" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703523" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703650" version="1" comment="webkit-jsc-4 is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703520" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703524" version="1" comment="webkit2gtk3-devel is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703651" version="1" comment="webkit2gtk3-minibrowser is &lt;2.36.5-150200.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704489" version="1" comment="python-Twisted-doc is &lt;19.10.0-150200.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704490" version="1" comment="python2-Twisted is &lt;19.10.0-150200.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704356" version="1" comment="python3-Twisted is &lt;19.10.0-150200.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704482" version="1" comment="kernel-debug-base is &lt;4.12.14-150100.197.120.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704433" version="1" comment="kernel-default-man is &lt;4.12.14-150100.197.120.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704483" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-150100.197.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704484" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.120.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704485" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.120.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704486" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.120.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704487" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.120.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704488" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-150100.197.120.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665442" version="1" comment="apache2-mod_apparmor is &lt;2.13.6-150300.3.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665340" version="1" comment="apparmor-abstractions is &lt;2.13.6-150300.3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665341" version="1" comment="apparmor-docs is &lt;2.13.6-150300.3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665342" version="1" comment="apparmor-parser is &lt;2.13.6-150300.3.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665343" version="1" comment="apparmor-parser-lang is &lt;2.13.6-150300.3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665344" version="1" comment="apparmor-profiles is &lt;2.13.6-150300.3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665345" version="1" comment="apparmor-utils is &lt;2.13.6-150300.3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665346" version="1" comment="apparmor-utils-lang is &lt;2.13.6-150300.3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665452" version="1" comment="ctdb is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666478" version="1" comment="ctdb-pcp-pmda is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665347" version="1" comment="krb5 is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665348" version="1" comment="krb5-32bit is &lt;1.19.2-150300.8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665349" version="1" comment="krb5-client is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665350" version="1" comment="krb5-devel is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666479" version="1" comment="krb5-devel-32bit is &lt;1.19.2-150300.8.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666480" version="1" comment="krb5-mini is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666481" version="1" comment="krb5-mini-devel is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665443" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665351" version="1" comment="krb5-plugin-preauth-otp is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665352" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665353" version="1" comment="krb5-plugin-preauth-spake is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665444" version="1" comment="krb5-server is &lt;1.19.2-150300.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665354" version="1" comment="ldb-tools is &lt;2.4.1-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665355" version="1" comment="libapparmor-devel is &lt;2.13.6-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665356" version="1" comment="libapparmor1 is &lt;2.13.6-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665357" version="1" comment="libapparmor1-32bit is &lt;2.13.6-150300.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665358" version="1" comment="libipa_hbac-devel is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665359" version="1" comment="libipa_hbac0 is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665360" version="1" comment="libldb-devel is &lt;2.4.1-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665361" version="1" comment="libldb2 is &lt;2.4.1-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665362" version="1" comment="libldb2-32bit is &lt;2.4.1-150300.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666482" version="1" comment="libnfsidmap-sss is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665363" version="1" comment="libsamba-policy-devel is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665364" version="1" comment="libsamba-policy-python3-devel is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665365" version="1" comment="libsamba-policy0-python3 is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666483" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666484" version="1" comment="libsamba-policy0-python3-64bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665366" version="1" comment="libsss_certmap-devel is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665367" version="1" comment="libsss_certmap0 is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665368" version="1" comment="libsss_idmap-devel is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665369" version="1" comment="libsss_idmap0 is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665370" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665371" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665372" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665373" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665374" version="1" comment="libtalloc-devel is &lt;2.3.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665375" version="1" comment="libtalloc2 is &lt;2.3.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665376" version="1" comment="libtalloc2-32bit is &lt;2.3.3-150300.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665377" version="1" comment="libtdb-devel is &lt;1.4.4-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665378" version="1" comment="libtdb1 is &lt;1.4.4-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665379" version="1" comment="libtdb1-32bit is &lt;1.4.4-150300.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665380" version="1" comment="libtevent-devel is &lt;0.11.0-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665381" version="1" comment="libtevent0 is &lt;0.11.0-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665382" version="1" comment="libtevent0-32bit is &lt;0.11.0-150300.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665383" version="1" comment="pam_apparmor is &lt;2.13.6-150300.3.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665384" version="1" comment="pam_apparmor-32bit is &lt;2.13.6-150300.3.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665385" version="1" comment="perl-apparmor is &lt;2.13.6-150300.3.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665386" version="1" comment="python3-apparmor is &lt;2.13.6-150300.3.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666485" version="1" comment="python3-ipa_hbac is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665387" version="1" comment="python3-ldb is &lt;2.4.1-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666486" version="1" comment="python3-ldb-32bit is &lt;2.4.1-150300.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665388" version="1" comment="python3-ldb-devel is &lt;2.4.1-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666487" version="1" comment="python3-sss-murmur is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666488" version="1" comment="python3-sss_nss_idmap is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665389" version="1" comment="python3-sssd-config is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665390" version="1" comment="python3-talloc is &lt;2.3.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666489" version="1" comment="python3-talloc-32bit is &lt;2.3.3-150300.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665391" version="1" comment="python3-talloc-devel is &lt;2.3.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665392" version="1" comment="python3-tdb is &lt;1.4.4-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666490" version="1" comment="python3-tdb-32bit is &lt;1.4.4-150300.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665393" version="1" comment="python3-tevent is &lt;0.11.0-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666491" version="1" comment="python3-tevent-32bit is &lt;0.11.0-150300.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666492" version="1" comment="ruby-apparmor is &lt;2.13.6-150300.3.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665394" version="1" comment="samba is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665441" version="1" comment="samba-ad-dc is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665395" version="1" comment="samba-ad-dc-libs is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665396" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665397" version="1" comment="samba-ceph is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665398" version="1" comment="samba-client is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665399" version="1" comment="samba-client-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666493" version="1" comment="samba-client-64bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665400" version="1" comment="samba-client-libs is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665401" version="1" comment="samba-client-libs-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665402" version="1" comment="samba-devel is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665403" version="1" comment="samba-devel-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666494" version="1" comment="samba-doc is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665404" version="1" comment="samba-dsdb-modules is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665405" version="1" comment="samba-gpupdate is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665406" version="1" comment="samba-ldb-ldap is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665407" version="1" comment="samba-libs is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665408" version="1" comment="samba-libs-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666495" version="1" comment="samba-libs-64bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665409" version="1" comment="samba-libs-python3 is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666496" version="1" comment="samba-libs-python3-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666497" version="1" comment="samba-libs-python3-64bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665410" version="1" comment="samba-python3 is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666498" version="1" comment="samba-test is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665411" version="1" comment="samba-tool is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665412" version="1" comment="samba-winbind is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665413" version="1" comment="samba-winbind-libs is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665414" version="1" comment="samba-winbind-libs-32bit is &lt;4.15.4+git.324.8332acf1a63-150300.3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665415" version="1" comment="sssd is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665416" version="1" comment="sssd-ad is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665417" version="1" comment="sssd-common is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665418" version="1" comment="sssd-dbus is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665419" version="1" comment="sssd-ipa is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665420" version="1" comment="sssd-krb5 is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665421" version="1" comment="sssd-krb5-common is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665422" version="1" comment="sssd-ldap is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665423" version="1" comment="sssd-proxy is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665424" version="1" comment="sssd-tools is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666499" version="1" comment="sssd-wbclient is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666500" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665425" version="1" comment="sssd-winbind-idmap is &lt;1.16.1-150300.23.17.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665426" version="1" comment="talloc-man is &lt;2.3.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665427" version="1" comment="tdb-tools is &lt;1.4.4-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665428" version="1" comment="tevent-man is &lt;0.11.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699815" version="1" comment="python-atomicwrites-doc is &lt;1.1.5-150000.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698634" version="1" comment="python2-apipkg is &lt;1.4-150000.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698625" version="1" comment="python2-atomicwrites is &lt;1.1.5-150000.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698626" version="1" comment="python2-coverage is &lt;4.5.4-150000.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698636" version="1" comment="python2-py is &lt;1.10.0-150000.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699816" version="1" comment="python2-pycodestyle is &lt;2.5.0-150000.3.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699817" version="1" comment="python2-pyflakes is &lt;2.1.1-150000.3.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698486" version="1" comment="python3-apipkg is &lt;1.4-150000.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698633" version="1" comment="python3-atomicwrites is &lt;1.1.5-150000.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698568" version="1" comment="python3-coverage is &lt;4.5.4-150000.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698488" version="1" comment="python3-py is &lt;1.10.0-150000.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699818" version="1" comment="python3-pycodestyle is &lt;2.5.0-150000.3.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699819" version="1" comment="python3-pyflakes is &lt;2.1.1-150000.3.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704222" version="1" comment="libntfs-3g-devel is &lt;2022.5.17-150000.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704223" version="1" comment="libntfs-3g87 is &lt;2022.5.17-150000.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704224" version="1" comment="ntfs-3g is &lt;2022.5.17-150000.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704225" version="1" comment="ntfsprogs is &lt;2022.5.17-150000.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704226" version="1" comment="ntfsprogs-extra is &lt;2022.5.17-150000.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705631" version="1" comment="podman is &lt;3.4.7-150300.9.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705632" version="1" comment="podman-cni-config is &lt;3.4.7-150300.9.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706147" version="1" comment="nodejs10 is &lt;10.24.1-150000.1.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706148" version="1" comment="nodejs10-devel is &lt;10.24.1-150000.1.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706130" version="1" comment="nodejs10-docs is &lt;10.24.1-150000.1.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706149" version="1" comment="npm10 is &lt;10.24.1-150000.1.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704729" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.345-150000.3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704769" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.345-150000.3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704730" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.345-150000.3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704731" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.345-150000.3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704732" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.345-150000.3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704770" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.345-150000.3.70.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704771" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.345-150000.3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698507" version="1" comment="systemd-presets-common-SUSE is &lt;15-150100.8.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704491" version="1" comment="u-boot-avnetultra96rev1 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704492" version="1" comment="u-boot-avnetultra96rev1-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704493" version="1" comment="u-boot-bananapim64 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704494" version="1" comment="u-boot-bananapim64-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704495" version="1" comment="u-boot-dragonboard410c is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704496" version="1" comment="u-boot-dragonboard410c-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704497" version="1" comment="u-boot-dragonboard820c is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704498" version="1" comment="u-boot-dragonboard820c-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704499" version="1" comment="u-boot-evb-rk3399 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704500" version="1" comment="u-boot-evb-rk3399-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704501" version="1" comment="u-boot-firefly-rk3399 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704502" version="1" comment="u-boot-firefly-rk3399-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704503" version="1" comment="u-boot-geekbox is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704504" version="1" comment="u-boot-geekbox-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704505" version="1" comment="u-boot-hikey is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704506" version="1" comment="u-boot-hikey-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704507" version="1" comment="u-boot-khadas-vim is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704508" version="1" comment="u-boot-khadas-vim-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704509" version="1" comment="u-boot-khadas-vim2 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704510" version="1" comment="u-boot-khadas-vim2-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704511" version="1" comment="u-boot-libretech-ac is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704512" version="1" comment="u-boot-libretech-ac-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704513" version="1" comment="u-boot-libretech-cc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704514" version="1" comment="u-boot-libretech-cc-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704515" version="1" comment="u-boot-ls1012afrdmqspi is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704516" version="1" comment="u-boot-ls1012afrdmqspi-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704517" version="1" comment="u-boot-mvebudb-88f3720 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704518" version="1" comment="u-boot-mvebudb-88f3720-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704519" version="1" comment="u-boot-mvebudbarmada8k is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704520" version="1" comment="u-boot-mvebudbarmada8k-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704521" version="1" comment="u-boot-mvebuespressobin-88f3720 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704522" version="1" comment="u-boot-mvebuespressobin-88f3720-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704523" version="1" comment="u-boot-mvebumcbin-88f8040 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704524" version="1" comment="u-boot-mvebumcbin-88f8040-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704525" version="1" comment="u-boot-nanopia64 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704526" version="1" comment="u-boot-nanopia64-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704527" version="1" comment="u-boot-odroid-c2 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704528" version="1" comment="u-boot-odroid-c2-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704529" version="1" comment="u-boot-odroid-c4 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704530" version="1" comment="u-boot-odroid-c4-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704531" version="1" comment="u-boot-odroid-n2 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704532" version="1" comment="u-boot-odroid-n2-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704533" version="1" comment="u-boot-orangepipc2 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704534" version="1" comment="u-boot-orangepipc2-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704535" version="1" comment="u-boot-p2371-2180 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704536" version="1" comment="u-boot-p2371-2180-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704537" version="1" comment="u-boot-p2771-0000-500 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704538" version="1" comment="u-boot-p2771-0000-500-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704539" version="1" comment="u-boot-p3450-0000 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704540" version="1" comment="u-boot-p3450-0000-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704541" version="1" comment="u-boot-pine64plus is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704542" version="1" comment="u-boot-pine64plus-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704543" version="1" comment="u-boot-pinebook is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704544" version="1" comment="u-boot-pinebook-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704545" version="1" comment="u-boot-pinebook-pro-rk3399 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704546" version="1" comment="u-boot-pinebook-pro-rk3399-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704547" version="1" comment="u-boot-pineh64 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704548" version="1" comment="u-boot-pineh64-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704549" version="1" comment="u-boot-pinephone is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704550" version="1" comment="u-boot-pinephone-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704551" version="1" comment="u-boot-poplar is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704552" version="1" comment="u-boot-poplar-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704553" version="1" comment="u-boot-rock-pi-4-rk3399 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704554" version="1" comment="u-boot-rock-pi-4-rk3399-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704555" version="1" comment="u-boot-rock64-rk3328 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704556" version="1" comment="u-boot-rock64-rk3328-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704557" version="1" comment="u-boot-rock960-rk3399 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704558" version="1" comment="u-boot-rock960-rk3399-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704559" version="1" comment="u-boot-rockpro64-rk3399 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704560" version="1" comment="u-boot-rockpro64-rk3399-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704561" version="1" comment="u-boot-rpi3 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704562" version="1" comment="u-boot-rpi3-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704563" version="1" comment="u-boot-rpi4 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704564" version="1" comment="u-boot-rpi4-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704353" version="1" comment="u-boot-rpiarm64 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704354" version="1" comment="u-boot-rpiarm64-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704355" version="1" comment="u-boot-tools is &lt;2021.01-150300.7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704565" version="1" comment="u-boot-xilinxzynqmpvirt is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704566" version="1" comment="u-boot-xilinxzynqmpvirt-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704567" version="1" comment="u-boot-xilinxzynqmpzcu102rev10 is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704568" version="1" comment="u-boot-xilinxzynqmpzcu102rev10-doc is &lt;2021.01-150300.7.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707098" version="1" comment="ruby2.5-rubygem-rails-html-sanitizer is &lt;1.0.4-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707364" version="1" comment="ruby2.5-rubygem-rails-html-sanitizer-doc is &lt;1.0.4-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707365" version="1" comment="ruby2.5-rubygem-rails-html-sanitizer-testsuite is &lt;1.0.4-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700999" version="1" comment="perl-HTTP-Daemon is &lt;6.01-150000.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706405" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706096" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706406" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706407" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706097" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706408" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706409" version="1" comment="dtb-al is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706410" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706411" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706412" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706413" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706414" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706415" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706416" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706417" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706418" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706419" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706420" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706421" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706422" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706423" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706424" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706425" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706426" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706427" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706428" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706429" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706430" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706431" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.90.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706432" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706098" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706433" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705841" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705842" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706434" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706435" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706436" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706437" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.90.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706438" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.90.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706439" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.90.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705843" version="1" comment="kernel-default is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705844" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.90.1.150300.18.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706440" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.90.1.150300.18.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705845" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706441" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706442" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706443" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706444" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705846" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705853" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706445" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706446" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.90.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706447" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.90.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706448" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.90.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705847" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705854" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706449" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705848" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705855" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706450" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706451" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706452" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705856" version="1" comment="kernel-source is &lt;5.3.18-150300.59.90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706453" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705857" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705849" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.90.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706454" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706455" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706456" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706457" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706099" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706458" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706459" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.90.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705858" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706460" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706480" version="1" comment="gfbgraph-devel is &lt;0.2.3-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706481" version="1" comment="libgfbgraph-0_2-0 is &lt;0.2.3-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706482" version="1" comment="typelib-1_0-GFBGraph-0_2 is &lt;0.2.3-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707088" version="1" comment="libspice-server-devel is &lt;0.14.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707089" version="1" comment="libspice-server1 is &lt;0.14.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705623" version="1" comment="gnutls is &lt;3.6.7-150200.14.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705814" version="1" comment="gnutls-guile is &lt;3.6.7-150200.14.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705624" version="1" comment="libgnutls-devel is &lt;3.6.7-150200.14.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705815" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-150200.14.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705625" version="1" comment="libgnutls30 is &lt;3.6.7-150200.14.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705626" version="1" comment="libgnutls30-32bit is &lt;3.6.7-150200.14.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705627" version="1" comment="libgnutls30-hmac is &lt;3.6.7-150200.14.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705628" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-150200.14.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705629" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-150200.14.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705630" version="1" comment="libgnutlsxx28 is &lt;3.6.7-150200.14.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706678" version="1" comment="bluez is &lt;5.55-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706754" version="1" comment="bluez-auto-enable-devices is &lt;5.55-150300.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706755" version="1" comment="bluez-cups is &lt;5.55-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706679" version="1" comment="bluez-deprecated is &lt;5.55-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706681" version="1" comment="bluez-devel is &lt;5.55-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706756" version="1" comment="bluez-devel-32bit is &lt;5.55-150300.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706757" version="1" comment="bluez-test is &lt;5.55-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706680" version="1" comment="libbluetooth3 is &lt;5.55-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706758" version="1" comment="libbluetooth3-32bit is &lt;5.55-150300.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706470" version="1" comment="freerdp is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706471" version="1" comment="freerdp-devel is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706472" version="1" comment="freerdp-proxy is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706473" version="1" comment="freerdp-server is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706474" version="1" comment="freerdp-wayland is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706475" version="1" comment="libfreerdp2 is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706476" version="1" comment="libuwac0-0 is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706477" version="1" comment="libwinpr2 is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706478" version="1" comment="uwac0-0-devel is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706479" version="1" comment="winpr2-devel is &lt;2.1.2-150200.15.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705850" version="1" comment="libraptor-devel is &lt;2.0.15-150200.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705851" version="1" comment="libraptor2-0 is &lt;2.0.15-150200.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706469" version="1" comment="libraptor2-0-32bit is &lt;2.0.15-150200.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705852" version="1" comment="raptor is &lt;2.0.15-150200.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707560" version="1" comment="python2-lxml is &lt;4.7.1-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707561" version="1" comment="python2-lxml-devel is &lt;4.7.1-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707544" version="1" comment="python3-lxml is &lt;4.7.1-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707545" version="1" comment="python3-lxml-devel is &lt;4.7.1-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707632" version="1" comment="libyang-cpp-devel is &lt;1.0.184-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707633" version="1" comment="libyang-cpp1 is &lt;1.0.184-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707634" version="1" comment="libyang-devel is &lt;1.0.184-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707635" version="1" comment="libyang-doc is &lt;1.0.184-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707572" version="1" comment="libyang-extentions is &lt;1.0.184-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707573" version="1" comment="libyang1 is &lt;1.0.184-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707636" version="1" comment="python3-yang is &lt;1.0.184-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707637" version="1" comment="yang-tools is &lt;1.0.184-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707786" version="1" comment="keepalived is &lt;2.0.19-150100.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707920" version="1" comment="libvmtools-devel is &lt;12.1.0-150300.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707921" version="1" comment="libvmtools0 is &lt;12.1.0-150300.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707922" version="1" comment="open-vm-tools is &lt;12.1.0-150300.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707923" version="1" comment="open-vm-tools-desktop is &lt;12.1.0-150300.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707924" version="1" comment="open-vm-tools-sdmp is &lt;12.1.0-150300.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707676" version="1" comment="libslirp-devel is &lt;4.3.1-150300.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707677" version="1" comment="libslirp0 is &lt;4.3.1-150300.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706878" version="1" comment="postgresql10 is &lt;10.22-150100.8.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706879" version="1" comment="postgresql10-contrib is &lt;10.22-150100.8.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706917" version="1" comment="postgresql10-docs is &lt;10.22-150100.8.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706881" version="1" comment="postgresql10-plperl is &lt;10.22-150100.8.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706882" version="1" comment="postgresql10-plpython is &lt;10.22-150100.8.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706883" version="1" comment="postgresql10-pltcl is &lt;10.22-150100.8.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706884" version="1" comment="postgresql10-server is &lt;10.22-150100.8.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707056" version="1" comment="postgresql10-test is &lt;10.22-150100.8.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706230" version="1" comment="libminizip1 is &lt;1.2.11-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706483" version="1" comment="libminizip1-32bit is &lt;1.2.11-150000.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706231" version="1" comment="libz1 is &lt;1.2.11-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706232" version="1" comment="libz1-32bit is &lt;1.2.11-150000.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706233" version="1" comment="minizip-devel is &lt;1.2.11-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706234" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706240" version="1" comment="zlib-devel-32bit is &lt;1.2.11-150000.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706235" version="1" comment="zlib-devel-static is &lt;1.2.11-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706484" version="1" comment="zlib-devel-static-32bit is &lt;1.2.11-150000.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707070" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.11-150000.3.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707366" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr7.11-150000.3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707071" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.11-150000.3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707367" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr7.11-150000.3.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707072" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.11-150000.3.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707368" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr7.11-150000.3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707073" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.11-150000.3.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707369" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr7.11-150000.3.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706236" version="1" comment="gstreamer-plugins-good is &lt;1.16.3-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706485" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.16.3-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706486" version="1" comment="gstreamer-plugins-good-doc is &lt;1.16.3-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706487" version="1" comment="gstreamer-plugins-good-extra is &lt;1.16.3-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706488" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.16.3-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706489" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.16.3-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706490" version="1" comment="gstreamer-plugins-good-jack is &lt;1.16.3-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706491" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.16.3-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706237" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.3-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706492" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.16.3-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706877" version="1" comment="rsync is &lt;3.1.3-150000.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706876" version="1" comment="ucode-intel is &lt;20220809-150200.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707065" version="1" comment="postgresql13 is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707090" version="1" comment="postgresql13-contrib is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707091" version="1" comment="postgresql13-devel is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707092" version="1" comment="postgresql13-docs is &lt;13.8-150200.5.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707083" version="1" comment="postgresql13-llvmjit is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707093" version="1" comment="postgresql13-plperl is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707094" version="1" comment="postgresql13-plpython is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707095" version="1" comment="postgresql13-pltcl is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707096" version="1" comment="postgresql13-server is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707097" version="1" comment="postgresql13-server-devel is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707084" version="1" comment="postgresql13-test is &lt;13.8-150200.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707074" version="1" comment="postgresql12 is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707075" version="1" comment="postgresql12-contrib is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707076" version="1" comment="postgresql12-devel is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707077" version="1" comment="postgresql12-docs is &lt;12.12-150200.8.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707085" version="1" comment="postgresql12-llvmjit is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707078" version="1" comment="postgresql12-plperl is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707079" version="1" comment="postgresql12-plpython is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707080" version="1" comment="postgresql12-pltcl is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707081" version="1" comment="postgresql12-server is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707082" version="1" comment="postgresql12-server-devel is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707086" version="1" comment="postgresql12-test is &lt;12.12-150200.8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706888" version="1" comment="libecpg6 is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707054" version="1" comment="libecpg6-32bit is &lt;14.5-150200.5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706874" version="1" comment="libpq5 is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706925" version="1" comment="libpq5-32bit is &lt;14.5-150200.5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706875" version="1" comment="postgresql14 is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706889" version="1" comment="postgresql14-contrib is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706890" version="1" comment="postgresql14-devel is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706891" version="1" comment="postgresql14-docs is &lt;14.5-150200.5.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706885" version="1" comment="postgresql14-llvmjit is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706892" version="1" comment="postgresql14-plperl is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706893" version="1" comment="postgresql14-plpython is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706894" version="1" comment="postgresql14-pltcl is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706895" version="1" comment="postgresql14-server is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706896" version="1" comment="postgresql14-server-devel is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707055" version="1" comment="postgresql14-test is &lt;14.5-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707437" version="1" comment="gdk-pixbuf-devel is &lt;2.40.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707499" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.40.0-150200.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707438" version="1" comment="gdk-pixbuf-lang is &lt;2.40.0-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707439" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707448" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.40.0-150200.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707440" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.40.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707441" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707449" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.40.0-150200.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707442" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707443" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.40.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708195" version="1" comment="curl is &lt;7.66.0-150200.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708196" version="1" comment="libcurl-devel is &lt;7.66.0-150200.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708369" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-150200.4.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708197" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708198" version="1" comment="libcurl4-32bit is &lt;7.66.0-150200.4.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707678" version="1" comment="389-ds is &lt;1.4.4.19~git46.c900a28c8-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707679" version="1" comment="389-ds-devel is &lt;1.4.4.19~git46.c900a28c8-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707768" version="1" comment="389-ds-snmp is &lt;1.4.4.19~git46.c900a28c8-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707680" version="1" comment="lib389 is &lt;1.4.4.19~git46.c900a28c8-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707681" version="1" comment="libsvrcore0 is &lt;1.4.4.19~git46.c900a28c8-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707960" version="1" comment="MozillaFirefox is &lt;91.13.0-150200.152.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707961" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-150200.9.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708001" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.13.0-150200.152.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708002" version="1" comment="MozillaFirefox-devel is &lt;91.13.0-150200.152.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707963" version="1" comment="MozillaFirefox-translations-common is &lt;91.13.0-150200.152.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707964" version="1" comment="MozillaFirefox-translations-other is &lt;91.13.0-150200.152.56.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707370" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.345-150200.3.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707371" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.345-150200.3.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707372" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.345-150200.3.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707373" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.345-150200.3.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707374" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.345-150200.3.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707375" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.345-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707376" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.345-150200.3.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707546" version="1" comment="python3-Flask-Security-Too is &lt;3.4.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707772" version="1" comment="libopenvswitch-2_13-0 is &lt;2.13.2-150200.9.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707773" version="1" comment="libovn-20_03-0 is &lt;20.03.1-150200.9.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707363" version="1" comment="python-bottle-doc is &lt;0.12.13-150000.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707087" version="1" comment="python2-bottle is &lt;0.12.13-150000.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707069" version="1" comment="python3-bottle is &lt;0.12.13-150000.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709620" version="1" comment="gimp is &lt;2.10.12-150300.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709621" version="1" comment="gimp-devel is &lt;2.10.12-150300.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709512" version="1" comment="gimp-lang is &lt;2.10.12-150300.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709622" version="1" comment="gimp-plugin-aa is &lt;2.10.12-150300.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709623" version="1" comment="libgimp-2_0-0 is &lt;2.10.12-150300.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709624" version="1" comment="libgimp-2_0-0-32bit is &lt;2.10.12-150300.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709625" version="1" comment="libgimpui-2_0-0 is &lt;2.10.12-150300.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709626" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.10.12-150300.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707682" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707683" version="1" comment="libovn-20_06-0 is &lt;20.06.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707684" version="1" comment="openvswitch is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707685" version="1" comment="openvswitch-devel is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707770" version="1" comment="openvswitch-doc is &lt;2.14.2-150300.19.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707686" version="1" comment="openvswitch-ipsec is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707687" version="1" comment="openvswitch-pki is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707688" version="1" comment="openvswitch-test is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707689" version="1" comment="openvswitch-vtep is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707690" version="1" comment="ovn is &lt;20.06.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707691" version="1" comment="ovn-central is &lt;20.06.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707692" version="1" comment="ovn-devel is &lt;20.06.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707771" version="1" comment="ovn-doc is &lt;20.06.2-150300.19.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707693" version="1" comment="ovn-docker is &lt;20.06.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707694" version="1" comment="ovn-host is &lt;20.06.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707695" version="1" comment="ovn-vtep is &lt;20.06.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707675" version="1" comment="python3-ovs is &lt;2.14.2-150300.19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708089" version="1" comment="ImageMagick is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708090" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708091" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708092" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708161" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-150200.10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708162" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-150200.10.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708163" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708093" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708164" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-150200.10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708094" version="1" comment="libMagick++-devel is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708165" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-150200.10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708095" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708166" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708096" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708167" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708097" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-150200.10.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707450" version="1" comment="libicu60_2 is &lt;60.2-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707503" version="1" comment="libicu60_2-32bit is &lt;60.2-150000.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707451" version="1" comment="libicu60_2-bedata is &lt;60.2-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707452" version="1" comment="libicu60_2-ledata is &lt;60.2-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707453" version="1" comment="icu is &lt;65.1-150200.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707444" version="1" comment="libicu-devel is &lt;65.1-150200.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707500" version="1" comment="libicu-devel-32bit is &lt;65.1-150200.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707501" version="1" comment="libicu-doc is &lt;65.1-150200.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707445" version="1" comment="libicu-suse65_1 is &lt;65.1-150200.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707502" version="1" comment="libicu-suse65_1-32bit is &lt;65.1-150200.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707446" version="1" comment="libicu65_1-bedata is &lt;65.1-150200.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707447" version="1" comment="libicu65_1-ledata is &lt;65.1-150200.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709887" version="1" comment="libudisks2-0 is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709888" version="1" comment="libudisks2-0-devel is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710080" version="1" comment="libudisks2-0_bcache is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710081" version="1" comment="libudisks2-0_btrfs is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710082" version="1" comment="libudisks2-0_lsm is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710083" version="1" comment="libudisks2-0_lvm2 is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710084" version="1" comment="libudisks2-0_zram is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709889" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709890" version="1" comment="udisks2 is &lt;2.8.1-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709891" version="1" comment="udisks2-lang is &lt;2.8.1-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706238" version="1" comment="libyajl-devel is &lt;2.1.0-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706493" version="1" comment="libyajl-devel-32bit is &lt;2.1.0-150000.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706494" version="1" comment="libyajl-devel-static is &lt;2.1.0-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706239" version="1" comment="libyajl2 is &lt;2.1.0-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706495" version="1" comment="libyajl2-32bit is &lt;2.1.0-150000.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706496" version="1" comment="yajl is &lt;2.1.0-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706461" version="1" comment="ansible is &lt;2.9.27-150000.1.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706462" version="1" comment="ansible-doc is &lt;2.9.27-150000.1.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706463" version="1" comment="ansible-test is &lt;2.9.27-150000.1.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707769" version="1" comment="dracut-saltboot is &lt;0.1.1657643023.0d694ce-150000.1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706465" version="1" comment="golang-github-QubitProducts-exporter_exporter is &lt;0.4.0-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706466" version="1" comment="python2-hwdata is &lt;2.3.5-150000.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706467" version="1" comment="python3-hwdata is &lt;2.3.5-150000.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706468" version="1" comment="spacecmd is &lt;4.3.14-150000.3.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708081" version="1" comment="libEMF-devel is &lt;1.0.7-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708082" version="1" comment="libEMF-utils is &lt;1.0.7-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708083" version="1" comment="libEMF1 is &lt;1.0.7-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709692" version="1" comment="gvim is &lt;9.0.0313-150000.5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709661" version="1" comment="vim is &lt;9.0.0313-150000.5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709662" version="1" comment="vim-data is &lt;9.0.0313-150000.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709663" version="1" comment="vim-data-common is &lt;9.0.0313-150000.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709664" version="1" comment="vim-small is &lt;9.0.0313-150000.5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709880" version="1" comment="gdk-pixbuf-devel is &lt;2.40.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710073" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.40.0-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709881" version="1" comment="gdk-pixbuf-lang is &lt;2.40.0-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709882" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709892" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.40.0-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709883" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.40.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709884" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709893" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.40.0-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709885" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709886" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.40.0-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710074" version="1" comment="libyang-cpp-devel is &lt;1.0.184-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710075" version="1" comment="libyang-cpp1 is &lt;1.0.184-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710076" version="1" comment="libyang-devel is &lt;1.0.184-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710077" version="1" comment="libyang-doc is &lt;1.0.184-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709895" version="1" comment="libyang-extentions is &lt;1.0.184-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709896" version="1" comment="libyang1 is &lt;1.0.184-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710078" version="1" comment="python3-yang is &lt;1.0.184-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710079" version="1" comment="yang-tools is &lt;1.0.184-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709897" version="1" comment="frr is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709898" version="1" comment="frr-devel is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709899" version="1" comment="libfrr0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709900" version="1" comment="libfrr_pb0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709901" version="1" comment="libfrrcares0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709902" version="1" comment="libfrrfpm_pb0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709903" version="1" comment="libfrrgrpc_pb0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709904" version="1" comment="libfrrospfapiclient0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709905" version="1" comment="libfrrsnmp0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709906" version="1" comment="libfrrzmq0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709907" version="1" comment="libmlag_pb0 is &lt;7.4-150300.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709894" version="1" comment="libqpdf26 is &lt;9.0.2-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709490" version="1" comment="clamav is &lt;0.103.7-150000.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709491" version="1" comment="clamav-devel is &lt;0.103.7-150000.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709492" version="1" comment="libclamav9 is &lt;0.103.7-150000.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709493" version="1" comment="libfreshclam2 is &lt;0.103.7-150000.3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709516" version="1" comment="nodejs16 is &lt;16.17.0-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709517" version="1" comment="nodejs16-devel is &lt;16.17.0-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709518" version="1" comment="nodejs16-docs is &lt;16.17.0-150300.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709519" version="1" comment="npm16 is &lt;16.17.0-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708192" version="1" comment="freetype2-devel is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708356" version="1" comment="freetype2-devel-32bit is &lt;2.10.4-150000.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708357" version="1" comment="freetype2-profile-tti35 is &lt;2.10.4-150000.4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708358" version="1" comment="ft2demos is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708359" version="1" comment="ftbench is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708360" version="1" comment="ftdiff is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708199" version="1" comment="ftdump is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708361" version="1" comment="ftgamma is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708362" version="1" comment="ftgrid is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708363" version="1" comment="ftinspect is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708364" version="1" comment="ftlint is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708365" version="1" comment="ftmulti is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708366" version="1" comment="ftstring is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708367" version="1" comment="ftvalid is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708368" version="1" comment="ftview is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708193" version="1" comment="libfreetype6 is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708194" version="1" comment="libfreetype6-32bit is &lt;2.10.4-150000.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710254" version="1" comment="ruby2.5-rubygem-kramdown is &lt;1.15.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710403" version="1" comment="ruby2.5-rubygem-kramdown-doc is &lt;1.15.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710404" version="1" comment="ruby2.5-rubygem-kramdown-testsuite is &lt;1.15.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711159" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710801" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711160" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711161" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710802" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711162" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711163" version="1" comment="dtb-al is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711164" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711165" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711166" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711167" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711168" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711169" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711170" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711171" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711172" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711173" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711174" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711175" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711176" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711177" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711178" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711179" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711180" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711181" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711182" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711183" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711184" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711185" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.93.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711186" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710803" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711187" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710778" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710779" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711188" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711189" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711190" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711191" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.93.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711192" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.93.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711193" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.93.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710780" version="1" comment="kernel-default is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710781" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.93.1.150300.18.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711194" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.93.1.150300.18.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710782" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711195" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711196" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711197" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711198" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710783" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710791" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711199" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711200" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.93.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711201" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.93.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711202" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.93.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710784" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710792" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711203" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710785" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710793" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711204" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711205" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711206" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710794" version="1" comment="kernel-source is &lt;5.3.18-150300.59.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711207" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710795" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710786" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.93.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711208" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711209" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711210" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711211" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710804" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711212" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711213" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.93.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710796" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711214" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710400" version="1" comment="libzapojit-0_0-0 is &lt;0.0.3-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710401" version="1" comment="libzapojit-devel is &lt;0.0.3-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710402" version="1" comment="typelib-1_0-Zpj-0_0 is &lt;0.0.3-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710215" version="1" comment="perl is &lt;5.26.1-150300.17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710248" version="1" comment="perl-32bit is &lt;5.26.1-150300.17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710216" version="1" comment="perl-base is &lt;5.26.1-150300.17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710217" version="1" comment="perl-base-32bit is &lt;5.26.1-150300.17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710218" version="1" comment="perl-core-DB_File is &lt;5.26.1-150300.17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710397" version="1" comment="perl-core-DB_File-32bit is &lt;5.26.1-150300.17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710240" version="1" comment="perl-doc is &lt;5.26.1-150300.17.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710609" version="1" comment="MozillaThunderbird is &lt;102.2.2-150200.8.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710610" version="1" comment="MozillaThunderbird-translations-common is &lt;102.2.2-150200.8.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710611" version="1" comment="MozillaThunderbird-translations-other is &lt;102.2.2-150200.8.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710219" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710220" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710221" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710222" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710398" version="1" comment="ruby2.5-doc is &lt;2.5.9-150000.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710399" version="1" comment="ruby2.5-doc-ri is &lt;2.5.9-150000.4.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710223" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665045" version="1" comment="glibc is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665046" version="1" comment="glibc-32bit is &lt;2.31-150300.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665047" version="1" comment="glibc-devel is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665057" version="1" comment="glibc-devel-32bit is &lt;2.31-150300.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665058" version="1" comment="glibc-devel-static is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665060" version="1" comment="glibc-devel-static-32bit is &lt;2.31-150300.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665048" version="1" comment="glibc-extra is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665061" version="1" comment="glibc-html is &lt;2.31-150300.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665049" version="1" comment="glibc-i18ndata is &lt;2.31-150300.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665050" version="1" comment="glibc-info is &lt;2.31-150300.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665051" version="1" comment="glibc-lang is &lt;2.31-150300.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665052" version="1" comment="glibc-locale is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665053" version="1" comment="glibc-locale-base is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665054" version="1" comment="glibc-locale-base-32bit is &lt;2.31-150300.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665055" version="1" comment="glibc-profile is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665062" version="1" comment="glibc-profile-32bit is &lt;2.31-150300.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665059" version="1" comment="glibc-utils is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665063" version="1" comment="glibc-utils-32bit is &lt;2.31-150300.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665056" version="1" comment="nscd is &lt;2.31-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710520" version="1" comment="libtirpc-devel is &lt;1.2.6-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710521" version="1" comment="libtirpc-netconfig is &lt;1.2.6-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710522" version="1" comment="libtirpc3 is &lt;1.2.6-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710523" version="1" comment="libtirpc3-32bit is &lt;1.2.6-150300.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710767" version="1" comment="libsqlite3-0 is &lt;3.39.3-150000.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710768" version="1" comment="libsqlite3-0-32bit is &lt;3.39.3-150000.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710769" version="1" comment="sqlite3 is &lt;3.39.3-150000.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710770" version="1" comment="sqlite3-devel is &lt;3.39.3-150000.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711145" version="1" comment="sqlite3-doc is &lt;3.39.3-150000.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714912" version="1" comment="sqlite3-tcl is &lt;3.39.3-150000.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711312" version="1" comment="libwireshark15 is &lt;3.6.8-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711313" version="1" comment="libwiretap12 is &lt;3.6.8-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711314" version="1" comment="libwsutil13 is &lt;3.6.8-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711315" version="1" comment="wireshark is &lt;3.6.8-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711316" version="1" comment="wireshark-devel is &lt;3.6.8-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711317" version="1" comment="wireshark-ui-qt is &lt;3.6.8-150000.3.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710417" version="1" comment="kubevirt-container-disk is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710233" version="1" comment="kubevirt-manifests is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710418" version="1" comment="kubevirt-tests is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710419" version="1" comment="kubevirt-virt-api is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710420" version="1" comment="kubevirt-virt-controller is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710421" version="1" comment="kubevirt-virt-handler is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710422" version="1" comment="kubevirt-virt-launcher is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710423" version="1" comment="kubevirt-virt-operator is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710234" version="1" comment="kubevirt-virtctl is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710424" version="1" comment="obs-service-kubevirt_containers_meta is &lt;0.49.0-150300.8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710241" version="1" comment="go1.18 is &lt;1.18.6-150000.1.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710242" version="1" comment="go1.18-doc is &lt;1.18.6-150000.1.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710243" version="1" comment="go1.18-race is &lt;1.18.6-150000.1.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710244" version="1" comment="go1.19 is &lt;1.19.1-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710245" version="1" comment="go1.19-doc is &lt;1.19.1-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710246" version="1" comment="go1.19-race is &lt;1.19.1-150000.1.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708026" version="1" comment="libonig4 is &lt;6.7.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708027" version="1" comment="oniguruma-devel is &lt;6.7.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666501" version="1" comment="xen is &lt;4.14.3_06-150300.3.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666502" version="1" comment="xen-devel is &lt;4.14.3_06-150300.3.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666503" version="1" comment="xen-doc-html is &lt;4.14.3_06-150300.3.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666504" version="1" comment="xen-libs is &lt;4.14.3_06-150300.3.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666505" version="1" comment="xen-libs-32bit is &lt;4.14.3_06-150300.3.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666506" version="1" comment="xen-tools is &lt;4.14.3_06-150300.3.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666507" version="1" comment="xen-tools-domU is &lt;4.14.3_06-150300.3.18.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665448" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.3_06-150300.3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711148" version="1" comment="containerized-data-importer-api is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711149" version="1" comment="containerized-data-importer-cloner is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711150" version="1" comment="containerized-data-importer-controller is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711151" version="1" comment="containerized-data-importer-importer is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710787" version="1" comment="containerized-data-importer-manifests is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711152" version="1" comment="containerized-data-importer-operator is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711153" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711154" version="1" comment="containerized-data-importer-uploadserver is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711155" version="1" comment="obs-service-cdi_containers_meta is &lt;1.43.2-150300.8.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664292" version="1" comment="containerd is &lt;1.4.12-60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664376" version="1" comment="containerd-ctr is &lt;1.4.12-60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664293" version="1" comment="docker is &lt;20.10.12_ce-159.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664294" version="1" comment="docker-bash-completion is &lt;20.10.12_ce-159.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664295" version="1" comment="docker-fish-completion is &lt;20.10.12_ce-159.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664377" version="1" comment="docker-kubic is &lt;20.10.12_ce-159.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664378" version="1" comment="docker-kubic-bash-completion is &lt;20.10.12_ce-159.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664379" version="1" comment="docker-kubic-fish-completion is &lt;20.10.12_ce-159.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664380" version="1" comment="docker-kubic-kubeadm-criconfig is &lt;20.10.12_ce-159.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664381" version="1" comment="docker-kubic-zsh-completion is &lt;20.10.12_ce-159.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664382" version="1" comment="docker-zsh-completion is &lt;20.10.12_ce-159.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713886" version="1" comment="ruby2.5-rubygem-rack is &lt;2.0.8-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713931" version="1" comment="ruby2.5-rubygem-rack-doc is &lt;2.0.8-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713932" version="1" comment="ruby2.5-rubygem-rack-testsuite is &lt;2.0.8-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710224" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710405" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.36.7-150200.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710225" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710406" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.36.7-150200.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710226" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.7-150200.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710235" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710236" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710237" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710407" version="1" comment="webkit-jsc-4 is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710227" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710238" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710408" version="1" comment="webkit2gtk3-minibrowser is &lt;2.36.7-150200.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713878" version="1" comment="dpdk is &lt;19.11.4-150300.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713879" version="1" comment="dpdk-devel is &lt;19.11.4-150300.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713921" version="1" comment="dpdk-doc is &lt;19.11.4-150300.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713922" version="1" comment="dpdk-examples is &lt;19.11.4-150300.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713880" version="1" comment="dpdk-kmp-default is &lt;19.11.4_k5.3.18_150300.59.93-150300.16.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713923" version="1" comment="dpdk-kmp-preempt is &lt;19.11.4_k5.3.18_150300.59.93-150300.16.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713881" version="1" comment="dpdk-thunderx is &lt;19.11.4-150300.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713882" version="1" comment="dpdk-thunderx-devel is &lt;19.11.4-150300.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713924" version="1" comment="dpdk-thunderx-doc is &lt;19.11.4-150300.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713925" version="1" comment="dpdk-thunderx-examples is &lt;19.11.4-150300.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713883" version="1" comment="dpdk-thunderx-kmp-default is &lt;19.11.4_k5.3.18_150300.59.93-150300.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713926" version="1" comment="dpdk-thunderx-kmp-preempt is &lt;19.11.4_k5.3.18_150300.59.93-150300.16.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713927" version="1" comment="dpdk-thunderx-tools is &lt;19.11.4-150300.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713884" version="1" comment="dpdk-tools is &lt;19.11.4-150300.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713885" version="1" comment="libdpdk-20_0 is &lt;19.11.4-150300.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710656" version="1" comment="libmariadbd-devel is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710657" version="1" comment="libmariadbd19 is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710658" version="1" comment="mariadb is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710750" version="1" comment="mariadb-bench is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710659" version="1" comment="mariadb-client is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710660" version="1" comment="mariadb-errormessages is &lt;10.5.17-150300.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710751" version="1" comment="mariadb-rpm-macros is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710752" version="1" comment="mariadb-test is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710661" version="1" comment="mariadb-tools is &lt;10.5.17-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710788" version="1" comment="bsdtar is &lt;3.4.2-150200.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710776" version="1" comment="libarchive-devel is &lt;3.4.2-150200.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710777" version="1" comment="libarchive13 is &lt;3.4.2-150200.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711156" version="1" comment="libarchive13-32bit is &lt;3.4.2-150200.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714070" version="1" comment="permissions is &lt;20181225-150200.23.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714071" version="1" comment="permissions-zypp-plugin is &lt;20181225-150200.23.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714175" version="1" comment="MozillaFirefox is &lt;102.3.0-150200.152.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714176" version="1" comment="MozillaFirefox-branding-SLE is &lt;102-150200.9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714314" version="1" comment="MozillaFirefox-branding-upstream is &lt;102.3.0-150200.152.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714315" version="1" comment="MozillaFirefox-devel is &lt;102.3.0-150200.152.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714178" version="1" comment="MozillaFirefox-translations-common is &lt;102.3.0-150200.152.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714179" version="1" comment="MozillaFirefox-translations-other is &lt;102.3.0-150200.152.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710247" version="1" comment="snakeyaml is &lt;1.31-150200.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710409" version="1" comment="snakeyaml-javadoc is &lt;1.31-150200.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714387" version="1" comment="unzip is &lt;6.00-150000.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714749" version="1" comment="unzip-doc is &lt;6.00-150000.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714103" version="1" comment="caca-utils is &lt;0.99.beta19.git20171003-150200.11.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714073" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-150200.11.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714104" version="1" comment="libcaca-ruby is &lt;0.99.beta19.git20171003-150200.11.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714074" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-150200.11.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714105" version="1" comment="libcaca0-32bit is &lt;0.99.beta19.git20171003-150200.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714075" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-150200.11.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714106" version="1" comment="libcaca0-plugins-32bit is &lt;0.99.beta19.git20171003-150200.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714107" version="1" comment="python3-caca is &lt;0.99.beta19.git20171003-150200.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711138" version="1" comment="kernel-debug-base is &lt;4.12.14-150100.197.123.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710986" version="1" comment="kernel-default-man is &lt;4.12.14-150100.197.123.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711139" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-150100.197.123.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711140" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.123.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711141" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.123.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711142" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.123.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711143" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.123.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711144" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-150100.197.123.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710749" version="1" comment="libdpdk-18_11 is &lt;18.11.9-150100.4.19.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714180" version="1" comment="cargo1.62 is &lt;1.62.1-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714181" version="1" comment="rust1.62 is &lt;1.62.1-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709689" version="1" comment="libostree is &lt;2020.8-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709660" version="1" comment="libostree-1-1 is &lt;2020.8-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709690" version="1" comment="libostree-devel is &lt;2020.8-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709813" version="1" comment="libostree-grub2 is &lt;2020.8-150200.3.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709691" version="1" comment="typelib-1_0-OSTree-1_0 is &lt;2020.8-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711318" version="1" comment="vsftpd is &lt;3.0.5-150200.12.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716088" version="1" comment="libpmi0_18_08 is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716089" version="1" comment="perl-slurm_18_08 is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716090" version="1" comment="slurm_18_08 is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716091" version="1" comment="slurm_18_08-auth-none is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716092" version="1" comment="slurm_18_08-config is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716093" version="1" comment="slurm_18_08-config-man is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716094" version="1" comment="slurm_18_08-cray is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716095" version="1" comment="slurm_18_08-devel is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716096" version="1" comment="slurm_18_08-doc is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716097" version="1" comment="slurm_18_08-hdf5 is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716098" version="1" comment="slurm_18_08-lua is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716099" version="1" comment="slurm_18_08-munge is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716100" version="1" comment="slurm_18_08-node is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716101" version="1" comment="slurm_18_08-openlava is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716102" version="1" comment="slurm_18_08-pam_slurm is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716103" version="1" comment="slurm_18_08-plugins is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716104" version="1" comment="slurm_18_08-seff is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716105" version="1" comment="slurm_18_08-sjstat is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716106" version="1" comment="slurm_18_08-slurmdbd is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716107" version="1" comment="slurm_18_08-sql is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716108" version="1" comment="slurm_18_08-sview is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716109" version="1" comment="slurm_18_08-torque is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716110" version="1" comment="slurm_18_08-webdoc is &lt;18.08.9-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716111" version="1" comment="libslurm33 is &lt;18.08.9-150100.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714388" version="1" comment="libpython3_9-1_0 is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714750" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.14-150300.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714389" version="1" comment="python39 is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714751" version="1" comment="python39-32bit is &lt;3.9.14-150300.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714390" version="1" comment="python39-base is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714752" version="1" comment="python39-base-32bit is &lt;3.9.14-150300.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714391" version="1" comment="python39-curses is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714392" version="1" comment="python39-dbm is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714393" version="1" comment="python39-devel is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714753" version="1" comment="python39-doc is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714754" version="1" comment="python39-doc-devhelp is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714394" version="1" comment="python39-idle is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714755" version="1" comment="python39-testsuite is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714395" version="1" comment="python39-tk is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714396" version="1" comment="python39-tools is &lt;3.9.14-150300.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716087" version="1" comment="libslurm35 is &lt;20.02.7-150200.3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716112" version="1" comment="libnss_slurm2_20_02 is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716113" version="1" comment="libpmi0_20_02 is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716114" version="1" comment="perl-slurm_20_02 is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716115" version="1" comment="slurm_20_02 is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716116" version="1" comment="slurm_20_02-auth-none is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716117" version="1" comment="slurm_20_02-config is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716118" version="1" comment="slurm_20_02-config-man is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716119" version="1" comment="slurm_20_02-cray is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716120" version="1" comment="slurm_20_02-devel is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716121" version="1" comment="slurm_20_02-doc is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716122" version="1" comment="slurm_20_02-hdf5 is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716123" version="1" comment="slurm_20_02-lua is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716124" version="1" comment="slurm_20_02-munge is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716125" version="1" comment="slurm_20_02-node is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716126" version="1" comment="slurm_20_02-openlava is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716127" version="1" comment="slurm_20_02-pam_slurm is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716128" version="1" comment="slurm_20_02-plugins is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716129" version="1" comment="slurm_20_02-rest is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716130" version="1" comment="slurm_20_02-seff is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716131" version="1" comment="slurm_20_02-sjstat is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716132" version="1" comment="slurm_20_02-slurmdbd is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716133" version="1" comment="slurm_20_02-sql is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716134" version="1" comment="slurm_20_02-sview is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716135" version="1" comment="slurm_20_02-torque is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716136" version="1" comment="slurm_20_02-webdoc is &lt;20.02.7-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710789" version="1" comment="libgit2-28 is &lt;0.28.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711158" version="1" comment="libgit2-28-32bit is &lt;0.28.4-150200.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710790" version="1" comment="libgit2-devel is &lt;0.28.4-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710961" version="1" comment="libgit2-26 is &lt;0.26.8-150000.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711157" version="1" comment="libgit2-26-32bit is &lt;0.26.8-150000.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714325" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714742" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714326" version="1" comment="python is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714743" version="1" comment="python-32bit is &lt;2.7.18-150000.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714327" version="1" comment="python-base is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714744" version="1" comment="python-base-32bit is &lt;2.7.18-150000.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714329" version="1" comment="python-curses is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714745" version="1" comment="python-demo is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714330" version="1" comment="python-devel is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714746" version="1" comment="python-doc is &lt;2.7.18-150000.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714747" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714331" version="1" comment="python-gdbm is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714748" version="1" comment="python-idle is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714328" version="1" comment="python-tk is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714332" version="1" comment="python-xml is &lt;2.7.18-150000.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710252" version="1" comment="libjpeg-turbo is &lt;1.5.3-150000.32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710228" version="1" comment="libjpeg62 is &lt;62.2.0-150000.32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710412" version="1" comment="libjpeg62-32bit is &lt;62.2.0-150000.32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710229" version="1" comment="libjpeg62-devel is &lt;62.2.0-150000.32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710413" version="1" comment="libjpeg62-devel-32bit is &lt;62.2.0-150000.32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710414" version="1" comment="libjpeg62-turbo is &lt;1.5.3-150000.32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710230" version="1" comment="libjpeg8 is &lt;8.1.2-150000.32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710239" version="1" comment="libjpeg8-32bit is &lt;8.1.2-150000.32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710231" version="1" comment="libjpeg8-devel is &lt;8.1.2-150000.32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710415" version="1" comment="libjpeg8-devel-32bit is &lt;8.1.2-150000.32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710232" version="1" comment="libturbojpeg0 is &lt;8.1.2-150000.32.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710416" version="1" comment="libturbojpeg0-32bit is &lt;8.1.2-150000.32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716315" version="1" comment="libslurm32 is &lt;17.11.13-150000.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715360" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715791" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.36.8-150200.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715361" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715792" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.36.8-150200.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715362" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.8-150200.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715364" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715365" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715366" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715793" version="1" comment="webkit-jsc-4 is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715363" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715367" version="1" comment="webkit2gtk3-devel is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715794" version="1" comment="webkit2gtk3-minibrowser is &lt;2.36.8-150200.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716354" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716492" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716355" version="1" comment="python3 is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716356" version="1" comment="python3-base is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716357" version="1" comment="python3-curses is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716358" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716359" version="1" comment="python3-devel is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716493" version="1" comment="python3-doc is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716494" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716360" version="1" comment="python3-idle is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716495" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716361" version="1" comment="python3-tk is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716362" version="1" comment="python3-tools is &lt;3.6.15-150300.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710524" version="1" comment="ImageMagick is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710525" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710526" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710527" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710602" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-150200.10.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710603" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-150200.10.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710604" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710528" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710605" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-150200.10.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710529" version="1" comment="libMagick++-devel is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710606" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-150200.10.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710530" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710607" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710531" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710608" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-150200.10.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710532" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-150200.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715925" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.12-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716137" version="1" comment="ruby2.5-rubygem-puma-doc is &lt;4.3.12-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717301" version="1" comment="qemu-s390 is &lt;4.2.1-150200.69.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715808" version="1" comment="squid is &lt;4.17-150000.5.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715803" version="1" comment="expat is &lt;2.2.5-150000.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715804" version="1" comment="libexpat-devel is &lt;2.2.5-150000.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715921" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-150000.3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715805" version="1" comment="libexpat1 is &lt;2.2.5-150000.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715806" version="1" comment="libexpat1-32bit is &lt;2.2.5-150000.3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716317" version="1" comment="exiv2 is &lt;0.26-150000.6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716318" version="1" comment="exiv2-lang is &lt;0.26-150000.6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716207" version="1" comment="libexiv2-26 is &lt;0.26-150000.6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716319" version="1" comment="libexiv2-26-32bit is &lt;0.26-150000.6.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716208" version="1" comment="libexiv2-devel is &lt;0.26-150000.6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716320" version="1" comment="libexiv2-doc is &lt;0.26-150000.6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717663" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717664" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717665" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717649" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717650" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717666" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717667" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717668" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717651" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717652" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717653" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717669" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717670" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717671" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716220" version="1" comment="postgresql-jdbc is &lt;42.2.25-150300.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716321" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.25-150300.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716221" version="1" comment="nodejs14 is &lt;14.20.1-150200.15.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716222" version="1" comment="nodejs14-devel is &lt;14.20.1-150200.15.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716223" version="1" comment="nodejs14-docs is &lt;14.20.1-150200.15.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716224" version="1" comment="npm14 is &lt;14.20.1-150200.15.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716225" version="1" comment="nodejs16 is &lt;16.17.1-150300.7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716226" version="1" comment="nodejs16-devel is &lt;16.17.1-150300.7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716227" version="1" comment="nodejs16-docs is &lt;16.17.1-150300.7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716228" version="1" comment="npm16 is &lt;16.17.1-150300.7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716229" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716230" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716231" version="1" comment="nodejs12-docs is &lt;12.22.12-150200.4.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716232" version="1" comment="npm12 is &lt;12.22.12-150200.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716155" version="1" comment="ruby2.5-rubygem-activesupport-5_1 is &lt;5.1.4-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716187" version="1" comment="ruby2.5-rubygem-activesupport-doc-5_1 is &lt;5.1.4-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667757" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667758" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667759" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667465" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667466" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667760" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667761" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667762" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667467" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.40.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667468" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.40.4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667469" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667763" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667764" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667765" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.40.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718224" version="1" comment="libreoffice is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718225" version="1" comment="libreoffice-base is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718226" version="1" comment="libreoffice-base-drivers-postgresql is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718227" version="1" comment="libreoffice-branding-upstream is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718228" version="1" comment="libreoffice-calc is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718229" version="1" comment="libreoffice-calc-extensions is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718230" version="1" comment="libreoffice-draw is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718231" version="1" comment="libreoffice-filters-optional is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718232" version="1" comment="libreoffice-gdb-pretty-printers is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718233" version="1" comment="libreoffice-glade is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718234" version="1" comment="libreoffice-gnome is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718235" version="1" comment="libreoffice-gtk3 is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718236" version="1" comment="libreoffice-icon-themes is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718237" version="1" comment="libreoffice-impress is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718238" version="1" comment="libreoffice-l10n-af is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718239" version="1" comment="libreoffice-l10n-am is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718240" version="1" comment="libreoffice-l10n-ar is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718241" version="1" comment="libreoffice-l10n-as is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718242" version="1" comment="libreoffice-l10n-ast is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718243" version="1" comment="libreoffice-l10n-be is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718244" version="1" comment="libreoffice-l10n-bg is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718245" version="1" comment="libreoffice-l10n-bn is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718246" version="1" comment="libreoffice-l10n-bn_IN is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718247" version="1" comment="libreoffice-l10n-bo is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718248" version="1" comment="libreoffice-l10n-br is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718249" version="1" comment="libreoffice-l10n-brx is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718250" version="1" comment="libreoffice-l10n-bs is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718251" version="1" comment="libreoffice-l10n-ca is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718252" version="1" comment="libreoffice-l10n-ca_valencia is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718253" version="1" comment="libreoffice-l10n-ckb is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718254" version="1" comment="libreoffice-l10n-cs is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718255" version="1" comment="libreoffice-l10n-cy is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718256" version="1" comment="libreoffice-l10n-da is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718257" version="1" comment="libreoffice-l10n-de is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718258" version="1" comment="libreoffice-l10n-dgo is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718259" version="1" comment="libreoffice-l10n-dsb is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718260" version="1" comment="libreoffice-l10n-dz is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718261" version="1" comment="libreoffice-l10n-el is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718262" version="1" comment="libreoffice-l10n-en is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718263" version="1" comment="libreoffice-l10n-en_GB is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718264" version="1" comment="libreoffice-l10n-en_ZA is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718265" version="1" comment="libreoffice-l10n-eo is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718266" version="1" comment="libreoffice-l10n-es is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718267" version="1" comment="libreoffice-l10n-et is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718268" version="1" comment="libreoffice-l10n-eu is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718269" version="1" comment="libreoffice-l10n-fa is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718270" version="1" comment="libreoffice-l10n-fi is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718271" version="1" comment="libreoffice-l10n-fr is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718272" version="1" comment="libreoffice-l10n-fur is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718273" version="1" comment="libreoffice-l10n-fy is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718274" version="1" comment="libreoffice-l10n-ga is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718275" version="1" comment="libreoffice-l10n-gd is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718276" version="1" comment="libreoffice-l10n-gl is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718277" version="1" comment="libreoffice-l10n-gu is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718278" version="1" comment="libreoffice-l10n-gug is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718279" version="1" comment="libreoffice-l10n-he is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718280" version="1" comment="libreoffice-l10n-hi is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718281" version="1" comment="libreoffice-l10n-hr is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718282" version="1" comment="libreoffice-l10n-hsb is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718283" version="1" comment="libreoffice-l10n-hu is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718284" version="1" comment="libreoffice-l10n-id is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718285" version="1" comment="libreoffice-l10n-is is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718286" version="1" comment="libreoffice-l10n-it is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718287" version="1" comment="libreoffice-l10n-ja is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718288" version="1" comment="libreoffice-l10n-ka is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718289" version="1" comment="libreoffice-l10n-kab is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718290" version="1" comment="libreoffice-l10n-kk is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718291" version="1" comment="libreoffice-l10n-km is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718292" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718293" version="1" comment="libreoffice-l10n-kn is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718294" version="1" comment="libreoffice-l10n-ko is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718295" version="1" comment="libreoffice-l10n-kok is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718296" version="1" comment="libreoffice-l10n-ks is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718297" version="1" comment="libreoffice-l10n-lb is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718298" version="1" comment="libreoffice-l10n-lo is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718299" version="1" comment="libreoffice-l10n-lt is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718300" version="1" comment="libreoffice-l10n-lv is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718301" version="1" comment="libreoffice-l10n-mai is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718302" version="1" comment="libreoffice-l10n-mk is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718303" version="1" comment="libreoffice-l10n-ml is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718304" version="1" comment="libreoffice-l10n-mn is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718305" version="1" comment="libreoffice-l10n-mni is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718306" version="1" comment="libreoffice-l10n-mr is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718307" version="1" comment="libreoffice-l10n-my is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718308" version="1" comment="libreoffice-l10n-nb is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718309" version="1" comment="libreoffice-l10n-ne is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718310" version="1" comment="libreoffice-l10n-nl is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718311" version="1" comment="libreoffice-l10n-nn is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718312" version="1" comment="libreoffice-l10n-nr is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718313" version="1" comment="libreoffice-l10n-nso is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718314" version="1" comment="libreoffice-l10n-oc is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718315" version="1" comment="libreoffice-l10n-om is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718316" version="1" comment="libreoffice-l10n-or is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718317" version="1" comment="libreoffice-l10n-pa is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718318" version="1" comment="libreoffice-l10n-pl is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718319" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718320" version="1" comment="libreoffice-l10n-pt_PT is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718321" version="1" comment="libreoffice-l10n-ro is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718322" version="1" comment="libreoffice-l10n-ru is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718323" version="1" comment="libreoffice-l10n-rw is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718324" version="1" comment="libreoffice-l10n-sa_IN is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718325" version="1" comment="libreoffice-l10n-sat is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718326" version="1" comment="libreoffice-l10n-sd is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718327" version="1" comment="libreoffice-l10n-si is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718328" version="1" comment="libreoffice-l10n-sid is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718329" version="1" comment="libreoffice-l10n-sk is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718330" version="1" comment="libreoffice-l10n-sl is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718331" version="1" comment="libreoffice-l10n-sq is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718332" version="1" comment="libreoffice-l10n-sr is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718333" version="1" comment="libreoffice-l10n-ss is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718334" version="1" comment="libreoffice-l10n-st is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718335" version="1" comment="libreoffice-l10n-sv is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718336" version="1" comment="libreoffice-l10n-sw_TZ is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718337" version="1" comment="libreoffice-l10n-szl is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718338" version="1" comment="libreoffice-l10n-ta is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718339" version="1" comment="libreoffice-l10n-te is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718340" version="1" comment="libreoffice-l10n-tg is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718341" version="1" comment="libreoffice-l10n-th is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718342" version="1" comment="libreoffice-l10n-tn is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718343" version="1" comment="libreoffice-l10n-tr is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718344" version="1" comment="libreoffice-l10n-ts is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718345" version="1" comment="libreoffice-l10n-tt is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718346" version="1" comment="libreoffice-l10n-ug is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718347" version="1" comment="libreoffice-l10n-uk is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718348" version="1" comment="libreoffice-l10n-uz is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718349" version="1" comment="libreoffice-l10n-ve is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718350" version="1" comment="libreoffice-l10n-vec is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718351" version="1" comment="libreoffice-l10n-vi is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718352" version="1" comment="libreoffice-l10n-xh is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718353" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718354" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718355" version="1" comment="libreoffice-l10n-zu is &lt;7.3.6.2-150300.14.22.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718356" version="1" comment="libreoffice-librelogo is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718357" version="1" comment="libreoffice-mailmerge is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718358" version="1" comment="libreoffice-math is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718359" version="1" comment="libreoffice-officebean is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718360" version="1" comment="libreoffice-pyuno is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718361" version="1" comment="libreoffice-qt5 is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718362" version="1" comment="libreoffice-sdk is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718363" version="1" comment="libreoffice-sdk-doc is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718364" version="1" comment="libreoffice-writer is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718365" version="1" comment="libreoffice-writer-extensions is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718366" version="1" comment="libreofficekit is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718367" version="1" comment="libreofficekit-devel is &lt;7.3.6.2-150300.14.22.24.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667096" version="1" comment="kernel-debug-base is &lt;4.12.14-197.105.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667070" version="1" comment="kernel-default-man is &lt;4.12.14-197.105.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667097" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.105.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667098" version="1" comment="kernel-vanilla is &lt;4.12.14-197.105.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667099" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.105.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667100" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.105.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667101" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.105.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667102" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.105.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717044" version="1" comment="qemu is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717045" version="1" comment="qemu-SLOF is &lt;5.2.0-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717273" version="1" comment="qemu-arm is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717274" version="1" comment="qemu-audio-alsa is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717275" version="1" comment="qemu-audio-pa is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717276" version="1" comment="qemu-audio-spice is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717050" version="1" comment="qemu-block-curl is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717277" version="1" comment="qemu-block-dmg is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717278" version="1" comment="qemu-block-gluster is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717051" version="1" comment="qemu-block-iscsi is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717279" version="1" comment="qemu-block-nfs is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717052" version="1" comment="qemu-block-rbd is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717053" version="1" comment="qemu-block-ssh is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717054" version="1" comment="qemu-chardev-baum is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717280" version="1" comment="qemu-chardev-spice is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717281" version="1" comment="qemu-extra is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717056" version="1" comment="qemu-guest-agent is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717282" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717283" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717284" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717285" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717286" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717287" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717288" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717063" version="1" comment="qemu-ipxe is &lt;1.0.0+-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717289" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717064" version="1" comment="qemu-ksm is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717065" version="1" comment="qemu-kvm is &lt;5.2.0-150300.118.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717066" version="1" comment="qemu-lang is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717290" version="1" comment="qemu-linux-user is &lt;5.2.0-150300.118.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717291" version="1" comment="qemu-microvm is &lt;5.2.0-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717292" version="1" comment="qemu-ppc is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717293" version="1" comment="qemu-s390x is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717069" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717070" version="1" comment="qemu-sgabios is &lt;8-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717071" version="1" comment="qemu-skiboot is &lt;5.2.0-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717294" version="1" comment="qemu-testsuite is &lt;5.2.0-150300.118.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717037" version="1" comment="qemu-tools is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717072" version="1" comment="qemu-ui-curses is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717295" version="1" comment="qemu-ui-gtk is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717296" version="1" comment="qemu-ui-opengl is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717297" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717298" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717077" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-150300.118.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717299" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717300" version="1" comment="qemu-x86 is &lt;5.2.0-150300.118.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719046" version="1" comment="xen is &lt;4.14.5_06-150300.3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719047" version="1" comment="xen-devel is &lt;4.14.5_06-150300.3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719048" version="1" comment="xen-doc-html is &lt;4.14.5_06-150300.3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719049" version="1" comment="xen-libs is &lt;4.14.5_06-150300.3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719050" version="1" comment="xen-libs-32bit is &lt;4.14.5_06-150300.3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719051" version="1" comment="xen-tools is &lt;4.14.5_06-150300.3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719052" version="1" comment="xen-tools-domU is &lt;4.14.5_06-150300.3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718871" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.5_06-150300.3.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717039" version="1" comment="helm is &lt;3.9.4-150000.1.10.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717040" version="1" comment="helm-bash-completion is &lt;3.9.4-150000.1.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717042" version="1" comment="helm-fish-completion is &lt;3.9.4-150000.1.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717041" version="1" comment="helm-zsh-completion is &lt;3.9.4-150000.1.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715595" version="1" comment="clone-master-clean-up is &lt;1.8-150100.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716744" version="1" comment="go1.18 is &lt;1.18.7-150000.1.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716745" version="1" comment="go1.18-doc is &lt;1.18.7-150000.1.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716746" version="1" comment="go1.18-race is &lt;1.18.7-150000.1.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716747" version="1" comment="go1.19 is &lt;1.19.2-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716748" version="1" comment="go1.19-doc is &lt;1.19.2-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716749" version="1" comment="go1.19-race is &lt;1.19.2-150000.1.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714101" version="1" comment="jasper is &lt;2.0.14-150000.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714076" version="1" comment="libjasper-devel is &lt;2.0.14-150000.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714072" version="1" comment="libjasper4 is &lt;2.0.14-150000.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714102" version="1" comment="libjasper4-32bit is &lt;2.0.14-150000.3.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715592" version="1" comment="bind is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715593" version="1" comment="bind-chrootenv is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715349" version="1" comment="bind-devel is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715594" version="1" comment="bind-doc is &lt;9.16.6-150300.22.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715350" version="1" comment="bind-utils is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715351" version="1" comment="libbind9-1600 is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715352" version="1" comment="libdns1605 is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715353" version="1" comment="libirs-devel is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715354" version="1" comment="libirs1601 is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715355" version="1" comment="libisc1606 is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715356" version="1" comment="libisccc1600 is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715357" version="1" comment="libisccfg1600 is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715358" version="1" comment="libns1604 is &lt;9.16.6-150300.22.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715359" version="1" comment="python3-bind is &lt;9.16.6-150300.22.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718374" version="1" comment="libksba-devel is &lt;1.3.5-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718375" version="1" comment="libksba8 is &lt;1.3.5-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718767" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719768" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718768" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718725" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718727" version="1" comment="tiff is &lt;4.0.9-150000.45.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717302" version="1" comment="kernel-debug-base is &lt;4.12.14-150100.197.126.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716991" version="1" comment="kernel-default-man is &lt;4.12.14-150100.197.126.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717303" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-150100.197.126.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717304" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.126.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717305" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.126.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717306" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.126.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717307" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.126.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717308" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-150100.197.126.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667685" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667480" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667686" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667687" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667481" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667688" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667689" version="1" comment="dtb-al is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667690" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667691" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667692" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667693" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667694" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667695" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667696" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667697" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667698" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667699" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667700" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667701" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667702" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667703" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667704" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667705" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667706" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667707" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667708" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667709" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667710" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667711" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667712" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667482" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667713" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667415" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667416" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667714" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667715" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667716" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667717" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667718" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667719" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667417" version="1" comment="kernel-default is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667418" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.49.1.150300.18.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667720" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.49.1.150300.18.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667419" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667721" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667722" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667723" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667724" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667420" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667448" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667725" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667726" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667727" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667728" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667421" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667449" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667729" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667422" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667450" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667730" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667731" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667732" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667451" version="1" comment="kernel-source is &lt;5.3.18-150300.59.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667733" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667452" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667423" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.49.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667734" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667735" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667736" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667737" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667483" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667738" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667739" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667454" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667740" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.49.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720104" version="1" comment="kpartx is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720105" version="1" comment="libdmmp-devel is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720106" version="1" comment="libdmmp0_2_0 is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720107" version="1" comment="libmpath0 is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720108" version="1" comment="multipath-tools is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720109" version="1" comment="multipath-tools-devel is &lt;0.8.5+126+suse.8ce8da5-150300.2.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720053" version="1" comment="libdmmp0_1_0 is &lt;0.7.3+173+suse.7dd1b01-150000.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720056" version="1" comment="multipath-tools-rbd is &lt;0.7.3+173+suse.7dd1b01-150000.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718863" version="1" comment="MozillaFirefox is &lt;102.4.0-150200.152.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720861" version="1" comment="MozillaFirefox-branding-upstream is &lt;102.4.0-150200.152.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720862" version="1" comment="MozillaFirefox-devel is &lt;102.4.0-150200.152.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718865" version="1" comment="MozillaFirefox-translations-common is &lt;102.4.0-150200.152.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718866" version="1" comment="MozillaFirefox-translations-other is &lt;102.4.0-150200.152.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714757" version="1" comment="bind-devel-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714758" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714759" version="1" comment="libdns1605-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714760" version="1" comment="libirs1601-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714761" version="1" comment="libisc1606-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714762" version="1" comment="libisccc1600-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714763" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714764" version="1" comment="libns1604-32bit is &lt;9.16.6-150000.12.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716329" version="1" comment="python-paramiko-doc is &lt;2.4.3-150100.6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716215" version="1" comment="python2-paramiko is &lt;2.4.3-150100.6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716204" version="1" comment="python3-paramiko is &lt;2.4.3-150100.6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716751" version="1" comment="python2-waitress is &lt;1.4.3-150000.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716743" version="1" comment="python3-waitress is &lt;1.4.3-150000.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716943" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.3.0-150100.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663863" version="1" comment="libvirt is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663864" version="1" comment="libvirt-admin is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663865" version="1" comment="libvirt-bash-completion is &lt;7.1.0-150300.6.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663866" version="1" comment="libvirt-client is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663867" version="1" comment="libvirt-daemon is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663868" version="1" comment="libvirt-daemon-config-network is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663869" version="1" comment="libvirt-daemon-config-nwfilter is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663870" version="1" comment="libvirt-daemon-driver-interface is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663871" version="1" comment="libvirt-daemon-driver-libxl is &lt;7.1.0-150300.6.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663872" version="1" comment="libvirt-daemon-driver-lxc is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663873" version="1" comment="libvirt-daemon-driver-network is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663874" version="1" comment="libvirt-daemon-driver-nodedev is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663875" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663876" version="1" comment="libvirt-daemon-driver-qemu is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663877" version="1" comment="libvirt-daemon-driver-secret is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663878" version="1" comment="libvirt-daemon-driver-storage is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663879" version="1" comment="libvirt-daemon-driver-storage-core is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663880" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664024" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663881" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663882" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663883" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663884" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663885" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;7.1.0-150300.6.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663886" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663887" version="1" comment="libvirt-daemon-hooks is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663888" version="1" comment="libvirt-daemon-lxc is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663889" version="1" comment="libvirt-daemon-qemu is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663890" version="1" comment="libvirt-daemon-xen is &lt;7.1.0-150300.6.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663891" version="1" comment="libvirt-devel is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664025" version="1" comment="libvirt-devel-32bit is &lt;7.1.0-150300.6.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663892" version="1" comment="libvirt-doc is &lt;7.1.0-150300.6.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663838" version="1" comment="libvirt-libs is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663893" version="1" comment="libvirt-lock-sanlock is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663894" version="1" comment="libvirt-nss is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663839" version="1" comment="libwireshark15 is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663840" version="1" comment="libwiretap12 is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663841" version="1" comment="libwsutil13 is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663842" version="1" comment="wireshark is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663857" version="1" comment="wireshark-devel is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664026" version="1" comment="wireshark-plugin-libvirt is &lt;7.1.0-150300.6.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663858" version="1" comment="wireshark-ui-qt is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717270" version="1" comment="dracut-saltboot is &lt;0.1.1661440542.6cbe0da-150000.1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717271" version="1" comment="golang-github-lusitaniae-apache_exporter is &lt;0.11.0-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717272" version="1" comment="spacecmd is &lt;4.3.15-150000.3.86.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716499" version="1" comment="grafana is &lt;8.3.10-150200.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717542" version="1" comment="buildah is &lt;1.27.1-150300.8.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717534" version="1" comment="libgpg-error-devel is &lt;1.42-150300.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717624" version="1" comment="libgpg-error-devel-32bit is &lt;1.42-150300.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717535" version="1" comment="libgpg-error0 is &lt;1.42-150300.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717536" version="1" comment="libgpg-error0-32bit is &lt;1.42-150300.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721540" version="1" comment="curl is &lt;7.66.0-150200.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721541" version="1" comment="libcurl-devel is &lt;7.66.0-150200.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721800" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-150200.4.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721542" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721543" version="1" comment="libcurl4-32bit is &lt;7.66.0-150200.4.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721801" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721588" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721802" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721803" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721589" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721804" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721505" version="1" comment="dtb-al is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721805" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721806" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721807" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721808" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721809" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721810" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721811" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721812" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721813" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721814" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721815" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721816" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721817" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721818" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721819" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721820" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721821" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721822" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721823" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721824" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721825" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721506" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.98.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721826" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721590" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721827" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721544" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721545" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721828" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721829" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721830" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721831" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.98.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721832" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.98.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721833" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.98.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721547" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.98.1.150300.18.56.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721834" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.98.1.150300.18.56.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721548" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721835" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721836" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721837" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721838" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721549" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.98.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721567" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.98.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721839" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.98.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721840" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.98.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721841" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.98.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721842" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.98.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721550" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.98.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721568" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721843" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721551" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721569" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721844" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721845" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721846" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721570" version="1" comment="kernel-source is &lt;5.3.18-150300.59.98.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721847" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.98.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721571" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721552" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.98.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721848" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721849" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721850" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721851" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721591" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721852" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721853" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.98.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721572" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.98.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721854" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719072" version="1" comment="container-suseconnect is &lt;2.3.0-150000.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719714" version="1" comment="libmad-devel is &lt;0.15.1b-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719715" version="1" comment="libmad0 is &lt;0.15.1b-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721509" version="1" comment="libmad0-32bit is &lt;0.15.1b-150000.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720651" version="1" comment="telnet is &lt;1.2-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720652" version="1" comment="telnet-server is &lt;1.2-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721368" version="1" comment="libtasn1 is &lt;4.13-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721369" version="1" comment="libtasn1-6 is &lt;4.13-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721362" version="1" comment="libtasn1-6-32bit is &lt;4.13-150000.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721370" version="1" comment="libtasn1-devel is &lt;4.13-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721510" version="1" comment="libtasn1-devel-32bit is &lt;4.13-150000.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631564" version="1" comment="libpython3_9-1_0 is &lt;3.9.6-4.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662637" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.6-4.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631565" version="1" comment="python39 is &lt;3.9.6-4.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631612" version="1" comment="python39-32bit is &lt;3.9.6-4.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631566" version="1" comment="python39-base is &lt;3.9.6-4.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662638" version="1" comment="python39-base-32bit is &lt;3.9.6-4.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631567" version="1" comment="python39-curses is &lt;3.9.6-4.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631568" version="1" comment="python39-dbm is &lt;3.9.6-4.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631569" version="1" comment="python39-devel is &lt;3.9.6-4.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662639" version="1" comment="python39-doc is &lt;3.9.6-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662640" version="1" comment="python39-doc-devhelp is &lt;3.9.6-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631570" version="1" comment="python39-idle is &lt;3.9.6-4.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662641" version="1" comment="python39-testsuite is &lt;3.9.6-4.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631571" version="1" comment="python39-tk is &lt;3.9.6-4.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631572" version="1" comment="python39-tools is &lt;3.9.6-4.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721700" version="1" comment="MozillaThunderbird is &lt;102.4.0-150200.8.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721701" version="1" comment="MozillaThunderbird-translations-common is &lt;102.4.0-150200.8.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721702" version="1" comment="MozillaThunderbird-translations-other is &lt;102.4.0-150200.8.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721365" version="1" comment="libopenjp2-7 is &lt;2.3.0-150000.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721340" version="1" comment="libopenjp2-7-32bit is &lt;2.3.0-150000.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721366" version="1" comment="openjpeg2 is &lt;2.3.0-150000.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721367" version="1" comment="openjpeg2-devel is &lt;2.3.0-150000.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717537" version="1" comment="dbus-1 is &lt;1.12.2-150100.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717538" version="1" comment="dbus-1-devel is &lt;1.12.2-150100.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717626" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-150100.8.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717627" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-150100.8.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717539" version="1" comment="dbus-1-x11 is &lt;1.12.2-150100.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717540" version="1" comment="libdbus-1-3 is &lt;1.12.2-150100.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717541" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-150100.8.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710612" version="1" comment="libconfuse-devel is &lt;2.8-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710613" version="1" comment="libconfuse0 is &lt;2.8-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710543" version="1" comment="libconfuse0-lang is &lt;2.8-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714498" version="1" comment="podman is &lt;3.4.7-150300.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714499" version="1" comment="podman-cni-config is &lt;3.4.7-150300.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721793" version="1" comment="hsqldb is &lt;2.3.3-150000.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721794" version="1" comment="hsqldb-demo is &lt;2.3.3-150000.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721795" version="1" comment="hsqldb-javadoc is &lt;2.3.3-150000.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721796" version="1" comment="hsqldb-manual is &lt;2.3.3-150000.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720110" version="1" comment="hdf5-gnu-hpc is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720111" version="1" comment="hdf5-gnu-hpc-devel is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720112" version="1" comment="hdf5-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720113" version="1" comment="hdf5-gnu-mpich-hpc-devel is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720114" version="1" comment="hdf5-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720115" version="1" comment="hdf5-gnu-mvapich2-hpc-devel is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720116" version="1" comment="hdf5-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720117" version="1" comment="hdf5-gnu-openmpi3-hpc-devel is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720118" version="1" comment="hdf5-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720119" version="1" comment="hdf5-gnu-openmpi4-hpc-devel is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720120" version="1" comment="hdf5-hpc-examples is &lt;1.10.8-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721709" version="1" comment="hdf5_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721710" version="1" comment="hdf5_1_10_8-gnu-hpc-devel is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721711" version="1" comment="hdf5_1_10_8-gnu-hpc-devel-static is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721712" version="1" comment="hdf5_1_10_8-gnu-hpc-module is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721713" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721714" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc-devel is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721715" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc-devel-static is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721716" version="1" comment="hdf5_1_10_8-gnu-mpich-hpc-module is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721717" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721718" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721719" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc-devel-static is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721720" version="1" comment="hdf5_1_10_8-gnu-mvapich2-hpc-module is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721721" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721722" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721723" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc-devel-static is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721724" version="1" comment="hdf5_1_10_8-gnu-openmpi3-hpc-module is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721725" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721726" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721727" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc-devel-static is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721728" version="1" comment="hdf5_1_10_8-gnu-openmpi4-hpc-module is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721729" version="1" comment="hdf5_1_10_8-hpc-examples is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721730" version="1" comment="libhdf5-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721731" version="1" comment="libhdf5-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721732" version="1" comment="libhdf5-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721733" version="1" comment="libhdf5-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721734" version="1" comment="libhdf5-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721735" version="1" comment="libhdf5_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721736" version="1" comment="libhdf5_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721737" version="1" comment="libhdf5_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721738" version="1" comment="libhdf5_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721739" version="1" comment="libhdf5_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721740" version="1" comment="libhdf5_cpp-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721741" version="1" comment="libhdf5_cpp-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721742" version="1" comment="libhdf5_cpp-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721743" version="1" comment="libhdf5_cpp-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721744" version="1" comment="libhdf5_cpp-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721745" version="1" comment="libhdf5_cpp_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721746" version="1" comment="libhdf5_cpp_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721747" version="1" comment="libhdf5_cpp_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721748" version="1" comment="libhdf5_cpp_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721749" version="1" comment="libhdf5_cpp_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721750" version="1" comment="libhdf5_fortran-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721751" version="1" comment="libhdf5_fortran-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721752" version="1" comment="libhdf5_fortran-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721753" version="1" comment="libhdf5_fortran-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721754" version="1" comment="libhdf5_fortran-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721755" version="1" comment="libhdf5_fortran_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721756" version="1" comment="libhdf5_fortran_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721757" version="1" comment="libhdf5_fortran_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721758" version="1" comment="libhdf5_fortran_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721759" version="1" comment="libhdf5_fortran_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721760" version="1" comment="libhdf5_hl-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721761" version="1" comment="libhdf5_hl-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721762" version="1" comment="libhdf5_hl-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721763" version="1" comment="libhdf5_hl-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721764" version="1" comment="libhdf5_hl-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721765" version="1" comment="libhdf5_hl_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721766" version="1" comment="libhdf5_hl_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721767" version="1" comment="libhdf5_hl_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721768" version="1" comment="libhdf5_hl_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721769" version="1" comment="libhdf5_hl_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721770" version="1" comment="libhdf5_hl_cpp-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721771" version="1" comment="libhdf5_hl_cpp-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721772" version="1" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721773" version="1" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721774" version="1" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721775" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721776" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721777" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721778" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721779" version="1" comment="libhdf5_hl_cpp_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721780" version="1" comment="libhdf5_hl_fortran-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721781" version="1" comment="libhdf5_hl_fortran-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721782" version="1" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721783" version="1" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721784" version="1" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721785" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721786" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-mpich-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721787" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-mvapich2-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721788" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi3-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721789" version="1" comment="libhdf5hl_fortran_1_10_8-gnu-openmpi4-hpc is &lt;1.10.8-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713928" version="1" comment="libpodofo-devel is &lt;0.9.6-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713929" version="1" comment="libpodofo0_9_6 is &lt;0.9.6-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713930" version="1" comment="podofo is &lt;0.9.6-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715922" version="1" comment="python2-Flask-Security is &lt;3.0.0-150100.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715923" version="1" comment="python3-Flask-Security is &lt;3.0.0-150100.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716325" version="1" comment="nodejs10 is &lt;10.24.1-150000.1.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716326" version="1" comment="nodejs10-devel is &lt;10.24.1-150000.1.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716327" version="1" comment="nodejs10-docs is &lt;10.24.1-150000.1.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716328" version="1" comment="npm10 is &lt;10.24.1-150000.1.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717314" version="1" comment="python2-lxml-doc is &lt;4.0.0-150000.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717315" version="1" comment="python3-lxml-doc is &lt;4.0.0-150000.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721955" version="1" comment="libgnome-desktop-3-12 is &lt;3.26.2-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721956" version="1" comment="libgnome-desktop-3-12-32bit is &lt;3.26.2-150000.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721532" version="1" comment="xorg-x11-server is &lt;1.20.3-150200.22.5.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721533" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-150200.22.5.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721555" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-150200.22.5.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721704" version="1" comment="xorg-x11-server-source is &lt;1.20.3-150200.22.5.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721705" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-150200.22.5.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722778" version="1" comment="libntfs-3g-devel is &lt;2022.5.17-150000.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722779" version="1" comment="libntfs-3g87 is &lt;2022.5.17-150000.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722780" version="1" comment="ntfs-3g is &lt;2022.5.17-150000.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722781" version="1" comment="ntfsprogs is &lt;2022.5.17-150000.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722782" version="1" comment="ntfsprogs-extra is &lt;2022.5.17-150000.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715807" version="1" comment="python3-Flask-Security-Too is &lt;3.4.2-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721356" version="1" comment="ruby2.5-rubygem-loofah is &lt;2.2.2-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721798" version="1" comment="ruby2.5-rubygem-loofah-doc is &lt;2.2.2-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721799" version="1" comment="ruby2.5-rubygem-loofah-testsuite is &lt;2.2.2-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718928" version="1" comment="libxml2-2 is &lt;2.9.7-150000.3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718903" version="1" comment="libxml2-2-32bit is &lt;2.9.7-150000.3.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718929" version="1" comment="libxml2-devel is &lt;2.9.7-150000.3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721676" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-150000.3.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721677" version="1" comment="libxml2-doc is &lt;2.9.7-150000.3.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718930" version="1" comment="libxml2-tools is &lt;2.9.7-150000.3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718867" version="1" comment="python2-libxml2-python is &lt;2.9.7-150000.3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718931" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721364" version="1" comment="xmlbeans is &lt;2.6.0-150000.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721797" version="1" comment="xmlbeans-scripts is &lt;2.6.0-150000.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722308" version="1" comment="exiv2 is &lt;0.26-150000.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722309" version="1" comment="exiv2-lang is &lt;0.26-150000.6.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722266" version="1" comment="libexiv2-26 is &lt;0.26-150000.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722310" version="1" comment="libexiv2-26-32bit is &lt;0.26-150000.6.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722267" version="1" comment="libexiv2-devel is &lt;0.26-150000.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722311" version="1" comment="libexiv2-doc is &lt;0.26-150000.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724512" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724513" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724514" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724426" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724427" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724515" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724516" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724517" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724428" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724429" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724430" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724518" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724519" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724520" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721946" version="1" comment="libmilter-doc is &lt;8.15.2-150000.8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721887" version="1" comment="libmilter1_0 is &lt;8.15.2-150000.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721894" version="1" comment="rmail is &lt;8.15.2-150000.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721947" version="1" comment="sendmail is &lt;8.15.2-150000.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721948" version="1" comment="sendmail-devel is &lt;8.15.2-150000.8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721949" version="1" comment="sendmail-starttls is &lt;8.15.2-150000.8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710495" version="1" comment="gstreamer-plugins-base is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710590" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710496" version="1" comment="gstreamer-plugins-base-devel is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710591" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710592" version="1" comment="gstreamer-plugins-base-doc is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710497" version="1" comment="gstreamer-plugins-base-lang is &lt;1.16.3-150200.4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710498" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710593" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710499" version="1" comment="libgstapp-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710594" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710500" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710535" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710501" version="1" comment="libgstfft-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710595" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710502" version="1" comment="libgstgl-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710596" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710503" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710597" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710504" version="1" comment="libgstriff-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710598" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710505" version="1" comment="libgstrtp-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710599" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710506" version="1" comment="libgstrtsp-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710600" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710507" version="1" comment="libgstsdp-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710601" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710508" version="1" comment="libgsttag-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710536" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710509" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710537" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.16.3-150200.4.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710510" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710511" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710512" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710513" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710514" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710515" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710516" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710517" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710518" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710519" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.16.3-150200.4.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721888" version="1" comment="expat is &lt;2.2.5-150000.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721889" version="1" comment="libexpat-devel is &lt;2.2.5-150000.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721950" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-150000.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721890" version="1" comment="libexpat1 is &lt;2.2.5-150000.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721891" version="1" comment="libexpat1-32bit is &lt;2.2.5-150000.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717507" version="1" comment="vsftpd is &lt;3.0.5-150200.12.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722314" version="1" comment="kubevirt-container-disk is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722264" version="1" comment="kubevirt-manifests is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722315" version="1" comment="kubevirt-tests is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722316" version="1" comment="kubevirt-virt-api is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722317" version="1" comment="kubevirt-virt-controller is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722318" version="1" comment="kubevirt-virt-handler is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722319" version="1" comment="kubevirt-virt-launcher is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722320" version="1" comment="kubevirt-virt-operator is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722265" version="1" comment="kubevirt-virtctl is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722321" version="1" comment="obs-service-kubevirt_containers_meta is &lt;0.49.0-150300.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722490" version="1" comment="containerized-data-importer-api is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722491" version="1" comment="containerized-data-importer-cloner is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722492" version="1" comment="containerized-data-importer-controller is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722493" version="1" comment="containerized-data-importer-importer is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722466" version="1" comment="containerized-data-importer-manifests is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722494" version="1" comment="containerized-data-importer-operator is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722495" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722496" version="1" comment="containerized-data-importer-uploadserver is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722497" version="1" comment="obs-service-cdi_containers_meta is &lt;1.43.2-150300.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721519" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721678" version="1" comment="libprotobuf-lite20-32bit is &lt;3.9.2-150200.4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721520" version="1" comment="libprotobuf20 is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721679" version="1" comment="libprotobuf20-32bit is &lt;3.9.2-150200.4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721553" version="1" comment="libprotoc20 is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721680" version="1" comment="libprotoc20-32bit is &lt;3.9.2-150200.4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721554" version="1" comment="protobuf-devel is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721681" version="1" comment="protobuf-java is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721682" version="1" comment="protobuf-source is &lt;3.9.2-150200.4.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721576" version="1" comment="python2-protobuf is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721577" version="1" comment="python3-protobuf is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721557" version="1" comment="git is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721558" version="1" comment="git-arch is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721538" version="1" comment="git-core is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721790" version="1" comment="git-credential-gnome-keyring is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721791" version="1" comment="git-credential-libsecret is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721559" version="1" comment="git-cvs is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721560" version="1" comment="git-daemon is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721561" version="1" comment="git-doc is &lt;2.35.3-150300.10.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721562" version="1" comment="git-email is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721563" version="1" comment="git-gui is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721792" version="1" comment="git-p4 is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721564" version="1" comment="git-svn is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721565" version="1" comment="git-web is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721566" version="1" comment="gitk is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721539" version="1" comment="perl-Git is &lt;2.35.3-150300.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719096" version="1" comment="python2-rsa is &lt;3.4.2-150000.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721522" version="1" comment="python3-rsa is &lt;3.4.2-150000.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721556" version="1" comment="bsdtar is &lt;3.4.2-150200.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721536" version="1" comment="libarchive-devel is &lt;3.4.2-150200.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721537" version="1" comment="libarchive13 is &lt;3.4.2-150200.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721708" version="1" comment="libarchive13-32bit is &lt;3.4.2-150200.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725117" version="1" comment="xen is &lt;4.14.5_08-150300.3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725118" version="1" comment="xen-devel is &lt;4.14.5_08-150300.3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725119" version="1" comment="xen-doc-html is &lt;4.14.5_08-150300.3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725120" version="1" comment="xen-libs is &lt;4.14.5_08-150300.3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725121" version="1" comment="xen-libs-32bit is &lt;4.14.5_08-150300.3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725122" version="1" comment="xen-tools is &lt;4.14.5_08-150300.3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725123" version="1" comment="xen-tools-domU is &lt;4.14.5_08-150300.3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724898" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.5_08-150300.3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716214" version="1" comment="rustup is &lt;1.25.1~0-150300.7.13.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721534" version="1" comment="xterm is &lt;330-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721535" version="1" comment="xterm-bin is &lt;330-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709694" version="1" comment="ctdb is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709814" version="1" comment="ctdb-pcp-pmda is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709665" version="1" comment="libsamba-policy-devel is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709666" version="1" comment="libsamba-policy-python3-devel is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709667" version="1" comment="libsamba-policy0-python3 is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709815" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709816" version="1" comment="libsamba-policy0-python3-64bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709668" version="1" comment="samba is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709693" version="1" comment="samba-ad-dc is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709669" version="1" comment="samba-ad-dc-libs is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709670" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709671" version="1" comment="samba-ceph is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709672" version="1" comment="samba-client is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709673" version="1" comment="samba-client-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709817" version="1" comment="samba-client-64bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709674" version="1" comment="samba-client-libs is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709675" version="1" comment="samba-client-libs-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709676" version="1" comment="samba-devel is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709677" version="1" comment="samba-devel-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709818" version="1" comment="samba-doc is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709678" version="1" comment="samba-dsdb-modules is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709679" version="1" comment="samba-gpupdate is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709680" version="1" comment="samba-ldb-ldap is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709681" version="1" comment="samba-libs is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709682" version="1" comment="samba-libs-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709819" version="1" comment="samba-libs-64bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709683" version="1" comment="samba-libs-python3 is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709820" version="1" comment="samba-libs-python3-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709821" version="1" comment="samba-libs-python3-64bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709684" version="1" comment="samba-python3 is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709822" version="1" comment="samba-test is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709685" version="1" comment="samba-tool is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709686" version="1" comment="samba-winbind is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709687" version="1" comment="samba-winbind-libs is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709688" version="1" comment="samba-winbind-libs-32bit is &lt;4.15.8+git.527.8d0c05d313e-150300.3.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717043" version="1" comment="python2-Mako is &lt;1.0.7-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717038" version="1" comment="python3-Mako is &lt;1.0.7-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721523" version="1" comment="bluez is &lt;5.55-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721685" version="1" comment="bluez-auto-enable-devices is &lt;5.55-150300.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721686" version="1" comment="bluez-cups is &lt;5.55-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721524" version="1" comment="bluez-deprecated is &lt;5.55-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718726" version="1" comment="bluez-devel is &lt;5.55-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721687" version="1" comment="bluez-devel-32bit is &lt;5.55-150300.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721688" version="1" comment="bluez-test is &lt;5.55-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721525" version="1" comment="libbluetooth3 is &lt;5.55-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721689" version="1" comment="libbluetooth3-32bit is &lt;5.55-150300.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721690" version="1" comment="freerdp is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721691" version="1" comment="freerdp-devel is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721692" version="1" comment="freerdp-proxy is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721693" version="1" comment="freerdp-server is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721694" version="1" comment="freerdp-wayland is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721695" version="1" comment="libfreerdp2 is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721696" version="1" comment="libuwac0-0 is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721697" version="1" comment="libwinpr2 is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721698" version="1" comment="uwac0-0-devel is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721699" version="1" comment="winpr2-devel is &lt;2.1.2-150200.15.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721526" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721527" version="1" comment="libX11-6-32bit is &lt;1.6.5-150000.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721528" version="1" comment="libX11-data is &lt;1.6.5-150000.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721529" version="1" comment="libX11-devel is &lt;1.6.5-150000.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721703" version="1" comment="libX11-devel-32bit is &lt;1.6.5-150000.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721530" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721531" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-150000.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710410" version="1" comment="LibVNCServer-devel is &lt;0.9.10-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710411" version="1" comment="libvncclient0 is &lt;0.9.10-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710251" version="1" comment="libvncserver0 is &lt;0.9.10-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725348" version="1" comment="dhcp is &lt;4.3.6.P1-150000.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725349" version="1" comment="dhcp-client is &lt;4.3.6.P1-150000.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725350" version="1" comment="dhcp-devel is &lt;4.3.6.P1-150000.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725351" version="1" comment="dhcp-doc is &lt;4.3.6.P1-150000.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725352" version="1" comment="dhcp-relay is &lt;4.3.6.P1-150000.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725353" version="1" comment="dhcp-server is &lt;4.3.6.P1-150000.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718372" version="1" comment="jackson-databind is &lt;2.13.4.2-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718373" version="1" comment="jackson-databind-javadoc is &lt;2.13.4.2-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661893" version="1" comment="kubevirt-container-disk is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661857" version="1" comment="kubevirt-manifests is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661894" version="1" comment="kubevirt-tests is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661895" version="1" comment="kubevirt-virt-api is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661896" version="1" comment="kubevirt-virt-controller is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661897" version="1" comment="kubevirt-virt-handler is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661898" version="1" comment="kubevirt-virt-launcher is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661899" version="1" comment="kubevirt-virt-operator is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661858" version="1" comment="kubevirt-virtctl is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661900" version="1" comment="obs-service-kubevirt_containers_meta is &lt;0.45.0-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718376" version="1" comment="jsoup is &lt;1.15.3-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718659" version="1" comment="jsoup-javadoc is &lt;1.15.3-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722263" version="1" comment="ruby2.5-rubygem-nokogiri is &lt;1.8.5-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722312" version="1" comment="ruby2.5-rubygem-nokogiri-doc is &lt;1.8.5-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722313" version="1" comment="ruby2.5-rubygem-nokogiri-testsuite is &lt;1.8.5-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009719776" version="1" comment="python2-cryptography is &lt;2.9.2-150200.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721683" version="1" comment="python2-cryptography-vectors is &lt;2.9.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721521" version="1" comment="python3-cryptography is &lt;2.9.2-150200.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721684" version="1" comment="python3-cryptography-vectors is &lt;2.9.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724458" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724441" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724459" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724460" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724442" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724461" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724336" version="1" comment="dtb-al is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724462" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724463" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724464" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724465" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724466" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724467" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724468" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724469" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724470" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724471" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724472" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724473" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724474" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724475" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724476" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724477" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724478" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724479" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724480" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724481" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724482" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724337" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.101.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724483" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724443" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724484" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724408" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724409" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724485" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724486" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724487" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724488" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.101.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724489" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.101.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724490" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.101.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724410" version="1" comment="kernel-default is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724411" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.101.1.150300.18.58.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724491" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.101.1.150300.18.58.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724412" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724492" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724493" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724494" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724495" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724413" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724417" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724496" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724497" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.101.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724498" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.101.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724499" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.101.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724414" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724418" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724500" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724415" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724419" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724501" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724502" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724503" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724420" version="1" comment="kernel-source is &lt;5.3.18-150300.59.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724504" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724421" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724416" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.101.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724505" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724506" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724507" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724508" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724444" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724509" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724510" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.101.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724422" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.101.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724511" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.101.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722595" version="1" comment="go1.19 is &lt;1.19.3-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722596" version="1" comment="go1.19-doc is &lt;1.19.3-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722597" version="1" comment="go1.19-race is &lt;1.19.3-150000.1.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722598" version="1" comment="go1.18 is &lt;1.18.8-150000.1.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722599" version="1" comment="go1.18-doc is &lt;1.18.8-150000.1.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722600" version="1" comment="go1.18-race is &lt;1.18.8-150000.1.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723127" version="1" comment="libsystemd0 is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723128" version="1" comment="libsystemd0-32bit is &lt;246.16-150300.7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723129" version="1" comment="libudev-devel is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723296" version="1" comment="libudev-devel-32bit is &lt;246.16-150300.7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723130" version="1" comment="libudev1 is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723131" version="1" comment="libudev1-32bit is &lt;246.16-150300.7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723297" version="1" comment="nss-myhostname is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723298" version="1" comment="nss-myhostname-32bit is &lt;246.16-150300.7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723119" version="1" comment="nss-mymachines is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723120" version="1" comment="nss-mymachines-32bit is &lt;246.16-150300.7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723121" version="1" comment="nss-resolve is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723299" version="1" comment="nss-systemd is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723132" version="1" comment="systemd is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723133" version="1" comment="systemd-32bit is &lt;246.16-150300.7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723134" version="1" comment="systemd-container is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723135" version="1" comment="systemd-coredump is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723136" version="1" comment="systemd-devel is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723137" version="1" comment="systemd-doc is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723138" version="1" comment="systemd-journal-remote is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723139" version="1" comment="systemd-lang is &lt;246.16-150300.7.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723122" version="1" comment="systemd-logger is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723300" version="1" comment="systemd-network is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723140" version="1" comment="systemd-sysvinit is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723141" version="1" comment="udev is &lt;246.16-150300.7.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723301" version="1" comment="python-Twisted-doc is &lt;19.10.0-150200.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723302" version="1" comment="python2-Twisted is &lt;19.10.0-150200.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723142" version="1" comment="python3-Twisted is &lt;19.10.0-150200.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725334" version="1" comment="MozillaFirefox is &lt;102.5.0-150200.152.67.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725335" version="1" comment="MozillaFirefox-branding-upstream is &lt;102.5.0-150200.152.67.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725336" version="1" comment="MozillaFirefox-devel is &lt;102.5.0-150200.152.67.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725337" version="1" comment="MozillaFirefox-translations-common is &lt;102.5.0-150200.152.67.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725338" version="1" comment="MozillaFirefox-translations-other is &lt;102.5.0-150200.152.67.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723657" version="1" comment="apache2-mod_php7 is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723658" version="1" comment="php7 is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723659" version="1" comment="php7-bcmath is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723660" version="1" comment="php7-bz2 is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723661" version="1" comment="php7-calendar is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723662" version="1" comment="php7-ctype is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723663" version="1" comment="php7-curl is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723664" version="1" comment="php7-dba is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723665" version="1" comment="php7-devel is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723666" version="1" comment="php7-dom is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723653" version="1" comment="php7-embed is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723667" version="1" comment="php7-enchant is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723668" version="1" comment="php7-exif is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723669" version="1" comment="php7-fastcgi is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723670" version="1" comment="php7-fileinfo is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723624" version="1" comment="php7-firebird is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723671" version="1" comment="php7-fpm is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723672" version="1" comment="php7-ftp is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723673" version="1" comment="php7-gd is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723674" version="1" comment="php7-gettext is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723675" version="1" comment="php7-gmp is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723676" version="1" comment="php7-iconv is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723677" version="1" comment="php7-intl is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723678" version="1" comment="php7-json is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723679" version="1" comment="php7-ldap is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723680" version="1" comment="php7-mbstring is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723681" version="1" comment="php7-mysql is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723682" version="1" comment="php7-odbc is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723683" version="1" comment="php7-opcache is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723684" version="1" comment="php7-openssl is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723685" version="1" comment="php7-pcntl is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723686" version="1" comment="php7-pdo is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723687" version="1" comment="php7-pgsql is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723688" version="1" comment="php7-phar is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723689" version="1" comment="php7-posix is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723690" version="1" comment="php7-readline is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723691" version="1" comment="php7-shmop is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723692" version="1" comment="php7-snmp is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723693" version="1" comment="php7-soap is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723694" version="1" comment="php7-sockets is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723695" version="1" comment="php7-sodium is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723696" version="1" comment="php7-sqlite is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723697" version="1" comment="php7-sysvmsg is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723698" version="1" comment="php7-sysvsem is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723699" version="1" comment="php7-sysvshm is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724322" version="1" comment="php7-test is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723700" version="1" comment="php7-tidy is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723701" version="1" comment="php7-tokenizer is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723702" version="1" comment="php7-xmlreader is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723703" version="1" comment="php7-xmlrpc is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723704" version="1" comment="php7-xmlwriter is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723705" version="1" comment="php7-xsl is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723706" version="1" comment="php7-zip is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723707" version="1" comment="php7-zlib is &lt;7.4.33-150200.3.46.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725231" version="1" comment="libpython3_9-1_0 is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725232" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.15-150300.4.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725233" version="1" comment="python39 is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725234" version="1" comment="python39-32bit is &lt;3.9.15-150300.4.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725235" version="1" comment="python39-base is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725236" version="1" comment="python39-base-32bit is &lt;3.9.15-150300.4.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725237" version="1" comment="python39-curses is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725238" version="1" comment="python39-dbm is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725239" version="1" comment="python39-devel is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725240" version="1" comment="python39-doc is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725241" version="1" comment="python39-doc-devhelp is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725242" version="1" comment="python39-idle is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725243" version="1" comment="python39-testsuite is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725244" version="1" comment="python39-tk is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725245" version="1" comment="python39-tools is &lt;3.9.15-150300.4.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717506" version="1" comment="sccache is &lt;0.3.0~git5.14a4b8b-150300.7.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725722" version="1" comment="sudo is &lt;1.9.5p2-150300.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725723" version="1" comment="sudo-devel is &lt;1.9.5p2-150300.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725724" version="1" comment="sudo-plugin-python is &lt;1.9.5p2-150300.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725787" version="1" comment="sudo-test is &lt;1.9.5p2-150300.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721029" version="1" comment="java-11-openjdk is &lt;11.0.17.0-150000.3.86.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721706" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.17.0-150000.3.86.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721030" version="1" comment="java-11-openjdk-demo is &lt;11.0.17.0-150000.3.86.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721031" version="1" comment="java-11-openjdk-devel is &lt;11.0.17.0-150000.3.86.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721032" version="1" comment="java-11-openjdk-headless is &lt;11.0.17.0-150000.3.86.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720886" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.17.0-150000.3.86.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720887" version="1" comment="java-11-openjdk-jmods is &lt;11.0.17.0-150000.3.86.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721707" version="1" comment="java-11-openjdk-src is &lt;11.0.17.0-150000.3.86.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723000" version="1" comment="dpkg is &lt;1.19.0.4-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723001" version="1" comment="dpkg-devel is &lt;1.19.0.4-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723002" version="1" comment="dpkg-lang is &lt;1.19.0.4-150000.4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723003" version="1" comment="update-alternatives is &lt;1.19.0.4-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722397" version="1" comment="libopenjpeg1 is &lt;1.5.2-150000.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722398" version="1" comment="libopenjpeg1-32bit is &lt;1.5.2-150000.4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722399" version="1" comment="openjpeg is &lt;1.5.2-150000.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722400" version="1" comment="openjpeg-devel is &lt;1.5.2-150000.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722401" version="1" comment="openjpeg-devel-32bit is &lt;1.5.2-150000.4.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724662" version="1" comment="nodejs16 is &lt;16.18.1-150300.7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724663" version="1" comment="nodejs16-devel is &lt;16.18.1-150300.7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724664" version="1" comment="nodejs16-docs is &lt;16.18.1-150300.7.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724665" version="1" comment="npm16 is &lt;16.18.1-150300.7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725711" version="1" comment="MozillaThunderbird is &lt;102.5.0-150200.8.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725712" version="1" comment="MozillaThunderbird-translations-common is &lt;102.5.0-150200.8.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725713" version="1" comment="MozillaThunderbird-translations-other is &lt;102.5.0-150200.8.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724891" version="1" comment="389-ds is &lt;1.4.4.19~git59.136fc84-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724892" version="1" comment="389-ds-devel is &lt;1.4.4.19~git59.136fc84-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725110" version="1" comment="389-ds-snmp is &lt;1.4.4.19~git59.136fc84-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724893" version="1" comment="lib389 is &lt;1.4.4.19~git59.136fc84-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724894" version="1" comment="libsvrcore0 is &lt;1.4.4.19~git59.136fc84-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725842" version="1" comment="frr is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725843" version="1" comment="frr-devel is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725844" version="1" comment="libfrr0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725845" version="1" comment="libfrr_pb0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725846" version="1" comment="libfrrcares0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725847" version="1" comment="libfrrfpm_pb0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725848" version="1" comment="libfrrgrpc_pb0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725849" version="1" comment="libfrrospfapiclient0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725850" version="1" comment="libfrrsnmp0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725851" version="1" comment="libfrrzmq0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725852" version="1" comment="libmlag_pb0 is &lt;7.4-150300.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723071" version="1" comment="binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723072" version="1" comment="binutils-devel is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723073" version="1" comment="binutils-devel-32bit is &lt;2.39-150100.7.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723074" version="1" comment="binutils-gold is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723075" version="1" comment="cross-aarch64-binutils is &lt;2.39-150100.7.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723076" version="1" comment="cross-arm-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723077" version="1" comment="cross-avr-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723078" version="1" comment="cross-epiphany-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723079" version="1" comment="cross-hppa-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723080" version="1" comment="cross-hppa64-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723081" version="1" comment="cross-i386-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723082" version="1" comment="cross-ia64-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723083" version="1" comment="cross-m68k-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723084" version="1" comment="cross-mips-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723085" version="1" comment="cross-ppc-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723086" version="1" comment="cross-ppc64-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723087" version="1" comment="cross-ppc64le-binutils is &lt;2.39-150100.7.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723088" version="1" comment="cross-riscv64-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723089" version="1" comment="cross-rx-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723090" version="1" comment="cross-s390-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723091" version="1" comment="cross-s390x-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723092" version="1" comment="cross-sparc-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723093" version="1" comment="cross-sparc64-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723094" version="1" comment="cross-spu-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723095" version="1" comment="cross-x86_64-binutils is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723096" version="1" comment="libctf-nobfd0 is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723097" version="1" comment="libctf0 is &lt;2.39-150100.7.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724868" version="1" comment="libpixman-1-0 is &lt;0.34.0-150000.7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724872" version="1" comment="libpixman-1-0-32bit is &lt;0.34.0-150000.7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724869" version="1" comment="libpixman-1-0-devel is &lt;0.34.0-150000.7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726476" version="1" comment="strongswan is &lt;5.8.2-150200.11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726477" version="1" comment="strongswan-doc is &lt;5.8.2-150200.11.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726478" version="1" comment="strongswan-hmac is &lt;5.8.2-150200.11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726479" version="1" comment="strongswan-ipsec is &lt;5.8.2-150200.11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726480" version="1" comment="strongswan-libs0 is &lt;5.8.2-150200.11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726608" version="1" comment="strongswan-mysql is &lt;5.8.2-150200.11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726482" version="1" comment="strongswan-nm is &lt;5.8.2-150200.11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726609" version="1" comment="strongswan-sqlite is &lt;5.8.2-150200.11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725714" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.20-150000.3.65.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725715" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr7.20-150000.3.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725716" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.20-150000.3.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725717" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr7.20-150000.3.65.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725718" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.20-150000.3.65.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725719" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr7.20-150000.3.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725720" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.20-150000.3.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725721" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr7.20-150000.3.65.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726204" version="1" comment="krb5 is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726205" version="1" comment="krb5-32bit is &lt;1.19.2-150300.7.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726206" version="1" comment="krb5-client is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726207" version="1" comment="krb5-devel is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726380" version="1" comment="krb5-devel-32bit is &lt;1.19.2-150300.7.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726381" version="1" comment="krb5-mini is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726382" version="1" comment="krb5-mini-devel is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726219" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726208" version="1" comment="krb5-plugin-preauth-otp is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726209" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726210" version="1" comment="krb5-plugin-preauth-spake is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726220" version="1" comment="krb5-server is &lt;1.19.2-150300.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721341" version="1" comment="redis is &lt;6.0.14-150200.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716323" version="1" comment="colord is &lt;1.4.4-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716209" version="1" comment="colord-color-profiles is &lt;1.4.4-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716235" version="1" comment="colord-lang is &lt;1.4.4-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716210" version="1" comment="libcolord-devel is &lt;1.4.4-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716203" version="1" comment="libcolord2 is &lt;1.4.4-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716324" version="1" comment="libcolord2-32bit is &lt;1.4.4-150200.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716211" version="1" comment="libcolorhug2 is &lt;1.4.4-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716212" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.4.4-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716213" version="1" comment="typelib-1_0-Colorhug-1_0 is &lt;1.4.4-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714497" version="1" comment="opensc is &lt;0.19.0-150100.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714756" version="1" comment="opensc-32bit is &lt;0.19.0-150100.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726222" version="1" comment="nginx is &lt;1.19.8-150300.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726223" version="1" comment="nginx-source is &lt;1.19.8-150300.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726178" version="1" comment="vim-plugin-nginx is &lt;1.19.8-150300.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726481" version="1" comment="bsdtar is &lt;3.4.2-150200.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726474" version="1" comment="libarchive-devel is &lt;3.4.2-150200.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726475" version="1" comment="libarchive13 is &lt;3.4.2-150200.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726607" version="1" comment="libarchive13-32bit is &lt;3.4.2-150200.4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717343" version="1" comment="libsnmp40 is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717348" version="1" comment="libsnmp40-32bit is &lt;5.9.3-150300.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717344" version="1" comment="net-snmp is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717345" version="1" comment="net-snmp-devel is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717468" version="1" comment="net-snmp-devel-32bit is &lt;5.9.3-150300.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717346" version="1" comment="perl-SNMP is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717625" version="1" comment="python2-net-snmp is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717469" version="1" comment="python3-net-snmp is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717347" version="1" comment="snmp-mibs is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725447" version="1" comment="db48-doc is &lt;4.8.30-150000.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725448" version="1" comment="db48-utils is &lt;4.8.30-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725449" version="1" comment="libdb-4_8 is &lt;4.8.30-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725450" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-150000.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725451" version="1" comment="libdb-4_8-devel is &lt;4.8.30-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725452" version="1" comment="libdb-4_8-devel-32bit is &lt;4.8.30-150000.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725453" version="1" comment="libdb_java-4_8 is &lt;4.8.30-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725454" version="1" comment="libdb_java-4_8-devel is &lt;4.8.30-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726648" version="1" comment="erlang is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726649" version="1" comment="erlang-debugger is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726650" version="1" comment="erlang-debugger-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726651" version="1" comment="erlang-dialyzer is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726652" version="1" comment="erlang-dialyzer-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726653" version="1" comment="erlang-diameter is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726654" version="1" comment="erlang-diameter-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726655" version="1" comment="erlang-doc is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726656" version="1" comment="erlang-epmd is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726657" version="1" comment="erlang-et is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726658" version="1" comment="erlang-et-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726659" version="1" comment="erlang-jinterface is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726660" version="1" comment="erlang-jinterface-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726661" version="1" comment="erlang-observer is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726662" version="1" comment="erlang-observer-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726663" version="1" comment="erlang-reltool is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726664" version="1" comment="erlang-reltool-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726665" version="1" comment="erlang-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726666" version="1" comment="erlang-wx is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726667" version="1" comment="erlang-wx-src is &lt;22.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726211" version="1" comment="grub2 is &lt;2.04-150300.22.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726212" version="1" comment="grub2-arm64-efi is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726383" version="1" comment="grub2-arm64-efi-debug is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726384" version="1" comment="grub2-branding-upstream is &lt;2.04-150300.22.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726213" version="1" comment="grub2-i386-pc is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726385" version="1" comment="grub2-i386-pc-debug is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726214" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726386" version="1" comment="grub2-powerpc-ieee1275-debug is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726215" version="1" comment="grub2-s390x-emu is &lt;2.04-150300.22.25.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726387" version="1" comment="grub2-s390x-emu-debug is &lt;2.04-150300.22.25.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726216" version="1" comment="grub2-snapper-plugin is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726217" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726218" version="1" comment="grub2-x86_64-efi is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726388" version="1" comment="grub2-x86_64-efi-debug is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726221" version="1" comment="grub2-x86_64-xen is &lt;2.04-150300.22.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725111" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.352-150200.3.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725112" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.352-150200.3.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725113" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.352-150200.3.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725114" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.352-150200.3.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725115" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.352-150200.3.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724808" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.352-150200.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725116" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.352-150200.3.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724624" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724625" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724626" version="1" comment="nodejs12-docs is &lt;12.22.12-150200.4.41.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724627" version="1" comment="npm12 is &lt;12.22.12-150200.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724620" version="1" comment="nodejs14 is &lt;14.21.1-150200.15.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724621" version="1" comment="nodejs14-devel is &lt;14.21.1-150200.15.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724622" version="1" comment="nodejs14-docs is &lt;14.21.1-150200.15.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724623" version="1" comment="npm14 is &lt;14.21.1-150200.15.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725455" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725456" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725457" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725458" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725459" version="1" comment="tiff is &lt;4.0.9-150000.45.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725896" version="1" comment="busybox is &lt;1.35.0-150000.4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725897" version="1" comment="busybox-static is &lt;1.35.0-150000.4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725422" version="1" comment="exiv2 is &lt;0.26-150000.6.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725423" version="1" comment="exiv2-lang is &lt;0.26-150000.6.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725374" version="1" comment="libexiv2-26 is &lt;0.26-150000.6.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725424" version="1" comment="libexiv2-26-32bit is &lt;0.26-150000.6.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725375" version="1" comment="libexiv2-devel is &lt;0.26-150000.6.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725425" version="1" comment="libexiv2-doc is &lt;0.26-150000.6.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726756" version="1" comment="supportutils is &lt;3.1.21-150300.7.35.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726417" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726418" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726419" version="1" comment="python3 is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726420" version="1" comment="python3-base is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726421" version="1" comment="python3-curses is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726422" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726423" version="1" comment="python3-devel is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726424" version="1" comment="python3-doc is &lt;3.6.15-150300.10.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726425" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726426" version="1" comment="python3-idle is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726427" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726428" version="1" comment="python3-tk is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726429" version="1" comment="python3-tools is &lt;3.6.15-150300.10.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726767" version="1" comment="gvim is &lt;9.0.0814-150000.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726768" version="1" comment="vim is &lt;9.0.0814-150000.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726769" version="1" comment="vim-data is &lt;9.0.0814-150000.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726770" version="1" comment="vim-data-common is &lt;9.0.0814-150000.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726771" version="1" comment="vim-small is &lt;9.0.0814-150000.5.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726690" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726750" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.38.2-150200.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726691" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726751" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.38.2-150200.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726646" version="1" comment="libwebkit2gtk3-lang is &lt;2.38.2-150200.54.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726693" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726694" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726695" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726752" version="1" comment="webkit-jsc-4 is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726692" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726696" version="1" comment="webkit2gtk3-devel is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726753" version="1" comment="webkit2gtk3-minibrowser is &lt;2.38.2-150200.54.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726840" version="1" comment="freerdp is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726841" version="1" comment="freerdp-devel is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726842" version="1" comment="freerdp-proxy is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726843" version="1" comment="freerdp-server is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726844" version="1" comment="freerdp-wayland is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726845" version="1" comment="libfreerdp2 is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726846" version="1" comment="libuwac0-0 is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726847" version="1" comment="libwinpr2 is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726848" version="1" comment="uwac0-0-devel is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726849" version="1" comment="winpr2-devel is &lt;2.1.2-150200.15.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662913" version="1" comment="libsystemd0 is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662914" version="1" comment="libsystemd0-32bit is &lt;246.16-7.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662915" version="1" comment="libudev-devel is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663198" version="1" comment="libudev-devel-32bit is &lt;246.16-7.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662916" version="1" comment="libudev1 is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662917" version="1" comment="libudev1-32bit is &lt;246.16-7.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663199" version="1" comment="nss-myhostname is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663200" version="1" comment="nss-myhostname-32bit is &lt;246.16-7.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663201" version="1" comment="nss-mymachines is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663202" version="1" comment="nss-mymachines-32bit is &lt;246.16-7.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663203" version="1" comment="nss-resolve is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663204" version="1" comment="nss-systemd is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662918" version="1" comment="systemd is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662919" version="1" comment="systemd-32bit is &lt;246.16-7.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662920" version="1" comment="systemd-container is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662921" version="1" comment="systemd-coredump is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662922" version="1" comment="systemd-devel is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662923" version="1" comment="systemd-doc is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662924" version="1" comment="systemd-journal-remote is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662925" version="1" comment="systemd-lang is &lt;246.16-7.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663205" version="1" comment="systemd-logger is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663206" version="1" comment="systemd-network is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662926" version="1" comment="systemd-sysvinit is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662927" version="1" comment="udev is &lt;246.16-7.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724643" version="1" comment="nodejs10 is &lt;10.24.1-150000.1.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724644" version="1" comment="nodejs10-devel is &lt;10.24.1-150000.1.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724645" version="1" comment="nodejs10-docs is &lt;10.24.1-150000.1.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724646" version="1" comment="npm10 is &lt;10.24.1-150000.1.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724862" version="1" comment="bcel is &lt;5.2-150200.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727229" version="1" comment="busybox is &lt;1.35.0-150000.4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727230" version="1" comment="busybox-static is &lt;1.35.0-150000.4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727404" version="1" comment="emacs is &lt;25.3-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727405" version="1" comment="emacs-el is &lt;25.3-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727406" version="1" comment="emacs-info is &lt;25.3-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727407" version="1" comment="emacs-nox is &lt;25.3-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727409" version="1" comment="emacs-x11 is &lt;25.3-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727408" version="1" comment="etags is &lt;25.3-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727583" version="1" comment="MozillaThunderbird is &lt;102.5.1-150200.8.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727584" version="1" comment="MozillaThunderbird-translations-common is &lt;102.5.1-150200.8.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727585" version="1" comment="MozillaThunderbird-translations-other is &lt;102.5.1-150200.8.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727588" version="1" comment="buildah is &lt;1.28.2-150300.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727390" version="1" comment="erlang-rabbitmq-client is &lt;3.8.11-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727391" version="1" comment="rabbitmq-server is &lt;3.8.11-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727392" version="1" comment="rabbitmq-server-plugins is &lt;3.8.11-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727660" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.34.3-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727661" version="1" comment="libnautilus-extension1 is &lt;3.34.3-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727656" version="1" comment="libnautilus-extension1-32bit is &lt;3.34.3-150200.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727662" version="1" comment="nautilus is &lt;3.34.3-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727663" version="1" comment="nautilus-devel is &lt;3.34.3-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727664" version="1" comment="nautilus-lang is &lt;3.34.3-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727665" version="1" comment="typelib-1_0-Nautilus-3_0 is &lt;3.34.3-150200.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728124" version="1" comment="ctdb is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728209" version="1" comment="ctdb-pcp-pmda is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728098" version="1" comment="libsamba-policy-devel is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728099" version="1" comment="libsamba-policy-python3-devel is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728100" version="1" comment="libsamba-policy0-python3 is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728210" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728211" version="1" comment="libsamba-policy0-python3-64bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728101" version="1" comment="samba is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728123" version="1" comment="samba-ad-dc is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728102" version="1" comment="samba-ad-dc-libs is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728103" version="1" comment="samba-ad-dc-libs-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728104" version="1" comment="samba-ceph is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728105" version="1" comment="samba-client is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728106" version="1" comment="samba-client-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728212" version="1" comment="samba-client-64bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728107" version="1" comment="samba-client-libs is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728108" version="1" comment="samba-client-libs-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728109" version="1" comment="samba-devel is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728110" version="1" comment="samba-devel-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728213" version="1" comment="samba-doc is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728111" version="1" comment="samba-dsdb-modules is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728112" version="1" comment="samba-gpupdate is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728113" version="1" comment="samba-ldb-ldap is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728114" version="1" comment="samba-libs is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728115" version="1" comment="samba-libs-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728214" version="1" comment="samba-libs-64bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728116" version="1" comment="samba-libs-python3 is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728215" version="1" comment="samba-libs-python3-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728216" version="1" comment="samba-libs-python3-64bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728117" version="1" comment="samba-python3 is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728217" version="1" comment="samba-test is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728118" version="1" comment="samba-tool is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728119" version="1" comment="samba-winbind is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728120" version="1" comment="samba-winbind-libs is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728121" version="1" comment="samba-winbind-libs-32bit is &lt;4.15.12+git.535.7750e5c95ef-150300.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727820" version="1" comment="go1.19 is &lt;1.19.4-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727821" version="1" comment="go1.19-doc is &lt;1.19.4-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727822" version="1" comment="go1.19-race is &lt;1.19.4-150000.1.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727817" version="1" comment="go1.18 is &lt;1.18.9-150000.1.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727818" version="1" comment="go1.18-doc is &lt;1.18.9-150000.1.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727819" version="1" comment="go1.18-race is &lt;1.18.9-150000.1.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727224" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727225" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727226" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727227" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727228" version="1" comment="tiff is &lt;4.0.9-150000.45.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726647" version="1" comment="grafana is &lt;8.5.13-150200.3.29.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726468" version="1" comment="dracut-saltboot is &lt;0.1.1665997480.587fa10-150000.1.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726469" version="1" comment="golang-github-boynux-squid_exporter is &lt;1.6-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726470" version="1" comment="golang-github-prometheus-promu is &lt;0.13.0-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726472" version="1" comment="spacecmd is &lt;4.3.16-150000.3.89.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727576" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.352-150000.3.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727577" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.352-150000.3.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727578" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.352-150000.3.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727579" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.352-150000.3.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727580" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.352-150000.3.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727581" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.352-150000.3.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727582" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.352-150000.3.73.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727811" version="1" comment="libwireshark15 is &lt;3.6.10-150000.3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727812" version="1" comment="libwiretap12 is &lt;3.6.10-150000.3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727813" version="1" comment="libwsutil13 is &lt;3.6.10-150000.3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727814" version="1" comment="wireshark is &lt;3.6.10-150000.3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727815" version="1" comment="wireshark-devel is &lt;3.6.10-150000.3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727816" version="1" comment="wireshark-ui-qt is &lt;3.6.10-150000.3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727177" version="1" comment="libtpms-devel is &lt;0.8.2-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727178" version="1" comment="libtpms0 is &lt;0.8.2-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728093" version="1" comment="MozillaFirefox is &lt;102.6.0-150200.152.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728094" version="1" comment="MozillaFirefox-branding-upstream is &lt;102.6.0-150200.152.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728095" version="1" comment="MozillaFirefox-devel is &lt;102.6.0-150200.152.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728096" version="1" comment="MozillaFirefox-translations-common is &lt;102.6.0-150200.152.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728097" version="1" comment="MozillaFirefox-translations-other is &lt;102.6.0-150200.152.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728091" version="1" comment="containerd is &lt;1.6.12-150000.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728092" version="1" comment="containerd-ctr is &lt;1.6.12-150000.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728938" version="1" comment="xorg-x11-server is &lt;1.20.3-150200.22.5.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728939" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-150200.22.5.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728941" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-150200.22.5.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728997" version="1" comment="xorg-x11-server-source is &lt;1.20.3-150200.22.5.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728931" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-150200.22.5.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716752" version="1" comment="apache2-mod_wsgi is &lt;4.5.18-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716753" version="1" comment="apache2-mod_wsgi-python3 is &lt;4.5.18-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714720" version="1" comment="ceph is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714721" version="1" comment="ceph-base is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714478" version="1" comment="ceph-common is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714722" version="1" comment="ceph-fuse is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714723" version="1" comment="ceph-grafana-dashboards is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714724" version="1" comment="ceph-immutable-object-cache is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714725" version="1" comment="ceph-mds is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714726" version="1" comment="ceph-mgr is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714727" version="1" comment="ceph-mgr-cephadm is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714728" version="1" comment="ceph-mgr-dashboard is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714729" version="1" comment="ceph-mgr-diskprediction-local is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714730" version="1" comment="ceph-mgr-k8sevents is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714731" version="1" comment="ceph-mgr-modules-core is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714732" version="1" comment="ceph-mgr-rook is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714733" version="1" comment="ceph-mon is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714734" version="1" comment="ceph-osd is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714735" version="1" comment="ceph-prometheus-alerts is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714736" version="1" comment="ceph-radosgw is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714737" version="1" comment="ceph-test is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714738" version="1" comment="cephadm is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714739" version="1" comment="cephfs-shell is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714479" version="1" comment="libcephfs-devel is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714480" version="1" comment="libcephfs2 is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714481" version="1" comment="libfmt8 is &lt;8.0.1-150300.7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714482" version="1" comment="librados-devel is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714483" version="1" comment="librados2 is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714484" version="1" comment="libradospp-devel is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714485" version="1" comment="librbd-devel is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714486" version="1" comment="librbd1 is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714487" version="1" comment="librgw-devel is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714488" version="1" comment="librgw2 is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714489" version="1" comment="python3-ceph-argparse is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714490" version="1" comment="python3-ceph-common is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714491" version="1" comment="python3-cephfs is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714492" version="1" comment="python3-rados is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714493" version="1" comment="python3-rbd is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714494" version="1" comment="python3-rgw is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714495" version="1" comment="rados-objclass-devel is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714740" version="1" comment="rbd-fuse is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714741" version="1" comment="rbd-mirror is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714496" version="1" comment="rbd-nbd is &lt;16.2.9.536+g41a9f9a5573-150300.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729413" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729414" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729415" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729156" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729157" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729416" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729417" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729418" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729158" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729159" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729160" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729419" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729420" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729421" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728697" version="1" comment="kernel-debug-base is &lt;4.12.14-150100.197.131.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728698" version="1" comment="kernel-default-man is &lt;4.12.14-150100.197.131.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728699" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-150100.197.131.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728700" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.131.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728701" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.131.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728702" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.131.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728703" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.131.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728704" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-150100.197.131.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728924" version="1" comment="MozillaThunderbird is &lt;102.6.0-150200.8.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728925" version="1" comment="MozillaThunderbird-translations-common is &lt;102.6.0-150200.8.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728926" version="1" comment="MozillaThunderbird-translations-other is &lt;102.6.0-150200.8.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725840" version="1" comment="cni is &lt;0.7.1-150100.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725841" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729562" version="1" comment="helm is &lt;3.10.3-150000.1.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729563" version="1" comment="helm-bash-completion is &lt;3.10.3-150000.1.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729564" version="1" comment="helm-fish-completion is &lt;3.10.3-150000.1.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729565" version="1" comment="helm-zsh-completion is &lt;3.10.3-150000.1.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728940" version="1" comment="conmon is &lt;2.1.5-150300.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729404" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729405" version="1" comment="dlm-kmp-rt is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729406" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729407" version="1" comment="kernel-devel-rt is &lt;5.3.18-150300.112.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729347" version="1" comment="kernel-rt is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729408" version="1" comment="kernel-rt-devel is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729409" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729410" version="1" comment="kernel-source-rt is &lt;5.3.18-150300.112.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729411" version="1" comment="kernel-syms-rt is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729412" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-150300.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729350" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729161" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729351" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729352" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729162" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729353" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729073" version="1" comment="dtb-al is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729354" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729355" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729356" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729357" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729358" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729359" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729360" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729361" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729362" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729363" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729364" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729365" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729366" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729367" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729368" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729369" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729370" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729371" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729372" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729373" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729374" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729074" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.106.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729375" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729163" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729376" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729119" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729120" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729377" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729378" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729379" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729380" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.106.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729381" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.106.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729382" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.106.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729121" version="1" comment="kernel-default is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729122" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.106.1.150300.18.60.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729383" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.106.1.150300.18.60.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729123" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729384" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729385" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729386" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729387" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729124" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729128" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729388" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729389" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.106.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729390" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.106.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729391" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.106.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729125" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729129" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729392" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729126" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729130" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729393" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729394" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729395" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729131" version="1" comment="kernel-source is &lt;5.3.18-150300.59.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729396" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729132" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729127" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.106.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729397" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729398" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729399" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729400" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729164" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729401" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729402" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.106.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729133" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.106.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729403" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.106.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729740" version="1" comment="freeradius-server is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729741" version="1" comment="freeradius-server-devel is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729742" version="1" comment="freeradius-server-doc is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729743" version="1" comment="freeradius-server-krb5 is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729744" version="1" comment="freeradius-server-ldap is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729745" version="1" comment="freeradius-server-libs is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729746" version="1" comment="freeradius-server-mysql is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729747" version="1" comment="freeradius-server-perl is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729748" version="1" comment="freeradius-server-postgresql is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729749" version="1" comment="freeradius-server-python3 is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729750" version="1" comment="freeradius-server-sqlite is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729751" version="1" comment="freeradius-server-utils is &lt;3.0.21-150200.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729556" version="1" comment="libsqlite3-0 is &lt;3.39.3-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729557" version="1" comment="libsqlite3-0-32bit is &lt;3.39.3-150000.3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729558" version="1" comment="sqlite3 is &lt;3.39.3-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729559" version="1" comment="sqlite3-devel is &lt;3.39.3-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729560" version="1" comment="sqlite3-doc is &lt;3.39.3-150000.3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729561" version="1" comment="sqlite3-tcl is &lt;3.39.3-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730353" version="1" comment="libsystemd0 is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730354" version="1" comment="libsystemd0-32bit is &lt;246.16-150300.7.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730355" version="1" comment="libudev-devel is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730682" version="1" comment="libudev-devel-32bit is &lt;246.16-150300.7.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730356" version="1" comment="libudev1 is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730357" version="1" comment="libudev1-32bit is &lt;246.16-150300.7.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730683" version="1" comment="nss-myhostname is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730684" version="1" comment="nss-myhostname-32bit is &lt;246.16-150300.7.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730253" version="1" comment="nss-mymachines is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730254" version="1" comment="nss-mymachines-32bit is &lt;246.16-150300.7.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730255" version="1" comment="nss-resolve is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730685" version="1" comment="nss-systemd is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730358" version="1" comment="systemd is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730359" version="1" comment="systemd-32bit is &lt;246.16-150300.7.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730360" version="1" comment="systemd-container is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730361" version="1" comment="systemd-coredump is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730362" version="1" comment="systemd-devel is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730363" version="1" comment="systemd-doc is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730364" version="1" comment="systemd-journal-remote is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730365" version="1" comment="systemd-lang is &lt;246.16-150300.7.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730256" version="1" comment="systemd-logger is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730686" version="1" comment="systemd-network is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730366" version="1" comment="systemd-sysvinit is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730367" version="1" comment="udev is &lt;246.16-150300.7.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729551" version="1" comment="gvim is &lt;9.0.1040-150000.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729552" version="1" comment="vim is &lt;9.0.1040-150000.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729553" version="1" comment="vim-data is &lt;9.0.1040-150000.5.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729554" version="1" comment="vim-data-common is &lt;9.0.1040-150000.5.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729555" version="1" comment="vim-small is &lt;9.0.1040-150000.5.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729981" version="1" comment="curl is &lt;7.66.0-150200.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729982" version="1" comment="libcurl-devel is &lt;7.66.0-150200.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729983" version="1" comment="libcurl-devel-32bit is &lt;7.66.0-150200.4.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729984" version="1" comment="libcurl4 is &lt;7.66.0-150200.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729917" version="1" comment="libcurl4-32bit is &lt;7.66.0-150200.4.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667312" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667313" version="1" comment="virglrenderer-devel is &lt;0.6.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667340" version="1" comment="virglrenderer-test-server is &lt;0.6.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665431" version="1" comment="libtiff-devel is &lt;4.0.9-45.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666516" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665432" version="1" comment="libtiff5 is &lt;4.0.9-45.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665439" version="1" comment="libtiff5-32bit is &lt;4.0.9-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665440" version="1" comment="tiff is &lt;4.0.9-45.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664840" version="1" comment="cargo-doc is &lt;1.53.0-22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664557" version="1" comment="rust-analysis is &lt;1.53.0-22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664841" version="1" comment="rust-doc is &lt;1.53.0-22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664558" version="1" comment="rust-src is &lt;1.53.0-22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664852" version="1" comment="strongswan is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664853" version="1" comment="strongswan-doc is &lt;5.8.2-11.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664854" version="1" comment="strongswan-hmac is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664855" version="1" comment="strongswan-ipsec is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664856" version="1" comment="strongswan-libs0 is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665039" version="1" comment="strongswan-mysql is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664858" version="1" comment="strongswan-nm is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665040" version="1" comment="strongswan-sqlite is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664496" version="1" comment="clamav is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664497" version="1" comment="clamav-devel is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664498" version="1" comment="libclamav9 is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664499" version="1" comment="libfreshclam2 is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665433" version="1" comment="expat is &lt;2.2.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665434" version="1" comment="libexpat-devel is &lt;2.2.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666517" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665435" version="1" comment="libexpat1 is &lt;2.2.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665436" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667854" version="1" comment="python-Twisted-doc is &lt;19.10.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667855" version="1" comment="python2-Twisted is &lt;19.10.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667814" version="1" comment="python3-Twisted is &lt;19.10.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661027" version="1" comment="libsnmp30 is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661035" version="1" comment="libsnmp30-32bit is &lt;5.7.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661028" version="1" comment="net-snmp is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661029" version="1" comment="net-snmp-devel is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661802" version="1" comment="net-snmp-devel-32bit is &lt;5.7.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661030" version="1" comment="perl-SNMP is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661803" version="1" comment="python2-net-snmp is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661804" version="1" comment="python3-net-snmp is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661031" version="1" comment="snmp-mibs is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667948" version="1" comment="xerces-j2-scripts is &lt;2.11.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667903" version="1" comment="xerces-j2-xml-apis is &lt;2.11.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667904" version="1" comment="xerces-j2-xml-resolver is &lt;2.11.0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667862" version="1" comment="xerces-j2 is &lt;2.12.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667946" version="1" comment="xerces-j2-demo is &lt;2.12.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667947" version="1" comment="xerces-j2-javadoc is &lt;2.12.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662457" version="1" comment="libsndfile-devel is &lt;1.0.28-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662536" version="1" comment="libsndfile-progs is &lt;1.0.28-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662458" version="1" comment="libsndfile1 is &lt;1.0.28-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662463" version="1" comment="libsndfile1-32bit is &lt;1.0.28-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668273" version="1" comment="libpolkit0 is &lt;0.116-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668422" version="1" comment="libpolkit0-32bit is &lt;0.116-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668274" version="1" comment="polkit is &lt;0.116-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668275" version="1" comment="polkit-devel is &lt;0.116-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668423" version="1" comment="polkit-doc is &lt;0.116-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668276" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666508" version="1" comment="kubevirt-container-disk is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665437" version="1" comment="kubevirt-manifests is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666509" version="1" comment="kubevirt-tests is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666510" version="1" comment="kubevirt-virt-api is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666511" version="1" comment="kubevirt-virt-controller is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666512" version="1" comment="kubevirt-virt-handler is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666513" version="1" comment="kubevirt-virt-launcher is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666514" version="1" comment="kubevirt-virt-operator is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665438" version="1" comment="kubevirt-virtctl is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666515" version="1" comment="obs-service-kubevirt_containers_meta is &lt;0.49.0-150300.8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667424" version="1" comment="libsystemd0 is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667425" version="1" comment="libsystemd0-32bit is &lt;246.16-150300.7.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667426" version="1" comment="libudev-devel is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667741" version="1" comment="libudev-devel-32bit is &lt;246.16-150300.7.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667427" version="1" comment="libudev1 is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667428" version="1" comment="libudev1-32bit is &lt;246.16-150300.7.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667742" version="1" comment="nss-myhostname is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667743" version="1" comment="nss-myhostname-32bit is &lt;246.16-150300.7.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667744" version="1" comment="nss-mymachines is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667745" version="1" comment="nss-mymachines-32bit is &lt;246.16-150300.7.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667746" version="1" comment="nss-resolve is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667747" version="1" comment="nss-systemd is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667429" version="1" comment="systemd is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667430" version="1" comment="systemd-32bit is &lt;246.16-150300.7.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667431" version="1" comment="systemd-container is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667432" version="1" comment="systemd-coredump is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667433" version="1" comment="systemd-devel is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667434" version="1" comment="systemd-doc is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667435" version="1" comment="systemd-journal-remote is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667436" version="1" comment="systemd-lang is &lt;246.16-150300.7.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667748" version="1" comment="systemd-logger is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667749" version="1" comment="systemd-network is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667437" version="1" comment="systemd-sysvinit is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667438" version="1" comment="udev is &lt;246.16-150300.7.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667439" version="1" comment="ImageMagick is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667440" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667441" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667442" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667750" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667751" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-10.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667752" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667443" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667753" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667444" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667754" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667445" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667755" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667446" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667756" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667453" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669124" version="1" comment="MozillaThunderbird is &lt;91.6.1-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669125" version="1" comment="MozillaThunderbird-translations-common is &lt;91.6.1-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669126" version="1" comment="MozillaThunderbird-translations-other is &lt;91.6.1-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663207" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663208" version="1" comment="dlm-kmp-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663209" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662938" version="1" comment="kernel-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662939" version="1" comment="kernel-azure-devel is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663210" version="1" comment="kernel-azure-extra is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663211" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663212" version="1" comment="kernel-azure-optional is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662940" version="1" comment="kernel-devel-azure is &lt;5.3.18-38.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662941" version="1" comment="kernel-source-azure is &lt;5.3.18-38.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662942" version="1" comment="kernel-syms-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663213" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663214" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663215" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-38.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668420" version="1" comment="jasper is &lt;2.0.14-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668281" version="1" comment="libjasper-devel is &lt;2.0.14-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668272" version="1" comment="libjasper4 is &lt;2.0.14-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668421" version="1" comment="libjasper4-32bit is &lt;2.0.14-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667863" version="1" comment="ucode-intel is &lt;20220207-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662578" version="1" comment="MozillaThunderbird is &lt;91.4.1-8.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662579" version="1" comment="MozillaThunderbird-translations-common is &lt;91.4.1-8.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662580" version="1" comment="MozillaThunderbird-translations-other is &lt;91.4.1-8.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662616" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662633" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662617" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662634" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662635" version="1" comment="openexr is &lt;2.2.1-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662618" version="1" comment="openexr-devel is &lt;2.2.1-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662636" version="1" comment="openexr-doc is &lt;2.2.1-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662912" version="1" comment="python39-pip is &lt;20.2.4-7.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668508" version="1" comment="nodejs12 is &lt;12.22.10-4.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668509" version="1" comment="nodejs12-devel is &lt;12.22.10-4.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668510" version="1" comment="nodejs12-docs is &lt;12.22.10-4.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668511" version="1" comment="npm12 is &lt;12.22.10-4.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670272" version="1" comment="mysql-connector-java is &lt;5.1.47-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667683" version="1" comment="ldns is &lt;1.7.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667413" version="1" comment="ldns-devel is &lt;1.7.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667414" version="1" comment="libldns2 is &lt;1.7.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667447" version="1" comment="perl-DNS-LDNS is &lt;1.7.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667684" version="1" comment="python3-ldns is &lt;1.7.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662614" version="1" comment="libmspack-devel is &lt;0.6-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662615" version="1" comment="libmspack0 is &lt;0.6-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662631" version="1" comment="libmspack0-32bit is &lt;0.6-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662632" version="1" comment="mspack-tools is &lt;0.6-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668193" version="1" comment="MozillaFirefox is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668250" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668251" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668195" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668196" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667951" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667952" version="1" comment="php7 is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667953" version="1" comment="php7-bcmath is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667954" version="1" comment="php7-bz2 is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667955" version="1" comment="php7-calendar is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667956" version="1" comment="php7-ctype is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667957" version="1" comment="php7-curl is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667958" version="1" comment="php7-dba is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667959" version="1" comment="php7-devel is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667960" version="1" comment="php7-dom is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667950" version="1" comment="php7-embed is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667961" version="1" comment="php7-enchant is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667962" version="1" comment="php7-exif is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667963" version="1" comment="php7-fastcgi is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667964" version="1" comment="php7-fileinfo is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668191" version="1" comment="php7-firebird is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667965" version="1" comment="php7-fpm is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667966" version="1" comment="php7-ftp is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667967" version="1" comment="php7-gd is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667968" version="1" comment="php7-gettext is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667969" version="1" comment="php7-gmp is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667970" version="1" comment="php7-iconv is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667971" version="1" comment="php7-intl is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667972" version="1" comment="php7-json is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667973" version="1" comment="php7-ldap is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667974" version="1" comment="php7-mbstring is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667975" version="1" comment="php7-mysql is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667976" version="1" comment="php7-odbc is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667977" version="1" comment="php7-opcache is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667978" version="1" comment="php7-openssl is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667979" version="1" comment="php7-pcntl is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667980" version="1" comment="php7-pdo is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667981" version="1" comment="php7-pgsql is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667982" version="1" comment="php7-phar is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667983" version="1" comment="php7-posix is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667984" version="1" comment="php7-readline is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667985" version="1" comment="php7-shmop is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667986" version="1" comment="php7-snmp is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667987" version="1" comment="php7-soap is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667988" version="1" comment="php7-sockets is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667989" version="1" comment="php7-sodium is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667990" version="1" comment="php7-sqlite is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667991" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667992" version="1" comment="php7-sysvsem is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667993" version="1" comment="php7-sysvshm is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668192" version="1" comment="php7-test is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667994" version="1" comment="php7-tidy is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667995" version="1" comment="php7-tokenizer is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667996" version="1" comment="php7-xmlreader is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667997" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667998" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667999" version="1" comment="php7-xsl is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668000" version="1" comment="php7-zip is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668001" version="1" comment="php7-zlib is &lt;7.4.6-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669854" version="1" comment="nodejs8 is &lt;8.17.0-10.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669855" version="1" comment="nodejs8-devel is &lt;8.17.0-10.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669768" version="1" comment="nodejs8-docs is &lt;8.17.0-10.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669856" version="1" comment="npm8 is &lt;8.17.0-10.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670663" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670986" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670664" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670987" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670665" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.6-29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670668" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670669" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670670" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670988" version="1" comment="webkit-jsc-4 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670666" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670671" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670989" version="1" comment="webkit2gtk3-minibrowser is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669930" version="1" comment="flatpak is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669931" version="1" comment="flatpak-devel is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669932" version="1" comment="flatpak-zsh-completion is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669933" version="1" comment="libflatpak0 is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669934" version="1" comment="system-user-flatpak is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669935" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669162" version="1" comment="expat is &lt;2.2.5-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669163" version="1" comment="libexpat-devel is &lt;2.2.5-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669531" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669164" version="1" comment="libexpat1 is &lt;2.2.5-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669165" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669194" version="1" comment="nodejs14 is &lt;14.19.0-15.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669195" version="1" comment="nodejs14-devel is &lt;14.19.0-15.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669196" version="1" comment="nodejs14-docs is &lt;14.19.0-15.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669197" version="1" comment="npm14 is &lt;14.19.0-15.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669161" version="1" comment="wpa_supplicant is &lt;2.9-4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669530" version="1" comment="wpa_supplicant-gui is &lt;2.9-4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669014" version="1" comment="gnutls is &lt;3.6.7-14.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669127" version="1" comment="gnutls-guile is &lt;3.6.7-14.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669015" version="1" comment="libgnutls-devel is &lt;3.6.7-14.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669128" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669016" version="1" comment="libgnutls30 is &lt;3.6.7-14.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669017" version="1" comment="libgnutls30-32bit is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669018" version="1" comment="libgnutls30-hmac is &lt;3.6.7-14.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669019" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669020" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-14.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669021" version="1" comment="libgnutlsxx28 is &lt;3.6.7-14.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670667" version="1" comment="containerd is &lt;1.4.12-63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670990" version="1" comment="containerd-ctr is &lt;1.4.12-63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669010" version="1" comment="libwireshark15 is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669011" version="1" comment="libwiretap12 is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669012" version="1" comment="libwsutil13 is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669013" version="1" comment="wireshark is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669022" version="1" comment="wireshark-devel is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669023" version="1" comment="wireshark-ui-qt is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669729" version="1" comment="go1.17 is &lt;1.17.7-1.20.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669730" version="1" comment="go1.17-doc is &lt;1.17.7-1.20.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669572" version="1" comment="go1.17-race is &lt;1.17.7-1.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669567" version="1" comment="go1.16 is &lt;1.16.14-1.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669568" version="1" comment="go1.16-doc is &lt;1.16.14-1.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669569" version="1" comment="go1.16-race is &lt;1.16.14-1.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669140" version="1" comment="libblkid-devel is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669517" version="1" comment="libblkid-devel-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669141" version="1" comment="libblkid-devel-static is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669142" version="1" comment="libblkid1 is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669143" version="1" comment="libblkid1-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669518" version="1" comment="libeconf-devel is &lt;0.4.4+git20220104.962774f-150300.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669144" version="1" comment="libeconf0 is &lt;0.4.4+git20220104.962774f-150300.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669519" version="1" comment="libeconf0-32bit is &lt;0.4.4+git20220104.962774f-150300.3.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669145" version="1" comment="libfdisk-devel is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669520" version="1" comment="libfdisk-devel-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669521" version="1" comment="libfdisk-devel-static is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669146" version="1" comment="libfdisk1 is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669522" version="1" comment="libfdisk1-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669147" version="1" comment="libmount-devel is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669523" version="1" comment="libmount-devel-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669524" version="1" comment="libmount-devel-static is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669148" version="1" comment="libmount1 is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669149" version="1" comment="libmount1-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669150" version="1" comment="libsmartcols-devel is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669525" version="1" comment="libsmartcols-devel-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669526" version="1" comment="libsmartcols-devel-static is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669151" version="1" comment="libsmartcols1 is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669527" version="1" comment="libsmartcols1-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669152" version="1" comment="libuuid-devel is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669528" version="1" comment="libuuid-devel-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669153" version="1" comment="libuuid-devel-static is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669154" version="1" comment="libuuid1 is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669155" version="1" comment="libuuid1-32bit is &lt;2.36.2-150300.4.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669156" version="1" comment="login_defs is &lt;4.8.1-150300.4.3.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669529" version="1" comment="python3-libmount is &lt;2.36.2-150300.4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669157" version="1" comment="shadow is &lt;4.8.1-150300.4.3.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669158" version="1" comment="util-linux is &lt;2.36.2-150300.4.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669159" version="1" comment="util-linux-lang is &lt;2.36.2-150300.4.14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669160" version="1" comment="util-linux-systemd is &lt;2.36.2-150300.4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669191" version="1" comment="uuidd is &lt;2.36.2-150300.4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669750" version="1" comment="libmariadbd-devel is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669751" version="1" comment="libmariadbd19 is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669752" version="1" comment="mariadb is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669857" version="1" comment="mariadb-bench is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669753" version="1" comment="mariadb-client is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669754" version="1" comment="mariadb-errormessages is &lt;10.5.15-150300.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669858" version="1" comment="mariadb-rpm-macros is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669859" version="1" comment="mariadb-test is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669755" version="1" comment="mariadb-tools is &lt;10.5.15-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670453" version="1" comment="zsh is &lt;5.6-7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670572" version="1" comment="zsh-htmldoc is &lt;5.6-7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669929" version="1" comment="gvim is &lt;8.0.1568-5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669881" version="1" comment="vim is &lt;8.0.1568-5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669882" version="1" comment="vim-data is &lt;8.0.1568-5.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669883" version="1" comment="vim-data-common is &lt;8.0.1568-5.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669884" version="1" comment="vim-small is &lt;8.0.1568-5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669166" version="1" comment="cyrus-sasl is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669167" version="1" comment="cyrus-sasl-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669181" version="1" comment="cyrus-sasl-bdb is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669532" version="1" comment="cyrus-sasl-bdb-crammd5 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669192" version="1" comment="cyrus-sasl-bdb-devel is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669182" version="1" comment="cyrus-sasl-bdb-digestmd5 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669183" version="1" comment="cyrus-sasl-bdb-gs2 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669184" version="1" comment="cyrus-sasl-bdb-gssapi is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669185" version="1" comment="cyrus-sasl-bdb-ntlm is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669186" version="1" comment="cyrus-sasl-bdb-otp is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669187" version="1" comment="cyrus-sasl-bdb-plain is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669188" version="1" comment="cyrus-sasl-bdb-scram is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669168" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669169" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669170" version="1" comment="cyrus-sasl-devel is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669533" version="1" comment="cyrus-sasl-devel-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669171" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669172" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669534" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669173" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669174" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669535" version="1" comment="cyrus-sasl-ldap-auxprop is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669536" version="1" comment="cyrus-sasl-ldap-auxprop-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669537" version="1" comment="cyrus-sasl-ldap-auxprop-bdb is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669538" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669175" version="1" comment="cyrus-sasl-otp is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669539" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669176" version="1" comment="cyrus-sasl-plain is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669177" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669178" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669189" version="1" comment="cyrus-sasl-saslauthd-bdb is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669540" version="1" comment="cyrus-sasl-scram is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669193" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669541" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669190" version="1" comment="cyrus-sasl-sqlauxprop-bdb is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669179" version="1" comment="libsasl2-3 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669180" version="1" comment="libsasl2-3-32bit is &lt;2.1.27-150300.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671899" version="1" comment="cluster-md-kmp-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671900" version="1" comment="dlm-kmp-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671901" version="1" comment="gfs2-kmp-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671408" version="1" comment="kernel-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671409" version="1" comment="kernel-azure-devel is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671902" version="1" comment="kernel-azure-extra is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671903" version="1" comment="kernel-azure-livepatch-devel is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671904" version="1" comment="kernel-azure-optional is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671410" version="1" comment="kernel-devel-azure is &lt;5.3.18-150300.38.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671411" version="1" comment="kernel-source-azure is &lt;5.3.18-150300.38.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671412" version="1" comment="kernel-syms-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671905" version="1" comment="kselftests-kmp-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671906" version="1" comment="ocfs2-kmp-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671907" version="1" comment="reiserfs-kmp-azure is &lt;5.3.18-150300.38.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671908" version="1" comment="cluster-md-kmp-64kb is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671446" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671909" version="1" comment="cluster-md-kmp-preempt is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671910" version="1" comment="dlm-kmp-64kb is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671447" version="1" comment="dlm-kmp-default is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671911" version="1" comment="dlm-kmp-preempt is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671912" version="1" comment="dtb-al is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671913" version="1" comment="dtb-allwinner is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671914" version="1" comment="dtb-altera is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671915" version="1" comment="dtb-amd is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671916" version="1" comment="dtb-amlogic is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671917" version="1" comment="dtb-apm is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671918" version="1" comment="dtb-arm is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671919" version="1" comment="dtb-broadcom is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671920" version="1" comment="dtb-cavium is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671921" version="1" comment="dtb-exynos is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671922" version="1" comment="dtb-freescale is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671923" version="1" comment="dtb-hisilicon is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671924" version="1" comment="dtb-lg is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671925" version="1" comment="dtb-marvell is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671926" version="1" comment="dtb-mediatek is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671927" version="1" comment="dtb-nvidia is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671928" version="1" comment="dtb-qcom is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671929" version="1" comment="dtb-renesas is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671930" version="1" comment="dtb-rockchip is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671931" version="1" comment="dtb-socionext is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671932" version="1" comment="dtb-sprd is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671933" version="1" comment="dtb-xilinx is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671934" version="1" comment="dtb-zte is &lt;5.3.18-150300.59.54.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671935" version="1" comment="gfs2-kmp-64kb is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671448" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671936" version="1" comment="gfs2-kmp-preempt is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671371" version="1" comment="kernel-64kb is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671372" version="1" comment="kernel-64kb-devel is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671937" version="1" comment="kernel-64kb-extra is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671938" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671939" version="1" comment="kernel-64kb-optional is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671940" version="1" comment="kernel-debug is &lt;5.3.18-150300.59.54.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671941" version="1" comment="kernel-debug-devel is &lt;5.3.18-150300.59.54.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671942" version="1" comment="kernel-debug-livepatch-devel is &lt;5.3.18-150300.59.54.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671373" version="1" comment="kernel-default is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671374" version="1" comment="kernel-default-base is &lt;5.3.18-150300.59.54.1.150300.18.35.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671943" version="1" comment="kernel-default-base-rebuild is &lt;5.3.18-150300.59.54.1.150300.18.35.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671375" version="1" comment="kernel-default-devel is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671944" version="1" comment="kernel-default-extra is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671945" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671946" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671947" version="1" comment="kernel-default-optional is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671376" version="1" comment="kernel-devel is &lt;5.3.18-150300.59.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671391" version="1" comment="kernel-docs is &lt;5.3.18-150300.59.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671948" version="1" comment="kernel-docs-html is &lt;5.3.18-150300.59.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671949" version="1" comment="kernel-kvmsmall is &lt;5.3.18-150300.59.54.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671950" version="1" comment="kernel-kvmsmall-devel is &lt;5.3.18-150300.59.54.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671951" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.3.18-150300.59.54.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671377" version="1" comment="kernel-macros is &lt;5.3.18-150300.59.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671392" version="1" comment="kernel-obs-build is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671952" version="1" comment="kernel-obs-qa is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671378" version="1" comment="kernel-preempt is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671393" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671953" version="1" comment="kernel-preempt-extra is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671954" version="1" comment="kernel-preempt-livepatch-devel is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671955" version="1" comment="kernel-preempt-optional is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671394" version="1" comment="kernel-source is &lt;5.3.18-150300.59.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671956" version="1" comment="kernel-source-vanilla is &lt;5.3.18-150300.59.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671395" version="1" comment="kernel-syms is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671379" version="1" comment="kernel-zfcpdump is &lt;5.3.18-150300.59.54.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671957" version="1" comment="kselftests-kmp-64kb is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671958" version="1" comment="kselftests-kmp-default is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671959" version="1" comment="kselftests-kmp-preempt is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671960" version="1" comment="ocfs2-kmp-64kb is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671449" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671961" version="1" comment="ocfs2-kmp-preempt is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671962" version="1" comment="reiserfs-kmp-64kb is &lt;5.3.18-150300.59.54.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671396" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150300.59.54.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671963" version="1" comment="reiserfs-kmp-preempt is &lt;5.3.18-150300.59.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671964" version="1" comment="kernel-debug-base is &lt;4.12.14-197.108.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671630" version="1" comment="kernel-default-man is &lt;4.12.14-197.108.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671965" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-197.108.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671966" version="1" comment="kernel-vanilla is &lt;4.12.14-197.108.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671967" version="1" comment="kernel-vanilla-base is &lt;4.12.14-197.108.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671968" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-197.108.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671969" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-197.108.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671970" version="1" comment="kernel-zfcpdump-man is &lt;4.12.14-197.108.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670981" version="1" comment="caca-utils is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670660" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670982" version="1" comment="libcaca-ruby is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670661" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670983" version="1" comment="libcaca0-32bit is &lt;0.99.beta19.git20171003-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670662" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670984" version="1" comment="libcaca0-plugins-32bit is &lt;0.99.beta19.git20171003-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670985" version="1" comment="python3-caca is &lt;0.99.beta19.git20171003-11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667813" version="1" comment="buildah is &lt;1.23.1-150300.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667949" version="1" comment="tcpdump is &lt;4.9.2-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671381" version="1" comment="MozillaFirefox is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671897" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671898" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671383" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671384" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670467" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670465" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667470" version="1" comment="python2-lxml is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667471" version="1" comment="python2-lxml-devel is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667411" version="1" comment="python3-lxml is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667412" version="1" comment="python3-lxml-devel is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672506" version="1" comment="MozillaThunderbird is &lt;91.6.2-8.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672507" version="1" comment="MozillaThunderbird-translations-common is &lt;91.6.2-8.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672508" version="1" comment="MozillaThunderbird-translations-other is &lt;91.6.2-8.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671009" version="1" comment="flac is &lt;1.3.2-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671006" version="1" comment="flac-devel is &lt;1.3.2-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671055" version="1" comment="flac-devel-32bit is &lt;1.3.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671056" version="1" comment="flac-doc is &lt;1.3.2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671007" version="1" comment="libFLAC++6 is &lt;1.3.2-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671057" version="1" comment="libFLAC++6-32bit is &lt;1.3.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671008" version="1" comment="libFLAC8 is &lt;1.3.2-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671010" version="1" comment="libFLAC8-32bit is &lt;1.3.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667407" version="1" comment="java-11-openjdk is &lt;11.0.14.0-3.74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667681" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.14.0-3.74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667408" version="1" comment="java-11-openjdk-demo is &lt;11.0.14.0-3.74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667409" version="1" comment="java-11-openjdk-devel is &lt;11.0.14.0-3.74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667410" version="1" comment="java-11-openjdk-headless is &lt;11.0.14.0-3.74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667463" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.14.0-3.74.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667464" version="1" comment="java-11-openjdk-jmods is &lt;11.0.14.0-3.74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667682" version="1" comment="java-11-openjdk-src is &lt;11.0.14.0-3.74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667358" version="1" comment="xstream is &lt;1.4.19-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667389" version="1" comment="xstream-benchmark is &lt;1.4.19-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667390" version="1" comment="xstream-javadoc is &lt;1.4.19-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667391" version="1" comment="xstream-parent is &lt;1.4.19-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671229" version="1" comment="tomcat is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671230" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671298" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671231" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671299" version="1" comment="tomcat-embed is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671300" version="1" comment="tomcat-javadoc is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671232" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671301" version="1" comment="tomcat-jsvc is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671233" version="1" comment="tomcat-lib is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671234" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671235" version="1" comment="tomcat-webapps is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672020" version="1" comment="MozillaFirefox is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672509" version="1" comment="MozillaFirefox-branding-upstream is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672510" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672022" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672023" version="1" comment="MozillaFirefox-translations-other is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673464" version="1" comment="libprotobuf-lite15 is &lt;3.5.0-5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673465" version="1" comment="libprotobuf-lite15-32bit is &lt;3.5.0-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673466" version="1" comment="libprotobuf15 is &lt;3.5.0-5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673467" version="1" comment="libprotobuf15-32bit is &lt;3.5.0-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673468" version="1" comment="libprotoc15 is &lt;3.5.0-5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673469" version="1" comment="libprotoc15-32bit is &lt;3.5.0-5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672468" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672469" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671971" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672470" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671972" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672471" version="1" comment="libQt5Concurrent5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671973" version="1" comment="libQt5Core-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672472" version="1" comment="libQt5Core-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671974" version="1" comment="libQt5Core-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671975" version="1" comment="libQt5Core5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672473" version="1" comment="libQt5Core5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671976" version="1" comment="libQt5DBus-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672474" version="1" comment="libQt5DBus-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671977" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671978" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672475" version="1" comment="libQt5DBus5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671979" version="1" comment="libQt5Gui-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672476" version="1" comment="libQt5Gui-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671980" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671981" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672477" version="1" comment="libQt5Gui5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671982" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671983" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671984" version="1" comment="libQt5Network-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672478" version="1" comment="libQt5Network-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671985" version="1" comment="libQt5Network-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671986" version="1" comment="libQt5Network5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672479" version="1" comment="libQt5Network5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671987" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672480" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671988" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671989" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672481" version="1" comment="libQt5OpenGL5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672015" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672482" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671990" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671991" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672483" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671992" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671993" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672484" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671994" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671995" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672485" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671996" version="1" comment="libQt5Sql-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672486" version="1" comment="libQt5Sql-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671997" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671998" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672487" version="1" comment="libQt5Sql5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672016" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672488" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672017" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672489" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671999" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672490" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672018" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672491" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672000" version="1" comment="libQt5Test-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672492" version="1" comment="libQt5Test-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672001" version="1" comment="libQt5Test-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672002" version="1" comment="libQt5Test5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672493" version="1" comment="libQt5Test5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672003" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672494" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672004" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672005" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672495" version="1" comment="libQt5Widgets5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672006" version="1" comment="libQt5Xml-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672496" version="1" comment="libQt5Xml-devel-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672007" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672497" version="1" comment="libQt5Xml5-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672008" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672009" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672498" version="1" comment="libqt5-qtbase-examples is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672499" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672019" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672500" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672010" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671385" version="1" comment="cargo is &lt;1.59.0-150300.21.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671386" version="1" comment="cargo1.58 is &lt;1.58.0-150300.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671387" version="1" comment="cargo1.59 is &lt;1.59.0-150300.7.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671388" version="1" comment="rust is &lt;1.59.0-150300.21.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671389" version="1" comment="rust1.58 is &lt;1.58.0-150300.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671390" version="1" comment="rust1.59 is &lt;1.59.0-150300.7.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671081" version="1" comment="expat is &lt;2.2.5-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671082" version="1" comment="libexpat-devel is &lt;2.2.5-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671324" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671083" version="1" comment="libexpat1 is &lt;2.2.5-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671084" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672011" version="1" comment="augeas is &lt;1.10.1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672012" version="1" comment="augeas-devel is &lt;1.10.1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672501" version="1" comment="augeas-devel-32bit is &lt;1.10.1-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672502" version="1" comment="augeas-lense-tests is &lt;1.10.1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672013" version="1" comment="augeas-lenses is &lt;1.10.1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670461" version="1" comment="chrony is &lt;4.1-150300.16.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670462" version="1" comment="chrony-pool-empty is &lt;4.1-150300.16.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670587" version="1" comment="chrony-pool-openSUSE is &lt;4.1-150300.16.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670463" version="1" comment="chrony-pool-suse is &lt;4.1-150300.16.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672014" version="1" comment="libaugeas0 is &lt;1.10.1-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672503" version="1" comment="libaugeas0-32bit is &lt;1.10.1-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672028" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672029" version="1" comment="php7 is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672030" version="1" comment="php7-bcmath is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672031" version="1" comment="php7-bz2 is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672032" version="1" comment="php7-calendar is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672033" version="1" comment="php7-ctype is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672034" version="1" comment="php7-curl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672035" version="1" comment="php7-dba is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672036" version="1" comment="php7-devel is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672037" version="1" comment="php7-dom is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672024" version="1" comment="php7-embed is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672038" version="1" comment="php7-enchant is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672039" version="1" comment="php7-exif is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672040" version="1" comment="php7-fastcgi is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672041" version="1" comment="php7-fileinfo is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672504" version="1" comment="php7-firebird is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672042" version="1" comment="php7-fpm is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672043" version="1" comment="php7-ftp is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672044" version="1" comment="php7-gd is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672045" version="1" comment="php7-gettext is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672046" version="1" comment="php7-gmp is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672047" version="1" comment="php7-iconv is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672048" version="1" comment="php7-intl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672049" version="1" comment="php7-json is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672050" version="1" comment="php7-ldap is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672051" version="1" comment="php7-mbstring is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672052" version="1" comment="php7-mysql is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672053" version="1" comment="php7-odbc is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672054" version="1" comment="php7-opcache is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672055" version="1" comment="php7-openssl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672056" version="1" comment="php7-pcntl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672057" version="1" comment="php7-pdo is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672058" version="1" comment="php7-pgsql is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672059" version="1" comment="php7-phar is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672060" version="1" comment="php7-posix is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672061" version="1" comment="php7-readline is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672062" version="1" comment="php7-shmop is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672063" version="1" comment="php7-snmp is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672064" version="1" comment="php7-soap is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672065" version="1" comment="php7-sockets is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672066" version="1" comment="php7-sodium is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672067" version="1" comment="php7-sqlite is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672068" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672069" version="1" comment="php7-sysvsem is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672070" version="1" comment="php7-sysvshm is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672505" version="1" comment="php7-test is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672071" version="1" comment="php7-tidy is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672072" version="1" comment="php7-tokenizer is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672073" version="1" comment="php7-xmlreader is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672074" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672075" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672076" version="1" comment="php7-xsl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672077" version="1" comment="php7-zip is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672078" version="1" comment="php7-zlib is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672865" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673161" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672866" version="1" comment="libopenssl10 is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672867" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673162" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673163" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673164" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673165" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673166" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-3.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672868" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673167" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673168" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-3.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673187" version="1" comment="glibc is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673188" version="1" comment="glibc-32bit is &lt;2.31-150300.20.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673189" version="1" comment="glibc-devel is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673218" version="1" comment="glibc-devel-32bit is &lt;2.31-150300.20.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673219" version="1" comment="glibc-devel-static is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673470" version="1" comment="glibc-devel-static-32bit is &lt;2.31-150300.20.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673190" version="1" comment="glibc-extra is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673471" version="1" comment="glibc-html is &lt;2.31-150300.20.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673191" version="1" comment="glibc-i18ndata is &lt;2.31-150300.20.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673192" version="1" comment="glibc-info is &lt;2.31-150300.20.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673193" version="1" comment="glibc-lang is &lt;2.31-150300.20.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673194" version="1" comment="glibc-locale is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673195" version="1" comment="glibc-locale-base is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673196" version="1" comment="glibc-locale-base-32bit is &lt;2.31-150300.20.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673197" version="1" comment="glibc-profile is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673472" version="1" comment="glibc-profile-32bit is &lt;2.31-150300.20.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673220" version="1" comment="glibc-utils is &lt;2.31-150300.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673473" version="1" comment="glibc-utils-32bit is &lt;2.31-150300.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673198" version="1" comment="libcrypt1 is &lt;4.4.15-150300.4.2.41 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673199" version="1" comment="libcrypt1-32bit is &lt;4.4.15-150300.4.2.41 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673200" version="1" comment="libminizip1 is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673474" version="1" comment="libminizip1-32bit is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673201" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673475" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673202" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673203" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673204" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673205" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673206" version="1" comment="libxcrypt-devel is &lt;4.4.15-150300.4.2.41 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673476" version="1" comment="libxcrypt-devel-32bit is &lt;4.4.15-150300.4.2.41 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673221" version="1" comment="libxcrypt-devel-static is &lt;4.4.15-150300.4.2.41 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673207" version="1" comment="libz1 is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673208" version="1" comment="libz1-32bit is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673209" version="1" comment="linux-glibc-devel is &lt;5.3-3.2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673210" version="1" comment="minizip-devel is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673211" version="1" comment="nscd is &lt;2.31-150300.20.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673212" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673477" version="1" comment="openssl-1_1-doc is &lt;1.1.1d-11.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673213" version="1" comment="zlib-devel is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673222" version="1" comment="zlib-devel-32bit is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673214" version="1" comment="zlib-devel-static is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673478" version="1" comment="zlib-devel-static-32bit is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672659" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.322-3.21.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672660" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.322-3.21.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672661" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.322-3.21.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672662" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.322-3.21.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672663" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.322-3.21.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672664" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.322-3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672665" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.322-3.21.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672634" version="1" comment="stunnel is &lt;5.62-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672669" version="1" comment="stunnel-doc is &lt;5.62-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672630" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672666" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672631" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672632" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672633" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672667" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.322-3.64.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672668" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663282" version="1" comment="ghostscript is &lt;9.52-161.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663283" version="1" comment="ghostscript-devel is &lt;9.52-161.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663284" version="1" comment="ghostscript-x11 is &lt;9.52-161.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671302" version="1" comment="libreoffice is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671303" version="1" comment="libreoffice-base is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671304" version="1" comment="libreoffice-base-drivers-postgresql is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671088" version="1" comment="libreoffice-branding-upstream is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671305" version="1" comment="libreoffice-calc is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671306" version="1" comment="libreoffice-calc-extensions is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671307" version="1" comment="libreoffice-draw is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671308" version="1" comment="libreoffice-filters-optional is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671093" version="1" comment="libreoffice-gdb-pretty-printers is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671094" version="1" comment="libreoffice-glade is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671309" version="1" comment="libreoffice-gnome is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671310" version="1" comment="libreoffice-gtk3 is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671097" version="1" comment="libreoffice-icon-themes is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671311" version="1" comment="libreoffice-impress is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671099" version="1" comment="libreoffice-l10n-af is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671100" version="1" comment="libreoffice-l10n-am is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671101" version="1" comment="libreoffice-l10n-ar is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671102" version="1" comment="libreoffice-l10n-as is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671103" version="1" comment="libreoffice-l10n-ast is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671104" version="1" comment="libreoffice-l10n-be is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671105" version="1" comment="libreoffice-l10n-bg is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671106" version="1" comment="libreoffice-l10n-bn is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671107" version="1" comment="libreoffice-l10n-bn_IN is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671108" version="1" comment="libreoffice-l10n-bo is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671109" version="1" comment="libreoffice-l10n-br is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671110" version="1" comment="libreoffice-l10n-brx is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671111" version="1" comment="libreoffice-l10n-bs is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671112" version="1" comment="libreoffice-l10n-ca is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671113" version="1" comment="libreoffice-l10n-ca_valencia is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671114" version="1" comment="libreoffice-l10n-ckb is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671115" version="1" comment="libreoffice-l10n-cs is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671116" version="1" comment="libreoffice-l10n-cy is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671117" version="1" comment="libreoffice-l10n-da is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671118" version="1" comment="libreoffice-l10n-de is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671119" version="1" comment="libreoffice-l10n-dgo is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671120" version="1" comment="libreoffice-l10n-dsb is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671121" version="1" comment="libreoffice-l10n-dz is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671122" version="1" comment="libreoffice-l10n-el is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671123" version="1" comment="libreoffice-l10n-en is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671124" version="1" comment="libreoffice-l10n-en_GB is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671125" version="1" comment="libreoffice-l10n-en_ZA is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671126" version="1" comment="libreoffice-l10n-eo is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671127" version="1" comment="libreoffice-l10n-es is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671128" version="1" comment="libreoffice-l10n-et is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671129" version="1" comment="libreoffice-l10n-eu is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671130" version="1" comment="libreoffice-l10n-fa is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671131" version="1" comment="libreoffice-l10n-fi is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671132" version="1" comment="libreoffice-l10n-fr is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671133" version="1" comment="libreoffice-l10n-fur is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671134" version="1" comment="libreoffice-l10n-fy is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671135" version="1" comment="libreoffice-l10n-ga is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671136" version="1" comment="libreoffice-l10n-gd is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671137" version="1" comment="libreoffice-l10n-gl is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671138" version="1" comment="libreoffice-l10n-gu is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671139" version="1" comment="libreoffice-l10n-gug is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671140" version="1" comment="libreoffice-l10n-he is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671141" version="1" comment="libreoffice-l10n-hi is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671142" version="1" comment="libreoffice-l10n-hr is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671143" version="1" comment="libreoffice-l10n-hsb is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671144" version="1" comment="libreoffice-l10n-hu is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671145" version="1" comment="libreoffice-l10n-id is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671146" version="1" comment="libreoffice-l10n-is is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671147" version="1" comment="libreoffice-l10n-it is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671148" version="1" comment="libreoffice-l10n-ja is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671149" version="1" comment="libreoffice-l10n-ka is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671150" version="1" comment="libreoffice-l10n-kab is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671151" version="1" comment="libreoffice-l10n-kk is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671152" version="1" comment="libreoffice-l10n-km is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671153" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671154" version="1" comment="libreoffice-l10n-kn is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671155" version="1" comment="libreoffice-l10n-ko is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671156" version="1" comment="libreoffice-l10n-kok is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671157" version="1" comment="libreoffice-l10n-ks is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671158" version="1" comment="libreoffice-l10n-lb is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671159" version="1" comment="libreoffice-l10n-lo is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671160" version="1" comment="libreoffice-l10n-lt is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671161" version="1" comment="libreoffice-l10n-lv is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671162" version="1" comment="libreoffice-l10n-mai is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671163" version="1" comment="libreoffice-l10n-mk is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671164" version="1" comment="libreoffice-l10n-ml is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671165" version="1" comment="libreoffice-l10n-mn is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671166" version="1" comment="libreoffice-l10n-mni is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671167" version="1" comment="libreoffice-l10n-mr is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671168" version="1" comment="libreoffice-l10n-my is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671169" version="1" comment="libreoffice-l10n-nb is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671170" version="1" comment="libreoffice-l10n-ne is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671171" version="1" comment="libreoffice-l10n-nl is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671172" version="1" comment="libreoffice-l10n-nn is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671173" version="1" comment="libreoffice-l10n-nr is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671174" version="1" comment="libreoffice-l10n-nso is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671175" version="1" comment="libreoffice-l10n-oc is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671176" version="1" comment="libreoffice-l10n-om is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671177" version="1" comment="libreoffice-l10n-or is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671178" version="1" comment="libreoffice-l10n-pa is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671179" version="1" comment="libreoffice-l10n-pl is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671180" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671181" version="1" comment="libreoffice-l10n-pt_PT is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671182" version="1" comment="libreoffice-l10n-ro is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671183" version="1" comment="libreoffice-l10n-ru is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671184" version="1" comment="libreoffice-l10n-rw is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671185" version="1" comment="libreoffice-l10n-sa_IN is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671186" version="1" comment="libreoffice-l10n-sat is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671187" version="1" comment="libreoffice-l10n-sd is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671188" version="1" comment="libreoffice-l10n-si is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671189" version="1" comment="libreoffice-l10n-sid is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671190" version="1" comment="libreoffice-l10n-sk is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671191" version="1" comment="libreoffice-l10n-sl is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671192" version="1" comment="libreoffice-l10n-sq is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671193" version="1" comment="libreoffice-l10n-sr is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671194" version="1" comment="libreoffice-l10n-ss is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671195" version="1" comment="libreoffice-l10n-st is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671196" version="1" comment="libreoffice-l10n-sv is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671197" version="1" comment="libreoffice-l10n-sw_TZ is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671198" version="1" comment="libreoffice-l10n-szl is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671199" version="1" comment="libreoffice-l10n-ta is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671200" version="1" comment="libreoffice-l10n-te is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671201" version="1" comment="libreoffice-l10n-tg is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671202" version="1" comment="libreoffice-l10n-th is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671203" version="1" comment="libreoffice-l10n-tn is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671204" version="1" comment="libreoffice-l10n-tr is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671205" version="1" comment="libreoffice-l10n-ts is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671206" version="1" comment="libreoffice-l10n-tt is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671207" version="1" comment="libreoffice-l10n-ug is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671208" version="1" comment="libreoffice-l10n-uk is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671209" version="1" comment="libreoffice-l10n-uz is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671210" version="1" comment="libreoffice-l10n-ve is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671211" version="1" comment="libreoffice-l10n-vec is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671212" version="1" comment="libreoffice-l10n-vi is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671213" version="1" comment="libreoffice-l10n-xh is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671214" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671215" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671216" version="1" comment="libreoffice-l10n-zu is &lt;7.2.5.1-150300.14.22.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671312" version="1" comment="libreoffice-librelogo is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671313" version="1" comment="libreoffice-mailmerge is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671314" version="1" comment="libreoffice-math is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671315" version="1" comment="libreoffice-officebean is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671316" version="1" comment="libreoffice-pyuno is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671317" version="1" comment="libreoffice-qt5 is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671318" version="1" comment="libreoffice-sdk is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671319" version="1" comment="libreoffice-sdk-doc is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671320" version="1" comment="libreoffice-writer is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671321" version="1" comment="libreoffice-writer-extensions is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671322" version="1" comment="libreofficekit is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671323" version="1" comment="libreofficekit-devel is &lt;7.2.5.1-150300.14.22.18.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672870" version="1" comment="frr is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672871" version="1" comment="frr-devel is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672872" version="1" comment="libfrr0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672873" version="1" comment="libfrr_pb0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672874" version="1" comment="libfrrcares0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672875" version="1" comment="libfrrfpm_pb0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672876" version="1" comment="libfrrgrpc_pb0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672877" version="1" comment="libfrrospfapiclient0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672878" version="1" comment="libfrrsnmp0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672879" version="1" comment="libfrrzmq0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672880" version="1" comment="libmlag_pb0 is &lt;7.4-150300.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674194" version="1" comment="MozillaThunderbird is &lt;91.7.0-150200.8.62.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674195" version="1" comment="MozillaThunderbird-translations-common is &lt;91.7.0-150200.8.62.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674196" version="1" comment="MozillaThunderbird-translations-other is &lt;91.7.0-150200.8.62.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662900" version="1" comment="apache2 is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662953" version="1" comment="apache2-devel is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662954" version="1" comment="apache2-doc is &lt;2.4.51-3.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662937" version="1" comment="apache2-event is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663140" version="1" comment="apache2-example-pages is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662901" version="1" comment="apache2-prefork is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662902" version="1" comment="apache2-utils is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662955" version="1" comment="apache2-worker is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670454" version="1" comment="blas-devel is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670573" version="1" comment="blas-devel-32bit is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670574" version="1" comment="blas-devel-static is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670575" version="1" comment="blas-man is &lt;3.5.0-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670455" version="1" comment="lapack-devel is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670576" version="1" comment="lapack-devel-32bit is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670577" version="1" comment="lapack-devel-static is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670578" version="1" comment="lapack-man is &lt;3.5.0-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670579" version="1" comment="lapacke-devel is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670580" version="1" comment="lapacke-devel-32bit is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670581" version="1" comment="lapacke-devel-static is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670456" version="1" comment="libblas3 is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670582" version="1" comment="libblas3-32bit is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670457" version="1" comment="liblapack3 is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670583" version="1" comment="liblapack3-32bit is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670466" version="1" comment="liblapacke3 is &lt;3.5.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670584" version="1" comment="liblapacke3-32bit is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673896" version="1" comment="update-test-security is &lt;5.1-150200.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673223" version="1" comment="qemu is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673224" version="1" comment="qemu-SLOF is &lt;5.2.0-150300.112.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674135" version="1" comment="qemu-arm is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674136" version="1" comment="qemu-audio-alsa is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674137" version="1" comment="qemu-audio-pa is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674138" version="1" comment="qemu-audio-spice is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673229" version="1" comment="qemu-block-curl is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674139" version="1" comment="qemu-block-dmg is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674140" version="1" comment="qemu-block-gluster is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673230" version="1" comment="qemu-block-iscsi is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674141" version="1" comment="qemu-block-nfs is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673231" version="1" comment="qemu-block-rbd is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673232" version="1" comment="qemu-block-ssh is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673233" version="1" comment="qemu-chardev-baum is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674142" version="1" comment="qemu-chardev-spice is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674143" version="1" comment="qemu-extra is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673235" version="1" comment="qemu-guest-agent is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674144" version="1" comment="qemu-hw-display-qxl is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674145" version="1" comment="qemu-hw-display-virtio-gpu is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674146" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674147" version="1" comment="qemu-hw-display-virtio-vga is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674148" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674149" version="1" comment="qemu-hw-usb-redirect is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674150" version="1" comment="qemu-hw-usb-smartcard is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673242" version="1" comment="qemu-ipxe is &lt;1.0.0+-150300.112.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674151" version="1" comment="qemu-ivshmem-tools is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673243" version="1" comment="qemu-ksm is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673244" version="1" comment="qemu-kvm is &lt;5.2.0-150300.112.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673245" version="1" comment="qemu-lang is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674152" version="1" comment="qemu-linux-user is &lt;5.2.0-150300.112.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674153" version="1" comment="qemu-microvm is &lt;5.2.0-150300.112.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674154" version="1" comment="qemu-ppc is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674155" version="1" comment="qemu-s390x is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673248" version="1" comment="qemu-seabios is &lt;1.14.0_0_g155821a-150300.112.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673249" version="1" comment="qemu-sgabios is &lt;8-150300.112.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673250" version="1" comment="qemu-skiboot is &lt;5.2.0-150300.112.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674156" version="1" comment="qemu-testsuite is &lt;5.2.0-150300.112.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673183" version="1" comment="qemu-tools is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673251" version="1" comment="qemu-ui-curses is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674157" version="1" comment="qemu-ui-gtk is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674158" version="1" comment="qemu-ui-opengl is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674159" version="1" comment="qemu-ui-spice-app is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674160" version="1" comment="qemu-ui-spice-core is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673256" version="1" comment="qemu-vgabios is &lt;1.14.0_0_g155821a-150300.112.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674161" version="1" comment="qemu-vhost-user-gpu is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674162" version="1" comment="qemu-x86 is &lt;5.2.0-150300.112.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674163" version="1" comment="xen is &lt;4.14.4_02-150300.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674164" version="1" comment="xen-devel is &lt;4.14.4_02-150300.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674165" version="1" comment="xen-doc-html is &lt;4.14.4_02-150300.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674166" version="1" comment="xen-libs is &lt;4.14.4_02-150300.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674167" version="1" comment="xen-libs-32bit is &lt;4.14.4_02-150300.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674168" version="1" comment="xen-tools is &lt;4.14.4_02-150300.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674169" version="1" comment="xen-tools-domU is &lt;4.14.4_02-150300.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673261" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.14.4_02-150300.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673175" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674127" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673176" version="1" comment="python3 is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673177" version="1" comment="python3-base is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673178" version="1" comment="python3-curses is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673179" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673180" version="1" comment="python3-devel is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674128" version="1" comment="python3-doc is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674129" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673181" version="1" comment="python3-idle is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674130" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673182" version="1" comment="python3-tk is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673217" version="1" comment="python3-tools is &lt;3.6.15-150300.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672521" version="1" comment="slirp4netns is &lt;0.4.7-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673536" version="1" comment="bsdtar is &lt;3.4.2-150200.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673531" version="1" comment="libarchive-devel is &lt;3.4.2-150200.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673532" version="1" comment="libarchive13 is &lt;3.4.2-150200.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674171" version="1" comment="libarchive13-32bit is &lt;3.4.2-150200.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673901" version="1" comment="bind is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673902" version="1" comment="bind-chrootenv is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673885" version="1" comment="bind-devel is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673903" version="1" comment="bind-doc is &lt;9.16.6-150300.22.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673886" version="1" comment="bind-utils is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673887" version="1" comment="libbind9-1600 is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673888" version="1" comment="libdns1605 is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673889" version="1" comment="libirs-devel is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673890" version="1" comment="libirs1601 is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673891" version="1" comment="libisc1606 is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673892" version="1" comment="libisccc1600 is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673893" version="1" comment="libisccfg1600 is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673894" version="1" comment="libns1604 is &lt;9.16.6-150300.22.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673895" version="1" comment="python3-bind is &lt;9.16.6-150300.22.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674182" version="1" comment="bind-devel-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674183" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674184" version="1" comment="libdns1605-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674185" version="1" comment="libirs1601-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674186" version="1" comment="libisc1606-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674187" version="1" comment="libisccc1600-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674188" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674189" version="1" comment="libns1604-32bit is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672864" version="1" comment="perl-DBD-SQLite is &lt;1.66-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673186" version="1" comment="libwavpack1 is &lt;5.4.0-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674170" version="1" comment="libwavpack1-32bit is &lt;5.4.0-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673215" version="1" comment="wavpack is &lt;5.4.0-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673216" version="1" comment="wavpack-devel is &lt;5.4.0-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730916" version="1" comment="rmt-server is &lt;2.10-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730917" version="1" comment="rmt-server-config is &lt;2.10-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730907" version="1" comment="rmt-server-pubcloud is &lt;2.10-150300.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722775" version="1" comment="tcl is &lt;8.6.12-150300.14.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722776" version="1" comment="tcl-32bit is &lt;8.6.12-150300.14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722777" version="1" comment="tcl-devel is &lt;8.6.12-150300.14.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730838" version="1" comment="saphanabootstrap-formula is &lt;0.13.1+git.1667812208.4db963e-150200.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173938"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libva</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_radeonsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-connection-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nma-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMA-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-abstractions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns1605</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs1601</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc1606</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libns1604</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blktrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dirmngr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserverui-1_2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libflatpak0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupdplugin1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjcat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Fwupd-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3_0-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeDesktop-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuchess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphviz6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-dict-emoji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconf_update5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-amdgpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath10k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath11k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-atheros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bnx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-brcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-chelsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-dpaa2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-i915</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-iwlwifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-liquidio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mellanox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mwifiex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-prestera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-realtek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-sound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ueagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-usb-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-extras5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio-extras5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkioarchive5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kscreenlocker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kscreenlocker-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKScreenLocker5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktexteditor-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libBasicUsageEnvironment1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libUsageEnvironment3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgroupsock8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libliveMedia66</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Auth5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5AuthCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Codecs5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Codecs5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58_134</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7_110</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58_76</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56_70</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcfitsio6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libekmfweb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_1-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-gtk-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-103</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_6-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixml11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmarkdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpg123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-openal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv3_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Libosinfo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpano13-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler89</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpotrace0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtwebengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_5-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-codec-gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-vdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_10-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxapian30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-core-DB_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-desktop-emojier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-smartcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-microvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-app</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-plugin-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tmux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tnftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpiarm64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpiarm64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgroupsock30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libliveMedia94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstWebRTC-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>solo-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fossil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>balsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>balsa-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaria2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prosody</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bgzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htsfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhts-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhts3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhts3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tabix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspf2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gifsicle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haserl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-composer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls12-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ssh-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaxutil7_0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions-zypp-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hiredis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hiredis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhiredis0_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>barrier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kafka-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kafka-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-toxcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-toxcore-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-toxcore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtoxcore2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postsrsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mininews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxls-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxlsreader8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abcm2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcmanfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcmanfm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcmanfm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bazel-skylib1.0.3-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bazel3.7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiomp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiomp5-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiomp5-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_cc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_cc2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_cc2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_framework2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_framework2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtensorflow_framework2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_6_0-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_6_0-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_6_0-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_6_0-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_6_0-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tensorflow2_2_6_0-gnu-openmpi2-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firejail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libathemecore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chafa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chafa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chafa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchafa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhvtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhvtl-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhvtl-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhvtl-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-authlibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-authlibs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-fuse_client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openafs-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl8812au</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl8812au-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl8812au-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtl8812au-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtw89-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtw89-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtw89-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtw89-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtw89-ueficert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-autoload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l2loopback-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipython-iptest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpPgAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpPgAdmin-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>canna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>canna-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>canna-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>canna-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>canna-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-treq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_maxminddb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-nmcompat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-hh2serial-gps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-iospm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-l2tp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-pptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-tist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-wireguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pngcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-applications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdcm3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsocketxx1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-webviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>EternalTerminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deluge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deluge-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libautotrace3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtumbler-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tumbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tumbler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tumbler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tumbler-folder-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tumbler-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tumbler-webp-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpano-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpano-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-10-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-joblib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-slixmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-godbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-json4s</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jawn-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dxflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxflib-3_17_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>civetweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>civetweb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcivetweb-cpp1_15_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcivetweb1_15_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librecad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librecad-parts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-watchman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>watchman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-java-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-phpfrontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsphinxclient-0_0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsphinxclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sphinx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>envoy-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>envoy-proxy-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxfrw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxfrw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdxfrw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shapelib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-electron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-electron-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbitcoinconsensus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbitcoinconsensus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-App-cpanminus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minidlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-spell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-build-key</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingacli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-HTMLPurifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-JShrink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-Parsedown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-dompdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-lessphp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-zf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-Icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetest-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetest-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minetestserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasn1-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssapi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhcrypto4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdb9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimbase1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimdal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimedit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimntlm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhx509-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5clnt7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5srv8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkafs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkrb5-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libroken18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwind0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multimon-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpkgconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpkgconf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkgconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gvedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-smyrna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u2f-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-qtqml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-grafana-dashboards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-immutable-object-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-cephadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-k8sevents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-rook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-osd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-prometheus-alerts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-radosgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephfs-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradospp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rados-objclass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-benchmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpextras0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpextras0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>umoci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt_modplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt_modplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpt123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-baum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-s390x-virtio-gpu-ccw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ivshmem-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-skiboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vhost-user-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-standalone-formulas-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base-rebuild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-continuation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-javax-websocket-client-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-javax-websocket-server-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jndi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-minimal-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-openid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util-ajax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-websocket-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-distro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-distro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsbc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsbc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUPnP-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pkix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch-ethercodes-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-container-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-handler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-launcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-auto-enable-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-resolve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-coredump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk-module-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk2-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaribou0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Caribou-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-oss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-saltboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-custom-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-osa-dispatcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-push</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osa-dispatcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-push</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-oscap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-uyuni-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-osa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-osa-dispatcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-push</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-spacewalk-koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-spacewalk-oscap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-uyuni-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-oscap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawkey-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf-repo-config-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-hawkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libdnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-al</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-allwinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-altera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-apm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-broadcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-cavium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-exynos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-freescale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-hisilicon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-lg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-renesas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-rockchip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-socionext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-sprd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-xilinx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-zte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-spell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvrcore0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mspack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-plugin-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spectre-meltdown-checker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-xendomains-wait-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aom-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pecl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-piechart-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrilo-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlnet-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlpls-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Grl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlNet-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlPls-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp5_6_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp5_6_5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-rabbitmq-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-cbindgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Flatpak-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-kubeadm-criconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-kubic-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireguard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ia64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-x86_64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activerecord-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtinyxml0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-gpupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns1605-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs1601-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc1606-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libns1604-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf13-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf13-openmpi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi-devel-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi1-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_6_1-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_6_1-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_6_1-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_6_1-gnu-openmpi1-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_6_1-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi1-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi1-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-hpc-devel-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-mpich-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-mvapich2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-openmpi1-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-openmpi1-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-openmpi1-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_6_1-gnu-openmpi2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler73</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler73-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18-openmpi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18-openmpi2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18-openmpi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18-openmpi3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18-openmpi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf18-openmpi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_4-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_4-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_4-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_4-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_4-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-devel-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi4-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi3-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-openmpi4-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-mpich-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-mvapich2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi3-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi4-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_4-gnu-openmpi4-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-malloccheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-wsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotli-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlicommon1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlicommon1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlidec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlidec1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlienc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlienc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-jcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu.691</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu.691-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu.691-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu69</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu69-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu69-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>disruptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>disruptor-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-servlet-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-access</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logback-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_4-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gegl-0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gegl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_16_5-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_16_5-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yaml-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-test-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-aptitude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-static-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python-ctypes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-poms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick-Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand-Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcraw-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo0_9_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podofo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_17_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_17_3-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-postgres_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-xalan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-imageio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-testutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cifscreds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caca-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-plugins-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-caca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_9-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_9-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-ssm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-web-uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libZXing1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zxing-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omamqp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omhttpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omtcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-ossl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sametime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-bom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-cbor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-smile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformats-binary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformats-binary-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-20_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi4-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-hpc-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mpich-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mpich-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mvapich2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-mvapich2-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi3-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi3-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi4-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi4-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-gnu-openmpi4-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_8-hpc-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_8-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_8-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_8-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_8-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_8-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_8-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_8-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_8-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_8-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_8-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_8-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_8-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_8-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_8-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_8-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_8-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_8-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_8-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_8-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_8-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_8-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_8-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_8-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_8-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_8-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_8-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_8-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_8-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_8-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_8-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-gson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-gson-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-avnetultra96rev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-avnetultra96rev1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-bananapim64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-bananapim64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard410c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard410c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard820c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-dragonboard820c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-evb-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-evb-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-firefly-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-firefly-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-geekbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-geekbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-hikey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-hikey-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-khadas-vim2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-libretech-ac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-libretech-ac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-libretech-cc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-libretech-cc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-ls1012afrdmqspi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-ls1012afrdmqspi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudb-88f3720</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudb-88f3720-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudbarmada8k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebudbarmada8k-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebuespressobin-88f3720</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebuespressobin-88f3720-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebumcbin-88f8040</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-mvebumcbin-88f8040-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-nanopia64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-nanopia64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-c2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-c4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-c4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-n2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-odroid-n2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-orangepipc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-orangepipc2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2371-2180</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2371-2180-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2771-0000-500</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p2771-0000-500-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p3450-0000</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-p3450-0000-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pine64plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pine64plus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinebook-pro-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinebook-pro-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pineh64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pineh64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinephone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-pinephone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-poplar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-poplar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock-pi-4-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock-pi-4-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock64-rk3328</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock64-rk3328-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock960-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rock960-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rockpro64-rk3399</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rockpro64-rk3399-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpi4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpzcu102rev10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpzcu102rev10-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpgeneric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-xilinxzynqmpgeneric-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-alertmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-node_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-SLOF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-18_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libekmfweb1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osasnmpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-hmcdrvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-zdsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dfu-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdtpmevlog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-FwupdPlugin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldirectord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-plugins-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-gcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuwac0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwac0-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs16-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-M2Crypto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-iam-authenticator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-tzinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-tzinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-tzinfo-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dwarves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarves-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarves-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarves1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarves1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mokutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-subset0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-subset0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-HarfBuzz-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ujson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-codecov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-codecov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-test-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-spake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-talloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-talloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tdb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tevent-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>talloc-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tevent-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-atomicwrites-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-apipkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-atomicwrites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-coverage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pycodestyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyflakes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-apipkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-atomicwrites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-coverage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycodestyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyflakes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-presets-common-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rails-html-sanitizer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rails-html-sanitizer-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfbgraph-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfbgraph-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GFBGraph-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang-cpp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang-extentions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-yang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yang-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixdata-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask-Security-Too</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-20_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bottle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-20_06-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-suse65_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-suse65_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu65_1-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu65_1-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_bcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_zram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-QubitProducts-exporter_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-hwdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-hwdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrcares0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrgrpc_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrsnmp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrzmq0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlag_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-profile-tti35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftbench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgamma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftinspect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftmulti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftvalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-kramdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-kramdown-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-kramdown-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzapojit-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzapojit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Zpj-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-core-DB_File-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-kubevirt_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonig4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oniguruma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-cloner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-importer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-cdi_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-OSTree-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0_18_08</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm_18_08</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_18_08-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gdb-pretty-printers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ckb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sa_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-librelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clone-master-clean-up</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp0_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-lusitaniae-apache_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>container-suseconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libconfuse0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Flask-Security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask-Security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-loofah-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-loofah-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlbeans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlbeans-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmilter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmilter1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-starttls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography-vectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sccache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-color-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colord-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colorhug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb_java-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb_java-4_8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Nautilus-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-boynux-squid_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-promu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfmt8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DNS-LDNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh-htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-gs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-bdb-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap-auxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap-auxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap-auxprop-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-xdgdesktopportal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lense-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-empty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapacke-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblas3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblas3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapack3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapack3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapacke3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapacke3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-SQLite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-pubcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>saphanabootstrap-formula</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009074736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">15.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.2.4-57.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.2.4-57.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-57.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.10.0-8.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.10.0-bp153.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.10-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.24-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-lp153.1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.55-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.6-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.04.2-bp153.2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.77-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-17.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0-17.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.16.6-20.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.35.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0+git.20170126-3.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.55-1.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:90.0.4430.212-bp153.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-1.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.32-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.25.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.27-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.108-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.27-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:049.1+suse.188.gbf445638-3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43.8-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.168-4.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.3-3.6.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.2-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.2-1.115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.4-1.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.32-7.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.32.5-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-bp153.1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.8-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1-8.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.46.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.1-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.16-1.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.52-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.12-7.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.12-3.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.62.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-7.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.7-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.1-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.32+67-2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.2+0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.6-bp153.1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.3-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04-20.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-lp153.2.114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.2-4.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.23-1.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.8.6-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.11.0-3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.76.0-bp153.1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20210208-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.76.0-bp153.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.04.2-bp153.2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-bp153.1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.5-bp153.1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.76.0-bp153.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:530-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2019.06.28-bp153.1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.15-3.12.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-9.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.3-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.9-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.11-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.5-3.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-bp153.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.36.2-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.36.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-3.3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.0-1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17.0-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.440-bp153.1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.13-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.4+git.187.5ad4708741a-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.27-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-bp153.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.8-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.22-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-bp153.1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.4-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.7-bp153.3.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-3.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-3.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0+git20180427.26373b3-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-bp153.1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.15.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-1.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.4-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-1.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.20171102-bp153.1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.4-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.100-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.4-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-3.8.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.17-4.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.37-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1-5.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.80.1-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.20-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.2.22-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.19-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.44.7+11-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.19-bp153.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.41-4.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.31-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.24-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.34-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.116-1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.79.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.15-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-12.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.0-10.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.18-7.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.13-3.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.13-3.81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.2-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.15.3-bp153.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4+git20180804.fff99cd-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.2.11.83+g8a15f484c2-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.15-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.9-bp153.2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.2.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.9-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-2.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-8.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.19-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.68.3-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-1.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.3-1.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.28.0-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.7-7.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:246.13-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.27-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.30.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-1.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.4-4.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-bp153.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.5-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-bp153.2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-bp153.1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.17-bp153.1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-3.8.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.7-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.25.10-3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.0-4.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.5.8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.04.2-bp153.1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.25.1-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.04.2-bp153.1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.08-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4p1-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1d-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:202008-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.02-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.1-15.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.60-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.72-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.06-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0132-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.52-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20181225-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.6-bp153.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-6.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.0.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:40.5.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.25.10-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.0-9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.1-29.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39.0-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11+git.20130926-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.32-6.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.0-lp153.1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.15.2-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.20.0-1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.30-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-bp153.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.004svn28119-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1c-bp153.1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20151004-bp153.1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.94-bp153.1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-6.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2021.01-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20210216-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-4.8.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-2.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.20-lp153.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.20_k5.3.18_57-lp153.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20180125-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.3-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.65-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3+20190413-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.1_16-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15.4-bp153.1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.44-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.10-1.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.43-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.05.22-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.11-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.4-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4472.164-bp153.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.5-bp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.24-lp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.24-lp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.24_k5.3.18_59.16-lp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.0.4054.277-lp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.8.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:92.0.4515.131-bp153.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.10-bp153.2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-bp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-bp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:92.0.4515.159-bp153.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-bp153.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.18-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6.7-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.4093.147-lp153.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.4093.184-lp153.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.93-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.12-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.36-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.22-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:93.0.4577.82-bp153.2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.4143.22-lp153.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-bp153.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.4143.50-lp153.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:94.0.4606.71-bp153.2.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:80.0.4170.16-lp153.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-bp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-bp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-bp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:95.0.4638.54-bp153.2.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.28-lp153.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.28-lp153.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.28_k5.3.18_59.27-lp153.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:80.0.4170.63-lp153.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:95.0.4638.69-bp153.2.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-bp153.3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:81.0.4196.31-lp153.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6.8-bp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200127-lp153.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200127-lp153.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-bp153.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:96.0.4664.93-bp153.2.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.10.1-bp153.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:96.0.4664.110-bp153.2.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.14-bp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.13-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.33-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.33-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.96-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:76.0.4017.154-lp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4472.77-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4472.114-bp153.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.0.4054.146-lp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.22-lp153.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.22-lp153.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.22_k5.3.18_59.5-lp153.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.4-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5.9-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.9-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.13-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.0.5005.115-bp153.2.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-bp153.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.2-bp153.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.70-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.12-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7.8-bp154.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-lp153.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8_k5.3.18_150300.59.76-lp153.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62-lp153.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62_k5.3.18_150300.59.76-lp153.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62_k5.3.18_150300.59.76-lp153.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62_k5.3.18_150300.59.76-lp153.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3.2+git20210427.6ef5d8f-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3.2+git20210427.6ef5d8f_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16~3.g38316db-lp153.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16~3.g38316db_k5.3.18_150300.59.76-lp153.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200106_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200106_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200106_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18_k5.3.18_150300.59.76-lp153.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.5060.53-bp153.2.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.13.0-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-bp153.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-bp153.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.5060.114-bp154.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:88.0.4412.74-lp154.2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.13.0-bp154.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.5060.134-bp154.2.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.13-lp153.17.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:89.0.4447.71-lp153.2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7p3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7p3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7p3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:104.0.5112.79-bp153.2.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.4-bp153.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.3.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:104.0.5112.101-bp154.2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:90.0.4480.54-lp153.2.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:90.0.4480.84-lp153.2.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:105.0.5195.102-bp153.2.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.36-lp153.2.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.36-lp153.2.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.36_k5.3.18_150300.59.90-lp153.2.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:105.0.5195.127-bp154.2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200127-lp153.24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200127-lp153.24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.38-lp153.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.38-lp153.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.38_k5.3.18_150300.59.93-lp153.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.0.4516.20-lp153.2.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.66-bp154.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0.5249.91-bp153.2.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.67-bp154.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.19-bp153.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-bp153.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-bp153.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-bp154.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.14-lp153.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0.5249.119-bp153.2.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-lp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5_k5.3.18_150300.59.93-lp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5_k5.3.18_150300.59.93-lp153.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.22-bp154.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.22-bp154.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0.5304.87-bp153.2.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.00-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:92.0.4561.21-lp153.2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.94.2-bp153.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0.5304.110-bp154.2.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.00-bp153.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.19-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7.11-bp154.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-bp153.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:93.0.4585.11-lp153.2.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0.5304.121-bp154.2.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-bp154.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.5359.71-bp154.2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.5359.94-bp154.2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.5359.124-bp153.2.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-bp153.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-bp153.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.9-bp153.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.18-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.18-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:85.0.4341.28-lp153.2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.11.1-lp153.17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0.4896.88-bp153.2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-bp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:100.0.4896.127-bp153.2.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.12-bp153.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4363.23-lp153.2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:101.0.4951.54-bp153.2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.26-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:101.0.4951.64-bp153.2.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.34-lp153.2.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.34-lp153.2.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.34_k5.3.18_150300.59.63-lp153.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-lp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:97.0.4692.71-bp153.2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0~rc3-bp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0~rc3-bp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.20-bp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.20-bp153.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:87.0.4390.25-lp153.2.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.12-lp153.17.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-bp153.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1549563867.59e9702-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:97.0.4692.99-bp153.2.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.32-lp153.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.32-lp153.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.32_k5.3.18_59.40-lp153.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.64-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:98.0.4758.80-bp153.2.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.37-lp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.68-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:98.0.4758.102-bp153.2.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12-bp153.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:83.0.4254.27-lp153.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4316.14-lp153.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-lp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.38-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.27-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.27-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.6-bp153.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.20220109-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0~rc3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0~rc3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.9-bp153.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.2-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7045-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0.4844.51-bp153.2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4316.21-lp153.2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.21-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0.4844.74-bp153.2.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0.4844.84-bp153.2.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-lp153.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-bp153.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.6-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9-bp153.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-bp154.2.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-bp154.2.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.8.0-bp153.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7.13-bp153.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.28-bp153.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.12.83+g528da226523-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.12.83+g528da226523-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.12.83+g528da226523-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.16-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6.P1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.2-8.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.28-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.28-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-8.41.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-8.41.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-6.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-6.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc93-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2.18.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.7-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.7-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.17-3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.42-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:330-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202008-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202008-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202008-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11.3-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.10.1.18.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.13-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.13-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-5.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.14-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.13.1.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.6-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.6-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-8.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-8.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.13-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.13-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:246.13-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.16.1.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1+20210702.4e0ee8fb-5.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.76.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.76.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1.1-9.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.20-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.39-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.47-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.7-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27.1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.21-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1627546504.96a0b3e-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.12-3.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.11-3.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.62.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.62.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.19.1.18.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1+20200724-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1+20200724-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-8.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-8.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.15-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.15-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-3.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-3.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4.16~git16.c1926dfc6-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.15-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.15-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:246.15-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.9-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-3.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.40-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.21-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.43-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-4.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.15-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.2_04-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.2_04-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.2_04-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-150.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.12-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.12-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-23.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.8.22-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.21-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.2_06-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.2_06-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.2_06-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.6+git.211.555d60b24ba-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.6+git.211.555d60b24ba-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.6+git.211.555d60b24ba-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.6+git.211.555d60b24ba-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.24.1.18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-5.15.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-5.15.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-5.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-5.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-5.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.8-8.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.8-8.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.8-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.8-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.11-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.27.1.18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-8.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.9-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.9-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20200827-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-50.1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-50.1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-106.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-106.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-106.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-106.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-106.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-106.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-106.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.528.140935f8d6a-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.528.140935f8d6a-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.528.140935f8d6a-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.528.140935f8d6a-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.528.140935f8d6a-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.531.903f5c0ccdc-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.531.903f5c0ccdc-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.531.903f5c0ccdc-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.531.903f5c0ccdc-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.13+git.531.903f5c0ccdc-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.0-4.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0-3.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0-3.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.471.5edbe3dcae7-3.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.471.5edbe3dcae7-3.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.34.1.18.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-152.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.9-8.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.9-8.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-3.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-3.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.14-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3-3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-10.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-10.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.13-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.13-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.62.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.62.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.87+git20180409.04c9dae-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-3.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.7-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.7-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.2.18.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.1-15.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.1-15.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3_04-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3_04-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3_04-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-152.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.2-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.22-20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-8.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-8.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:69.1-7.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:69.1-7.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-8.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.16-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.16-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.16-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150000.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.60.4.150300.18.37.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150300.53.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150300.53.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20210208-150300.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4.19~git28.b12c72226-150300.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.3-15.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.3-15.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-150200.152.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.9-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.9-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-150000.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-150000.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-150100.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-150100.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.22-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.30.0-150200.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.52-150200.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.52-150200.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-150300.10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-150300.10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.15-150000.1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.15-150000.1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.8-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.8-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-150200.8.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.63.1.150300.18.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-150100.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-150100.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.75-150200.4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.75-150200.4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.35-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.28.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.28.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-150200.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150100.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1.18.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.75-150200.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.75-150200.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-152.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.16-150000.3.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.12-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-150000.1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-150000.1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-150000.1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-150000.1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-150100.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-150100.4.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.1-150300.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-150100.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.2-150100.6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.1-150200.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.1-150200.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150300.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-150300.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-150300.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-150300.4.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-150300.4.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-150300.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.4_04-150300.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.4_04-150300.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.4_04-150300.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150000.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150300.22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150300.22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1260.0-150000.5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.11-150000.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.12-150000.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.12-150000.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.0-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.30-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.30-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2106.0-150200.4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-150200.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.6-150000.3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.9-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-150200.14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.68.1.150300.18.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-150000.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-150000.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.11-150000.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.14_ce-150000.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.14_ce-150000.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-150200.10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-150200.10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.55.0-150300.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-150200.8.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220510-150200.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150300.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-150200.152.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.57.0-150300.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-150200.3.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150300.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-150300.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150300.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.109.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-150200.152.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.9-150200.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20210208-150300.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.14-150200.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.10-150000.1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.10-150000.1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-150000.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-150000.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-150000.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-150000.1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-150100.8.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-150100.8.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.63-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.63-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.63-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11-150200.8.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11-150200.8.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-150200.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-150200.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-150200.5.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-150200.5.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-150200.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.3-150200.5.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-150300.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-150300.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-150300.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-150300.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-150200.152.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-150000.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.43.1.150300.18.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-8.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.16-150300.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.16-150300.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.11-150000.1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.11-150000.1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.3-150000.1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.3-150000.1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.9-150200.3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.6-150200.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.01-150300.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.01-150300.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.01-150200.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-150200.8.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.12-150300.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.12-150300.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.12-150300.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_02-150300.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_02-150300.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_02-150300.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.3-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.3-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.3-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.2.150300.18.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4.19~git38.9951c1101-150300.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.5038-150000.5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.5038-150000.5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-150100.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150100.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.29~0+git.9a7bc817-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.29~0+git.9a7bc817_k5.3.18_150300.59.71-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.29~0+git.9a7bc817_k5.3.18_8.13-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1.150300.18.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.13-150300.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.13-150300.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3004-150300.53.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3004-150300.53.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-150200.3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150300.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-150300.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150300.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.115.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.76-150300.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.76-150300.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.76-150300.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.9-150100.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.30-150300.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20210626-150300.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-150300.10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-150300.10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-150300.9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-150300.9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.1-150300.8.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-150200.152.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-150200.8.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.8-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.8-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.0+git30.d0077df0-150300.8.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.0+git30.d0077df0-150300.8.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-150200.11.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-150100.11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-150000.73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.17_ce-150000.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.17_ce-150000.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-150000.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-150300.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-150300.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.9-150300.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.9-150300.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.9_k5.3.18_150300.59.76-150300.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.9_k5.3.18_150300.59.76-150300.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.9_k5.3.18_150300.59.76-150300.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-150200.15.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-150000.20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-150000.20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-150000.20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-150200.22.5.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k5.3.18_150300.59.76-150300.19.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k5.3.18_150300.59.76-150300.19.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k5.3.18_150300.59.76-150300.19.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k5.3.18_8.13-150300.19.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-150000.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-150000.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.0-150200.15.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.0-150200.15.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.15-150200.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.4-150200.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.4-150200.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.4-150200.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79-150000.3.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79-150000.3.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1.150300.18.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-150300.7.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-150300.7.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-150000.5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.2-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.2-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.500.d5910280cc7-150300.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150300.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150300.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.500.d5910280cc7-150300.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.500.d5910280cc7-150300.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.500.d5910280cc7-150300.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.500.d5910280cc7-150300.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_04-150300.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_04-150300.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_04-150300.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-150300.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-150200.152.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-150300.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.177-150300.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.177-150300.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.177-150300.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-150300.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.12-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-150000.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-150000.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.10-150000.3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.10-150000.3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.01-150300.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.01-150300.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.01-150200.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.13-150000.1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.13-150000.1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-150100.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-150000.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-150000.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0-150000.3.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0-150000.3.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-150200.8.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-150100.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.4-150300.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.4-150300.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-150100.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.5-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.5-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.5-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-150200.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.6-150300.3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.6-150300.3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.4+git.324.8332acf1a63-150300.3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150300.8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150300.8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-150300.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.6-150300.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.6-150300.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-150300.23.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-150300.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.4+git.324.8332acf1a63-150300.3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.4+git.324.8332acf1a63-150300.3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.6-150300.3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.4+git.324.8332acf1a63-150300.3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.4+git.324.8332acf1a63-150300.3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-150000.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-150000.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.4-150000.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-150000.5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-150000.3.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-150000.3.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.5.17-150000.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-150300.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-150300.9.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.345-150000.3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.345-150000.3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15-150100.8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.01-150300.7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.01-150300.7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.01-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1.150300.18.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.3-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-150200.14.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-150200.14.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-150300.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-150300.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-150300.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-150200.15.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-150200.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-150200.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.184-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.184-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-150100.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-150300.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22-150100.8.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22-150100.8.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.11-150000.3.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.11-150000.3.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-150000.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220809-150200.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.8-150200.5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.8-150200.5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.12-150200.8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.12-150200.8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.5-150200.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.5-150200.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.5-150200.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4.19~git46.c900a28c8-150300.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-150200.152.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-150200.9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.345-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.345-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-150200.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.03.1-150200.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.13-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.12-150300.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.12-150300.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.12-150300.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150300.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150300.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150300.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150300.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.27-150000.1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1657643023.0d694ce-150000.1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-150000.1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.5-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.14-150000.3.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0313-150000.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0313-150000.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.184-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.184-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-150300.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.7-150000.3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.0-150300.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.0-150300.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1.150300.18.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.2.2-150200.8.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-150000.3.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.49.0-150300.8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.6-150000.1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.6-150000.1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3_06-150300.3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3_06-150300.3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3_06-150300.3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.2-150300.8.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.12-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.12_ce-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.12_ce-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-150200.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-150200.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-150200.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.93-150300.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.93-150300.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-150300.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_150300.59.93-150300.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.17-150300.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.17-150300.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-150200.23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-150200.23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-150200.152.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102-150200.9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-150200.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-150000.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-150200.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-150200.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-150200.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.9-150100.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62.1-150300.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.8-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.8-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-150200.12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.08.9-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.08.9-150100.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-150300.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-150300.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.7-150200.3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.7-150100.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.4-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.4-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.8-150000.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.8-150000.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-150000.32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-150000.32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-150000.32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-150000.32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-150000.32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.11.13-150000.6.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.8-150200.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.8-150200.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.8-150200.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-150200.10.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.12-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-150200.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-150000.5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-150000.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-150000.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.25-150300.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.1-150200.15.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.1-150200.15.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-150300.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-150300.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.40.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.40.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.6.2-150300.14.22.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.6.2-150300.14.22.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150300.118.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.118.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_06-150300.3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_06-150300.3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_06-150300.3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-150000.1.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-150000.1.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-150100.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.7-150000.1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.7-150000.1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150300.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150300.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.49.1.150300.18.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5+126+suse.8ce8da5-150300.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3+173+suse.7dd1b01-150000.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-150200.152.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150000.12.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150100.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150100.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150300.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1661440542.6cbe0da-150000.1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.15-150000.3.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.10-150200.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-150300.8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42-150300.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42-150300.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1.150300.18.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-150000.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-150000.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-4.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-4.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-4.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-4.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-150200.8.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150100.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150100.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150100.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-150300.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-150300.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-150000.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-150100.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-150200.22.5.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.5.17-150000.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-150000.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.2-150000.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.2-150000.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-150200.4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-150200.4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-150200.4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-150000.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-150000.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-150200.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.49.0-150300.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.2-150300.8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-150200.4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-150200.4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-150200.4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150000.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_08-150300.3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_08-150300.3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5_08-150300.3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.1~0-150300.7.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:330-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.527.8d0c05d313e-150300.3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.527.8d0c05d313e-150300.3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.527.8d0c05d313e-150300.3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.527.8d0c05d313e-150300.3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.8+git.527.8d0c05d313e-150300.3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-150200.15.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-150000.4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6.P1-150000.6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.4.2-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.45.0-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.3-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-150200.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1.150300.18.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.3-150000.1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.3-150000.1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-150000.1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-150000.1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-150200.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-150200.152.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-150200.3.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.15-150300.4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.15-150300.4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0~git5.14a4b8b-150300.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-150300.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0-150000.3.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0-150000.3.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-150000.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-150000.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-150300.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-150300.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-150200.8.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4.19~git59.136fc84-150300.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-150300.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-150100.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-150100.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-150100.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-150100.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-150100.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39-150100.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-150000.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-150000.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-150200.11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-150200.11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.20-150000.3.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.20-150000.3.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150300.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150300.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.14-150200.6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-150100.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-150100.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.8-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.8-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3-150300.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3-150300.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-150000.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-150000.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-150000.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-150300.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352-150200.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352-150200.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21.1-150200.15.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21.1-150200.15.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-150000.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-150000.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.21-150300.7.35.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0814-150000.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0814-150000.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.2-150200.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.2-150200.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.2-150200.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-150200.15.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-7.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-7.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-7.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-150000.1.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-150200.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-150000.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.1-150200.8.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.2-150300.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.11-150300.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.3-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.3-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.3-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.12+git.535.7750e5c95ef-150300.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.12+git.535.7750e5c95ef-150300.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.12+git.535.7750e5c95ef-150300.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.12+git.535.7750e5c95ef-150300.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.12+git.535.7750e5c95ef-150300.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.4-150000.1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.4-150000.1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-150000.1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-150000.1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.13-150200.3.29.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1665997480.587fa10-150000.1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.16-150000.3.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352-150000.3.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352-150000.3.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-150000.3.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-150200.152.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.12-150000.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-150200.22.5.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.18-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.9.536+g41a9f9a5573-150300.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.9.536+g41a9f9a5573-150300.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.9.536+g41a9f9a5573-150300.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150300.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-150200.8.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.3-150000.1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.3-150000.1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-150300.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1.150300.18.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1040-150000.5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1040-150000.5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-150200.4.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.49.0-150300.8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:246.16-150300.7.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-8.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220207-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.1-8.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.2.4-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.10-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.10-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.47-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-152.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.0-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.0-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.12-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.14-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.14-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-150300.4.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-150300.4.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4+git20220104.962774f-150300.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4+git20220104.962774f-150300.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150300.4.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-150300.4.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150300.4.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.2-150300.4.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.15-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.15-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.27-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.27-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.54.1.150300.18.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.1-150300.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-152.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.2-8.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.14.0-3.74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.14.0-3.74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.19-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.0-150300.21.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.0-150300.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.0-150300.7.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150300.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150300.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.20.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.20.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.20.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.15-150300.4.2.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.15-150300.4.2.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-3.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5.1-150300.14.22.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5.1-150300.14.22.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-150300.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-150200.8.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.112.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.112.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150300.112.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.112.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.112.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0_0_g155821a-150300.112.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150300.112.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150300.112.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.4_02-150300.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.4_02-150300.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.4_02-150300.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150300.22.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150300.22.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150000.12.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-150300.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.12-150300.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.12-150300.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1+git.1667812208.4db963e-150200.3.15.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
